Você está na página 1de 1187

iManager U2000 Unified Network Management

System
V200R014C50

Operation Guide for Common


Features
Issue

03

Date

2014-12-10

HUAWEI TECHNOLOGIES CO., LTD.

Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved.


No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions


and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address:

Huawei Industrial Base


Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website:

http://www.huawei.com

Email:

support@huawei.com

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

About This Document

About This Document


Related Version
The following table lists the product version related to this document.
Product Name

Version

iManager U2000

V200R014C50

Intended Audience
This document describes the operations for common features on the U2000.
This document guides the user to understand basic operations of the U2000.
The document is intended for:
l

Data configuration engineers

NM administrators

System maintenance engineers

Symbol Conventions
The following symbols may be found in this document. They are defined as follows.
Symbol

Description
Indicates an imminently hazardous situation
which, if not avoided, will result in death or
serious injury.
Indicates a potentially hazardous situation
which, if not avoided, could result in death or
serious injury.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

ii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Symbol

About This Document

Description
Indicates a potentially hazardous situation
which, if not avoided, may result in minor or
moderate injury.
Indicates a potentially hazardous situation
which, if not avoided, could result in
equipment damage, data loss, performance
deterioration, or unanticipated results.
NOTICE is used to address practices not
related to personal injury.
Calls attention to important information, best
practices and tips.
NOTE is used to address information not
related to personal injury, equipment damage,
and environment deterioration.

Command Conventions
The command conventions that may be found in this document are defined as follows.

Issue 03 (2014-12-10)

Convention

Description

Boldface

The keywords of a command line are in


boldface.

Italic

Command arguments are in italic.

[]

Items (keywords or arguments) in square


brackets [ ] are optional.

{ x | y | ... }

Alternative items are grouped in braces and


separated by vertical bars. One is selected.

[ x | y | ... ]

Optional alternative items are grouped in


square brackets and separated by vertical
bars. One or none is selected.

{ x | y | ... } *

Alternative items are grouped in braces and


separated by vertical bars. A minimum of one
or a maximum of all can be selected.

[ x | y | ... ] *

Optional alternative items are grouped in


square brackets and separated by vertical
bars. A maximum of all or none can be
selected.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

About This Document

GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention

Description

Boldface

Buttons, menus, parameters, tabs, window,


and dialog titles are in boldface. For example,
click OK.

>

Multi-level menus are in boldface and


separated by the ">" signs. For example,
choose File > Create > Folder.

Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes in earlier issues.

Changes in Issue 03 (2014-12-10) Based on Product Version V200R014C50


The third release. It has the following update:
l

In chapter "Topology Management", added the description and the note about
Automatically Allocate IP Address in "Creating Fibers Manually", "Creating Links
Automatically" and "Creating Fiber/Cable Connections in Batches".

In chapter "Inventory Management", added the description and the note about
Automatically Allocate IP Address in "Importing Link Data".

In chapter "Inventory Management", changed the picture of step 2 in "Setting the Line Shape
and Width for New Fiber/Cable/Microwave Link".

Changes in Issue 02 (2014-10-10) Based on Product Version V200R014C50


The second release. It has the following update:
In chapter "Inventory Management", changed the picture of step 2 in "Setting the Line Shape
and Width for New Fiber/Cable/Microwave Link".

Changes in Issue 01 (2014-08-13) Based on Product Version V200R014C50


Initial field trail release.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iv

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

Contents
About This Document.....................................................................................................................ii
1 Getting Started...............................................................................................................................1
1.1 Precautions for Using the U2000 Safely........................................................................................................................4
1.2 Starting the U2000 System...........................................................................................................................................12
1.2.1 Starting the U2000 Server in a Windows Single-Server System..............................................................................12
1.2.1.1 Powering On the Server Safely..............................................................................................................................12
1.2.1.2 Starting the Database..............................................................................................................................................14
1.2.1.3 Starting the U2000 Server Processes......................................................................................................................15
1.2.2 Starting the U2000 Server in a Solaris Single-Server System...................................................................................16
1.2.2.1 Powering On the Server Safely..............................................................................................................................16
1.2.2.2 Starting the Database..............................................................................................................................................21
1.2.2.3 Starting the U2000 Server Processes......................................................................................................................23
1.2.3 Starting the U2000 Server in a SUSE Linux Single-Server System.........................................................................25
1.2.3.1 Powering On the Server Safely..............................................................................................................................25
1.2.3.2 Starting the Database..............................................................................................................................................27
1.2.3.3 Starting the U2000 Server Processes......................................................................................................................29
1.2.4 Starting the U2000 Server in a Solaris High Availability System............................................................................30
1.2.4.1 Powering On the Server Safely..............................................................................................................................30
1.2.4.2 Starting the Database..............................................................................................................................................34
1.2.4.3 Starting the U2000 Server Processes......................................................................................................................37
1.2.5 Starting the U2000 Server in a SUSE Linux High Availability System...................................................................38
1.2.5.1 Powering On the Server Safely..............................................................................................................................39
1.2.5.2 Starting the Database..............................................................................................................................................41
1.2.5.3 Starting the U2000 Server Processes......................................................................................................................43
1.2.6 Logging In to a U2000 Client....................................................................................................................................45
1.3 Shutting Down a U2000...............................................................................................................................................48
1.3.1 Shutting Down U2000 Clients...................................................................................................................................48
1.3.2 Shutting Down the U2000 Server (Single Server System, Windows)......................................................................49
1.3.2.1 Stopping the U2000 Server Processes....................................................................................................................49
1.3.2.2 Shutting Down the Database..................................................................................................................................50
1.3.2.3 Powering Off the Server Safely..............................................................................................................................51
1.3.3 Shutting Down the U2000 Server (Single Server System, Solaris)..........................................................................51
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

1.3.3.1 Stopping the U2000 Server Processes....................................................................................................................51


1.3.3.2 Shutting Down the Database..................................................................................................................................52
1.3.3.3 Power Off the Server Safely...................................................................................................................................54
1.3.4 Shutting Down the U2000 Server (Single Server System, SUSE Linux).................................................................54
1.3.4.1 Stopping the U2000 Server Processes....................................................................................................................55
1.3.4.2 Shutting Down the Database..................................................................................................................................55
1.3.4.3 Powering Off the Server Safely..............................................................................................................................57
1.3.5 Shutting Down the U2000 Server in a High Availability System (Solaris)..............................................................57
1.3.5.1 Stopping the U2000 Server Processes....................................................................................................................57
1.3.5.2 Shutting Down the Database..................................................................................................................................59
1.3.5.3 Stopping the VCS Service......................................................................................................................................60
1.3.5.4 Power Off the Server Safely...................................................................................................................................61
1.3.6 Shutting Down the U2000 Server in a High Availability System (PC Linux)..........................................................61
1.3.6.1 Stopping the U2000 Server Processes....................................................................................................................61
1.3.6.2 Shutting Down the Database..................................................................................................................................63
1.3.6.3 Stopping the VCS Service......................................................................................................................................64
1.3.6.4 Power Off the Server Safely...................................................................................................................................65
1.4 Using the Workbench and Favorites Folder.................................................................................................................65
1.4.1 Placing a Shortcut Icon on the Workbench...............................................................................................................65
1.4.2 Adding a Common Function to the Favorites Folder................................................................................................66
1.4.3 Viewing Common Functions.....................................................................................................................................67
1.5 Setting the Character Set of an NE...............................................................................................................................68
1.5.1 Character Set..............................................................................................................................................................68
1.5.2 Setting or Modifying Character Sets.........................................................................................................................71
1.6 Main Windows and Common Operations of the U2000..............................................................................................72
1.6.1 Client GUI in the Application Style..........................................................................................................................72
1.6.2 Quick Start for Clients in the Application Style........................................................................................................79
1.6.3 Client GUI in the Traditional Style...........................................................................................................................82
1.6.4 Key GUI Components...............................................................................................................................................83
1.6.5 Frequently Used Buttons...........................................................................................................................................85
1.6.6 Frequently Used Shortcut Icon..................................................................................................................................87
1.6.7 Keyboard Shortcuts...................................................................................................................................................93
1.6.8 Main Windows..........................................................................................................................................................96
1.6.8.1 Workbench..............................................................................................................................................................96
1.6.8.2 Main Topology.......................................................................................................................................................96
1.6.8.3 NE Explorer..........................................................................................................................................................101
1.6.8.4 NE Panel...............................................................................................................................................................102
1.6.8.5 Browse Alarm.......................................................................................................................................................103
1.6.8.6 Browse Event........................................................................................................................................................104
1.6.9 Operations Frequently-Performed on the User Interface.........................................................................................105
1.6.9.1 Filtering Operation Objects in a View..................................................................................................................105
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

vi

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

1.6.9.2 Searching for NEs in a View................................................................................................................................107


1.6.9.3 Collecting Statistics on the Number of NEs.........................................................................................................108
1.6.9.4 Customizing Parameter Display...........................................................................................................................109
1.6.9.5 Copying Table Texts Quickly...............................................................................................................................110
1.6.9.6 Monitoring Alarms...............................................................................................................................................110
1.7 How to Obtain Version Information About the U2000..............................................................................................112
1.8 Customizing the Client GUI Effect............................................................................................................................112
1.8.1 Setting the Client Skin.............................................................................................................................................113
1.8.2 Setting the Client Display Style...............................................................................................................................113
1.8.3 Setting the Main Window Title...............................................................................................................................114
1.8.4 Setting the Topology View Display........................................................................................................................115
1.8.5 Setting the Font Size................................................................................................................................................118
1.8.6 Setting the Output Information................................................................................................................................118
1.8.7 Setting the Workbench............................................................................................................................................120
1.8.8 Setting the Menu Collapse.......................................................................................................................................123
1.8.9 Setting the Colors of Alarms...................................................................................................................................124
1.8.10 Highlighting Alarms..............................................................................................................................................125
1.8.11 Setting the Alarm Font..........................................................................................................................................126
1.8.12 Setting the Alarm Display Mode...........................................................................................................................127
1.8.13 Setting the Display Properties of New Alarm/Event.............................................................................................129
1.8.14 Setting the Alarm Display in the Topology View.................................................................................................130
1.8.15 Setting the Number Format of the Client..............................................................................................................133
1.8.16 Setting Board Color...............................................................................................................................................134
1.8.17 Setting the Time and Date Formats of the Client..................................................................................................135
1.8.17.1 Setting the Time Format of the Client................................................................................................................135
1.8.17.2 Setting the Date Format of the Client.................................................................................................................136
1.8.17.3 Setting the Time Mode of the Client..................................................................................................................137
1.8.18 Setting the Toolbar................................................................................................................................................138
1.9 Setting the Alert upon Network Disconnections........................................................................................................139
1.10 Checking Whether the Client Needs Upgrade..........................................................................................................140
1.11 Setting the Interval of Client Upgrade Check..........................................................................................................140
1.12 Locking the Client....................................................................................................................................................141
1.13 Unlocking the Client.................................................................................................................................................142
1.14 Setting the Level of Operation Logs Recorded by the Client...................................................................................143
1.15 Setting a Scheduled Task..........................................................................................................................................144
1.16 Broadcast Messages..................................................................................................................................................145
1.16.1 Setting Broadcast Parameters................................................................................................................................145
1.16.2 Sending Broadcast Messages.................................................................................................................................146
1.17 Applying for and Updating the U2000 License........................................................................................................147
1.17.1 U2000 License Precautions...................................................................................................................................148
1.17.2 Applying for a U2000 License..............................................................................................................................148
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

vii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

1.17.3 Updating the U2000 License.................................................................................................................................150


1.17.4 Checking the Status of the U2000 License............................................................................................................158
1.17.5 Revoking a License on the U2000.........................................................................................................................158
1.17.6 Querying the License Revocation Code on the U2000.........................................................................................159
1.17.7 Setting Periodic Export of the U2000 License......................................................................................................160
1.17.8 Setting the NE Capacity Threshold for the U2000 License..................................................................................161
1.17.9 Collecting Port Statistics of Service Licenses.......................................................................................................162
1.18 Starting the Web Client............................................................................................................................................163
1.19 Starting the NE Data Collection...............................................................................................................................164
1.20 Customizing Naming Rule.......................................................................................................................................165
1.21 U2000 Process List...................................................................................................................................................167
1.22 GUI Input and Display Conventions........................................................................................................................249
1.23 Mutual Exclusion List for Multiclient Operations...................................................................................................251

2 Network Management Process...............................................................................................255


2.1 MSTP Network Management Process........................................................................................................................256
2.2 WDM Network Management Process........................................................................................................................257
2.3 RTN Network Management Process..........................................................................................................................261
2.4 PTN Network Management Process...........................................................................................................................262
2.5 Router and Switch Network Management Process....................................................................................................263
2.6 Access Network Management Process.......................................................................................................................269
2.7 Core Network Management Process..........................................................................................................................272
2.8 Security NE Network Management Process..............................................................................................................272

3 Security Management...............................................................................................................274
3.1 User Security..............................................................................................................................................................276
3.2 Managing User Rights................................................................................................................................................282
3.2.1 Getting to Know Operation Rights Management....................................................................................................282
3.2.1.1 Rights....................................................................................................................................................................282
3.2.1.2 U2000 Authorization Principles...........................................................................................................................283
3.2.1.3 Users and User Groups.........................................................................................................................................290
3.2.1.4 Object and Object Set...........................................................................................................................................292
3.2.1.5 Domain.................................................................................................................................................................293
3.2.1.6 Operation and Operation Set................................................................................................................................294
3.2.2 Scenarios for Operation Right Management...........................................................................................................297
3.2.3 Authorization Plan...................................................................................................................................................300
3.2.4 Assigning Rights to Users.......................................................................................................................................312
3.2.4.1 Authorization Process...........................................................................................................................................312
3.2.4.2 Creating User-Defined Object Sets......................................................................................................................313
3.2.4.3 Creating User-Defined Operation Sets.................................................................................................................315
3.2.4.4 Creating and Authorizing U2000 User Groups....................................................................................................318
3.2.4.5 Creating Users and Adding Them to User Groups...............................................................................................321
3.2.5 Transferring Operation Sets.....................................................................................................................................323
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

viii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

3.2.5.1 Exporting Operation Sets......................................................................................................................................324


3.2.5.2 Adding Operation Sets or Changing Operation Set Members in Batches............................................................325
3.2.5.3 Importing Operation Set Files..............................................................................................................................327
3.2.6 Operation Right Adjustment After Device Addition or Deletion............................................................................329
3.2.6.1 Adjusting Operation Rights After an NE Is Added..............................................................................................329
3.2.6.2 Adjusting Operation Rights After a Subnet Is Added..........................................................................................332
3.2.6.3 Adjusting Operation Rights After the Networking Structure Is Changed............................................................335
3.2.7 Operation Right Adjustment After Personnel's Responsibilities Change...............................................................335
3.2.7.1 Adjusting Operation Rights After the Scope of Managed Objects Is Changed...................................................335
3.2.7.2 Adjusting Operation Rights After the Scope of Operation Rights Is Changed....................................................337
3.2.7.3 Adjusting Operation Rights After Management Personnel's Posts Change.........................................................338
3.2.8 Querying Authorization...........................................................................................................................................339
3.2.8.1 Viewing Domains of a User or User Group.........................................................................................................339
3.2.8.2 Viewing Operation Rights of a User or User Group............................................................................................341
3.2.8.3 Viewing User Groups To Which a User Belongs.................................................................................................342
3.2.8.4 Querying User and User Group Authorization Details.........................................................................................343
3.2.8.5 Viewing Operations in an Operation Set..............................................................................................................344
3.2.8.6 Viewing Objects Contained in an Object Set.......................................................................................................345
3.2.8.7 Comparing U2000 User Rights............................................................................................................................346
3.2.9 FAQs About Authorization.....................................................................................................................................348
3.2.9.1 How Do I Determine an Operation Right Type?..................................................................................................348
3.2.9.2 How Do I Adjust Operation Rights After an NE Is Added?................................................................................349
3.2.9.3 How Do I Adjust Operation Rights After a Subnet Is Added?............................................................................352
3.2.9.4 How to Adjust Operation Rights After the Scope of Managed NEs Is Changed?...............................................354
3.2.9.5 How Do I Assign User Operation Rights That Do Not Belong to the User's User Group?.................................361
3.2.10 Configuration Examples of Security Management...............................................................................................361
3.2.10.1 Assigning Specific Operation Rights to an NMS User......................................................................................361
3.2.10.2 Adjusting User Rights........................................................................................................................................365
3.2.10.3 Example for Creating U2000 User Accounts and Allocating Rights in the Rights- and Domain-based Management
Scenario............................................................................................................................................................................370
3.3 User Security Policy Management.............................................................................................................................374
3.3.1 Security Policy Management...................................................................................................................................374
3.3.1.1 Setting the System ACL.......................................................................................................................................374
3.3.1.2 Setting a User ACL...............................................................................................................................................376
3.3.1.3 Setting the Proxy Service ACL............................................................................................................................377
3.3.1.4 Setting Account Policies.......................................................................................................................................379
3.3.1.5 Setting Password Policies.....................................................................................................................................380
3.3.1.6 Setting the Maximum Number of Sessions..........................................................................................................381
3.3.1.7 Setting the U2000 Login Mode............................................................................................................................382
3.3.1.8 Setting Auto-locking for a Client.........................................................................................................................384
3.3.2 Setting U2000 Data Transmission Security.............................................................................................................385
3.3.2.1 Setting a Secure Connection Between the U2000 Client and Server...................................................................386
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

ix

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

3.3.2.2 Setting the File Transfer Policy Between the Client and Server..........................................................................387
3.3.2.3 Configuring the Communication Between a Client and the U2000 Server in the NAT Scenario.......................387
3.3.3 Managing Passwords and Locking Clients..............................................................................................................390
3.3.3.1 Changing the Password of the Current User........................................................................................................390
3.3.3.2 Resetting the Password of an NMS user..............................................................................................................390
3.3.3.3 Modifying NMS user Information in Batches......................................................................................................391
3.3.3.4 Locking a Client Immediately..............................................................................................................................393
3.3.3.5 Unlocking the Client.............................................................................................................................................393
3.3.3.6 Setting Auto-locking for an NMS user.................................................................................................................394
3.3.4 Monitoring U2000 Users.........................................................................................................................................395
3.3.4.1 Monitoring NMS User Sessions...........................................................................................................................395
3.3.4.2 Monitoring NMS User Operations.......................................................................................................................396
3.3.4.3 Forcing U2000 Users to Log Out.........................................................................................................................397
3.3.4.4 Unlocking Users...................................................................................................................................................397
3.3.4.5 Sending Messages to Online Users......................................................................................................................399
3.3.5 Managing the Remote Maintenance User................................................................................................................399
3.4 Managing NE Security...............................................................................................................................................400
3.4.1 NE Security Management........................................................................................................................................400
3.4.2 Setting the NE ACL.................................................................................................................................................402
3.4.2.1 Overview of ACL.................................................................................................................................................402
3.4.2.2 Setting Basic ACL Rules......................................................................................................................................403
3.4.2.3 Setting the Advanced ACL Rules.........................................................................................................................404
3.4.3 Setting the Security Access of an NE......................................................................................................................405
3.4.3.1 Setting Ethernet Access for NEs..........................................................................................................................405
3.4.3.2 Setting Serial Port Access for NEs.......................................................................................................................406
3.4.3.3 Setting the OAM Access to NEs..........................................................................................................................406
3.4.3.4 Setting the COM Access to NEs...........................................................................................................................407
3.4.3.5 Setting the LCT Access to NEs............................................................................................................................407
3.4.4 Managing NE Login................................................................................................................................................408
3.4.4.1 Locking Out NE Login.........................................................................................................................................409
3.4.4.2 Locking Out NE Settings......................................................................................................................................409
3.4.4.3 Querying the Information About an Online NE User...........................................................................................410
3.4.4.4 Switching a Logged-In NE User..........................................................................................................................411
3.4.4.5 Forcing an NE User to Log Out of the U2000.....................................................................................................412
3.4.4.6 Setting NE Login Prompt Message......................................................................................................................412
3.4.5 Managing NE Users.................................................................................................................................................413
3.4.5.1 Querying the Additional Information of NE User................................................................................................413
3.4.5.2 Creating an NE User.............................................................................................................................................414
3.4.5.3 Modifying NE Users.............................................................................................................................................417
3.4.5.4 Changing an NE User Password...........................................................................................................................418
3.4.5.5 Querying NE Security Parameters........................................................................................................................419
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

3.4.5.6 Querying NE User Groups...................................................................................................................................419


3.4.5.7 Deleting NE Users................................................................................................................................................420
3.4.6 Configuring an NE As an SSH Server.....................................................................................................................420
3.4.7 Checking NE SSH Fingerprint................................................................................................................................424
3.5 Configuring NE RADIUS..........................................................................................................................................424
3.5.1 Overview.................................................................................................................................................................425
3.5.2 Setting an NE as an RADIUS Client or Proxy Server.............................................................................................428
3.5.3 Adding an RADIUS Server.....................................................................................................................................429
3.5.4 Setting NE RADIUS Parameters.............................................................................................................................429
3.6 Change Audit..............................................................................................................................................................430
3.6.1 Viewing Information About Change Audit.............................................................................................................430
3.6.2 Dumping Information About Change Audit............................................................................................................431
3.6.3 Deleting Information About Change Audit.............................................................................................................432
3.7 Database Security Policy............................................................................................................................................432
3.8 Log Management........................................................................................................................................................433
3.8.1 Log Management Overview....................................................................................................................................433
3.8.1.1 Log Management Policy.......................................................................................................................................433
3.8.1.2 Log Type...............................................................................................................................................................434
3.8.1.2.1 U2000 System Logs...........................................................................................................................................435
3.8.1.2.2 U2000 Security Logs.........................................................................................................................................436
3.8.1.2.3 U2000 Operation Logs......................................................................................................................................437
3.8.1.2.4 Syslog Run Logs of IP NEs...............................................................................................................................439
3.8.1.2.5 Syslog Operation Logs of Access NEs..............................................................................................................440
3.8.1.2.6 Security Logs of Transport NEs........................................................................................................................441
3.8.1.3 Syslog Service......................................................................................................................................................442
3.8.2 Managing U2000 System Logs...............................................................................................................................446
3.8.2.1 Querying U2000 System Logs.............................................................................................................................446
3.8.2.2 Collecting Statistics on U2000 System Logs.......................................................................................................447
3.8.3 Managing U2000 Security Logs..............................................................................................................................449
3.8.3.1 Querying U2000 Security Logs............................................................................................................................449
3.8.3.2 Collecting Statistics on U2000 Security Logs......................................................................................................451
3.8.4 Managing U2000 Operation Logs...........................................................................................................................454
3.8.4.1 Querying U2000 Operation Logs.........................................................................................................................454
3.8.4.2 Collecting Statistics on U2000 Operation Logs...................................................................................................456
3.8.5 Setting U2000 Log Templates.................................................................................................................................459
3.8.6 Managing U2000 Log Data.....................................................................................................................................460
3.8.6.1 Setting U2000 Log Dump.....................................................................................................................................460
3.8.6.2 Setting U2000 Log Overflow Dump....................................................................................................................462
3.8.6.3 Manually Dumping U2000 Logs..........................................................................................................................463
3.8.6.4 Setting U2000 Log Export....................................................................................................................................465
3.8.6.5 Setting Device Log Dump....................................................................................................................................466
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xi

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

3.8.6.6 Setting U2000 Log Forwarding............................................................................................................................467


3.8.6.6.1 Getting to Know Log Forwarding.....................................................................................................................467
3.8.6.6.2 Enabling Logging to U2000 Syslog Database...................................................................................................468
3.8.6.6.3 Setting the Interconnection Between the U2000 and the Syslog Server...........................................................469
3.8.6.6.4 Managing the Connection Between the U2000 and the Syslog Server.............................................................472
3.8.7 Managing Logs of the IP NE Side...........................................................................................................................472
3.8.7.1 Configuring the Information Center on the NEs..................................................................................................473
3.8.7.1.1 Enabling the Information Center.......................................................................................................................473
3.8.7.1.2 Configuring the Syslog Source Interface...........................................................................................................474
3.8.7.1.3 Adding a Syslog Host........................................................................................................................................474
3.8.7.1.4 Configuring the Advanced Attributes of the Syslog Service............................................................................475
3.8.7.2 Browsing the NE Syslog Run Logs......................................................................................................................476
3.8.8 Managing Logs of the Access NE Side...................................................................................................................477
3.8.8.1 Browsing NE Syslog Operation Logs..................................................................................................................477
3.8.8.2 Browsing Login Logs of NE Users......................................................................................................................479
3.8.9 Managing Transport NE Logs.................................................................................................................................480
3.8.9.1 Transferring NE Logs to a Syslog Server.............................................................................................................480
3.8.9.1.1 Setting a Syslog Server......................................................................................................................................480
3.8.9.1.2 Setting a Syslog GNE........................................................................................................................................481
3.8.9.1.3 Setting the Syslog Type and Severity................................................................................................................481
3.8.9.1.4 Starting the Syslog Service................................................................................................................................482
3.8.9.2 Viewing Security Logs of NEs.............................................................................................................................482
3.8.9.3 Viewing Operation Logs of NEs..........................................................................................................................483

4 Topology Management.............................................................................................................485
4.1 Overview of Topology Management..........................................................................................................................487
4.1.1 Topology Management Function.............................................................................................................................487
4.1.2 Types of Topology Views.......................................................................................................................................489
4.1.3 Objects in a Topology View....................................................................................................................................493
4.1.4 Automatic Topology Discovery..............................................................................................................................498
4.1.5 Alarm Indication in a Topology View.....................................................................................................................499
4.2 Network Topology Construction Process...................................................................................................................500
4.3 Designing a Physical Topology..................................................................................................................................504
4.4 Creating a Subnet........................................................................................................................................................505
4.5 Setting Parameters for the Communication Between the U2000 and NEs................................................................506
4.5.1 Protocols for Communication Between the U2000 and NEs..................................................................................507
4.5.2 Setting SNMP Parameters.......................................................................................................................................512
4.5.2.1 Configuring the Default SNMP Parameters Template.........................................................................................512
4.5.2.2 Setting NE SNMP Parameters..............................................................................................................................513
4.5.3 Setting Telnet/STelnet Parameters..........................................................................................................................516
4.5.3.1 Configuring a Telnet/STelnet Parameter Template..............................................................................................516
4.5.3.2 Setting Telnet/STelnet Parameters with a Template............................................................................................518
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

4.5.3.3 Manually Setting Telnet/STelnet Parameters.......................................................................................................520


4.5.4 Setting NETCONF Parameters................................................................................................................................522
4.5.4.1 Configuring the Default NETCONF Parameters Template..................................................................................522
4.5.4.2 Setting NE NETCONF Parameters......................................................................................................................523
4.5.5 Configuring the xFTP Service.................................................................................................................................525
4.5.5.1 Creating an FTP Account and Adding it to an FTP Application..........................................................................525
4.5.5.2 Testing the FTP Service.......................................................................................................................................528
4.5.5.3 Configuring the NAT Address Translation..........................................................................................................528
4.6 Creating NEs...............................................................................................................................................................531
4.6.1 Creating NEs in Batches..........................................................................................................................................531
4.6.1.1 Creating Transport/PTN NEs in Batches..............................................................................................................532
4.6.1.2 Creating SNMP/ICMP NEs in Batches................................................................................................................534
4.6.1.3 Creating Core Network NEs in Batches...............................................................................................................540
4.6.1.4 Importing/Exporting NEs in Batches...................................................................................................................542
4.6.2 Creating a Single NE...............................................................................................................................................545
4.6.2.1 Creating Optical NEs............................................................................................................................................546
4.6.2.2 Creating a Single Transport NE............................................................................................................................546
4.6.2.3 Creating a Single PTN NE(USP Platform)...........................................................................................................550
4.6.2.4 Creating a Single PTN NE (VRP V800)..............................................................................................................553
4.6.2.5 Creating a Single Router NE................................................................................................................................554
4.6.2.6 Creating a Single Switch NE................................................................................................................................556
4.6.2.7 Creating a Single Security NE..............................................................................................................................558
4.6.2.8 Creating an Access NE.........................................................................................................................................559
4.6.2.9 Creating a Single BITS NE..................................................................................................................................561
4.6.2.10 Creating a Single RPS NE..................................................................................................................................563
4.6.2.11 Creating a Single Third-Party NE......................................................................................................................564
4.6.2.12 Creating Virtual NEs..........................................................................................................................................565
4.6.2.13 Creating a Single NGN NE................................................................................................................................566
4.6.2.14 Creating a Single IMS NE..................................................................................................................................567
4.6.3 Setting the Time Discovery Policy for NEs............................................................................................................570
4.6.4 Setting the Security SSL Connection Mode for Transport NEs..............................................................................572
4.7 Configuring the NE Data............................................................................................................................................579
4.7.1 Synchronizing NE Configuration Data....................................................................................................................579
4.7.2 Configuring the NE Data Manually.........................................................................................................................582
4.7.3 Replicating the NE Data..........................................................................................................................................583
4.7.4 Uploading the NE Data............................................................................................................................................586
4.7.5 Configuring Virtual NE Data..................................................................................................................................587
4.7.6 Adding Boards.........................................................................................................................................................588
4.8 Creating Connections.................................................................................................................................................589
4.8.1 Creating Fibers Manually........................................................................................................................................590
4.8.2 Creating Fibers/Cables Automatically.....................................................................................................................592
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xiii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

4.8.3 Creating Fiber/Cable Connections in Batches.........................................................................................................594


4.8.4 Creating a Link Manually........................................................................................................................................595
4.8.5 Creating Links Automatically.................................................................................................................................597
4.8.6 Creating Inter Fibers Inside a WDM NE.................................................................................................................602
4.8.7 Synchronizing Fiber/Cable Connection Data Inside a WDM NE...........................................................................604
4.8.8 Automatically Creating Microwave Links..............................................................................................................605
4.8.9 Manually Creating Microwave Links......................................................................................................................606
4.8.10 Creating Cables Manually.....................................................................................................................................609
4.8.11 Creating Virtual Fibers..........................................................................................................................................611
4.8.12 Restoring the Fiber Connection.............................................................................................................................614
4.9 Maintaining a Network Topology View.....................................................................................................................614
4.9.1 Creating Custom Views...........................................................................................................................................615
4.9.2 Adjusting Topology Objects....................................................................................................................................616
4.9.2.1 Expanding the Capacity of the Transport NE Management Process....................................................................616
4.9.2.2 Balancing Load of an NE Explorer......................................................................................................................618
4.9.2.3 Modifying the NE ID and Extended ID................................................................................................................621
4.9.2.4 Modifying the NE Name......................................................................................................................................622
4.9.2.5 Modifying the NE IP Address..............................................................................................................................622
4.9.2.6 Modifying the Optical NE Name..........................................................................................................................623
4.9.2.7 Adjusting Optical NE Resource...........................................................................................................................624
4.9.2.8 Modifying the Status of Preconfigured NEs in Batches.......................................................................................624
4.9.2.9 Modifying the NMS Name...................................................................................................................................625
4.9.2.10 Modifying Fiber/Cable Information...................................................................................................................626
4.9.2.11 Naming a Fiber/Cable/Microwave Link.............................................................................................................626
4.9.2.12 Copying Topology Objects.................................................................................................................................627
4.9.2.13 Moving Topology Objects..................................................................................................................................628
4.9.2.14 Modifying Topology Objects.............................................................................................................................630
4.9.2.15 Laying Out Topology Objects Automatically....................................................................................................631
4.9.3 Setting the NE Maintenance Information................................................................................................................632
4.9.4 Setting the Maintenance Personnel Information.....................................................................................................633
4.9.5 Deleting Topology Objects......................................................................................................................................634
4.9.5.1 Deleting a Subnet..................................................................................................................................................634
4.9.5.2 Deleting Boards....................................................................................................................................................635
4.9.5.3 Deleting Sub-boards.............................................................................................................................................635
4.9.5.4 Deleting Connections...........................................................................................................................................636
4.9.5.5 Deleting NEs.........................................................................................................................................................637
4.9.5.6 Deleting an Optical NE.........................................................................................................................................638
4.10 Viewing Topology Information................................................................................................................................639
4.10.1 Searching for NEs in a View.................................................................................................................................639
4.10.2 Browsing Fibers/Cables.........................................................................................................................................640
4.10.2.1 Viewing the Connection Status..........................................................................................................................640
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xiv

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

4.10.2.2 Querying Fiber/Cable/Microwave Link Information.........................................................................................642


4.10.2.3 Querying Relevant Trails of a Fiber/Cable.........................................................................................................642
4.10.2.4 Querying Relevant Optical Power of a Fiber/Cable...........................................................................................643
4.10.2.5 Querying the Performance Data of a Microwave Link......................................................................................644
4.10.3 Setting the Topology Background.........................................................................................................................646
4.10.4 Filtering Operation Objects in a View...................................................................................................................647
4.10.5 Viewing the Meanings of Topology Icons............................................................................................................650
4.10.6 Viewing Topology Object Information.................................................................................................................651
4.10.7 Viewing the Topology Aerial View......................................................................................................................652
4.10.8 Setting Startup subnet............................................................................................................................................653
4.10.9 Customizing the Topology Toolbar.......................................................................................................................654
4.11 Topology Management Examples............................................................................................................................655
4.11.1 Creating a Transport Network Topology...............................................................................................................655
4.11.2 Creating an IP Network Topology.........................................................................................................................659
4.11.3 Creating an Access Network Topology.................................................................................................................664
4.11.4 Creating a Security Network Topology.................................................................................................................670
4.11.5 Creating a NGN Network Topology.....................................................................................................................679
4.11.6 Creating an IMS Network Topology.....................................................................................................................683
4.11.7 Moving an NE from One Subnet to Another.........................................................................................................688

5 Time Localization Management.............................................................................................690


5.1 Time Localization.......................................................................................................................................................691
5.2 Setting Time Localization on the U2000....................................................................................................................692
5.2.1 Setting the Time Display Format.............................................................................................................................692
5.2.2 Setting the Time Mode of the Client.......................................................................................................................692
5.3 Setting Time Localization on NEs..............................................................................................................................693
5.3.1 Setting a Time Zone for an NE................................................................................................................................693
5.3.2 Setting DST on NEs................................................................................................................................................694

6 Alarm Management...................................................................................................................696
6.1 Basic Concepts...........................................................................................................................................................698
6.1.1 Alarms and Events...................................................................................................................................................698
6.1.2 Alarm Severities......................................................................................................................................................698
6.1.3 Alarm Status............................................................................................................................................................699
6.1.4 Alarm Category.......................................................................................................................................................700
6.1.5 Alarm Notification...................................................................................................................................................701
6.1.6 Current Alarms and Historical Alarms....................................................................................................................705
6.1.7 Alarm Basic Operations...........................................................................................................................................706
6.1.8 Alarm Setting Operations........................................................................................................................................708
6.2 Overview of Fault Operations....................................................................................................................................715
6.3 Setting Remote Alarm or Event Notification.............................................................................................................716
6.3.1 Commissioning the SMS Gateway..........................................................................................................................716
6.3.1.1 Setting Parameters for Alarm Notification by the SMS Gateway........................................................................716
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xv

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

6.3.1.2 Verifying the SMS Gateway.................................................................................................................................718


6.3.2 Commissioning Alarm Notification by Email.........................................................................................................719
6.3.2.1 Setting Parameters for Alarm Notification by Email...........................................................................................719
6.3.2.2 Verifying Remote Alarm Notification by Email..................................................................................................721
6.3.3 Commissioning the Wireless Modem......................................................................................................................722
6.3.3.1 Installing the Wireless Modem.............................................................................................................................722
6.3.3.2 Commissioning the Wireless Modem in Solaris or SUSE Linux.........................................................................725
6.3.3.3 Commissioning the Wireless Modem in Windows..............................................................................................726
6.3.3.4 Setting Parameters for Alarm Notification by the Wireless Modem....................................................................732
6.3.3.5 Verifying the Wireless Modem............................................................................................................................734
6.3.4 Setting the Format of Remote Alarm or Event Notification Messages...................................................................735
6.3.5 Setting Delay Delivery of Remote Alarm or Event Notification Messages............................................................736
6.3.6 Setting the Remote Alarm or Event Notification Rule............................................................................................737
6.3.7 Downloading Remote Notification Logs.................................................................................................................739
6.4 Analyzing Alarm Correlation.....................................................................................................................................739
6.4.1 Introduction to Correlation Rules............................................................................................................................740
6.4.2 Analyzing Root Alarms Based on Customized Rules.............................................................................................741
6.4.2.1 Setting Default Alarm Correlation Rules.............................................................................................................741
6.4.2.2 Analyzing Root Alarms and Events According to Customized Rules.................................................................742
6.4.3 Trail Alarm Correlation Analysis - Analyzing Root Alarms..................................................................................743
6.4.3.1 Trail Root Alarm Analysis...................................................................................................................................743
6.4.3.2 Setting the Rules for Trail Alarm Correlation Analysis.......................................................................................746
6.4.3.3 Analyzing Root Alarms Based on Trail Alarm Correlation Rules.......................................................................747
6.4.4 Setting an Alarm or Event Frequency Analysis Rule..............................................................................................748
6.4.5 Setting an Intermittent Alarm or Repeat Event Analysis Rule................................................................................749
6.4.6 Setting a Time Analysis Rule for Acknowledged and Uncleared Alarms..............................................................751
6.4.7 Example of Analyzing Root Alarms According to Customized Rules...................................................................752
6.4.8 Example of Alarm or Event Frequency Analysis....................................................................................................754
6.4.9 Example of Intermittent Alarm or Repeated Event Analysis..................................................................................755
6.4.10 Example of Acknowledged and Uncleared Alarm Time Analysis........................................................................756
6.5 Setting Automatic Alarm/Event Processing...............................................................................................................756
6.5.1 Setting Rules for Automatic Reporting Alarms or Events......................................................................................756
6.5.1.1 Setting Automatic Reporting Status for Alarms of an NE...................................................................................756
6.5.1.2 Setting Automatic Reporting Status for Alarms of a Board.................................................................................757
6.5.2 Setting Alarm Automatic Synchronization..............................................................................................................758
6.5.3 Setting an Alarm or Event Mask Rule.....................................................................................................................759
6.5.4 Setting an Automatic Alarm Acknowledgment Rule..............................................................................................763
6.5.5 Modifying Alarm Severity.......................................................................................................................................764
6.5.5.1 Setting an Alarm or Event Redefinition Rule.......................................................................................................764
6.5.5.2 Modifying the Alarm Severity for an NE.............................................................................................................766
6.5.5.3 Modifying the Alarm Severity for a Board..........................................................................................................767
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xvi

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

6.5.6 Setting Alarm/Event Suppression Rules..................................................................................................................767


6.5.7 Setting an Alarm or Event Postprocessing Rule......................................................................................................769
6.5.8 Example of the Alarm or Event Postprocessing Script...........................................................................................770
6.5.9 Setting Summarized Parallel Alarm Rules..............................................................................................................770
6.5.10 Converting an Event to an ADMC Alarm.............................................................................................................772
6.5.11 Setting the Lifecycle of the Current Alarm...........................................................................................................773
6.5.12 Configuring Fiber-Related Alarms........................................................................................................................774
6.5.13 Setting an Alarm or Event Northbound Filtering Rule..........................................................................................775
6.6 Setting Alarm or Event Notification...........................................................................................................................776
6.6.1 Introduction to the Alarm Panel..............................................................................................................................777
6.6.2 Setting the Alarm Panel...........................................................................................................................................779
6.6.3 Setting the Alarm Sound..........................................................................................................................................780
6.6.4 Setting Prompt Colors of Alarms............................................................................................................................783
6.6.5 Setting the Alarm Box.............................................................................................................................................783
6.6.6 Disable the Alarm Sound.........................................................................................................................................785
6.6.7 Setting the Alarm Highlighting...............................................................................................................................786
6.6.8 Setting the Alarm Font............................................................................................................................................787
6.6.9 Setting the Alarm Display Mode.............................................................................................................................788
6.6.10 Setting the Format of the Alarm Lamp Tooltip.....................................................................................................790
6.6.11 Setting the Display Properties of New Alarms/Events..........................................................................................791
6.6.12 Setting the Alarm Display in the Topology View.................................................................................................792
6.7 Managing an Alarm/Event Template.........................................................................................................................795
6.7.1 Alarm/Event Template............................................................................................................................................795
6.7.2 Creating an Alarm/Event Template.........................................................................................................................797
6.7.3 Setting Template Status for the Current User..........................................................................................................800
6.7.4 Customizing Alarm/Event Attribute Template........................................................................................................802
6.8 Monitoring Network Alarms/Events..........................................................................................................................803
6.8.1 Alarm Reporting Process.........................................................................................................................................803
6.8.2 Setting Trap Parameters on an NE..........................................................................................................................807
6.8.3 Synchronizing Alarms.............................................................................................................................................808
6.8.3.1 Synchronizing NE Alarms Manually...................................................................................................................808
6.8.3.2 Synchronizing Current Alarms on NEs................................................................................................................809
6.8.4 Monitoring Alarms Using the Alarm Panel.............................................................................................................810
6.8.5 Monitoring Alarms or Events by Using the Topology View..................................................................................811
6.8.6 Monitoring Alarms by Using the Alarm Bar Chart.................................................................................................812
6.8.7 Monitoring Events by Using the Event Indicator....................................................................................................813
6.8.8 Monitoring NMS Alarms/Events Using Emergency Maintenance Notifications...................................................814
6.8.9 Setting Columns to Be Displayed in an Alarm/Event Window..............................................................................815
6.8.10 Browsing Current Alarms......................................................................................................................................818
6.8.11 Querying Alarm Logs............................................................................................................................................820
6.8.12 Browsing the Historical Alarms............................................................................................................................822
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xvii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

6.8.13 Querying Event Logs.............................................................................................................................................823


6.8.14 Browse Current Alarm by Severity.......................................................................................................................825
6.8.15 Browse Current Alarm by Status...........................................................................................................................826
6.8.16 Querying Alarms at the Opposite Port..................................................................................................................827
6.8.17 Setting Maintenance Regions................................................................................................................................828
6.8.18 Setting the Time Display Mode for Queried Alarms or Events............................................................................830
6.8.19 Locating Objects with Alarms/Events...................................................................................................................832
6.8.20 Collecting Statistics on Alarm Logs......................................................................................................................833
6.8.21 Collecting Statistics on Event Logs.......................................................................................................................835
6.8.22 Setting an NE Object Group..................................................................................................................................838
6.8.23 Setting an Alarm or Event Name Group...............................................................................................................839
6.9 Handling Alarms.........................................................................................................................................................841
6.9.1 Alarm Handling Procedure......................................................................................................................................841
6.9.2 Viewing Alarm or Event Details.............................................................................................................................843
6.9.3 Acknowledging an Alarm........................................................................................................................................845
6.9.4 Locating Objects with Alarms/Events.....................................................................................................................846
6.9.5 Checking NE Alarms...............................................................................................................................................847
6.9.6 Rectifying a Fault....................................................................................................................................................849
6.9.7 Masking Alarms......................................................................................................................................................849
6.9.8 Suppressing Alarms.................................................................................................................................................851
6.9.9 Clearing an Alarm Manually...................................................................................................................................853
6.9.10 Recording Alarm or Event Handling Experience..................................................................................................854
6.10 Managing Alarm or Event Data................................................................................................................................855
6.10.1 Alarm/Event Data Dumping..................................................................................................................................856
6.10.2 Setting a Scheduled Alarm/Event Log Dump Task...............................................................................................856
6.10.3 Setting Alarm/Event Overflow Dump...................................................................................................................857
6.10.4 Manually Dumping Alarms/Events.......................................................................................................................859
6.10.5 Setting Alarm or Event Log Scheduled Export.....................................................................................................860
6.11 Managing Maintenance Experience.........................................................................................................................861
6.11.1 Recording Alarm/Event Maintenance Experience................................................................................................861
6.11.2 Exporting Alarm or Event Handling Experience...................................................................................................862
6.11.3 Importing Alarm or Event Handling Experience...................................................................................................863
6.12 Managing the Alarm Maintenance Status................................................................................................................864
6.12.1 Configure a Construction Task for NEs................................................................................................................865
6.12.2 Configuring a Construction Task..........................................................................................................................867
6.12.3 Configuring Objects for a Construction Task........................................................................................................868
6.12.4 Setting the Alarm Maintenance Status..................................................................................................................871
6.13 Alarm Management (MSTP&WDM&RTN&PTN NE)...........................................................................................873
6.13.1 Suppressing Alarms...............................................................................................................................................873
6.13.1.1 Suppressing NE Alarms......................................................................................................................................873
6.13.1.2 Suppressing Alarms of a Board or Port..............................................................................................................874
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xviii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

6.13.1.3 Suppressing the Alarms on an ATM Connection...............................................................................................875


6.13.1.4 Checking Path Alarm Suppression Status..........................................................................................................876
6.13.2 Setting Alarm Reversion.......................................................................................................................................876
6.13.2.1 Setting the Alarm Reversion Mode of an NE.....................................................................................................877
6.13.2.2 Setting the Alarm Reversion for Specified Resources.......................................................................................878
6.13.2.3 Setting Alarm Reversion for a Specified Port....................................................................................................881
6.13.2.4 Setting Alarm Reversion for an SDH Trail........................................................................................................882
6.13.2.5 Checking Path Alarm Reversion Status..............................................................................................................883
6.13.3 Setting the Types of Lower Order Services in the VC4 Path................................................................................883
6.13.4 Monitoring the Alarms and Performance of Lower Order Services in the VC4 Path...........................................884
6.13.5 Setting the Insertion Mode for Channels Not Configured with Services..............................................................885
6.13.6 Specifying the Port QoS Alarm.............................................................................................................................886
6.13.6.1 Specifying Bit Error Alarm Threshold...............................................................................................................886
6.13.6.2 Enabling AIS Insertion for a Specified Channel................................................................................................887
6.13.6.3 Enabling UNEQ Insertion for a Specified Path..................................................................................................888
6.13.7 Configuring Alarm Insertion.................................................................................................................................888
6.13.7.1 Inserting an Alarm at a Specified Path...............................................................................................................888
6.13.7.2 Testing Trail Connectivity by Inserting an Alarm..............................................................................................889
6.13.7.3 Checking Path Alarm Insertion Status................................................................................................................890
6.13.8 Inserting a Maintenance Signal to the ODU Layer...............................................................................................891
6.13.9 Setting NE Alarm Attributes.................................................................................................................................891
6.13.9.1 Setting the Register Mode for NE Alarms..........................................................................................................891
6.13.9.2 Setting the Enabling Status of NE Alarm Correlation Suppression...................................................................892
6.13.9.3 Querying NE Alarm Correlation Rules..............................................................................................................893
6.13.9.4 Setting NE Alarm Delay.....................................................................................................................................894
6.13.10 Setting Triggered Alarm Insertion.......................................................................................................................894
6.13.11 Enabling the Alarm Monitoring for Lower Order Paths.....................................................................................896
6.13.12 Browsing Microwave Link Alarms.....................................................................................................................896
6.13.13 Processing Alarm Threshold-Crossing Notifications..........................................................................................897
6.13.14 Diagnosing Faults................................................................................................................................................898
6.13.14.1 Creating Fault Diagnosis Rules........................................................................................................................898
6.13.14.2 Analyzing and Diagnosing a Service Fault by Wizard.....................................................................................899
6.13.14.3 Starting the Fault Diagnosis Wizard.................................................................................................................900
6.13.15 Configuring Housekeeping..................................................................................................................................901
6.13.15.1 Configuring Environment Property..................................................................................................................901
6.13.15.2 Configuring Control Property...........................................................................................................................903
6.14 Alarm Reliability of Routers and Switches..............................................................................................................904
6.14.1 Alarm Reliability Overview..................................................................................................................................904
6.14.2 Configuring Alarm Reliability in Inform Mode....................................................................................................904
6.14.3 Configuring Alarm Reliability in ESN Mode........................................................................................................907

7 Performance Management (MSTP&WDM&RTN&PTN).................................................909


Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xix

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

7.1 Basic Concept.............................................................................................................................................................911


7.1.1 Introduction to Performance Events........................................................................................................................911
7.1.2 Performance Reporting Process...............................................................................................................................914
7.1.3 Current Performance and History Performance......................................................................................................915
7.1.4 Performance Threshold............................................................................................................................................916
7.1.5 Performance Dumping.............................................................................................................................................916
7.1.6 Performance Analysis..............................................................................................................................................916
7.2 Viewing SDH/WDM Performance Data....................................................................................................................917
7.2.1 Setting Performance Monitoring Parameters..........................................................................................................917
7.2.1.1 Setting Performance Monitoring Time of NE......................................................................................................918
7.2.1.2 Setting the Performance Reporting Status for a Single NE..................................................................................919
7.2.1.3 Setting the NE Performance Event Monitoring Parameters.................................................................................920
7.2.1.4 Setting Performance Threshold............................................................................................................................922
7.2.1.5 Setting the Performance Reporting Status for a PFE NE.....................................................................................924
7.2.2 Creating a Browsing Performance Filtering Template............................................................................................925
7.2.3 Viewing Current Performance Data........................................................................................................................926
7.2.4 Viewing Historical Performance Data.....................................................................................................................928
7.2.5 Viewing UAT Records............................................................................................................................................930
7.2.6 Viewing Performance Threshold Crossing..............................................................................................................932
7.2.7 Querying Performance Data of a Microwave Link.................................................................................................934
7.2.8 Collecting the Performance Data.............................................................................................................................935
7.2.9 Analyzing History Performance Data......................................................................................................................938
7.3 Viewing RMON Performance Data...........................................................................................................................939
7.3.1 Setting RMON Performance Monitoring Parameters.............................................................................................940
7.3.1.1 Setting the RMON Performance Monitoring Parameters for NE.........................................................................940
7.3.1.2 Setting the RMON Performance Event Monitoring Parameters..........................................................................941
7.3.1.3 Setting Automatic Reporting of RMON Performance Events.............................................................................944
7.3.1.4 Setting the RMON Performance Threshold.........................................................................................................945
7.3.2 Viewing Statistics Group Performance of an Ethernet Port....................................................................................946
7.3.3 Viewing Historical Group Performance..................................................................................................................948
7.4 Viewing Ethernet Port Flow.......................................................................................................................................951
7.4.1 Setting Ethernet Port Flow Monitoring...................................................................................................................951
7.4.2 Query Ethernet Port Flow........................................................................................................................................951
7.5 Viewing Performance Data of an ATM Port..............................................................................................................952
7.5.1 Setting ATM Performance Monitoring Parameters of an NE.................................................................................952
7.5.2 Viewing Current Performance Data of an ATM Port..............................................................................................953
7.5.3 Viewing History Performance Data of an ATM Port..............................................................................................953
7.6 Viewing Lower Order Performance Data...................................................................................................................954
7.6.1 Setting the Lower Order Performance Monitoring Status.......................................................................................954
7.6.2 Setting the Lower Order Performance Threshold....................................................................................................955
7.6.3 Viewing Current Lower Order Performance Data...................................................................................................956
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xx

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

7.6.4 Viewing History Lower Order Performance Data...................................................................................................956


7.6.5 Viewing UAT Records for a Lower Order Service.................................................................................................957
7.6.6 Viewing Lower Order Performance Threshold-Crossing Records.........................................................................958
7.7 Viewing IP Performance of Ethernet Ports................................................................................................................959
7.7.1 Setting IP Performance Monitoring Parameters of an NE.......................................................................................959
7.7.2 Viewing Current Performance Data of an Ethernet Port.........................................................................................960
7.7.3 Viewing History Performance Data of an Ethernet Port.........................................................................................960
7.8 Dumping Performance Data.......................................................................................................................................961
7.8.1 Dumping Performance Data Manually....................................................................................................................961
7.8.2 Dumping Performance Data Periodically................................................................................................................962
7.8.3 Dumping Performance Data in the Overflow Way.................................................................................................963
7.9 Forecasting the Failure Time of the Laser..................................................................................................................964
7.10 Resetting Performance Registers..............................................................................................................................964
7.10.1 Resetting Board Performance Registers................................................................................................................964
7.10.2 Resetting ATM Performance Registers.................................................................................................................965
7.10.3 Resetting Ethernet Performance Registers............................................................................................................965
7.11 Configuring the Q Value Performance Monitoring..................................................................................................966
7.11.1 Setting and Querying the Threshold of the Q Value Performance........................................................................966
7.11.2 Querying the Current Q Value Performance.........................................................................................................967
7.11.3 Querying the History Q Value Performance.........................................................................................................968

8 Inventory Management............................................................................................................970
8.1 Telecommunications Room Management..................................................................................................................973
8.1.1 Creating a Telecommunications Room...................................................................................................................973
8.1.2 Installing a Rack or an NMS in a Telecommunications Room...............................................................................974
8.1.3 Querying Telecommunications Rooms...................................................................................................................975
8.1.4 Modifying a Telecommunications Room................................................................................................................975
8.1.5 Deleting a Telecommunications Room...................................................................................................................976
8.1.6 Setting a Flag for a Telecommunications Room.....................................................................................................976
8.1.7 Exporting Information About telecommunications Rooms ....................................................................................977
8.1.8 Collecting Statistics on a Telecommunications Room............................................................................................978
8.2 Rack Management......................................................................................................................................................979
8.2.1 Creating a Rack.......................................................................................................................................................979
8.2.2 Installing a Subrack on a Rack................................................................................................................................980
8.2.3 Querying Racks.......................................................................................................................................................980
8.2.4 Modifying a Rack....................................................................................................................................................981
8.2.5 Deleting a Rack.......................................................................................................................................................982
8.2.6 Setting a Rack Flag..................................................................................................................................................982
8.2.7 Exporting Rack Information....................................................................................................................................983
8.2.8 Collecting Statistics on a Rack................................................................................................................................983
8.3 NE Management.........................................................................................................................................................985
8.3.1 Querying NEs..........................................................................................................................................................985
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xxi

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

8.3.2 Setting a Flag for an NE..........................................................................................................................................986


8.3.3 Exporting NE Information.......................................................................................................................................986
8.3.4 Collecting Statistics on an NE.................................................................................................................................987
8.3.5 Collecting Statistics on an Equivalent NE...............................................................................................................988
8.4 Subrack Management.................................................................................................................................................989
8.4.1 Querying Subracks..................................................................................................................................................989
8.4.2 Setting a Flag for a Subrack....................................................................................................................................990
8.4.3 Exporting Subrack Information...............................................................................................................................990
8.4.4 Collecting Statistics on a Subrack...........................................................................................................................991
8.5 Board Management.....................................................................................................................................................992
8.5.1 Querying Boards......................................................................................................................................................992
8.5.2 Setting a Flag for a Board........................................................................................................................................993
8.5.3 Exporting Board Information..................................................................................................................................994
8.5.4 Collecting Statistics on a Board...............................................................................................................................995
8.6 Subboard Management...............................................................................................................................................996
8.6.1 Querying Subboards................................................................................................................................................996
8.6.2 Setting a Flag for a Subboard..................................................................................................................................996
8.6.3 Exporting Subboard Information.............................................................................................................................997
8.6.4 Collecting Statistics on a Subboard.........................................................................................................................998
8.7 Port Management........................................................................................................................................................999
8.7.1 Querying Ports.........................................................................................................................................................999
8.7.2 Setting a Port Flag.................................................................................................................................................1000
8.7.3 Exporting Port Information...................................................................................................................................1001
8.7.4 Collecting Statistics on Ports.................................................................................................................................1001
8.8 Optical/Electrical Module Management (Router series and Switch series NEs).....................................................1002
8.8.1 Querying Optical/Electrical Modules....................................................................................................................1002
8.8.2 Setting an Optical/Electrical Module Label..........................................................................................................1003
8.8.3 Exporting Optical/Electrical Module Information.................................................................................................1003
8.8.4 Collecting Statistics on Optical/Electrical Module...............................................................................................1004
8.9 Collecting Statistics on the Slot Usage.....................................................................................................................1005
8.10 Collecting Statistics on the ONU............................................................................................................................1006
8.11 Collecting Statistics on the CMC...........................................................................................................................1006
8.12 Fiber/Cable/Microwave Link Management............................................................................................................1007
8.12.1 Creating Fiber/Cable Connections in Batches.....................................................................................................1007
8.12.2 Importing Link Data............................................................................................................................................1008
8.12.3 Querying Fiber/Cable/Microwave Link Information..........................................................................................1010
8.12.4 Modifying Fiber/Cable Information....................................................................................................................1010
8.12.5 Deleting Connections..........................................................................................................................................1011
8.12.6 Setting the Line Shape and Width for New Fiber/Cable/Microwave Link ........................................................1012
8.12.7 Modifying the Line Shape and Width for Fiber/Cable/Microwave Link............................................................1013
8.12.8 Exporting Fiber/Cable/Microwave Link Information.........................................................................................1014
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xxii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

8.12.9 Creating an Intermediate Office..........................................................................................................................1015


8.12.10 Checking the Fiber/Cable Connection...............................................................................................................1016
8.12.11 Querying the Fiber/Cable Pipe to Which a Fiber/Cable Belongs......................................................................1016
8.12.12 Querying Alarms Related to a Fiber/Cable/Microwave Link............................................................................1017
8.13 Fiber/Cable Pipe Management...............................................................................................................................1018
8.13.1 Creating a Fiber/Cable Pipe.................................................................................................................................1018
8.13.2 Adding a Fiber/Cable to a Fiber/Cable Pipe........................................................................................................1018
8.13.3 Querying a Fiber/Cable Pipe...............................................................................................................................1020
8.13.4 Modifying Information About a Fiber/Cable Pipe..............................................................................................1020
8.13.5 Removing a Fiber/Cable from a Fiber/Cable Pipe..............................................................................................1021
8.13.6 Deleting a Fiber/Cable Pipe.................................................................................................................................1021
8.14 Link Resource Management...................................................................................................................................1022
8.14.1 Synchronizing Trunk Links.................................................................................................................................1023
8.14.2 Creating a Link....................................................................................................................................................1023
8.14.3 Querying a Link...................................................................................................................................................1024
8.14.4 Viewing Link Alarms..........................................................................................................................................1025
8.14.5 Reverting the Source and Sink NEs of a Link.....................................................................................................1025
8.14.6 Modifying the Line Shape and Width for a Link................................................................................................1026
8.14.7 Creating a Link View..........................................................................................................................................1027
8.14.8 Creating a Link Group.........................................................................................................................................1027
8.14.9 Adding a Link to a Link Group...........................................................................................................................1028
8.15 Interface Resource Management............................................................................................................................1029
8.15.1 Querying Router/Switch Interface Resources.....................................................................................................1029
8.15.2 Setting a Router/Switch Interface Flag................................................................................................................1030
8.15.3 Exporting Router/Switch Interface Information..................................................................................................1031
8.16 Access Service Statistics Management...................................................................................................................1031
8.16.1 Statistics on ports of various types......................................................................................................................1031
8.16.2 Querying Port Statistics.......................................................................................................................................1034
8.16.3 Creating a Port Statistics Collection Task...........................................................................................................1035
8.16.4 Modifying a Port Statistics Collection Task........................................................................................................1036
8.16.5 Deleting a Port Statistics Collection Task...........................................................................................................1037
8.16.6 Starting a Port Statistics Collection Task............................................................................................................1037
8.16.7 Stopping a Port Statistics Collection Task..........................................................................................................1038
8.17 Exporting Electronic Labels...................................................................................................................................1038
8.17.1 Exporting Electronic Labels of NEs....................................................................................................................1039
8.17.2 Exporting NE Inventory Information..................................................................................................................1040
8.18 SDH Report............................................................................................................................................................1042
8.18.1 Collecting Statistics on the SDH Ports................................................................................................................1042
8.18.2 Collecting Statistics on the SDH Lower Order Cross-Connections....................................................................1043
8.18.3 Collecting Statistics on SDH Tributary Port Resources......................................................................................1044
8.18.4 Collecting Statistics on Trails Between SDH NEs..............................................................................................1045
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xxiii

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

8.18.5 Collecting Statistics on the SDH Protection Subnet Resources..........................................................................1045


8.18.6 Collecting Statistics on SDH Trail Resources.....................................................................................................1046
8.18.7 Collecting Statistics on SDH Fiber Resource Usage...........................................................................................1047
8.18.8 Creating a Timing Task for Collecting Statistics on SDH Resources.................................................................1047
8.19 Microwave Report..................................................................................................................................................1048
8.19.1 Collecting Statistics on the Microwave License Capacity..................................................................................1048
8.19.2 Collecting Statistics on Microwave Links...........................................................................................................1049
8.19.3 Collecting Statistics on Microwave Link Resource Usage.................................................................................1050
8.19.4 Collecting Statistics on Fiber/Cable Occupancy Resources at Scheduled Time.................................................1051
8.20 MSTP Ethernet Report...........................................................................................................................................1052
8.20.1 Collecting Statistics on Ethernet Port Resources................................................................................................1052
8.20.2 Collecting Statistics on Service Resources Between Ethernet NEs....................................................................1052
8.21 WDM Statistic Report............................................................................................................................................1053
8.21.1 Collecting Statistics on the WDM Protection Group Switching State................................................................1053
8.21.2 Collecting Statistics on WDM NE Master/Slave Shelf Information...................................................................1054
8.21.3 Collecting Statistics on WDM Client-Side Port Resources.................................................................................1054
8.21.4 Collecting Statistics on Wavelength Resources Between WDM Sites...............................................................1055
8.21.5 Statistics Report of WDM Link Resources.........................................................................................................1056
8.21.6 Collecting Statistics on Wavelength Resource Usage.........................................................................................1057
8.21.7 Creating a Timing Task for Collecting Statistics on WDM Resources...............................................................1058
8.21.8 Viewing WDM Channel Resources....................................................................................................................1059
8.21.9 Viewing WDM Bandwidth Resource Statistics Report......................................................................................1059
8.22 PTN Statistic Report...............................................................................................................................................1063
8.22.1 Querying a PTN Interface Resource Report........................................................................................................1063
8.22.2 Querying a PTN Port Resource Report...............................................................................................................1064
8.22.3 Querying a PTN Network Resource Statistics Report.........................................................................................1064
8.22.4 Query LAG Resource Report..............................................................................................................................1065
8.23 Project Document...................................................................................................................................................1066
8.23.1 Viewing the Board Manufacturer Information Report........................................................................................1066
8.23.2 Viewing Common Manufacturer Information Report.........................................................................................1067
8.23.3 Viewing the Clock Tracing Diagram...................................................................................................................1068
8.23.4 Viewing the Networking Diagram......................................................................................................................1068
8.23.5 Viewing the Timeslot Allocation Diagram.........................................................................................................1070

9 U2000 Server Monitoring.......................................................................................................1071


9.1 Setting the Monitoring Parameters...........................................................................................................................1072
9.1.1 Setting the Parameters for Monitoring the U2000 Server.....................................................................................1072
9.1.2 Setting the Parameters for Monitoring the Disk Usage of the U2000 Server.......................................................1073
9.1.3 Setting the Parameters for Monitoring the Database Usage of the U2000 Server................................................1075
9.1.4 Setting the Parameters for Monitoring the Service Status of the U2000 Server...................................................1076
9.2 Monitoring the Status of the U2000 Server..............................................................................................................1077
9.2.1 Monitoring the Service Status of the U2000 Server..............................................................................................1077
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xxiv

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

9.2.2 Monitoring the Process Status of the U2000 Server..............................................................................................1078


9.2.3 Monitoring the Disk Status of the U2000 Server..................................................................................................1079
9.2.4 Monitoring the Database Status of the U2000 Server...........................................................................................1079
9.2.5 Monitoring the Resource Status of the U2000 Server...........................................................................................1080
9.2.6 Viewing the Component Information of the U2000 Server..................................................................................1081
9.2.7 Refreshing the Monitoring Information................................................................................................................1081
9.2.8 Saving the Monitoring Information.......................................................................................................................1082

10 Integrated Task Management.............................................................................................1083


10.1 Basic Concepts.......................................................................................................................................................1084
10.1.1 Task Management Window.................................................................................................................................1084
10.1.2 Periods of Scheduled Tasks.................................................................................................................................1085
10.1.3 Features of Scheduled Tasks...............................................................................................................................1086
10.1.4 Types of Scheduled Tasks...................................................................................................................................1087
10.1.5 Task Scheduling Parameters................................................................................................................................1091
10.1.6 States of a Scheduled Task..................................................................................................................................1092
10.2 Managing Scheduled Tasks....................................................................................................................................1094
10.2.1 Customizing the Interface for Managing Scheduled Tasks.................................................................................1094
10.2.2 Viewing Scheduled Tasks...................................................................................................................................1095
10.2.3 Creating User Scheduled Tasks...........................................................................................................................1096
10.2.4 Modifying Scheduled Tasks................................................................................................................................1097
10.2.5 Deleting Scheduled Tasks...................................................................................................................................1098
10.2.6 Suspending Scheduled Tasks...............................................................................................................................1099
10.2.7 Resuming Scheduled Tasks.................................................................................................................................1100

11 Backing Up and Restoring the U2000 Data......................................................................1101


11.1 Basic Concepts and Application Scenarios............................................................................................................1102
11.2 Methods of Backing Up and Restoring the U2000 Data........................................................................................1103
11.3 U2000 Database List..............................................................................................................................................1105
11.3.1 List of Minimum-Size U2000 Databases............................................................................................................1105
11.3.2 List of Small-Size U2000 Databases...................................................................................................................1108
11.3.3 List of Medium-Size U2000 Databases...............................................................................................................1111
11.3.4 List of Extra-Large-Size U2000 Databases.........................................................................................................1113
11.4 Suggestions on Data Backup and Restoration........................................................................................................1117
11.5 Backing Up and Restoring All Data in U2000 Database.......................................................................................1117
11.5.1 Immediately Backing Up the U2000 Data to a Local Server Through the U2000 Client...................................1117
11.5.2 Periodically Backing Up the U2000 Data to a Local Server Through the U2000 Client....................................1119
11.5.3 Periodically Backing Up the U2000 Data to a Remote Server Through the U2000 Client................................1122
11.5.4 Restoring a U2000 Database...............................................................................................................................1124
11.6 Backing Up and Restoring the U2000 Network Configuration Data by Using Scripts.........................................1125
11.6.1 Script Files...........................................................................................................................................................1127
11.6.2 Immediately Backing Up the U2000 Data by Script...........................................................................................1139
11.6.3 Backing Up the U2000 Data Through Script Exporting in a Scheduled Manner...............................................1140
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xxv

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Contents

11.6.4 Restoring the U2000 Data by Using the Script...................................................................................................1141


11.7 Dumping Performance Data...................................................................................................................................1145
11.7.1 Dumping Performance Data Manually................................................................................................................1145
11.7.2 Dumping Performance Data Automatically........................................................................................................1147

12 Customer Management........................................................................................................1149
12.1 Relationships Between Customers and Users........................................................................................................1151
12.2 Creating a Customer...............................................................................................................................................1151
12.3 Creating a Customer Group....................................................................................................................................1152
12.4 Authorizing a Customer to a U2000 User..............................................................................................................1152
12.5 Browsing Customer Information............................................................................................................................1153
12.6 Viewing Relevant Trails of a Customer.................................................................................................................1153
12.7 Browsing Current Alarms of a Customer...............................................................................................................1154
12.8 Browsing Historical Alarms of a Customer...........................................................................................................1155
12.9 Modifying Customer Information..........................................................................................................................1156
12.10 Deleting a Customer.............................................................................................................................................1156
12.11 Viewing the Customers Affected by an Alarm....................................................................................................1157
12.12 Specifying the Customer of a Service..................................................................................................................1158
12.13 Enabling VCN Status of a Customer....................................................................................................................1159

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xxvi

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Getting Started

About This Chapter


The following topics introduce some preparation operations that will ensure a smooth, troublefree launch of the U2000.
1.1 Precautions for Using the U2000 Safely
To ensure that the U2000 will run properly, strictly follow the precautions provided. Any
breaches of the precautions may bring risks to services and even cause no response from NEs.
1.2 Starting the U2000 System
This topic describes how to start the U2000 system. The procedure for starting the U2000 system
varies according to deployment solutions.
1.3 Shutting Down a U2000
This topic describes how to shut down the U2000 server and U2000 clients. The shutdown
procedure varies according to the deployment scheme.
1.4 Using the Workbench and Favorites Folder
This topic describes how to use the workbench and the favorites folder of commonly used
functions to rapidly locate the commonly used functions of the U2000.
1.5 Setting the Character Set of an NE
To meet global requirements, the U2000 provides the function of setting or modifying NE
character sets to prevent garbled characters caused by language change.
1.6 Main Windows and Common Operations of the U2000
This topic describes the main windows of the U2000 client. Learning about the main windows
helps you locate entrances to operations quickly, which increase your operation efficiency.
1.7 How to Obtain Version Information About the U2000
This topic describes how to obtain version information about the U2000.
1.8 Customizing the Client GUI Effect
You can customize the GUI effect of the U2000 client as required.
1.9 Setting the Alert upon Network Disconnections
After you set the disconnection alert on the U2000 client, the sound box connected to the client
plays the sound if the U2000 client is disconnected from the server.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.10 Checking Whether the Client Needs Upgrade


You can perform this operation to check whether the client version matches the server version.
If the versions do not match, you must upgrade the client.
1.11 Setting the Interval of Client Upgrade Check
After the server is upgraded, the server version and the client version do not match. Therefore,
the client must also be upgraded. After the interval for upgrade checking is set, the U2000
periodically checks whether the client needs to be upgraded.
1.12 Locking the Client
You can lock the U2000 client to prevent unauthorized operations.
1.13 Unlocking the Client
After a client is locked by the current login user or by the system automatically, the current user
can unlock it, or ask a user in the SMManagers group to reset the password and then log in
again, or ask a user in the Administrators group to unlock the client.
1.14 Setting the Level of Operation Logs Recorded by the Client
You can set the level of operation logs recorded by the client, which enables you to focus on
desired operation logs.
1.15 Setting a Scheduled Task
The U2000 can automatically execute certain tasks in a scheduled time without manual
intervention. You can set and modify these scheduled tasks as required.
1.16 Broadcast Messages
The broadcast message functions include setting the broadcast parameters and sending the
broadcast messages. The broadcast message functions of the U2000 enable you to send messages
to other users easily.
1.17 Applying for and Updating the U2000 License
This topic describes the license file of the U2000, and how to apply for, install, and use the
U2000 license.
1.18 Starting the Web Client
Certain NEs must be configured by using the Web LCT. Before you configure services for these
NEs, you need to first start the Web LCT client.
1.19 Starting the NE Data Collection
When an NE is faulty, you can collect the NE data for fault identification and analysis. There
are fast fault collection and full fault collection.
1.20 Customizing Naming Rule
When you create fibers or trails, the U2000 automatically creates the names of the fibers, trails,
ASON trails, Tunnel, Tunnel protection group PWE3 Service and Native Ethernet E-Line
Service based on the naming rule. The settings can be modified according to actual requirements.
This section takes the fiber naming rule as an example to illustrate how to customize the naming
rule.
1.21 U2000 Process List
This topic describes the information about U2000 processes,such as the functions and dependent
processes of each process and the port occupied by each process.
1.22 GUI Input and Display Conventions
The topic describes the input conventions for the text boxes and display conventions for GUI
elements on the U2000. These rules specify the typing requirements for the text boxes in the
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

U2000 operation interface. These text boxes are used to enter character strings, file names, IP
addresses, MAC addresses, numerals, passwords, dates, time, and so on.
1.23 Mutual Exclusion List for Multiclient Operations
The mutual exclusion list for multiclient operations is given below.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.1 Precautions for Using the U2000 Safely


To ensure that the U2000 will run properly, strictly follow the precautions provided. Any
breaches of the precautions may bring risks to services and even cause no response from NEs.
Table 1-1 Precautions on software operation
Item

Precautions

Risks

Remarks

OS

Do not install the OS that is


incompatible with the U2000
version.

This operation may


result in
incompatibility
between the OS and
U2000 and
consequently a
failure to start the
U2000 process.

For the mapping OS,


see Chapter
Software
Configuration
Planning for the
NMS Server in
U2000 Planning
Guide.

Do not install the system patch after


OS installation is configured
without confirmation by Huawei
engineers.

l This operation
may affect
U2000
operation.

For example, do not install the thirdparty vulnerability patch and


upgrade package.

l This operation
may result in
system collapse.

l In normal cases,
to install the
system patch,
you need to
obtain the OS
patch package
from Huawei
official website.

For example, the OS is


unauthorized, pirated, or
incompatible with the U2000
version.

l If the patch
package obtained
from Huawei
official website
does not meet the
requirement,
contact Huawei
engineers.
Do not add, delete, or modify the
U2000 configuration file or
permissions as the root or nonNMS user.

This operation may


result in system
failure.

Do not enable insecure services that


are irrelevant to the OS.

This operation may


bring risks of
attacks.

Using the SSH and


SFTP services is
recommended
because the SSH and
SFTP services are
more secure.

For example, the Telnet and FTP


services of the OS and the mail
service.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Item

1 Getting Started

Precautions

Risks

Remarks

Do not install the unwanted


unauthenticated third-party
application on the runningU2000
server.

l A lot of system
resources are
consumed,
which may lead
to slow operation
on the U2000.

For example, game software.

l This operation
may lead to
security threats
from virus
attacks.

Issue 03 (2014-12-10)

Do not install unauthenticated


antivirus software such as 360
antivirus software on the U2000
server.

This operation may


cause exceptions
such as U2000 file
isolation or
insufficient memory
on the U2000.

Installing the
OfficeScan is
recommended.

Do not use the OS hardening tools


that are not provided the U2000.

This operation may


result in system
failure.

Use the OS
hardening tools
provided by the
U2000.

Do not configure the U2000 server


as the DNS server.

If the connection
between the OS and
DNS fails or is at a
slow speed, the
U2000 restart fails.

Do not manually change the IP


address and host name of OS.

This operation may


lead to a failure to
start U2000
processes.

If the IP address and


host name of OS
need to be changed,
use the U2000
MSuite tool to
change it. Ensure
that the U2000
processes have been
stopped before
making such a
change.

Do not use the reboot or init 6


command to restart the Solaris OS,
and do not use Stop+A to switch to
the ok prompt on the
runningU2000 server..

This operation may


result in system
failure.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Item

1 Getting Started

Precautions

Risks

Remarks

Do not use the switching partition


swap as a normal partition.

This operation
increases the usage
of the switching
partition swap and
affects the U2000
operation speed.

Do not leak the password. The


permissions on passwords are
classified based on the user level
and can be assigned only to the
maintenance owner.

This operation may


lead to beyond
authority operations.

Periodically change the OS


password.

l After security
hardening, you
need to specify a
validity period
for the password.
If you do not
change the
password in
time, it will
expire, causing a
failure to log in to
the OS.

l The password
that has not been
changed for a
long time is less
secure.

Databa
se

Regularly check the size of the /var/


adm/pacct file, the accounting file
of the Solaris OS. If the size of
the /var/adm/pacct file exceeds 2
GB, dump the data and then clean
up the file.

This operation may


slow down the
system operation or
event results in a
primary/secondary
switchover.

Do not install the database that is


incompatible with the U2000
version.

This operation may


cause
incompatibility
between the
database and the
U2000 version and
consequently a
failure to start the
U2000.

For the mapping OS,


see Chapter
Software
Configuration
Planning for the
NMS Server in
U2000 Planning
Guide.

For example, the database is


unauthorized, pirated, or
incompatible with the U2000
version.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Item

1 Getting Started

Precautions

Risks

Remarks

Do not manually log in to the


database and perform operations on
the database, such as adding,
deleting, modifying, and viewing
the database.

For example, do not use T-SQL to


change the U2000 database data or
manually modify the interfaces file
of the Sybase database.

This operation
results in a data
inconsistency
between the U2000
and NEs. Accessing
the database among
different sets of
U2000 results in a
database disorder.

Do not use the commands carried by


the database to change the
passwords of the sa and dbuser
users.

This operation
results in a failure to
start U2000
processes.

If the passwords of
the sa and dbuser
users need to be
changed, use the
U2000 MSuite to
change them.

Do not leak the password. The


permissions on passwords are
classified based on the user level
and can be assigned only to the
maintenance owner. The
administrator password can be
managed only by the maintenance
owner.

This operation may


lead to beyond
authority operations.

Periodically change the database


password.

l After security
hardening, you
need to specify a
validity period
for the password.
If you do not
change the
password in
time, it will
expire, causing a
failure to log in to
the database.

If the passwords of
the sa and dbuser
users need to be
changed, use the
U2000 MSuite to
change them.

l The database
password that
has not been
changed for a
long time is less
secure.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Item

High
availab
ility
system
(Verita
s)

1 Getting Started

Precautions

Risks

Remarks

Regularly back up the U2000


database. This minimizes damages
if an exception occurs on the
system.

If you do not back up


the U2000 database,
U2000 data may be
lost upon system
exceptions.

Do not perform large-data-volume


operations during full
synchronization between the
primary and secondary sites, such as
searching for circuits and protection
subnets and querying alarms on the
entire network.

This operation may


affect the
performance of the
entire U2000 high
availability system.

In normal cases, the U2000 is


running only on the primary site,
and the secondary site works as a
backup.

If the U2000 is
running on both the
primary and
secondary sites, a
major abnormality
may occur.

For example, this


operation may lead
to that the system
enters the dual host
status.
U2000

Do not browse web pages on the


U2000 server.
Do not configure unnecessary share
directories. Pay attention to the
permissions of a share directory.

l A lot of system
resources are
consumed,
which may lead
to slow operation
on the U2000.

l This operation
may bring risks
of attacks.
Do not connect another PC or laptop
to the network where the U2000
server resides unless allowed.

Issue 03 (2014-12-10)

Various issues may


occur, such as IP
address conflict and
virus infection.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Item

Precautions

Risks

Remarks

Do not use multiple sets of U2000


to manage an NE or use the U2000
and a third-party OSS together to
manage an NE.

l This operation
results in discrete
services, data
inconsistency,
and device CPU
load growth.

In scenarios where
multiple sets of the
U2000 are used in
upgrading, contact
the Huawei
Technologies Co.,
Ltd. local
representative office
or customer service
center. For details,
see Obtaining
Technical Support.

For example, it is not recommended


that use MIBs to interconnect
devices when the U2000 is used to
manage NEs. In addition, do not use
the TR-069 and U2000 together to
manage ONTs.

Issue 03 (2014-12-10)

1 Getting Started

l After one set of


the U2000 is
used to apply
configurations to
a router, other
sets of the U2000
may fail to
incrementally
synchronize the
configurations.
In this situation,
the data on the
U2000s is
inconsistent with
the NE data. If
operations are
performed using
these U2000s,
configuration
conflicts may
occur, which
interrupts
services.

Do not use both the U2000 and


commands to manage the live
network.

This operation
results in a data
inconsistency
between the U2000
and NEs, and there is
risk of deleting NE
data.

Do not modify the XML file of the


ONT on the U2000 server.

This operation
results in an
inconsistency of the
ONT XML file
between the U2000
and NEs.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Item

1 Getting Started

Precautions

Risks

Remarks

Do not modify the system time


during U2000 running.

This operation may


cause time
inconsistency
between the U2000
and NEs and failures
of some functions.

l To modify the
system time of
the server, exit
the U2000 server
and restart it after
the modification.
l To modify the
system time of
the client, exit the
U2000 client and
restart it after the
modification.

Do not leak the password. The


permissions on passwords are
classified based on the user level
and can be assigned only to the
maintenance owner. The
administrator password can be
managed only by the maintenance
owner.

This operation may


lead to beyond
authority operations.

Periodically change the NMS user


password.

l After security
hardening, you
need to specify a
validity period
for the password.
If you do not
change the
password in
time, it will
expire, causing a
failure to log in to
the U2000.

l The NMS user


password that
has not been
changed for a
long time is less
secure.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

10

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Item

Issue 03 (2014-12-10)

1 Getting Started

Precautions

Risks

Remarks

Refer to Maintenance Item List to


regularly check and test the U2000
and record the results.

Troubleshoot faults
in time. For the faults
fail to be rectified,
contact the Huawei
Technologies Co.,
Ltd. local
representative office
or customer service
center. For details,
see Obtaining
Technical Support.

Use the UEasy tool to regularly


perform health check on the
U2000.

On Solaris or SUSE
Linux, the UEasy
tool is stored in the
$IMAP_ROOT/
tools/UEasy
directory. On
Windows, the UEasy
tool is stored in the
%IMAP_ROOT%
\tools\UEasy
directory. For details
about how to use the
UEasy tool, see the
readme_en.txt file
contained in the save
path.

After the DC is used to upgrade or


degrade transport NEs, you must
use the U2000 to upload the data
about the involved transport NEs to
the U2000 database.

This operation
results in a failure to
distribute services to
transport NEs during
transport NE
configuration.

Ensure data consistency between


the U2000 and NEs.

If data is
inconsistent
between the U2000
and NEs, it may lead
to misjudgment or
misoperation.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

11

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Item

1 Getting Started

Precautions

Risks

Remarks

The U2000 displays a warning


message when a risky operation is
to be performed.

For example, a message is displayed


indicating that services will be
interrupted when data is to be
downloaded from the U2000 to an
NE.

1.2 Starting the U2000 System


This topic describes how to start the U2000 system. The procedure for starting the U2000 system
varies according to deployment solutions.

1.2.1 Starting the U2000 Server in a Windows Single-Server System


The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.

1.2.1.1 Powering On the Server Safely


This topic describes how to power on the server in a Windows single-server system safely.
Power on the IBM X3650 M4, IBM X3650 M3 or IBM X3850 X5 on condition that the power
supply is normal.
1.

Power on a Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3/IBM X3650 M4/
IBM X3650 M3/IBM X3850 X5 server.

NOTICE
l Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3 server supports 100 to 240
VAC input voltage.
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops.
2.

Press the power buttons on the peripherals and monitor connected to a server.

3.

Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks every
1s, press the power button on the shelf of the server.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

12

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

If the power button is steady on, the server has been successfully powered on. For details about IBM
server indicators, see the manual for IBM servers or log in to the official IBM website. For details
about Huawei server indicators, see the manual for Huawei servers or log in to the official Huawei
website. For official websites of software and hardware documents, see How Do I Obtain ThirdParty Software and Hardware Materials?.

The red boxes in the following figures show the positions of power buttons on Huawei
Tecal RH2288H V2, Huawei Tecal RH5885H V3, IBM X3650 M4, IBM X3650 M3 and
IBM X3850 X5.
Figure 1-1 Position of the power button on Huawei Tecal RH5885H V3 server

Figure 1-2 Position of the power button on Huawei Tecal RH2288H V2 server

Figure 1-3 Position of the power button on IBM X3650 M4

Figure 1-4 Position of the power button on IBM X3650 M3

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

13

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-5 Position of the power button on IBM X3850 X5

1.2.1.2 Starting the Database


This topic describes how to start the database in a Windows single-server system. The U2000
can start properly only after the database is started.

Prerequisites
The OS has been started.

Context
Generally, the database starts along with the OS.

Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > All Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL
Server Configuration Manager > SQL Server Services.
Step 3 Right-click SQL Server (MSSQLSERVER) and choose Start from the shortcut menu.
NOTE

If the SQL Server 2000 database is installed on Windows Server 2003, choose Start > Programs >
Microsoft SQL Server > Service Manager. In the SQL Server Service Manager dialog box, click Start/
Continue.

----End

Result
In the SQL Server (MSSQLSERVER), if Start is dimmed, Microsoft SQL Server 2008 is
running.
NOTE

If the SQL Server 2000 database is installed on Windows Server 2003, in the SQL Server Service
Manager dialog box, if Start/Continue is dimmed, Microsoft SQL Server 2000 is running.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

14

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.2.1.3 Starting the U2000 Server Processes


This topic describes how to start the U2000 server processes in a Windows single-server system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.

Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.

Context
l

Generally, the U2000 server processes start along with the OS.

Only one default NMS user, admin, is provided during U2000 software installation. The
admin user is a U2000 administrator with the highest rights on the U2000 system.

Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 View the startup information about the U2000 server processes.
1.

Choose Start > Run. The Run window will be displayed.

2.

Enter cmd and click OK.

3.

In the CLI, run the daem_ps command to check whether the U2000 process is started.
l If information similar to the following is displayed, the U2000 process has started.
imapmrb.exe
K
imapeventmgr.exe
K
imapsysd.exe
K
imapwatchdog.exe
K
ResourceMonitor.exe
K
imap_sysmonitor.exe
K
python.exe
K
httpd.exe
K
java.exe
K
httpd.exe
K

4000 Services

28,200

4020 Services

19,128

4028 Services

46,696

4060 Services

7,548

4088 Services

26,704

3652 Services

35,644

4412 Services

21,348

4496 Services

10,848

4520 Services

94,952

5260 Services

18,512

l If no command output is displayed, the U2000 process is not started. You can run the
D:\oss\server\platform\bin\startnms.bat command in the CLI to start the U2000
process.
NOTE

l D:\oss specifies the installation path of the U2000.


l Starting the U2000 process takes about 3 minutes.

Step 3 Check the running status of every process on the System Monitor client.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

15

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.

Choose Start > All Programs > Network Management System > U2000 System
Monitor or click the shortcut icon on the desktop to start the U2000 System Monitor client.

2.

In the Login dialog box, enter a user name and a password.


NOTE

Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). For details, see section How
to Set the Communication Mode on the U2000 server for the Single-Server System (Windows) to
query or change the communication mode of the server.
The initial password of the admin user is Changeme_123 (It is Admin_123 for a U2000 that comes
preinstalled). The password must be changed during the first login to ensure system security. Keep
the password confidential and change it regularly.

----End

Result
l

If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.

If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.

If the U2000 does not run properly, contact Huawei engineers.

Follow-up Procedure
The network management system maintenance suite is used for U2000 commissioning,
maintenance, and redeployment.
In the Windows Task Manager dialog box, check whether msdaemon.exe and
msserver.exe are listed.
l

If the two processes are listed, the MSuite server has started.

If the two processes are not listed, the MSuite server has not started. Navigate to the D:\oss
\engr\engineering directory of U2000 server and double-click startserver.bat to start the
MSuite server.

1.2.2 Starting the U2000 Server in a Solaris Single-Server System


The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.

1.2.2.1 Powering On the Server Safely


This topic describes how to power on the server in a Solaris single-server system safely. The
procedure for powering on a server varies according to the server type and disk array type.

Netra T4-1/Netra T4-2/Oracle T4-1/Oracle T4-2/T5220 Server


1.

Issue 03 (2014-12-10)

Power on a Netra T4-1/Netra T4-2/Oracle T4-1/Oracle T4-2/T5220 server.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

16

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTICE
l Oracle SPARC T4-2 workstations support only 200 ~ 240 VAC input voltage and do
not support 100 ~ 120 VAC input voltage.
l Netra T4-1/Oracle T4-1/T5220/M4000/M5000 server supports 200 to 240 VAC and
100 to 120 VAC input voltage.
l Netra T4-2 server supports100 to 220 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops and the high availability system fails to
trigger an active/standby switchover.
2.

Wait about 2 or 3 minutes. Then switch on the power of the Netra T4-1/Netra T4-2/Oracle
T4-1/Oracle T4-2/T5220 workstation to start the server.

3.

After the server is started, check indicators on the front panel. If the power indicator is
steady green, the server is powered on. If another indicator is on or blinks, the server does
not function properly. Contact the server maintenance engineers to solve the problem. The
following figure shows the positions of the power switch and power indicator.
Figure 1-6 Power switch and power indicator on the Netra T4 server

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-7 Power switch and power indicator on the Netra T4-2 server

Figure 1-8 Power switch and power indicator on the Oracle T4-1 server

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

18

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-9 Power switch and power indicator on the Oracle T4-2 server

Figure 1-10 Power switch and power indicator on the T5220 server

NOTE

l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If the server displays the OK prompt, enter boot. If the server does not respond, no Solaris OS has been
installed on the server.

M4000/M5000 Server
1.

Power on an M4000/M5000 server.


NOTE

Configure power supply based on the rated system power requirement, see U2000 Hardware
Installation Guide (Huawei N610E cabinet). If the power supply is insufficient, the server
automatically stops and the high availability system fails to trigger an active/standby switchover.
This issue occurs frequently for the M4000/M5000 with high power consumption.

2.

Insert the key delivered with the server into the key slot in the front panel of the M4000/
M5000 server, and turn the rotary switch to the Locked position labeled with
in the following figure.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

, as shown

19

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-11 Power button on the M4000/M5000 server

3.

Press the power switch of the workstation, which is identified by . Wait 2 to 3 minutes.
If front indicator of the server is on (changes to steady green), the server starts up and
performs self-diagnosis.
NOTE

l Ensure that the green LED power indicator on the operation panel is lit.
l During the power-on process, it is recommended that you use a PC to log in to the controller on
an M4000/M5000 server through a serial interface and enter console -d 0 -f to view the server
start status.
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If turn the rotary switch to the Service position labeled with
, the server cannot access the
OS automatically, the server displays the ok prompt. Enter boot. If the server does not respond,
no Solaris OS has been installed on the server.

Disk Array

NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
Power-on Sequence
For OceanStor S3900:
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

20

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Normal power-on sequence: switch on the power switches of the external power supplies
connected to all the devices press the power button on either controller switch on the
LAN switch or FC switch (if any LAN switch or FC switch is deployed but is not powered
on) switch on the application server (if the application server is not powered on).

Normal power-down sequence: stop the services of the application server hold the power
button for 5 seconds on either controller disconnect the controller enclosure and disk
enclosures from the external power supplies.

For OceanStor S2600:


l

Power-on sequence: cabinet disk enclosures controller enclosure switch (if has)
application server.

Power-off sequence: application server switch (if has) controller enclosure disk
enclosures cabinet.
NOTE

Power supply must be provided for the two power modules of the OceanStor S2600 and OceanStor
S3900; otherwise, the OceanStor S2600 and OceanStor S3900 fail to be used. Then press the power switch
on the controller A / B. Wait 5 to 10 minutes until the power indicator is steady green, no longer flashing,
indicating the success of the power-on.

Physical indications that the storage system is up and running without error:
l

The power indicators of the controllers, controller enclosure, and disk enclosures are steady
green.

The alarm indicators of the controllers, controller enclosure, and disk enclosures are off.

The running indicators of the coffer disks are steady green, and their alarm/location
indicators are off.

1.2.2.2 Starting the Database


This topic describes how to start the database. The U2000 can start properly only after the
database is started.

Prerequisites
The OS has been started.

Context
Generally, the database starts along with the OS.

Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE

To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see How to Change the OS User Password.

Step 2 Ensure that the database is running.


Run the following command to check whether the Sybase database is running:
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

21

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

$ ps -ef | grep sybase

Information similar to the following is displayed:


dbuser
793
1
0
Sep 16 ?
0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR
dbuser
802
801
0
Sep 16 ?
0:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/insta
dbuser
795
793
0
Sep 16 ?
118:30 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt
dbuser
926
795
0
Sep 16 ?
117:45 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:1,0,0x2005f917, 10000000000, 0xd4be
dbuser
927
795
0
Sep 16 ?
63:59 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:2,0,0x2005f917, 10000000000, 0xd4be
dbuser
930
795
0
Sep 16 ?
145:24 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:5,0,0x2005f917, 10000000000, 0xd4be
dbuser
929
795
0
Sep 16 ?
69:26 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:4,0,0x2005f917, 10000000000, 0xd4be
dbuser
801
1
0
Sep 16 ?
0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR_back
dbuser
932
795
0
Sep 16 ?
56:19 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:7,0,0x2005f917, 10000000000, 0xd4be
dbuser
931
795
0
Sep 16 ?
54:25 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:6,0,0x2005f917, 10000000000, 0xd4be
dbuser
928
795
0
Sep 16 ?
90:08 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:3,0,0x2005f917, 10000000000, 0xd4be
dbuser 28591 28193
0 15:22:07 pts/1
0:00 grep sybase
NOTE

The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.

Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
NOTE

Enter the dbuser user password as prompted. The default password is Changeme_123. For system security,
modify the default password and remember the new password. For details, see How to Change the OS User
Password.
$
$
$
$
$

. /opt/sybase/SYBASE.sh
cd /opt/sybase/ASE*/install
./startserver -f ./RUN_DBSVR &
./startserver -f ./RUN_DBSVR_back &
exit
NOTE

l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.

----End

Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase

Information similar to the following is displayed:


Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

22

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

dbuser
4664
1 0 Apr15 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser
4675 4664 32 Apr15 ?
2-22:42:47 /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/
DBSVR.log -c/opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser
4688
1 0 Apr15 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser
4692 4688 0 Apr15 ?
00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE

If the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -sDBSVR and /opt/sybase/


ASE-15_0/bin/backupserver -SDBSVR_back, the Sybase process is running.

1.2.2.3 Starting the U2000 Server Processes


This topic describes how to start the U2000 server processes in a Solaris single-server system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.

Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.

Context
l

Generally, the U2000 server processes start along with the OS.

Only one default NMS user, admin, is provided during U2000 software installation. The
admin user is a U2000 administrator with the highest rights on the U2000 system.

Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 Run the following command to check whether the U2000 processes have started:
$ daem_ps

Information similar to the following is displayed:


ossuser
ossuser
ossuser
ossuser
ossuser
ossuser

27069
27079
27075
27086
23679
27116

1
1
1
1
1
1

0
0
0
0
1
0

10:31:39
10:31:39
10:31:39
10:31:39
17:57:06
10:31:40

?
?
?
?
pts/8
?

1:39
0:00
0:50
0:09
0:02
0:52

imapmrb
imapwatchdog -cmd start
imapsysd -cmd start
imapeventmgr
imap_sysmonitor -cmd start
ResourceMonitor -cmd start

NOTE

If the displayed information contains imap_sysmonitor -cmd start, the U2000 processes have started.

Step 3 Run the following command to start the U2000 processes if they have not started:
$ cd /opt/oss/server/platform/bin
$ ./startnms.sh

Step 4 Perform the following operations to log in to the server GUI as the ossuser user and view the
running status of every process on the System Monitor client:
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

23

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTICE
If the login to the server GUI is unavailable, run the svc_adm -cmd status command as the
ossuser user to view the process status.
1.

Double-click the U2000 System Monitor shortcut icon on the desktop.

2.

In the dialog box that is displayed, enter a U2000 user name and a password. The initial
password of the admin user is Changeme_123 (It is Admin_123 for a U2000 that comes
preinstalled). The password must be changed during the first login to ensure system
security. Keep the password confidential and change it regularly.
NOTE

Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). Security(SSL) is
recommended for the high security requirements. You can run a command on the server to query the
data transmission mode.
For details about how to set the communication mode for the U2000 server in a Solaris single-server
system, see How to Set the Communication Mode on the U2000 server for the Single-Server System
(Solaris).

----End

Result
l

If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.

If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.

If the U2000 does not run properly, contact Huawei engineers.

Follow-up Procedure
The network management system maintenance suite is used for U2000 commissioning,
maintenance, and redeployment. Generally, the MSuite server starts along with the OS. If the
MSuite server does not start, run the following commands:
$ su - root
password: password_of_the_root_user
# cd /opt/oss/engr/engineering
# ./startserver.sh

Run the following command to switch back to the ossuser user:


# exit

Run the following command to check whether the network management system maintenance
suite process has started:
$ ps -ef | grep java
root 19913 19907
0 04:04:09 pts/1
0:00 grep java
...
root 18382 18311
0 03:42:33 pts/2
12:20 /opt/OSSJRE/jre_sol/bin/java -server
-Dequinox.conf=engineering/conf/installE
NOTE

If the displayed information contains /opt/OSSJRE/jre_sol/bin/java -server, the network management


system maintenance suite process has started.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

24

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.2.3 Starting the U2000 Server in a SUSE Linux Single-Server


System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.

1.2.3.1 Powering On the Server Safely


This topic describes how to power on the server in a SUSE Linux system safely. Power on the
Huawei Tecal RH2288H V2, Huawei Tecal RH5885H V3, IBM X3650 M4, IBM X3650 M3
or IBM X3850 X5 on condition that the power supply is normal.

Server
1.

Power on a Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3/IBM X3650 M4/
IBM X3650 M3/IBM X3850 X5 server.

NOTICE
l Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3 server supports 100 to 240
VAC input voltage.
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
For the High Availability System (SUSE Linux), if the power supply is insufficient, the
server automatically stops and the high availability system fails to trigger an active/
standby switchover.
2.

Press the power buttons on the peripherals and monitor connected to a server.

3.

Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks every
1s, press the power button on the shelf of the server.
NOTE

If the power button is steady on, the server has been successfully powered on. For details about IBM
server indicators, see the manual for IBM servers or log in to the official IBM website. For details
about Huawei server indicators, see the manual for Huawei servers or log in to the official Huawei
website. For official websites of software and hardware documents, see How Do I Obtain ThirdParty Software and Hardware Materials?.

The red boxes in the following figures show the positions of power buttons on Huawei
Tecal RH2288H V2, Huawei Tecal RH5885H V3, IBM X3650 M4, IBM X3650 M3 and
IBM X3850 X5.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

25

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-12 Position of the power button on Huawei Tecal RH5885H V3 server

Figure 1-13 Position of the power button on Huawei Tecal RH2288H V2 server

Figure 1-14 Position of the power button on IBM X3650 M4

Figure 1-15 Position of the power button on IBM X3650 M3

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

26

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-16 Position of the power button on IBM X3850 X5

Disk Array

NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
NOTE

Power supply must be provided for the two power modules of the OceanStor S3900; otherwise, the
OceanStor S3900 fail to be used. Then press the power switch on the controller A / B. Wait 5 to 10 minutes
until the power indicator is steady green, no longer flashing, indicating the success of the power-on.

1.2.3.2 Starting the Database


This topic describes how to start the database. The U2000 can start properly only after the
database is started.

Prerequisites
The OS has been started.

Context
Generally, the database starts along with the OS.

Procedure
Step 1 Log in to the OS as the dbuser user.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

27

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see How to Change the OS User Password.

Step 2 Run the following command to check whether the Sybase database is running.
$ ps -ef | grep sybase

Information similar to the following is displayed:


dbuser
4989
1 0 Sep20 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser
5003 4989 0 Sep20 ?
00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser
5012
1 0 Sep20 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser
5016 5012 0 Sep20 ?
00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE

The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.

Step 3 Run the following commands to start the Sybase database if it is not running.
$
$
$
$

. /opt/sybase/SYBASE.sh
cd /opt/sybase/ASE*/install
./startserver -f ./RUN_DBSVR &
./startserver -f ./RUN_DBSVR_back &
NOTE

l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.

----End

Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase

Information similar to the following is displayed:


dbuser
4989
1 0 Sep20 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser
5003 4989 0 Sep20 ?
00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser
5012
1 0 Sep20 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser
5016 5012 0 Sep20 ?
00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 M/opt/sybase/ASE-15_0/bin/sybmultbuf
...

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

28

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.

1.2.3.3 Starting the U2000 Server Processes


This topic describes how to start the U2000 server processes in a SUSE Linux single-server
system. You can log in to the U2000 to manage a network only after starting the U2000 server
processes on the computer on which the U2000 is installed.

Prerequisites
The OS on the PC server on which the U2000 server processes are installed is running properly,
and the database has been started.

Context
Generally, the U2000 server processes start along with the OS.

Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 Ensure that the U2000 is running.
Run the following command to check whether the U2000 is running:
$ daem_ps

Information similar to the following is displayed:


ossuser
ossuser
ossuser
ossuser
ossuser
ossuser

27069
27079
27075
27086
23679
27116

1
1
1
1
1
1

0
0
0
0
1
0

10:31:39
10:31:39
10:31:39
10:31:39
17:57:06
10:31:40

?
?
?
?
pts/8
?

1:39
0:00
0:50
0:09
0:02
0:52

imapmrb
imapwatchdog -cmd start
imapsysd -cmd start
imapeventmgr
imap_sysmonitor -cmd start
ResourceMonitor -cmd start

NOTE

The U2000 is running if the displayed information contains imap_sysmonitor -cmd start. If no
introduction is displayed, the U2000 processes have been stopped.

Run the following command to start the U2000 if it is not running:


$ cd /opt/oss/server/platform/bin
$ ./startnms.sh

Step 3 View the running status of each process through the System Monitor on the SUSE Linux OS,
as follows:
1.

On the desktop of the OS, double-click the U2000 System Monitor shortcut icon.
NOTE

You can run the following commands to start the system monitor client through the CLI:
$ cd /opt/oss/client
$ ./startup_sysmonitor_global.sh

2.

Issue 03 (2014-12-10)

In the dialog box that is displayed, enter the U2000 user name and password to open the
System Monitor window. The initial password of the admin user is Changeme_123 (It is
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

29

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Admin_123 for a U2000 that comes preinstalled). The password must be changed during
the first login to ensure system security. Keep the password confidential and change it
regularly.
NOTE

Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). Security(SSL) is
recommended for the high security requirements. You can run a command on the server to query the
data transmission mode.
For details about how to set the communication mode for the U2000 server in a SUSE Linux singleserver system, see How to Set the Communication Mode on the U2000 server for the Single-Server
System (SUSE Linux).

----End

Result
l

If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.

If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.

If the U2000 does not run properly, contact Huawei engineers.

1.2.4 Starting the U2000 Server in a Solaris High Availability System


The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.

1.2.4.1 Powering On the Server Safely


This topic describes how to power on the server in a HA system (Solaris) safely. The procedure
for powering on a server varies according to the server type and disk array type.

Netra T4-1/Netra T4-2/Oracle T4-1/Oracle T4-2/T5220 Server


1.

Power on a Netra T4-1/Netra T4-2/Oracle T4-1/Oracle T4-2/T5220 server.

NOTICE
l Oracle SPARC T4-2 workstations support only 200 ~ 240 VAC input voltage and do
not support 100 ~ 120 VAC input voltage.
l Netra T4-1/Oracle T4-1/T5220/M4000/M5000 server supports 200 to 240 VAC and
100 to 120 VAC input voltage.
l Netra T4-2 server supports100 to 220 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops and the high availability system fails to
trigger an active/standby switchover.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

30

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

2.

Wait about 2 or 3 minutes. Then switch on the power of the Netra T4-1/Netra T4-2/Oracle
T4-1/Oracle T4-2/T5220 workstation to start the server.

3.

After the server is started, check indicators on the front panel. If the power indicator is
steady green, the server is powered on. If another indicator is on or blinks, the server does
not function properly. Contact the server maintenance engineers to solve the problem. The
following figure shows the positions of the power switch and power indicator.
Figure 1-17 Power switch and power indicator on the Netra T4 server

Figure 1-18 Power switch and power indicator on the Netra T4-2 server

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

31

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-19 Power switch and power indicator on the Oracle T4-1 server

Figure 1-20 Power switch and power indicator on the Oracle T4-2 server

Figure 1-21 Power switch and power indicator on the T5220 server

NOTE

l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If the server displays the OK prompt, enter boot. If the server does not respond, no Solaris OS has been
installed on the server.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

32

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

M4000/M5000 Server
1.

Power on an M4000/M5000 server.


NOTE

Configure power supply based on the rated system power requirement, see U2000 Hardware
Installation Guide (Huawei N610E cabinet). If the power supply is insufficient, the server
automatically stops and the high availability system fails to trigger an active/standby switchover.
This issue occurs frequently for the M4000/M5000 with high power consumption.

2.

Insert the key delivered with the server into the key slot in the front panel of the M4000/
M5000 server, and turn the rotary switch to the Locked position labeled with
in the following figure.

, as shown

Figure 1-22 Power button on the M4000/M5000 server

3.

Press the power switch of the workstation, which is identified by . Wait 2 to 3 minutes.
If front indicator of the server is on (changes to steady green), the server starts up and
performs self-diagnosis.
NOTE

l Ensure that the green LED power indicator on the operation panel is lit.
l During the power-on process, it is recommended that you use a PC to log in to the controller on
an M4000/M5000 server through a serial interface and enter console -d 0 -f to view the server
start status.
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
, the server cannot access the
l If turn the rotary switch to the Service position labeled with
OS automatically, the server displays the ok prompt. Enter boot. If the server does not respond,
no Solaris OS has been installed on the server.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

33

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Disk Array

NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
Power-on Sequence
For OceanStor S3900:
l

Normal power-on sequence: switch on the power switches of the external power supplies
connected to all the devices press the power button on either controller switch on the
LAN switch or FC switch (if any LAN switch or FC switch is deployed but is not powered
on) switch on the application server (if the application server is not powered on).

Normal power-down sequence: stop the services of the application server hold the power
button for 5 seconds on either controller disconnect the controller enclosure and disk
enclosures from the external power supplies.

For OceanStor S2600:


l

Power-on sequence: cabinet disk enclosures controller enclosure switch (if has)
application server.

Power-off sequence: application server switch (if has) controller enclosure disk
enclosures cabinet.
NOTE

Power supply must be provided for the two power modules of the OceanStor S2600 and OceanStor
S3900; otherwise, the OceanStor S2600 and OceanStor S3900 fail to be used. Then press the power switch
on the controller A / B. Wait 5 to 10 minutes until the power indicator is steady green, no longer flashing,
indicating the success of the power-on.

Physical indications that the storage system is up and running without error:
l

The power indicators of the controllers, controller enclosure, and disk enclosures are steady
green.

The alarm indicators of the controllers, controller enclosure, and disk enclosures are off.

The running indicators of the coffer disks are steady green, and their alarm/location
indicators are off.

1.2.4.2 Starting the Database


This topic describes how to start the database in a Solaris high availability system. The U2000
can start properly only after the database is started.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

34

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Prerequisites
l

The OS has been started.

The server is properly connected to the network.

The VCS service must be properly started. The VCS service has started along with the OS
and the disk is functioning properly.

Procedure
Step 1 Perform the following operations to start the Sybase database:
l GUI mode:
1.

Log in to the active site as the root user.

2.

Run the following command to start the VCS client:


# hagui&

3.

Choose File > New Cluster from the main menu. In the dialog box that is displayed,
enter the server IP address and click OK.
NOTE

If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.

4.

Enter the default user name admin and the initial password Changeme_123 for the
VCS client. For system security, modify the default password and remember the new
password. For detail, see How to Change the admin User Password for Logging In to
the VCS Client. Then click OK.

5.

Ensure that all Veritas resources are in Enabled state. Use the BackupServer resource
as an example. Perform the following operations:
Expand the AppService node and then the SybaseBk node in the navigation tree, rightclick BackupServer, and check whether Enabled has been selected in the shortcut
menu. If Enabled has not been selected, select it.

6.

Right-click BackupServer and choose Online > host name from the shortcut menu.

7.

In the dialog box that is displayed, click Yes.


Wait until the BackupServer and DatabaseServer resource icons on the Resources
tab page are bright, which indicates that the Sybase database service has started.

l CLI mode:
1.

Log in to the active site as the root user.

2.

Run the following commands to query Veritas resource names:


# haconf -makerw
# hares -list

Information similar to the following is displayed in a Solaris high availability system:


BackupServer
DataFilesystem
DatabaseServer
NMSServer
RVGPrimary
datarvg
wac

Primary
Primary
Primary
Primary
Primary
Primary
Primary

Information similar to the following is displayed in a PC Linux high availability


system:
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

35

iManager U2000 Unified Network Management System


Operation Guide for Common Features
APPBOND
BackupServer
DatabaseServer
NMSServer
RVGPrimary
datarvg
mountRes
wac

3.

1 Getting Started
Primaster
Primary
Primary
Primary
Primary
Primary
Primary
Primary

Run the hares -modify resource name Enabled 1 command to change the status of all
Veritas resources to Enabled. Use the resource names displayed in the previous
command output as an example. Run the following commands to change the status of
all the Veritas resources to Enabled:
For example, execute the following commands in a Solaris high availability system:
#
#
#
#
#
#
#

hares
hares
hares
hares
hares
hares
hares

-modify
-modify
-modify
-modify
-modify
-modify
-modify

BackupServer Enabled 1
DataFilesystem Enabled 1
DatabaseServer Enabled 1
NMSServer Enabled 1
RVGPrimary Enabled 1
datarvg Enabled 1
wac Enabled 1

For example, execute the following commands in a PC Linux high availability system:
#
#
#
#
#
#
#
#

4.

hares
hares
hares
hares
hares
hares
hares
hares

-modify
-modify
-modify
-modify
-modify
-modify
-modify
-modify

APPBOND Enabled 1
BackupServer Enabled 1
DatabaseServer Enabled 1
NMSServer Enabled 1
RVGPrimary Enabled 1
datarvg Enabled 1
mountRes Enabled 1
wac Enabled 1

Run the following command to start the Sybase database service:


# hares -online BackupServer -sys hostname
NOTE

hostname specifies the server name. You can run the hostname command to view the server
name.

----End

Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase

Information similar to the following is displayed:


dbuser
4664
1 0 Apr15 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser
4675 4664 32 Apr15 ?
2-22:42:47 /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/
DBSVR.log -c/opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser
4688
1 0 Apr15 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser
4692 4688 0 Apr15 ?
00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE

If the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -sDBSVR and /opt/sybase/


ASE-15_0/bin/backupserver -SDBSVR_back, the Sybase process is running.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

36

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.2.4.3 Starting the U2000 Server Processes


This topic describes how to start the U2000 server processes in a Solaris high availability system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.

Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.

Procedure
Step 1 Log in to the OS on the active site as the root user.
Step 2 Start the U2000 server processes.
l GUI mode:
1.

Open a terminal window and run the following command:


# hagui&

NOTE

If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.

2.

Choose Connect to cluster name.


NOTE

If you are logging in to the VCS for the first time, create a new cluster.
1. Choose File > New Cluster.
2. Enter an application network IP address.
3. Click OK.

3.

Set User Name and Password.


NOTE

The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.

4.
Issue 03 (2014-12-10)

Click OK.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

37

iManager U2000 Unified Network Management System


Operation Guide for Common Features

5.

1 Getting Started

In the Cluster Explorer window, select the AppService resource group in the
navigation tree, right-click, and choose Online > host name from the shortcut menu to
start the Sybase process and U2000 server processes.
NOTE

Click the Resources tab to view the start status of each resource.

Normally, the value of State for the active site is Online in the Group Status on
Member Systems area on the Status tab page, and the value of Status is Online on
host name in the Resource Status area.
NOTE

l Use the actual host name for real-world configuration.


l If a fault has occurred during the start of the AppService process, right-click AppService and
choose clear fault from the shortcut menu to rectify the fault. Then choose Online > host name
to start the AppService process.

6.

In the dialog box that is displayed, click Yes.

l CLI mode:
# hagrp -online AppService -sys hostname
NOTE

l Use the actual host name for real-world configuration.


l If a fault has occurred during the start of the AppService process, run the
# hagrp -clear AppService -sys hostname
command to rectify the fault. Then run the
# hagrp -online AppService -sys hostname
command to start the AppService process.

----End

Result
1.

Log in to the OS of the active site as the ossuser user.

2.

Run the following command to check whether the U2000 is running:


$ daem_ps

Information similar to the following is displayed:


ossuser
ossuser
ossuser
ossuser
ossuser
start
ossuser

27069
27079
27075
27086
23679
27116

1
1
1
1
1
1

0
0
0
0
1

10:31:39
10:31:39
10:31:39
10:31:39
17:57:06

?
?
?
?
pts/8

0 10:31:40 ?

1:39
0:00
0:50
0:09
0:02

imapmrb
imapwatchdog -cmd start
imapsysd -cmd start
imapeventmgr
imap_sysmonitor -cmd

0:52 ResourceMonitor -cmd start

NOTE

The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.

1.2.5 Starting the U2000 Server in a SUSE Linux High Availability


System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

38

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.2.5.1 Powering On the Server Safely


This topic describes how to power on the server in a SUSE Linux system safely. Power on the
Huawei Tecal RH2288H V2, Huawei Tecal RH5885H V3, IBM X3650 M4, IBM X3650 M3
or IBM X3850 X5 on condition that the power supply is normal.

Server
1.

Power on a Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3/IBM X3650 M4/
IBM X3650 M3/IBM X3850 X5 server.

NOTICE
l Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3 server supports 100 to 240
VAC input voltage.
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
For the High Availability System (SUSE Linux), if the power supply is insufficient, the
server automatically stops and the high availability system fails to trigger an active/
standby switchover.
2.

Press the power buttons on the peripherals and monitor connected to a server.

3.

Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks every
1s, press the power button on the shelf of the server.
NOTE

If the power button is steady on, the server has been successfully powered on. For details about IBM
server indicators, see the manual for IBM servers or log in to the official IBM website. For details
about Huawei server indicators, see the manual for Huawei servers or log in to the official Huawei
website. For official websites of software and hardware documents, see How Do I Obtain ThirdParty Software and Hardware Materials?.

The red boxes in the following figures show the positions of power buttons on Huawei
Tecal RH2288H V2, Huawei Tecal RH5885H V3, IBM X3650 M4, IBM X3650 M3 and
IBM X3850 X5.
Figure 1-23 Position of the power button on Huawei Tecal RH5885H V3 server

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

39

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-24 Position of the power button on Huawei Tecal RH2288H V2 server

Figure 1-25 Position of the power button on IBM X3650 M4

Figure 1-26 Position of the power button on IBM X3650 M3

Figure 1-27 Position of the power button on IBM X3850 X5

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

40

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Disk Array

NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
NOTE

Power supply must be provided for the two power modules of the OceanStor S3900; otherwise, the
OceanStor S3900 fail to be used. Then press the power switch on the controller A / B. Wait 5 to 10 minutes
until the power indicator is steady green, no longer flashing, indicating the success of the power-on.

1.2.5.2 Starting the Database


This topic describes how to start the database in a PC Linux high availability system. The
U2000 can start properly only after the database is started.

Prerequisites
l

The OS has been started.

The server is properly connected to the network.

The VCS service has started along with the OS and the disk is functioning properly.

Procedure
Step 1 Perform the following operations to start the Sybase database:
l GUI mode:
1.

Log in to the active site as the root user.

2.

Run the following command to start the VCS client:


# hagui&

3.

Choose File > New Cluster from the main menu. In the dialog box that is displayed,
enter the server IP address and click OK.
NOTE

If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.

Issue 03 (2014-12-10)

4.

Enter the default user name admin and the initial password Changeme_123 for the
VCS client. For system security, modify the default password and remember the new
password. For detail, see How to Change the admin User Password for Logging In to
the VCS Client. Then click OK.

5.

Ensure that all Veritas resources are in Enabled state. Use the BackupServer resource
as an example. Perform the following operations:
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

41

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Expand the AppService node and then the SybaseBk node in the navigation tree, rightclick BackupServer, and check whether Enabled has been selected in the shortcut
menu. If Enabled has not been selected, select it.
6.

Right-click BackupServer and choose Online > host name from the shortcut menu.

7.

In the dialog box that is displayed, click Yes.


Wait until the BackupServer and DatabaseServer resource icons on the Resources
tab page are bright, which indicates that the Sybase database service has started.

l CLI mode:
1.

Log in to the active site as the root user.

2.

Run the following commands to query Veritas resource names:


# haconf -makerw
# hares -list

Information similar to the following is displayed in a Solaris high availability system:


BackupServer
DataFilesystem
DatabaseServer
NMSServer
RVGPrimary
datarvg
wac

Primary
Primary
Primary
Primary
Primary
Primary
Primary

Information similar to the following is displayed in a PC Linux high availability


system:
APPBOND
BackupServer
DatabaseServer
NMSServer
RVGPrimary
datarvg
mountRes
wac

3.

Primaster
Primary
Primary
Primary
Primary
Primary
Primary
Primary

Run the hares -modify resource name Enabled 1 command to change the status of all
Veritas resources to Enabled. Use the resource names displayed in the previous
command output as an example. Run the following commands to change the status of
all the Veritas resources to Enabled:
For example, execute the following commands in a Solaris high availability system:
#
#
#
#
#
#
#

hares
hares
hares
hares
hares
hares
hares

-modify
-modify
-modify
-modify
-modify
-modify
-modify

BackupServer Enabled 1
DataFilesystem Enabled 1
DatabaseServer Enabled 1
NMSServer Enabled 1
RVGPrimary Enabled 1
datarvg Enabled 1
wac Enabled 1

For example, execute the following commands in a PC Linux high availability system:
#
#
#
#
#
#
#
#

4.

hares
hares
hares
hares
hares
hares
hares
hares

-modify
-modify
-modify
-modify
-modify
-modify
-modify
-modify

APPBOND Enabled 1
BackupServer Enabled 1
DatabaseServer Enabled 1
NMSServer Enabled 1
RVGPrimary Enabled 1
datarvg Enabled 1
mountRes Enabled 1
wac Enabled 1

Run the following command to start the Sybase database service:


# hares -online BackupServer -sys hostname

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

42

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

hostname specifies the server name. You can run the hostname command to view the server
name.

----End

Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase

Information similar to the following is displayed:


dbuser
4989
1 0 Sep20 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser
5003 4989 0 Sep20 ?
00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser
5012
1 0 Sep20 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser
5016 5012 0 Sep20 ?
00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE

The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.

1.2.5.3 Starting the U2000 Server Processes


This topic describes how to start the U2000 server processes in a PC Linux high availability
system. You can log in to the U2000 to manage a network only after starting the U2000 server
processes on the computer on which the U2000 is installed.

Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.

Procedure
Step 1 Log in to the OS on the active site as the root user.
Step 2 Start the U2000 server processes.
l GUI mode:
1.

Open a terminal window and run the following command:


# hagui&

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

43

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.

2.

Click Connect to cluster name.


NOTE

If you are logging in to the VCS for the first time, create a new cluster.
1. Choose File > New Cluster.
2. Enter an application network IP address.
3. Click OK.

3.

Set User Name and Password.


NOTE

The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.

4.

Click OK.

5.

In the Cluster Explorer window, select the AppService resource group in the
navigation tree, right-click, and choose Online > host name from the shortcut menu to
start the Sybase process and U2000 server processes.
NOTE

Click the Resources tab to view the start status of each resource.

Normally, the value of State for the active site is Online in the Group Status on
Member Systems area on the Status tab page, and the value of Status is Online on
host name in the Resource Status area.
NOTE

l Use the actual host name for real-world configuration.


l If a fault has occurred during the start of the AppService process, right-click AppService and
choose clear fault from the shortcut menu to rectify the fault. Then choose Online > host name
to start the AppService process.

6.

In the dialog box that is displayed, click Yes.

l CLI mode:
# hagrp -online AppService -sys hostname

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

44

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

l hostname specifies the server name. You can run the hostname command to view the server name.
l If a fault has occurred during the start of the AppService process, run the # hagrp -clear AppService
-sys hostname command to rectify the fault. Then run the # hagrp -online AppService -sys hostname
command to start the AppService process.

----End

Result
1.

Log in to the OS of the active site as the ossuser user.

2.

Run the following command to check whether the U2000 is running:


$ daem_ps

Information similar to the following is displayed:


ossuser
ossuser
ossuser
ossuser
ossuser
start
ossuser

27069
27079
27075
27086
23679
27116

1
1
1
1
1
1

0
0
0
0
1

10:31:39
10:31:39
10:31:39
10:31:39
17:57:06

?
?
?
?
pts/8

0 10:31:40 ?

1:39
0:00
0:50
0:09
0:02

imapmrb
imapwatchdog -cmd start
imapsysd -cmd start
imapeventmgr
imap_sysmonitor -cmd

0:52 ResourceMonitor -cmd start

NOTE

The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.

1.2.6 Logging In to a U2000 Client


Log in to a U2000 using the client, and then perform management operations in the GUI of the
U2000 client.

Prerequisites
Before logging in to a U2000 client, ensure that the following conditions are met:
l

The U2000 server has been started.

The U2000 client communicates with the U2000 server properly.


NOTE

Run the ping peer IP address command to check the network communication.

In a single-server system, the IP address is the system IP address for the server.
In an availability system, the IP address is the NMS application network IP address for
the active site.
l

The ports used between the U2000 client and the U2000 server have been enabled. For
details, see U2000 Communication Port Matrix.

The IP address of the U2000 client is included in the ACL configured on the U2000 server.
NOTE

By default, an ACL contains all IP addresses. Setting an ACL based on security requirements is
recommended. For details, see 3.3.1.2 Setting a User ACL.

Valid U2000 user account and password are available.

U2000 licenses have been correctly loaded to the U2000 server.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

45

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Using the resolution 1024 x 768 or higher is recommended. If the resolution is not used,
the U2000 client GUI may be incomplete. If the GUI contains complex elements, use a
higher resolution at the same ratio, such as 1152 x 864.

By default, if three incorrect passwords are entered consecutively, the associated user
account will be locked by the U2000. The user admin can unlock common user accounts.
The U2000 will also unlock the user account in 30 minutes.

The password for the U2000 System Monitor must be the same as that for the U2000 client.

Each U2000 client can concurrently connect to multiple U2000 servers of the same version.

Context

Procedure
Step 1 Log in to the OS on which the U2000 client is installed.
l On Windows, log in to the OS as the administrator user.
l On Solaris, log in to the OS GUI as the ossuser user.
Step 2 Double-click the U2000 Client shortcut icon on the desktop. The Login dialog box is displayed.
NOTE

l On Windows, double-click the startup_all_global.bat file in the client installation path, for example
D:\oss\client directory to start the U2000 client.
l On Solaris, run the ./startup_all_global.sh command in the /opt/oss/client directory to start the
U2000 client.

Step 3 In the Login dialog box, select a desired server from the Server drop-down list.
If no server has been configured, perform the following operations to add a server:
1.

Click the ... button. In the Server List dialog box, click Add.

2.

In the Add Server Information dialog box, set parameters for the U2000 server to be
added and click OK.
Table 1-2 Server parameter settings
Parameter

Settings

Name

Setting this parameter to the login IP address or the related host name
is recommended.

Server name (or


IP address)

Setting this parameter to an IP address is recommended.


l In a single-server system, the IP address is the system IP address
for the server.
l In an availability system, the IP address is the NMS application
network IP address for the active site.

Secondary server
name (or IP
address)

Issue 03 (2014-12-10)

Generally, this parameter is not set. If the U2000 server is running


in a high availability system, set this parameter to the IP address of
the standby site.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

46

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Parameter

Settings

Port

Two data transmission modes are available: Common and Security


(SSL) (more secure, recommended). By default, port 31037 is used
in Common mode and port 31039 is used in Security(SSL) (more
secure, recommended) mode.

Mode

Two data transmission modes are available: Common and Security


(SSL) (more secure, recommended). The default data transmission
mode is Security(SSL). Security(SSL) is recommended for the
high security requirements. You can run a command on the server
to query the data transmission mode.
l about how to set the communication mode for the U2000 server
and client in a Windows single-server system, see How to Set
the Communication Mode on the U2000 server for the SingleServer System (Windows).
l about how to set the communication mode for the U2000 server
and client in a Solaris single-server system, see How to Set the
Communication Mode on the U2000 server for the Single-Server
System (Solaris).
l about how to set the communication mode for the U2000 server
and client in a SUSE Linux single-server system, see How to Set
the Communication Mode on the U2000 server for the SingleServer System (SUSE Linux).
l about how to set the communication mode for the U2000 server
and client in a Solaris high availability system, see How to Set
the Communication Mode of the Server in a High Availability
System (Solaris, SUSE Linux).
l about how to set the communication mode for the U2000 server
and client in a SUSE Linux high availability system, see How to
Set the Communication Mode of the Server in a High
Availability System (Solaris, SUSE Linux).
NOTE
A client can log in to the U2000 server only when they work in the same
mode. If the client and server work in different modes, even if they are
installed on the same host, the client cannot log in to the server.

3.

In the Server List dialog box, select a server from the list and click OK.

Step 4 Enter valid user name and password, and click Login.
l The default user name is admin. The initial password of the admin user is
Changeme_123 (It is Admin_123 for a U2000 that comes preinstalled). The password must
be changed during the first login to ensure system security. Keep the password confidential
and change it regularly.
l If you attempt to connect to the server in a non-SSL mode, the client displays a dialog box
indicating security risks.
If you want to continue the connection, click Yes. If you do not want the client to display
the dialog box again upon subsequent logins, select Do not remind me next time.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

47

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

The IP address of the server being connected is saved to the allComServer.dat file in Client
installation directory\client\client\plugins\loginui\style\conf\loginui. Therefore, the Do not
remind me next time settings apply only to the connected server. If you want the client to display
the dialog box that indicates the security risks upon subsequent logins, delete the
allComServer.dat file.

If you want to terminate the connection, click No. The Login dialog box is displayed.
You can select the matched communication mode.
l If the client does not trust the server, you need to determine whether the server is trustworthy
using the server certificate.
If you confirm that the server is trustworthy, click Yes and log in to the client. If you do
not want the system to display the dialog box again, contact the system administrator to
configure a trust certificate.
If you confirm that the server is untrustworthy, click No to return to the Login dialog box
and contact the system administrator to process the issue.
l When you log in to the U2000 client, a message will be displayed asking you whether to
upgrade the client if the U2000 detects that the local computer version is earlier than the
server version.
To upgrade the client, click OK.
To return to the login window, click Cancel.
NOTE

If the automatic upgrade fails, upgrade the client through the CAU.

----End

Result
After the U2000 client is successfully logged in to, it automatically obtains associated data from
the U2000 server.
NOTE

After the U2000 client is successfully logged in to, if a certificate problem is prompted, accept this
certificate permanently. Click OK.

1.3 Shutting Down a U2000


This topic describes how to shut down the U2000 server and U2000 clients. The shutdown
procedure varies according to the deployment scheme.

1.3.1 Shutting Down U2000 Clients


You must ensure that all U2000 clients are shut down before you shut down the U2000 server.
This topic describes how to shut down the U2000 clients.

Prerequisites
The U2000 clients must be started properly.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

48

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Procedure
Step 1 Choose File > Exit from the main menu.
Step 2 In the Confirm dialog box, click OK.
If certain operations are performed on the Main Topology but not saved, a prompt is displayed,
asking you whether to save them.
----End

1.3.2 Shutting Down the U2000 Server (Single Server System,


Windows)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.

1.3.2.1 Stopping the U2000 Server Processes


Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Windows single-server system.

Prerequisites
Exit all running U2000 clients.

Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Ensure that the U2000 is not running.
1.

Choose Start > Run. The Run window will be displayed.

2.

Enter cmd and click OK.

3.

In the CLI, run the daem_ps command to check whether the U2000 process is stopped.
l If no command output is displayed, the U2000 process has stopped.
l If information similar to the following is displayed, the U2000 process is not stopped.
In the CLI, run the D:\oss\server\platform\bin\stopnms.bat command to stop the
U2000 process.
imapmrb.exe
K
imapeventmgr.exe
K
imapsysd.exe
K
imapwatchdog.exe
K
ResourceMonitor.exe
K
imap_sysmonitor.exe
K
python.exe
K
httpd.exe

Issue 03 (2014-12-10)

4000 Services

28,200

4020 Services

19,128

4028 Services

46,696

4060 Services

7,548

4088 Services

26,704

3652 Services

35,644

4412 Services

21,348

4496 Services

10,848

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

49

iManager U2000 Unified Network Management System


Operation Guide for Common Features
K
java.exe
K
httpd.exe
K

1 Getting Started

4520 Services

94,952

5260 Services

18,512

NOTE

l D:\oss specifies the installation path of the U2000.


l Stopping the U2000 process takes about 3 minutes.

----End

Result
If no command output is displayed after the daem_ps command is executed, the U2000 process
has stopped.

1.3.2.2 Shutting Down the Database


The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the Windows single-server system.

Prerequisites
The U2000 server processes must have been stopped.

Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > All Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL
Server Configuration Manager > SQL Server Services.
Step 3 Right-click SQL Server (MSSQLSERVER) and choose Stop to stop the database.
NOTE

If the SQL Server 2000 is installed in Windows Server 2003, choose Start > All Programs > Microsoft
SQL Server > Service Manager. The SQL Server Service Manager dialog box is displayed. Then, click
Stop. Then, click Yes.

----End

Result
Two methods are available for checking whether the SQL Server database can connect normally.
l

Through the CLI:


1.

Choose Start > Run.

2.

In the Run dialog box, enter cmd. A command line interface (CLI) is displayed.

3.

Run the following commands:


> isql -Usa -SDBSVR

In order to enhance the security of the database after the U2000 is installed, the sa
user may be manually disabled and replaced with a customized administrator name,
such as dbadmin.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

50

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

l DBSVR specifies the database name.


l Enter the database sa user password as prompted.
l The prompt C:\> varies according to on-site conditions. If the system is logged in to as
the Administrator user, the default prompt is C:\Users\Administrator>. You can
run the cd command to switch the directory. A command example is
C:\Users\Administrator> cd c:\

. The command prompt switches to c:\>.

If the displayed information includes 1>, you can connect to the database normally,
that is, the database is shutted down. Otherwise, the database is started.
l

Through the GUI:


1.

Click Start > All Programs > Microsoft SQL Server 2008 > SQL Server
Management Studio. The Connect to Server window is displayed.

2.

Set parameters according to the following information and then click Connect.
Server type: Database Engine
Server name: DBSVR
Authentication: Windows Authentication
If the displayed SQL Server Management Studio window prompted, you can
connect to the database normally, that is, the database is started. Otherwise, the
database is shutted down.

1.3.2.3 Powering Off the Server Safely


Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Windows single-server system safely.

Prerequisites
l

The U2000 server processes must have been stopped.

The database must have been shut down.

Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > Shut down to shut down the Windows OS.
Step 3 If a KVM is equipped, power off the KVM switcher.
----End

1.3.3 Shutting Down the U2000 Server (Single Server System,


Solaris)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.

1.3.3.1 Stopping the U2000 Server Processes


Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

51

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Solaris single-server system.

Prerequisites
Exit all running U2000 clients.

Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 To check the running status of the U2000 process, run the following command:
Run the following command to check whether the U2000 is running:
$ daem_ps

Information similar to the following is displayed:


ossuser
ossuser
ossuser
ossuser
ossuser
ossuser

27069
27079
27075
27086
23679
27116

1
1
1
1
1
1

0
0
0
0
1
0

10:31:39
10:31:39
10:31:39
10:31:39
17:57:06
10:31:40

?
?
?
?
pts/8
?

1:39
0:00
0:50
0:09
0:02
0:52

imapmrb
imapwatchdog -cmd start
imapsysd -cmd start
imapeventmgr
imap_sysmonitor -cmd start
ResourceMonitor -cmd start

NOTE

The U2000 is running if the displayed information contains imap_sysmonitor -cmd start. If no
introduction is displayed, the U2000 processes have been stopped.

Step 3 Run the following commands to stop U2000 if it is running:


$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh

----End

Result
Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE

The process is stopped if the displayed information is empty.

1.3.3.2 Shutting Down the Database


The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the Solaris single-server system.

Prerequisites
The U2000 server processes must have been stopped.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

52

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE

To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see How to Change the OS User Password.

Step 2 Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase

Information similar to the following is displayed:


dbuser
793
1
0
Sep 16 ?
0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR
dbuser
802
801
0
Sep 16 ?
0:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/insta
dbuser
795
793
0
Sep 16 ?
118:30 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt
dbuser
926
795
0
Sep 16 ?
117:45 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:1,0,0x2005f917, 10000000000, 0xd4be
dbuser
927
795
0
Sep 16 ?
63:59 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:2,0,0x2005f917, 10000000000, 0xd4be
dbuser
930
795
0
Sep 16 ?
145:24 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:5,0,0x2005f917, 10000000000, 0xd4be
dbuser
929
795
0
Sep 16 ?
69:26 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:4,0,0x2005f917, 10000000000, 0xd4be
dbuser
801
1
0
Sep 16 ?
0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR_back
dbuser
932
795
0
Sep 16 ?
56:19 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:7,0,0x2005f917, 10000000000, 0xd4be
dbuser
931
795
0
Sep 16 ?
54:25 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:6,0,0x2005f917, 10000000000, 0xd4be
dbuser
928
795
0
Sep 16 ?
90:08 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:3,0,0x2005f917, 10000000000, 0xd4be
dbuser 28591 28193
0 15:22:07 pts/1
0:00 grep sybase
NOTE

The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.

Step 3 Run the following commands to stop the Sybase database if it is running:
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE

Enter the database administrator user password as prompted. The initial password of the database
administrator user is Changeme_123.
In order to enhance the security of the database after the U2000 is installed, the sa user may be manually
disabled and replaced with a customized administrator name, such as dbadmin.
1>
2>
1>
2>

Issue 03 (2014-12-10)

shutdown SYB_BACKUP
go
shutdown
go

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

53

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error: NetLibrary operation terminated due to disconnect

----End

Result
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE

The database is stopped if the displayed information does not contain /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.

1.3.3.3 Power Off the Server Safely


Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Solaris single-server system safely.

Prerequisites
l

The U2000 server processes must have been stopped.

The database must have been shut down.

Procedure
Step 1 Log in to the Solaris OS as user root.
Step 2 Run the following commands to power off the server:
# sync;sync;sync;sync
# shutdown -y -g0 -i5
NOTE

If you do not want to power off the server, you can run the following commands to restart the OS:
# sync;sync;sync;sync
# shutdown -y -g0 -i6

Step 3 If a KVM is equipped, power off the KVM switcher.


----End

1.3.4 Shutting Down the U2000 Server (Single Server System, SUSE
Linux)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

54

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.3.4.1 Stopping the U2000 Server Processes


Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the SUSE Linux single-server system.

Prerequisites
All running U2000 clients have been stopped.

Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 To check the running status of the U2000 process, run the following command:
$ daem_ps

A message similar to the following will be displayed:


ossuser
ossuser
ossuser
ossuser
ossuser
ossuser

27069
27079
27075
27086
23679
27116

1
1
1
1
1
1

0
0
0
0
1
0

10:31:39
10:31:39
10:31:39
10:31:39
17:57:06
10:31:40

?
?
?
?
pts/8
?

1:39
0:00
0:50
0:09
0:02
0:52

imapmrb
imapwatchdog -cmd start
imapsysd -cmd start
imapeventmgr
imap_sysmonitor -cmd start
ResourceMonitor -cmd start

NOTE

The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.

Step 3 Run the following commands to stop U2000 if it is running:


$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh

----End

Result
Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE

The process is stopped if the displayed information is empty.

1.3.4.2 Shutting Down the Database


The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the SUSE Linux single-server system.

Prerequisites
The U2000 server processes must have been stopped.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

55

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE

To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see How to Change the OS User Password.

Step 2 Run the following command to check whether the Sybase database is running.
$ ps -ef | grep sybase

Information similar to the following is displayed:


dbuser
4989
1 0 Sep20 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser
5003 4989 0 Sep20 ?
00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser
5012
1 0 Sep20 ?
00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser
5016 5012 0 Sep20 ?
00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE

The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.

Step 3 Run the following commands to stop the Sybase database if it is running:
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE

Enter the database administrator user password as prompted. The initial password of the database
administrator user is Changeme_123.
In order to enhance the security of the database after the U2000 is installed, the sa user may be manually
disabled and replaced with a customized administrator name, such as dbadmin.
1>
2>
1>
2>

shutdown SYB_BACKUP
go
shutdown
go
NOTE

l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error: NetLibrary operation terminated due to disconnect

----End

Result
Run the following command to check whether the Sybase database is running:
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

56

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

$ ps -ef | grep sybase


NOTE

The database is stopped if the displayed information does not contain /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.

1.3.4.3 Powering Off the Server Safely


Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the U2000 single-server system (SUSE Linux) .

Prerequisites
l

The U2000 server processes must have been stopped.

The database must have been shut down.

Procedure
Step 1 Log in to the OS as the root user.
Step 2 Run the following commands to shut down the OS.
# sync;sync;sync;sync
# shutdown -h now

----End

1.3.5 Shutting Down the U2000 Server in a High Availability System


(Solaris)
Four steps are required to shut down the U2000 server in a high availability system (Solaris):
stop the U2000 server processes, shut down the database, stop the VCS service, and power off
the server safely.

1.3.5.1 Stopping the U2000 Server Processes


Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Solaris HA system.

Prerequisites
Exit all running U2000 clients.

Procedure
Step 1 Log in to the OS of the active site as the root user.
Step 2 Stop the U2000 server processes.
l GUI mode:
1.

Open a terminal window, run the following command:


# hagui&

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

57

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.

2.

Click Connect to Cluster name.


NOTE

If you are logging in to the VCS for the first time, you need to create a new Cluster.
1. Click File > New Cluster.
2. Enter the IP address of application network.
3. Click OK.

3.

Enter the user name and password for VCS login.


NOTE

The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.

4.

Click OK.

5.

Choose AppService from the navigation tree.

6.

Click the Resources tab. Right-click NMSServer and choose Offline > Host name
from the shortcut menu. In the Question dialog box, click Yes.
Wait about 1 minute. If the NMSServer icon changes to grey, the U2000 processes
have been stopped.

l CLI mode:
# hares -offline NMSServer -sys hostname

Step 3 Ensure that the U2000 is not running.


1.

Log in to the OS of the active site as the ossuser user.

2.

Run the following command to check the running status of the U2000 process:
$ daem_ps

Information similar to the following is displayed:


ossuser
ossuser
ossuser
ossuser
ossuser

Issue 03 (2014-12-10)

27069
27079
27075
27086
23679

1
1
1
1
1

0
0
0
0
1

10:31:39
10:31:39
10:31:39
10:31:39
17:57:06

?
?
?
?
pts/8

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

1:39
0:00
0:50
0:09
0:02

imapmrb
imapwatchdog -cmd start
imapsysd -cmd start
imapeventmgr
imap_sysmonitor -cmd

58

iManager U2000 Unified Network Management System


Operation Guide for Common Features
start
ossuser 27116

3.

1 Getting Started

0 10:31:40 ?

0:52 ResourceMonitor -cmd start

Run the following commands to stop the U2000 processes:


$ su - root
Password: root user password
# hares -offline NMSServer -sys hostname
# exit

4.

Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE

l The process is stopped if the displayed information is empty.


l For the high availability system (Solaris), you can still view information about the imapwatchdog
and ResourceMonitor processes after the U2000 is stopped. This is because the two processes are
used to monitor high availability system alarms and will be automatically enabled after the U2000 is
stopped.

----End

1.3.5.2 Shutting Down the Database


The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the HA system.

Prerequisites
The U2000 server processes must have been stopped.

Procedure
Step 1 Perform the following operations to disable the Sybase database service at the primary site in
the HA system:
NOTE

By default, the Sybase database service at the secondary site is not running.

l GUI mode:
1.

Log in to the primary site as user root.

2.

Run the following command to start the VCS client at the primary site:
# hagui&

3.

Choose File > New Cluster from the main menu. In the window that is displayed, enter
the IP address of the server and click OK.
NOTE

If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.

4.

Issue 03 (2014-12-10)

Enter the default user name admin and the initial password Changeme_123 for the
VCS client. For system security, modify the default password and remember the new
password. For detail, see How to Change the admin User Password for Logging In to
the VCS Client. Then click OK.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

59

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

5.

On the VCS client of the primary site, right-click the NMSServer node and choose
Offline > hostname from the shortcut menu.

6.

In the confirmation dialog box, click Yes.

7.

After the NMSServer node is dimmed, right-click the BackupServer node and choose
Offline > hostname from the shortcut menu.

8.

In the confirmation dialog box, click Yes.

9.

After the BackupServer node is dimmed, right-click the DatabaseServer node and
choose Offline > hostname from the shortcut menu.

10. In the confirmation dialog box, click Yes.


l CLI mode:
1.

Log in to the primary site as user root.

2.

Run the following command to shut down the U2000:


# hares -offline NMSServer -sys hostname

3.

Run the following command to disable the Sybase database service:


# hares -offline BackupServer -sys hostname
# hares -offline DatabaseServer -sys hostname
NOTE

hostname specifies the server name. You can run the hostname command to view the server name.

Run the following command to check whether the Sybase database service is disabled:
# ps -ef | grep sybase
If the following message is displayed, the Sybase database service has been disabled:
root

9629 14603

0 07:46:52 pts/3

0:00 grep sybase

----End

1.3.5.3 Stopping the VCS Service


This topic describes how to stop the VCS service.

Prerequisites
The U2000 and database must have been shut down.

Context
Before powering off the server safely, manually stop the VCS service; otherwise, the server may
fail to shut down properly.

Procedure
Step 1 Log in to the OS on the server as the root user.
Step 2 Run the following command to stop the VCS service:
# hastop -all -force
----End
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

60

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.3.5.4 Power Off the Server Safely


Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Solaris HA system safely.

Prerequisites
l

The U2000 server processes must have been stopped.

The database must have been shut down.

The VCS services must have been shut down.

Procedure
Step 1 Log in to the Solaris OS as user root.
Step 2 Run the following commands to power off the server:
# sync;sync;sync;sync
# shutdown -y -g0 -i5
NOTE

If you do not want to power off the server, you can run the following commands to restart the OS:
# sync;sync;sync;sync
# shutdown -y -g0 -i6

Step 3 If a KVM is equipped, power off the KVM switcher.


----End

1.3.6 Shutting Down the U2000 Server in a High Availability System


(PC Linux)
Four steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, stop the VCS service, and power off the server safely.

1.3.6.1 Stopping the U2000 Server Processes


Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the SUSE Linux HA system.

Prerequisites
Exit all running U2000 clients.

Procedure
Step 1 Log in to the OS of the active site as the root user.
Step 2 Stop the U2000 server processes.
l GUI mode:
1.

Open a terminal window, run the following command:


# hagui&

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

61

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.

2.

Click Connect to Cluster name.


NOTE

If you are logging in to the VCS for the first time, you need to create a new Cluster.
1. Click File > New Cluster.
2. Enter the IP address of application network.
3. Click OK.

3.

Enter the user name and password for VCS login.


NOTE

The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.

4.

Click OK.

5.

Choose AppService from the navigation tree.

6.

Click the Resources tab. Right-click NMSServer and choose Offline > Host name
from the shortcut menu. In the Question dialog box, click Yes.
Wait about 1 minute. If the NMSServer icon changes to grey, the U2000 processes
have been stopped.

l CLI mode:
# hares -offline NMSServer -sys hostname
NOTE

hostname specifies the server name. You can run the hostname command to view the server name.

Step 3 Ensure that the U2000 is not running.


1.

Log in to the OS of the active site as the ossuser user.

2.

Run the following command to check the running status of the U2000 process:
$ daem_ps

Information similar to the following is displayed:


ossuser
ossuser
ossuser
ossuser

Issue 03 (2014-12-10)

27069
27079
27075
27086

1
1
1
1

0
0
0
0

10:31:39
10:31:39
10:31:39
10:31:39

?
?
?
?

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

1:39
0:00
0:50
0:09

imapmrb
imapwatchdog -cmd start
imapsysd -cmd start
imapeventmgr

62

iManager U2000 Unified Network Management System


Operation Guide for Common Features
ossuser 23679
start
ossuser 27116

3.

1
1

1 Getting Started
1 17:57:06 pts/8
0 10:31:40 ?

0:02 imap_sysmonitor -cmd


0:52 ResourceMonitor -cmd start

Run the following commands to stop the U2000 processes:


$ su - root
Password: root user password
# hares -offline NMSServer -sys hostname
# exit

4.

Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE

The process is stopped if the displayed information is empty.

----End

1.3.6.2 Shutting Down the Database


The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the HA system.

Prerequisites
The U2000 server processes must have been stopped.

Procedure
Step 1 Perform the following operations to disable the Sybase database service at the primary site in
the HA system:
NOTE

By default, the Sybase database service at the secondary site is not running.

l GUI mode:
1.

Log in to the primary site as user root.

2.

Run the following command to start the VCS client at the primary site:
# hagui&

3.

Choose File > New Cluster from the main menu. In the window that is displayed, enter
the IP address of the server and click OK.
NOTE

If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.

Issue 03 (2014-12-10)

4.

Enter the default user name admin and the initial password Changeme_123 for the
VCS client. For system security, modify the default password and remember the new
password. For detail, see How to Change the admin User Password for Logging In to
the VCS Client. Then click OK.

5.

On the VCS client of the primary site, right-click the NMSServer node and choose
Offline > hostname from the shortcut menu.

6.

In the confirmation dialog box, click Yes.


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

63

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

7.

After the NMSServer node is dimmed, right-click the BackupServer node and choose
Offline > hostname from the shortcut menu.

8.

In the confirmation dialog box, click Yes.

9.

After the BackupServer node is dimmed, right-click the DatabaseServer node and
choose Offline > hostname from the shortcut menu.

10. In the confirmation dialog box, click Yes.


l CLI mode:
1.

Log in to the primary site as user root.

2.

Run the following command to shut down the U2000:


# hares -offline NMSServer -sys hostname

3.

Run the following command to disable the Sybase database service:


# hares -offline BackupServer -sys hostname
# hares -offline DatabaseServer -sys hostname
NOTE

hostname specifies the server name. You can run the hostname command to view the server name.

Run the following command to check whether the Sybase database service is disabled:
# ps -ef | grep sybase
If the following message is displayed, the Sybase database service has been disabled:
root

9629 14603

0 07:46:52 pts/3

0:00 grep sybase

----End

1.3.6.3 Stopping the VCS Service


This topic describes how to stop the VCS service.

Prerequisites
The U2000 and database must have been shut down.

Context
Before powering off the server safely, manually stop the VCS service; otherwise, the server may
fail to shut down properly.

Procedure
Step 1 Log in to the OS on the server as the root user.
Step 2 Run the following command to stop the VCS service:
# hastop -all -force
----End
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

64

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.3.6.4 Power Off the Server Safely


Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the U2000 HA System (SUSE Linux, PC Server).

Prerequisites
l

The U2000 server processes must have been stopped.

The database must have been shut down.

The VCS services must have been shut down.

Procedure
Step 1 Log in to the OS as the root user.
Step 2 Run the following commands to shut down the OS.
# sync;sync;sync;sync
# shutdown -h now

----End

1.4 Using the Workbench and Favorites Folder


This topic describes how to use the workbench and the favorites folder of commonly used
functions to rapidly locate the commonly used functions of the U2000.

1.4.1 Placing a Shortcut Icon on the Workbench


This topic describes how to place the shortcut icons of the commonly used functions on the
workbench and create function links. You can use the shortcut icons to improve operation
efficiency.

Context
If + is appended to a menu option on the main menu of the NMS, you can create the shortcut of
this menu option on the workbench.

Procedure
Step 1 In the main window of the U2000, click the drop-down arrow next to
Desktop to access the workbench.

and select Style of

Step 2 Right-click Workbench and choose Create Shortcut from the shortcut menu.
Step 3 In the Create Shortcut dialog box, select the function to be added with a shortcut icon.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

65

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 4 Click Create. The shortcut icon of the function is displayed on the workbench.
----End

1.4.2 Adding a Common Function to the Favorites Folder


This topic describes how to add a common function to the favorites folder. You can easily open
a common function view using the customized favorites folder.

Prerequisites
The U2000 client has been started successfully.

Context
When the NMS is started for the first time, the shortcut function view of the favorites folder is
displayed as a floating window on the Workbench. The default shortcut nodes, such as the alarm,
and Main Topology are displayed in the floating window.

Procedure
Step 1 Click the drop-down arrow next to

on the toolbar.

Step 2 In the drop-down list that is displayed, select Style of Favorites Folder.
Step 3 In the Workbench window, right-click Default Workbench.
Step 4 Choose Add Menu Shortcut from the shortcut menu.
Step 5 The Add Menu Shortcut window is displayed.
Step 6 Select the node to be added to the favorites folder, and click Create.
----End
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

66

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Result
The added node is displayed under Default Workbench in the favorites folder.

1.4.3 Viewing Common Functions


This topic describes how to view common functions on the workbench or in the favorites folder.

Prerequisites
The U2000 client has been started successfully.

Context
When the NMS is started for the first time, the shortcut function view of the favorites folder is
displayed as a floating window on the Workbench. The default shortcut nodes, such as the alarm,
and Main Topology are displayed in the floating window.

Procedure
Step 1 Click the drop-down arrow next to

on the toolbar.

Step 2 In the drop-down list that is displayed, select Style of Desktop or Style of Favorites Folder.
Step 3 If Style of Desktop is selected, the Workbench window is displayed, and the common functions
are displayed as floating icons.

Step 4 If Style of Favorites Folder is selected, the Workbench dialog box is displayed. If you click
+ in the front of Default Workbench or double-click Default Workbench, the common
functions are expanded.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

67

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

----End

Follow-up Procedure
Right-click a common function and delete or modify it.

1.5 Setting the Character Set of an NE


To meet global requirements, the U2000 provides the function of setting or modifying NE
character sets to prevent garbled characters caused by language change.

1.5.1 Character Set


This topic describes the character sets on the U2000 and the precautions for setting character
sets.
If the character set that an NE transfers to the U2000 is different from the character set of the
internal data (NE source file) on the U2000, the data transferred to the U2000 is displayed as
garbled characters. The data that the U2000 applies to the NE is also displayed as garbled
characters, resulting in failure in reading the NE.

Introduction of Character Set on the U2000

Issue 03 (2014-12-10)

Character Set

Description

GBK

Chinese character set which indicates that the


NEs support only Chinese characters.

ISO-8859-1

Latin character set which indicates that the


NEs support only western-Europe characters.

UTF-8

Unicode encoding mode which indicates that


the NEs support Chinese, English, Spanish,
Russian, German, Portuguese, Italian,
French, and Arabic characters.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

68

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Description of Character Sets on the U2000


l

Modifying character sets is not allowed. Character sets are set only when garbled characters
are displayed. The setting rules are as follows:
U2000 Language

Character Set

Chinese

GBK

English

ISO-8859-1

Spanish

UTF-8

Russian
German
Portuguese
Italian
French
Arabic

In the case of the MSTP series, WDM series, RTN series, PTN series, router series, and
switch series NEs, if the character sets on an NE are changed, the U2000 refreshes the
character sets in real time so that the character sets on the U2000 are the same as those of
the NE. At the same time, the U2000 notifies the user by means of an event that the NE
character sets are changed.

In the case of a new NE, if the data on the U2000 is displayed as garbled characters or the
language changes, you can query and modify the character set attribute of a single NE or
NEs in batches in the NE Character Set Management window.

In the case of an old NE, the character set cannot be modified because an old NE does not
have the character set attribute interface. In the NE Character Set Management window,
if the queried NE is an old NE, the related record is dimmed.
NOTE

l Modifying character sets is not a commonly performed operation. Generally, it is not allowed to modify
character sets. If you change the character set incorrectly, characters may be garbled. If you change the
character set to UTF-8, characters on the NE may be truncated.
l If there is a definite multi-language requirement and the character set needs to be changed to UTF-8,
convert the original character sets according to the guide for related NEs to ensure that the original
data is normally displayed.

Relationship Between Characters and Bytes


Generally, in user manuals, the description of the restrictions on entering characters in text boxes
is specific to English characters. For the restrictions on other languages, see the following table
and calculate the occupied bytes of each language.

Issue 03 (2014-12-10)

Language

Bytes occupied by a character

Chinese

English

1
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

69

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Language

Bytes occupied by a character

Spanish

Russian

German

Portuguese

Italian

French

Arabic

List of New NEs


The NEs supporting the preceding nine languages are globalized NEs. The NEs that are
globalized are new NEs, whereas the NEs that are not planned with globalization are old NEs.
The following table lists the NEs that are globalized.
Field

NE

Access

MA5600T V800R008 and later versions, MxU


V800R308 and later versions, MA5600 V300R003 and
later versions, UA5000V100R019 and later versions

Transport

OSN 9800 U32/U64 V100R001 and later versions, OSN


8800 T16/T32/T64 V100R005 and later versions, OSN
6800/3800 V100R005 and later versions, OSN 6800A/
3800A V100R005 and later versions, OSN 1800
V100R002 and later versions, OSN 1600S V100R004
and later versions, OSN 7500/3500/2500/1500
V100R010 and later versions, Metro 1000 V300R007 and
later versions, OSN 500 V100R003 and later versions,
RTN 900 V100R002 and later versions, RTN 600
V100R004 and later versions

IP

Issue 03 (2014-12-10)

Router

NE40E&80E V300R008 and later versions,


NE40E&80E V300R009 and later versions, NE5000E
V600R001 and later versions

PTN

Chassis-shaped (PTN3900/1900) V100R002C02 and


later versions, Box-shaped (PTN950/910/912)
V100R002C01 and later versions

Switch

Switch 93 V100R003 and later versions

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

70

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.5.2 Setting or Modifying Character Sets


If the character set that an NE transfers to the U2000 is different from the character set of the
internal data (NE source file) on the U2000, the data transferred to the U2000 is displayed as
garbled characters. The data that the U2000 applies to the NE is also displayed as garbled
characters, resulting in failure in reading the NE. The U2000 provides the function of querying
or modifying character sets of NEs to help users manage the NE data.

Prerequisites
You have logged in to the U2000 client as user admin.

Context

NOTICE
If an incorrect character set is specified for an NE, the NE may encounter garbled characters in
configuration data or even service exceptions. Exercise caution.
l

If multiple languages are required when an NE is created, set the character set to UTF-8
to support multiple language entering.

If multiple languages are required when an NE is upgraded, set the character set of the NE
to UTF-8 to support multiple language entering.

If garbled characters are displayed after an NE is upgraded and the character set is set on
the NE, you can restore the setting to the original character set.

Procedure
Step 1 Choose Configuration > NE Batch Configuration > NE Charset Management from the main
menu (traditional style); alternatively, double-click Fix-Network NE Configuration in
Application Center and choose Configuration > NE Batch Configuration > NE Charset
Management from the main menu (application style).
Step 2 In the NE Character Set Management window, select one or more NEs in the left pane and
click

Step 3 Click Close in the Result dialog box.


Step 4 Click the Query button in the lower right corner.
Step 5 Click Close in the Result dialog box.
Step 6 Select one or more NEs to be modified, right-click in the Character Set column and then choose
the desired character set from the shortcut menu.
NOTE

You can hold down Shift or Ctrl to select multiple NEs, and set or modify character sets in batches.

Step 7 After setting or modifying the character set, click Apply.


Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

71

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 8 Click OK when the Warning dialog box is displayed indicating that modifying the character
set incorrectly may garble data or truncate characters on the NE.
Step 9 Click OK when the Warning dialog box is displayed again.
Step 10 A dialog box is displayed indicating that the operation is successful. Click Close.
----End

1.6 Main Windows and Common Operations of the U2000


This topic describes the main windows of the U2000 client. Learning about the main windows
helps you locate entrances to operations quickly, which increase your operation efficiency.

1.6.1 Client GUI in the Application Style


The application style is a new GUI style. It improves usability of the U2000 as a whole and
facilitates common function search and management.

Initial Window
Figure 1-28 shows the GUI after you log in to the client.
Figure 1-28 Initial window

NOTE

If you have added functions to the My Favorites tab, the My Favorites tab is displayed after you log in
to the client.

Figure 1-29 shows the GUI after you click


Issue 03 (2014-12-10)

. Table 1-3 describes Figure 1-29.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

72

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-29 Application style window


1
2

3
4

Table 1-3 Application style window


No.

Name

Description

Menu Bar

Shows the main menu of the system.

Toolbar

Shows the shortcut icons for key operation tasks.

Output Pane

Displays results of operations performed during the U2000


running.

Status Bar

Displays the status information of the system, such as the current


user and the IP address of the connected server.

Menu Bar
The U2000 client menu bar consists of the File, Favorites, Window, and Help menus.
Toolbar
The toolbar provides shortcut icons for system management. Table 1-4 describes these shortcut
icons and their functions.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

73

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Table 1-4 Shortcut icons for system management


Icon

Name

Description

Application
Panel

Switches from the initial window to the application style


window. After you open the main window of a function from
the application window, you can click the application panel
icon to switch back to the application window.

Exit

Terminates client programs and exit the current U2000


client.

Log out

Logs out of the current U2000 client without the termination


of client programs.

Lock Terminal

Locks the client. If the client is locked, you are not allowed
to perform operations on the client. You must enter the
correct password to unlock the client.

Full Screen

Displays the window in full screen mode. In full screen


mode, the menu bar, toolbar, output window, and status bar
are hidden. You can press Esc to exit the full screen mode.

Output Pane
The output pane displays the echo message of the operation performed when the U2000 is
running, such as the initialization message when you log in to the server.
Status Bar
The status bar displays the information such as the system status, the login users, and the IP
address of the connected server. The information displayed from left to right is as follows:
l

Server: Displays the name and IP address used for logging in to the server.

Login user: Displays the name of the login user.

Connection duration: Displays the client time in real time.

System pop-up pane: Displays a message in real time when an operation on the server
affects client operations. For example, after the user opens the Security Management
window, if a user, user group, or operation set is added or deleted on the U2000, the system
pop-up pane displays a message.
NOTE

To enable or disable the function of displaying a message, right-click the icon of the system pop-up
pane and choose Enable or Disable.

Login mode: Displays the login mode. It can be single-user mode and multi-user mode.

Connection status: Displays the status of the connection between the client and the server.
When the client is disconnected from the server, the icon on the status bar is changed from
to , and then to . When the status of the alarm indicator changes to
disconnection sound is available.

l
Issue 03 (2014-12-10)

,a

Logo: Displays the logo of Huawei Technologies Co., Ltd..


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

74

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Application Center
Figure 1-30 shows the GUI when you log in to the client. The application center provides
common applications, such as fault management applications. Table 1-5 describes the
operations that can be performed on the Application Center tab.
Figure 1-30 Application Center tab

Table 1-5 Operations on the Application Center tab


Operation

Details

Accessing applications

Double-click an application to open the main window of the


application.

Browsing application
functions and opening
function windows

Right-click an application to browse all functions of the


application listed on the shortcut menu. Choose a function to open
the main window of the function.
NOTE
You can click
Favorites tab.

next to a function to add the function to the My

Table 1-6 shows the functions of applications in the application center.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

75

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Table 1-6 Function of the applications


Application

Function

Alarm Monitor

Allows you to manage alarms and events, for


example, monitoring, querying, and
collecting statistics on alarms and events.
These applications help you promptly
diagnose and troubleshoot network or device
faults.

Topo View

Constructs and manages topologies of the


entire network to monitor its running status in
real time. The topology management enables
maintenance personnel to manage NEs and
links.

Fix-Network NE Configuration

Configures NEs in batches, configures


profiles, manages access services, deploys
FTTx services, configures NE
communication parameters, manages
inventories, and manages network security.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.

Bearer Network Service Configuration

Queries, configures, and manages E2E


services.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.

Fix-Network NE Software Management

Backs up NE data, restores NE data, upgrades


NE software, downgrades NE software,
manages NE logs, and manages licenses.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.

Issue 03 (2014-12-10)

System Settings

Monitors NMS systems, backs up and


restores NMS data, manages centralized
tasks, manages licenses, and configures NMS
systems.

Security Management

Manages NMS user rights, security policies,


NE security, NMS licenses, and logs.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

76

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Application

Function

Fix-Network Performance

Collects historical performance data,


monitors performance data in real time,
displays statistics, and generates performance
NBI data.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.

IMS&NGN Service Management

Manages NGN test beds, query IMS users,


and manages NGN service configuration.
NOTE
Applies to the Core Network NEs.

CN Dual Homing Management

Provides a disaster recovery mechanism. It


prevents network services from being
interrupted when softswitches break down or
an unexpected disaster occurs, and ensures
uninterrupted emergent communications.
NOTE
Applies to the Core Network NEs.

Operation Tools

Provides O&M tools to manage NEs.

Configuration

Views NE configuration and monitors NE


resource status.
NOTE
Applies to the Core Network NEs.

Performance

Provides the performance measurement and


management function and provides reliable
data for network measurement, design, and
operation management. Users can collect
data for verifying NE security, running status,
and system resource usage. Users can view
and analyze the data.
NOTE
Applies to the Core Network NEs.

Software Management

Manages NE upgrades, files and licenses and


backs up files.
NOTE
Applies to the Core Network NEs.

My Favorites
Figure 1-31 shows the GUI when you click My Favorites.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

77

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-31 My Favorites tab

You can add common functions to the My Favorites tab for quick access to the main windows
of the functions. You can also create folders on the My Favorites tab to classify the functions.
To create a folder, perform the following operations:
1.

On the My Favorites tab page, right-click the My Favorites node in the navigation tree
and choose New Folder from the shortcut menu.

2.

In the Create Folder dialog box, enter a folder name and click OK.
NOTE

l You can choose the My Favorites node or any folder in the navigation tree, right-click a function in
the right pane and choose Copy from the shortcut menu to copy the function. Then, right-click a folder
or choose a folder and right-click in the right pane, and then choose Paste from the shortcut menu to
paste the function to the folder. You can also right-click a folder and choose Delete or Rename from
the shortcut menu to delete or rename the folder respectively.
l Before deleting a folder under the My Favorites node, delete all the functions contained in the folder.
l You can open the main window of a function that has been added to the My Favorites tab using the
Favorites menu on the menu bar.
l You can add a maximum of 20 folders on the My Favorites tab and the total number of favorite
functions can reach 200.

Function Search
On this tab, you can enter a keyword to search for functions. The U2000 supports fuzzy matching
by Function or Menu Path. Figure 1-32 shows the GUI displayed after you conduct a function
search.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

78

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-32 Function Search tab

Either of the following results is achieved:


l

No functions are found.

Functions that meet the search criteria are listed.

: indicates that a function can be added to the My Favorites tab page. Click
next to the function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
NOTE

If no folder exists under the My Favorites node, the Add to Favorite dialog box does not appear
when you click

: indicates that a function has been added to the My Favorites tab.

No icon next to a function indicates that the function cannot be added to the My
Favorites tab.
NOTE

You can double-click a function in the list to open the main window of the function.

1.6.2 Quick Start for Clients in the Application Style


This topic provides some suggestions on using clients in the application style the first time.

Context
l

Issue 03 (2014-12-10)

If you have added functions to the My Favorites tab, the tab is displayed after you log in
to a client.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

79

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

My Favorites is recommended for quick access to the frequently used functions. The
legends related to the My Favorites tab are described as follows:

: indicates that a function can be added to the My Favorites tab page. Click
next to the function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
NOTE

If no folder exists under the My Favorites node, the Add to Favorite dialog box does not appear
when you click

: indicates that a function has been added to the My Favorites tab.

No icon next to a function indicates that the function cannot be added to the My
Favorites tab.

Procedure
Step 1 Log in to a client the first time. On the Application Center tab, right-click an application to
display its functions on the shortcut menu. Click
next to a function. In the Add to
Favorite dialog box, select a folder from the Location drop-down list and click Add.
The function is added to the folder on the My Favorites tab.

Step 2 Click the Function Search tab and enter a keyword to search for functions.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

80

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Click
next to a function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab.
NOTE

You can double-click a function in the list to open the main window of the function.

Step 3 Optional: Open the main window of an application. Choose an item on the menu bar and click
next to a function listed on the menu. In the Add to Favorite dialog box, select a folder
from the Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab.

Step 4 Log in to the client again. On the My Favorites tab, click a function to directly open its main
window.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

81

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

You can choose My Favorites and choose a function on the menu to launch the function.

----End

1.6.3 Client GUI in the Traditional Style


This topic describes the components of the client GUI in the traditional style.
Figure 1-33 shows the client GUI in the traditional style.
NOTE

For how to switch the client to other style, see 1.8.2 Setting the Client Display Style.

Figure 1-33 Client GUI

1
2

4
5
1: Menu bar

2: Toolbar

3: Workbench list

4: Output pane

5: Status bar

6: Workbench

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

82

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Menu Bar
The menu bar provides the entries to all the functions of the U2000 client. It consists of the
following menus: File, Edit, View, Fault, Performance, Configuration, Service, Inventory,
Administration, Window, and Help.
NOTE

The menu items and submenu items displayed on U2000 clients vary according to the components deployed
on the U2000 server or the existing license control items.

Toolbar
The toolbar provides the shortcut icons for major operation tasks. For details, see 1.6.6
Frequently Used Shortcut Icon.

Workbench list
You can create or modify a workbench using the shortcut icons.

Output Pane
The output pane displays the returned information and other relevant information.

Status Bar
The status bar displays information such as the system status, the login users, and the IP address
of the connected server. The information displayed from left to right is as follows:
l

Server and communication mode: Displays the name and IP address used for logging in to
the server and the communication mode between the client and server.

Login user: Displays the name of the login user.

Connection duration: Displays the client time in real time.

System pop-up pane: Display a message in real time when the operation on the client is
affected. It can be disable and enable.

Login mode: Displays the login mode. It can be single-user mode and multi-user mode.

Connection status: Displays the status of the connection between the client and the server.

Logo: Displays the logo of Huawei Technologies Co., Ltd..

Workbench
The shortcut icons on the workbench help you perform operations.

1.6.4 Key GUI Components


This topic describes some common components displayed on the U2000 GUI.
Componen
t

Example

Button

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

83

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Componen
t

1 Getting Started

Example

Shortcut
icon
Option
button
Check box
Tab
Text box

Spin box
Group box

Drop-down
list

Menu
Shortcut
menu

Navigation
tree

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

84

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Componen
t

1 Getting Started

Example

Dialog box

1.6.5 Frequently Used Buttons


This topic describes the frequently used buttons. The frequently used buttons on the U2000 GUI
are as follows:
Button

Function
Selects the objects.

Selects the objects in a batch.

Expands all available options.


Collapses all available options.
Displays or hides a dialog box.

Selects the objects.

Selects the objects in a batch.

Increases the priority of the selected object.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

85

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Button

1 Getting Started

Function
Decreases the priority of the selected object.
Displays a dialog box.
Queries results from the NE.
Enables the current settings.
Displays the latest result(s).
Exports the selected scheduled tasks to the
browser of the operating system for printing.
Saves selected data to the specified file.
Enables the current setting and closes the
dialog box.
Cancels the current setting and closes the
dialog box.
Closes the operation wizard.
Views the selected data.
Deletes the selected data or icon.

Creates a new service, protection or physical


inventory information etc.
Adds existing data or objects.
Proceeds to the next step.
Returns to the previous step.
Closes the dialog box.
Expands the Object Tree.
Collapses the Object Tree.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

86

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Button

1 Getting Started

Function
Enables the current setting and closes the
dialog box.
Cancels the current setting and closes the
dialog box.
Search the related information.
Sets the related condition.
Sets filter criteria and views the filter result.

1.6.6 Frequently Used Shortcut Icon


This topic describes the frequently used shortcut icons on the U2000 client.
NOTE

You can customize the toolbar to display only the frequently-used shortcut icons. To customize the toolbar,
right-click the toolbar and choose a menu item from the shortcut menu.

Table 1-7 The shortcut icons on the Main Topology


Button

Name

Description

Workbench

l Style of Favorites Folder: By


selecting it, you can modify or
delete the workbench.
l Style of Desktop: By selecting it,
you can return to the workbench.

Issue 03 (2014-12-10)

Exit

Exits the U2000 client.

Log Out

Logs out of the current user.

Lock Terminal

Locks the current client.

Full Screen

Displays the Main Topology in full


screen mode.

NMS User
Management

Manages user information on the


U2000.

Maintain SDH
Protection Subnet

Displays the Maintenance SDH


Protection Subnet window.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

87

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Button

Issue 03 (2014-12-10)

1 Getting Started

Name

Description

Manage SDH Trail

Displays the Manage SDH Trail


window.

Create SDH Trail

Displays the Create SDH Trail


window.

Manage WDM Trail

Displays the Manage WDM Trail


window.

Browse Current
Alarm

Displays the Filter dialog box. After


the filter criteria is set, displays the
Browse Current Alarm window.

Browse Alarm Logs

Displays the Filter dialog box. After


the filter criteria is set, displays the
Browse Alarm Logs window.

Stop the Current


Alarm Sound

Clicks this shortcut to stop the current


alarm sound on the U2000. The alarm
sound starts again when a new alarm
is generated. To permanently stop the
alarm sound, choose Fault > Stop the
Alarm Sound Permanently from
the main menu.

Main Topology

Switches to the Main Topology.

NE Explorer

Displays the NE Explorer window.

Create Fiber

Creates fiber.

Browse SDH
Performance

Displays the Browse SDH


Performance window.

Browse WDM
Performance

Displays the Browse WDM


Performance window.

WDM Optical Power


Commissioning

Displays the WDM Optical Power


Commissioning window.

IPA Management

Displays the presence of the IPA that


is in the disabled state. This icon
blinks if a disabled IPA exists. When
you click this icon, the IPA
Management window is displayed.

NM Tasks
Management
Progress

Displays the process of NMS tasks


management. When you click this
icon, the Configuration Data
Management Progress window is
displayed.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

88

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Button

1 Getting Started

Name

Description

Networkwide
Maintenance Status

Performs centralized monitoring over


the maintenance and operating status
of the equipment managed by the
U2000, including:
l Alarm Reversion
l DCC Enabling Status
l Path Loading
l Alarm Suppression
l Alarm Insertion
l Optical (Electrical) Interface
Loopback
l Cross-Connection Loopback
l Laser Status

Issue 03 (2014-12-10)

Show alarm panel

Displays the Alarm Panel dialog


box. The statistics of all current
alarms are displayed by default.

Critical Alarm

Dynamically displays critical alarms.


When you click this icon, all critical
alarm information is displayed.

Major Alarm

Dynamically displays major alarms.


When you click this icon, all major
alarm information is displayed.

Minor Alarm

Dynamically displays minor alarms.


When you click this icon, all minor
alarm information is displayed.

Warning/Not
Alarmed Alarm

Dynamically displays warnings/not


alarmed. When you click this icon, all
warning or /not alarmed alarm
information is displayed.

No new events

Dynamically displays abnormal


events. This icon indicates that there
are no newly reported events. When
you click this icon, the Query Event
Logs window is displayed.

New events

Dynamically displays abnormal


events. This icon indicates that there
are newly reported events. When you
click this icon, the Query Event
Logs window is displayed.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

89

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Button

1 Getting Started

Name

Description

New

To create a custom view, subnet, NE,


and link.
NOTE
The NE cannot be created in the custom
view.

Modify View

To modify the name of custom view,


add NEs, subnets or links to the
custom view, and delete NEs, subnets
or links from the custom view.
NOTE
This shortcut icon is displayed only when
the current view is a custom view.

Delete View

To delete a custom view.


NOTE
This shortcut icon is displayed only when
the current view is a custom view.

Previous

To go back to view or subnet that you


viewed last time.
NOTE
The icon is not displayed by default. Set
this icon on the topology toolbar. For
details, see 1.8.18 Setting the Toolbar.

Next

To go to the view or subnet before


you click

NOTE
The icon is not displayed by default. Set
this icon on the topology toolbar. For
details, see 1.8.18 Setting the Toolbar.

Issue 03 (2014-12-10)

Back to Parent

To return the parent interface.

Select

To select a topology object.

Move View

To move the topology view.

Search

Displays the Search dialog box. You


can locate objects in the topology.

Print

To print the topology view.

Print Preview

To preview the print effect of the


topology view.

Overview

To provide a general view of


topology.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

90

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Button

1 Getting Started

Name

Description

NE Statistics

l To collect statistics on the NE


types and number of the objects
selected in the current topology
view.
l If no object is selected in the
current topology view, the system
collects statistics on the types and
number of all NEs in the current
topology view.

Issue 03 (2014-12-10)

Refresh

Refreshes the current view after you


click the button when the data in the
view is changed. For example, if an
IP link is changed in the link
management window, you can click
this button to display the latest IP link
data in the Main Topology.

Save Position

To save the position information of


the topology objects in the current

Legend & Filter &


Attribute

To display the legend/filter/attribute


panel.

Current Alarm

To display the current Alarms.

Layout

To arrange the topology objects in the


topology view.

Zoom In

Zooms in topology view.

Zoom Out

Zooms out topology view.

Local Amplification

To enlarge the selected area. In the


topology view, drag the mouse to
generate a rectangle. Topology
objects in this rectangle are
magnified.

Lock View/Unlock
View

Locks/Unlocks the current NE(s).

Ascending

Lists the objects on the Object Tree


in an ascending or a descending
order.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

91

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Button

1 Getting Started

Name

Description

Descending

NOTE
Topology objects in the navigation tree
are sorted according to the following
rules:
l No matter whether topology objects
are sorted in ascending or descending
order, the order of the types of
topology objects is unchanged,
namely, local NMS, subnets, NEs
with subnodes, and NEs without
subnodes. The local NMS is always
displayed on the top.
l The types of topology objects are
sorted by name alphabetically.
Object names are case insensitive.

Table 1-8 The shortcut icons on the other GUI


Button

Issue 03 (2014-12-10)

Name

Description

Shrink all

Shrinks Alarm/Event Name.

Classify by group id

Classifies alarms by group ID.

Classify by severity

Classifies alarms by severity.

Classify by type

Classifies alarms by type.

Classify by
category

Classifies alarms by category.

NE Time
Synchronization

Synchronizes the NE time and NMS


time.

Synchronize
Current Alarms

Synchronizes the current alarms of an


NE.

Browse Current
Alarms

Browses the current alarms of an NE.

Clear Alarm
Indication

Clears the current alarm indications of


an NE.

Refresh NE Panel
Status

Refreshes the NE panel status to enable


the NE panel to display the latest data.

Back Up NE
Database To SCC

Backs up NE data to the SCC.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

92

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Button

1 Getting Started

Name

Description

Display/Hide
Extended Slot

Displays or hides the extended slot on


the Extended Slot tab.

Legend

Displays a legend and its description.

1.6.7 Keyboard Shortcuts


You can use keyboard shortcuts to perform various operations on U2000 clients. This function
simplifies interactions between users and U2000 clients.

Keyboard Shortcuts of Controls on GUIs


Table 1-9 describes keyboard shortcuts for controls on GUIs. These shortcuts facilitate user
operations performed on the controls.
Table 1-9 Controls and corresponding keyboard shortcuts
Control

Description

Menu

For a menu whose name is followed by an underscore _, you can press


Alt+_ to choose the menu item.

Drop-down menu

For a drop-down menu whose name is followed by an underscore _, you


can press Alt+_ to choose the menu item.

Button

l For a button whose name is followed by an underscore _, you can


press Alt+_ instead of clicking the button.
l When the focus is on a button, you can press Enter or the space bar
instead of clicking the button.
l The button that is focused on after you open a dialog box is the default
button. When the focus is not on the button, you can press Enter that
has the same function as the default button.
l You can press Esc to cancel an operation performed in a dialog box
and close the dialog box. In this case, the Esc has the same functions
as the Cancel button in the dialog box.

Issue 03 (2014-12-10)

Drop-down list

When the focus is on a drop-down list, you can press the DOWN
ARROW key to expand the drop-down list. You can press the UP and
DOWN ARROW keys to switch between the options in a drop-down list,
and press Enter or the space bar to select the current option.

Option button

If the focus is on an option button, you can press the space bar to select
the option button.

Check box

If the focus is on a check box, you can press the space bar to select or
clear the check box.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

93

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Control

Description

Navigation tree

When the focus is on the navigation tree, you can press the UP ARROW
and DOWN ARROW keys to switch between the nodes in the tree. In
addition, you can press the LEFT ARROW key or RIGHT ARROW key
to expand or collapse a node that contains subnodes respectively.

Tab page

When the focus is on a tab page, you can press the LEFT ARROW and
RIGHT ARROW keys to switch between tab pages.

Main window

When the focus is on a main window, you can press Ctrl+Tab or Ctrl
+Shift+Tab to switch between main windows.

Toolbar

You can use the shortcut keys corresponding to the shortcut icons on the
toolbar to perform desired operations.
NOTE
When you place the pointer on a shortcut icon on the toolbar, the corresponding
shortcut keys are displayed.

Switching
between controls

When there are multiple controls in a window, dialog box, or tab page,
you can press Tab to switch from one control to another, and press Shift
+Tab to switch to the previous control.
NOTE
When the focus is on a text box and Tab is used to enter tab characters, you can
press Ctrl+Tab to switch to the next control or Ctrl+Shift+Tab to switch to the
previous control.

Common Shortcut Keys


Table 1-10 describes other key combinations provided by the U2000 client. You can use these
key combinations to perform operations quickly.
Table 1-10 Common shortcut keys

Issue 03 (2014-12-10)

Shortcut key

Function

(Application
key)

Right-clicks

Enter

Confirms

Esc

Exits

Ctrl+Alt+U

Unlocks a terminal

F1

Opens the Online Help

F2

Edits the contents of a cell

Alt+F4

Exits the system

Ctrl+F

Finds

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

94

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Shortcut key

Function

Ctrl+X

Cuts

Ctrl+C

Copies

Ctrl+V

Pastes

Ctrl+S

Saves

F11

Displays the window in full screen mode

Ctrl+A

Selects all

Ctrl+F4

Closes the current window

Ctrl+F5

Restores down (when the service window in the public window is


maximized)

Ctrl+F9

Minimizes the window (applied to the service window in the public


window)

Ctrl+F10

Maximizes the window (when the service window in the public window
is restored)

Ctrl++

Zooms in the topology view

Ctrl+-

Zooms out the topology view

NOTE

The common area is under the toolbar on the U2000 client interface.

Shortcut Keys for Clients in the Application Style


The following table describes shortcut keys specific to clients in the application style. These
shortcut keys enable you to perform these operations faster using the mouse on GUI controls.
Table 1-11 Shortcut keys for clients in the application style
Shortcut keys

Function

Shift+Space bar
Functions the same as
+

Delete

Issue 03 (2014-12-10)

Functions the same as


when the menu item or function that is
focused on can be added to My Favorites.
Delete a function from the My Favorites tab when the focus is on the
function.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

95

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.6.8 Main Windows


This topic describes the main windows of the U2000 client.

1.6.8.1 Workbench
This topic describes the workbench. After a client is started, the system automatically accesses
the default workbench. The default shortcut icons are displayed on the workbench.
l

In the main window of the U2000, click the drop-down arrow next to
of Desktop to access the workbench.

You can click to hide the left list of the workbench, then click to display the left list of
the workbench.

You can view the description of the function of the workbench in the background picture
of the workbench and press F1 to view the Help.

You can perform operations on the workbench. For details, see1.8.7 Setting the
Workbench.

and select Style

1.6.8.2 Main Topology


All topology management functions can be accessed in the Main Topology of the U2000.
Topological relationships between NEs, subnets and connections are displayed in the Main
Topology of the U2000. You can browse, create, search for, configure, maintain and manage
NEs, subnets, connections and trails in the Main Topology.

Navigation Path
l

In the Workbench Window, double-click the Main Topology icon.

Choose View > Main Topology from the main menu (traditional style); alternatively,
double-click Topo View in Application Center and choose Topology > Main
Topology from the main menu (application style).

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

96

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Click the shortcut icon

1 Getting Started

to open the Main Topology.

GUI Description
l

Open the Main Topology to ensure that main menu items are available.

The U2000 provides multiple display modes of the client. For example, you can set an
alarm display mode for an object. For details about the meanings and setting methods of
display modes, see 1.8 Customizing the Client GUI Effect.

The U2000 provides the focus display function. When the pointer stays over a shortcut
button for about 2 seconds, the U2000 will provide a focus display, presenting its meaning.

The U2000 provides a variety of view windows according to different functions, and the
views can be switched.
Select Physical Root from the Current View drop-down list. For details, see Physical
Root.
Select Clock View from the Current View drop-down list. For details, see Clock View.
Alternatively, right-click in a blank area of the current subnet in the physical root view
and choose Switch to Clock View from the shortcut menu to switch to the subnet in
the clock view.
Select Custom View from the Current View drop-down list. For details, see 4.9.1
Creating Custom Views.

Main Topology
Figure 1-34 shows the Main Topology of the U2000.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

97

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-34 Main Topology


1

13 12 11

Issue 03 (2014-12-10)

10

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

98

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1: Network management
system (NMS) name

2: Menu bar

1 Getting Started

3&4: Shortcut icon

You can perform operations on By clicking a shortcut icon, you


the NMS and NEs with the
can:
submenu bar, including
l Perform a simple task
configuring and managing
quickly. For example, exit
tasks.
the NMS, lock terminals, log
out, manage NMS users,
stop the current alarm sound,
1.6.8.3 NE Explorer,
1.6.8.5 Browse Alarm, and
4.8 Creating Connections.
l Perform a simple task
quickly in the Main
Topology. For example,
zoom in or zoom out in the
view, refresh or save the
view, show or hide the
navigators, search for
objects, view object
attributes, and lock or
unlock the view.
For details, see 1.6.6
Frequently Used Shortcut
Icon.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

99

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

5: Alarm panel, Alarm


6: Legend, Filter and Attribute 7: Displays the client time in
button bar and Event button
real time.
In this area, you can set the
The Alarm panel collects display modes of the objects in
statistics on alarms of the
a view, view the descriptions
managed objects by alarm of legends and NE attributes in
severity and state according the view. For details about how
to locate an operation object
to the current alarm
template. The alarm panel quickly, see 1.6.9.1 Filtering
provides the fault status of Operation Objects in a
the entire network. It can
View.
work as a monitoring panel.
The Alarm buttons for
alarms with different
severities are in different
colors. You can click the
button to view the number
of the uncleared alarms
generated on the current
U2000. You can click the
button to view current
alarms.
When there are abnormal
events on the U2000, the
Abnormal event indicator
turns red from green. You
can click the indicator to
view current abnormal
events.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

100

iManager U2000 Unified Network Management System


Operation Guide for Common Features

8: Views the name of the


logged-in U2000 user.

9: Views the name which is set


by the current U2000 client,
the IP address of the current
U2000 server and the
communication mode between
the client and server.

1 Getting Started

10: Main Topology


Views NEs.
In the Main Topology, you can
perform operations such as 4.6
Creating NEs, 4.7
Configuring the NE Data, 4.8
Creating Connections, 4.10.2
Browsing Fibers/Cables, 4.9.5
Deleting Topology Objects,
6.8.10 Browsing Current
Alarms, and 1.19 Starting the
NE Data Collection; enter the
1.6.8.3 NE Explorer to
configure the service for the NE
and so on.
You can check the NE status
and communication status in the
Filter Tree or on the Legend tab.

11: Displays the mouse


coordinate in the Main
Topology.

12: Topology navigation tree

13: Browse Current Alarm

In this area, all NEs managed


by the U2000 are displayed.
You can locate the desired NE
quickly.

In this area, you can browse the


alarms that require attention and
processing by setting the
filtering criteria of the current
alarm.

NE types and quantity are


displayed in the NE Statistics
table below the navigation tree.

1.6.8.3 NE Explorer
The NE Explorer is the main user interface used to manage equipment. In the NE Explorer, a
user can configure, manage and maintain the NE, boards, and ports on a per-NE basis. The NE
Explorer is the main user interface for commissioning and configuration on a per-NE basis. The
NE Explorer contains a Function Tree that makes the operations easy. To display the
configuration window for an object, select the object and choose a desired function in the
Function Tree.
NOTE

l For NEs of MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except PTN 6900
series) and marine series NEs, you can open a maximum of ten NE Explorer windows at the same time.
l Currently, NEs such as the OptiX OSN 1800, OptiX OSN 1832, OptiX OSN 6800, OptiX OSN 8800
series, OptiX OSN 9800 series can be managed individually or in optical NEs.

Navigation Path
l
Issue 03 (2014-12-10)

Right-click an NE in the Main Topology and choose NE Explorer from the shortcut menu.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

101

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

In the left-hand pane of the Main Topology, right-click an NE and choose NE Explorer
from the shortcut menu.

In the Main Topology, select an NE and click

Double-click an optical NE in the Main Topology. In the window that is displayed, rightclick an NE in the left-hand pane and choose NE Explorer from the shortcut menu.

Related Operation
l

Click

in NE Explorer window to display the 1.6.8.4 NE Panel.

Click

in NE Explorer window to switch to other NEs.

1.6.8.4 NE Panel
The NE Panel displays boards and ports in different colors indicating their current status. On
the U2000, most operations such as equipment configuration, monitoring, and maintenance are
performed in the NE Panel window.

Navigation Path
Double-click an NE in the Main Topology to display the NE Panel.

GUI Description
l

For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
on the toolbar to view the legends of
PTN 6900 series) and marine series NEs, click
the boards and ports on the right of the Slot Layout.

For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
PTN 6900 series) and marine series NEs, right-click the NE Panel window and choose
Always On Top, the NE Panel window to always remain on top.

When a board occupies multiple slots, the slot ID of the main slot is displayed in boldface,
and the slot ID of the slave slot is dimmed.

In the NE panel, when you click the processing board equipped with an interface board,
the slot ID of this interface board is orange.

For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
PTN 6900 series) and marine series NEs, when you move the cursor to the installed board,
the board remarks is displayed. For the WDM series, WDM (NA) series, and Marine
series NEs, if you configure the wavelength informations on the installed board, when you
move the cursor to the board, the optical ports, band type, and wavelength is displayed.

To perform an operation related to an installed board, right-click the installed board and
choose the corresponding submenu item from the shortcut menu. For example, you can add
a remark of the board in the Modify Remark dialog box by right-clicking the installed
board and choosing Remark.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

102

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.6.8.5 Browse Alarm


This topic describes the user interface for viewing the current and historical alarms and Alarm
Logs. In this user interface, buttons are provided, such as Filter, Synchronize, Refresh, and
Acknowledge, to help you quickly locate the alarm cause.

Context
l

Current alarm displays the merged alarms. The rules for merging alarms are as follows:
The alarms with the same IDs, location information, and sources and in the Normal
maintenance state are merged into one current alarm record.
The alarms with the same IDs, location information, and sources are the same but not
in the Normal maintenance state are merged into one current alarm record.

For a newly reported alarm, if the current alarm contains the record that meets the alarm
merging rule, the alarm is merged into the previous record in the current alarm regardless
of the acknowledgment and clearance status of the record. After being merged, the
frequency of the record is added by 1. The displayed acknowledgment and clearance status
of the record depends on that of the latest alarm. After thecurrent alarm is changed to a
historical alarm, the frequency recorded for the current alarm is reduced by 1.

You can query details of each alarm log in the Browse Alarm Logs window.

Alarm log records all the alarms received by the U2000. In the alarm log, each alarm is
displayed as a record.

Alarms are not displayed in the current alarm list after they are acknowledged and cleared
and their life cycles end. However, you can query these alarms in the alarm logs and
historical alarms. For details about how to set the lifecyle of an alarm, see 6.5.11 Setting
the Lifecycle of the Current Alarm.

Navigation Path
l

Choose Fault > Browse Current Alarm from the main menu (traditional style);
alternatively, double-click Fault Management in Application Center and choose Browse
Alarm > Browse Current Alarm from the main menu (application style).

Choose Fault > Browse Historical Alarm from the main menu (traditional style);
alternatively, double-click Fault Management in Application Center and choose Browse
Alarm > Query Historical Alarm from the main menu (application style).

Choose Fault > Browse Alarm Logs from the main menu (traditional style); alternatively,
double-click Fault Management in Application Center and choose Browse Alarm >
Query Alarm Logs from the main menu (application style).

Figure 1-35 shows the alarm window.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

103

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-35 Browsing alarms

1.6.8.6 Browse Event


In the Browse Event Logs window, you can view events at different levels. This window
provides buttons, such as Filter by Template, Filter and Refresh, to help you quickly locate
the alarm cause.

GUI
Choose Fault > Browse Event Logs from the main menu (traditional style); alternatively,
double-click Fault Management in Application Center and choose Browse Alarm > Query
Event Logs from the main menu (application style).
Figure 1-36 shows the window of Event.
Figure 1-36 Browse Event Logs

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

104

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.6.9 Operations Frequently-Performed on the User Interface


This topic describes the operations that are frequently performed on the U2000 user interface.

1.6.9.1 Filtering Operation Objects in a View


The topology view displays objects such as subnets, links, and NE nodes. When a large number
of objects are displayed in the topology view, these objects may be overlapped. In this case, you
can set filter criteria to filter the objects. After the filtering, the topology view displays only the
required objects.

Context
l

The topology view displays the objects selected in the Topology Filter navigation tree,
such as subnets, NEs, background images.

When the U2000 is started, filter criteria are empty by default, and all the topology objects
are displayed.

When you clear the check box of a filter criterion, the objects matching the criterion are
not displayed.

Parent nodes in the Topology Filter navigation tree have three types of icons. indicates
that some topology filter criteria under a parent nodes are selected; indicates none of the
topology filter criteria under a parent nodes is selected; indicates that all topology filter
criteria under this node are not displayed in the topology view.

Modified topology filter criteria take effect only for the current user. After this user logs
in next time, the settings still take effect. If the user launches multiple clients and sets filter
criteria in the Main Topology on these clients, the topology view displays objects based on
the latest filter criteria after the user re-opens the Main Topology.

Procedure
Step 1 Choose View > Main Topology from the main menu (traditional style); alternatively, doubleclick Topo View in Application Center (application style).
Step 2 Choose View > Display Setting > Filter from the main menu (traditional style); alternatively,
double-click Topo View in Application Center and choose View > Show > Filter from the
on the toolbar. Click the Filter tab in the right pane.
main menu (application style), or click

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

105

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In the Topology Filter navigation tree, select the topology objects to be displayed in the topology
view.
NOTE

l Topology objects that are not selected are unavailable in the topology view.
l Click Other Conditions. In the displayed panel, specify the values for NE Name, Link Name, or
Subnet Name, and click Filter to filter objects again. The NEs, links, or subnets containing this string
(case insensitive) are displayed.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

106

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

After the operations are successful, the current view displays the topology objects based on the
filter criteria.
Step 4 Optional: Click Filter Tree and select Switch. In the Switch a Filter Tree dialog box, select
the filter tree template, and click Open.
NOTE

Filter tree templates displayed in the Switch a Filter Tree dialog box indicate that filter trees have been
used and saved as filter tree templates. If no filter tree has been saved, no filter tree template is available
in the dialog box. To save a filter tree as a template, click Filter Tree and choose Save As. In the displayed
dialog box, enter a template name and click OK.

Step 5 Optional: To close the Legend/Filter/Properties panel, choose View > Display Setting >
Filter from the main menu (traditional style); alternatively, double-click Topo View in
Application Center and choose View > Show > Filter from the main menu (application
style), or click
on the toolbar.
----End

1.6.9.2 Searching for NEs in a View


This operation enables you to search for NEs quickly.

Context
l

If you search for NEs in the Physical Root or Clock View navigation tree in the Main
Topology, the search operation applies to the current view.

If you search for NEs in the window outside the Main Topology, the search operation
applies to the Physical Root navigation tree.

You can search out only the NEs for which you have management rights.

During NE search, the U2000 searches for NEs in dynamic and fuzzy matching mode. That
is, the Search window displays search results in real time as you specify the search criteria.

Transport NEs can be also searched out in Remarks mode.

Procedure
Step 1 Choose File > Find from the main menu (traditional style); alternatively, double-click Topo
View in Application Center and choose Topology > Search from the main menu (application
style).
The Search dialog box is displayed.
NOTE

You can also perform he following operations to access the Search dialog box.
l Press Ctrl+F in the Main Topology.
l Right-click in the Main Topology, and choose Find from the shortcut menu.
l Click

Step 2 Select the search criteria, which are Search Type and Search Mode.
Step 3 Enter a keyword in the Keyword combo box or choose a keyword record from the drop-down
list.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

107

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 4 Optional: You can select Match whole word only, Case Sensitive or Auto search with
specified keyword as required.
NOTE

l Match whole word only: If you select this check box, only the results that exactly meet the conditions
are displayed.
l Case Sensitive: If you select this check box, the keyword is case-sensitive during search.
l Auto search with specified keyword: If you select this check box, when you enter the keyword, the
result is displayed dynamically.

Step 5 Click Search.


All the found records are displayed in the Search window.
Step 6 The NE is located in the topology view and navigation tree.
l click Locate and select Locate to NE Panel from the menu to directly locate the NE panel.
l Click Locate and select Locate to Topo from the menu or double-click in the query result
area to search for NE to locate the Main Topology.
l click Locate and select Locate to NE Partition from the menu to directly locate the NE
partition.
Step 7 Optional: Select the Minimized after locating check box, the Search window is minimized
after the location.
----End

1.6.9.3 Collecting Statistics on the Number of NEs


By collecting statistics on the number of NEs, you can learn the number of NEs that are created
on the U2000. The NEs contain real, preconfigured, and virtual NEs.

Context
l

By default, the NE Statistics list is displayed on the left lower corner of the Main Topology
view of the client. If it is not displayed, Choose View > Display Setting > NE Statistics
from the main menu (traditional style); alternatively, double-click Topo View in
Application Center and choose View > Show > NE Statistics from the main menu
(application style).

If certain objects are selected in the current topology view, the system collects statistics on
the NE types and quantity of the selected objects.

If no object is selected in the current topology view, the system collects statistics on the
types and number of all NEs in the current topology view.

Procedure
Step 1 Choose View > Display Setting > NE Statistics from the main menu (traditional style);
alternatively, double-click Topo View in Application Center and choose View > Show > NE
Statistics from the main menu (application style).
Step 2 Check the number of NEs in the NE Statistics list displayed on the left lower corner of the Main
Topology view.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

108

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

----End

1.6.9.4 Customizing Parameter Display


The U2000 provides the function of customizing the layout of tables. Users can customize the
sequence and width of columns, and whether to display or hide a column in the table. When a
user reopens some windows, the table layout, including the column sequence and width, is the
same as that specified by the user.

Procedure
l

Right-click on the top of a parameter list, and choose the desired items from the shortcut
menu. The unselected items are not shown in the parameter list.

Choose Column Settings from the shortcut menu. The Column Settings dialog box is
displayed. You can set whether to show a column in the parameter list, set the sequence of
columns and the column width.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

109

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

----End

1.6.9.5 Copying Table Texts Quickly


The U2000 allows you to copy and paste table text. You can copy text from a table to other
programs quickly.

Procedure
Step 1 Select the text in a table, and press Ctrl+C.
NOTE

l Select all texts in the table by pressing Ctrl+A. Only the current screen of the table is supported.
l To view all data in the current table, click Print or Save As.

Step 2 Switch to another program, and press Ctrl+V. The selected text is copied to the system clipboard.
----End

1.6.9.6 Monitoring Alarms


You can learn about the number of alarms of specified severities on NEs using the alarm panel
on the U2000 client. In addition, you can learn about the current alarm by using the alarm panel
or alarm indicator. In Alarm Panel, you can double-click an alarm template to open the window
for browsing alarms.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

110

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Procedure
Step 1 Choose Fault > Display Alarm Panel from the main menu (traditional style); alternatively,
double-click Fault Management in Application Center and choose Browse Alarms > Display
Alarm Panel from the main menu (application style) or click the
open the alarm panel.

icon on the toolbar to

The U2000 displays the Alarm Panel window, as shown in Figure 1-37. You can add a current
alarm template to the alarm panel if you want to monitor the alarms of specified severities on
NEs. For details, see 6.6.2 Setting the Alarm Panel. The alarm panel then displays alarm
information based on the preset template.
Figure 1-37 Alarm panel

NOTE

l The bar charts in the Query Alarm Bar Chart window correspond to the template displayed on the
alarm panel. When you add or delete an alarm bar chart (alarm template) in the Query Alarm Bar
Chart window, the corresponding alarm template is automatically added to or deleted from the alarm
panel. Similarly, when you perform the add or delete operation on the alarm panel, the bar chart in the
Query Alarm Bar Chart window is modified accordingly.
l If a user changes the name, status, or search criteria of a template in the alarm panel on client B, the
changes can be synchronized to client A only after the user restarts client A.

Step 2 Double-click a specific current alarm template on the alarm panel.


The U2000 displays the Browse Current Alarm window. In the Browse Current Alarm
window, you can query the alarm occurrence time, alarm source, and alarm logs. In addition,
you can acknowledge and clear alarms. For details, see 6.8.10 Browsing Current Alarms.
NOTE

You can click an alarm indicator to view an alarm of a corresponding severity. For details about the alarm
indicators, see 6.6.1 Introduction to the Alarm Panel.

----End

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

111

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.7 How to Obtain Version Information About the U2000


This topic describes how to obtain version information about the U2000.

Procedure
l

View the U2000 SPC version on the System Monitor.


1.

Log in to the U2000 System Monitor.

2.

Click the Component Information tab to view the component version information
about the U2000.
NOTE

Only the U2000 SPC version number can be viewed on the System Monitor. To view more version
information about the U2000 software, perform View the CP version of the U2000.

View the U2000 SPC version on the U2000 client.


1.

Log in to the U2000 client.

2.

Choose Help > About from the Main Menu.

3.

Click the About or Component tab to view the component version information about
the U2000.
NOTE

Only the U2000 SPC version number can be viewed on the U2000 client. To view more version
information about the U2000 software, perform View the CP version of the U2000.

View the U2000 CP version on the U2000 server.


The version information is stored on the U2000 server as a configuration file named the
version number. Access the following directory to view all version information:
In Windows: %IMAP_ROOT%\patch, such as D:\oss\server\patch
In Solaris and Linux: $IMAP_ROOT/patch, such as /opt/oss/server/patch
NOTE

The CP version number can be obtained only by accessing the directory. One version can have either
0 patch or multiple CP patches.

For example, if the directory contains the V100R009C00CP3011.cfg,


V100R009C00CP3013.cfg, and V100R009C00SPC301.cfg files, the version has been
installed with two CP patches and one SPC patch.
----End

1.8 Customizing the Client GUI Effect


You can customize the GUI effect of the U2000 client as required.

Context
The ranges of client GUI effect are for Current User and for Client. On the setting page, the
effect range is displayed on the topics of all items.The two types of ranges are described as
follows:
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

112

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

for Current User: The current user can view the GUI effect after logging in to the
configured server from any client.

for Client: All users can view the GUI effect after logging in to any server from the current
client.

1.8.1 Setting the Client Skin


The U2000 client provides the gray and green skin colors. You can set the skin color as required.

Context
l

After setting the skin color, you must re-log in to the U2000 client for the settings to take
effect.

The settings take effect for the current user that logs in different clients, but is invalid for
other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Skin in the navigation tree on the left.

Step 3 In Skin settings, select a skin color for the client.


Step 4 Click OK.
----End

1.8.2 Setting the Client Display Style


The U2000 client provides the function of setting the client display style. You can set the client
display style as required.

Context
l

You can switch the client display style to change the overall usability of the client and the
way the client is launched. You can use either of the following two styles to launch the
client:
Application style
Traditional style

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

113

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

After setting the client display style, you must re-log in to the U2000 client for the settings
to take effect.

The settings take effect for the current user that logs in different clients, but is invalid for
other users.

Table 1-12 describes the differences between the traditional style and the application style.
Table 1-12 Differences between the traditional style and the application style
Traditional Style

Application Style

Menu items cannot be searched for.

Users can search for menu items.

The Favorites feature is not supported.

You can add functions and menu items that


are frequently used to the Favorites tab. So
that you can access to the main windows of
the functions quickly.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Client Display Style in the navigation tree on the left.

Step 3 Select Application style or Traditional style for the client.


Step 4 Click OK.
----End

1.8.3 Setting the Main Window Title


This topic describes how to set the main window title displayed in the title bar.

Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

114

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 2 From the navigation tree on the left of the Preferences window, select Main Window Title.
Step 3 In Main Window Title, enter the title you want to display.
Step 4 Click OK.
----End

Result
The title that you set is displayed as the main window title.

1.8.4 Setting the Topology View Display


In the Topology Display Settings dialog box, you can set the view background color, subnet
display effect, link display mode, node icon, and node label displayed in the Main Topology.

Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose the Topology Display Settings node in the left navigation
tree.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

115

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In the Topology Display Settings dialog box, set Background Color, Subnet, Link, Node
Icon, and Node Label.
NOTE

Only the Label items settings in the Node Label area are synchronized to the topology tree. Other settings
do not take effect in the topology tree.

The Display each label item in separate lines in the topology view option allows you to quickly
view the node information such as node name, IP address, and alias in the topology view. You
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

116

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

can refer to Table 1-13 to set Abridged label and Display each label item in separate lines
in the topology view.
Table 1-13 Set the Abridged label and Display each label item in separate lines in the
topology view check boxes
Operation

Display Effect for the Topology View

Select the Abridged label and


Display each label item in
separate lines in the topology
view check boxes.

l If you do not select any topology objects or if you rightclick a topology object, the labels of all topology
objects are displayed in abridged mode. The items in
each node label are separated by colons (:).
l If you click a node, the node label is completely
displayed. This indicates that the items in the node
label are displayed in separated lines.
l If you click a link, the link label is completely
displayed in one line, regardless of the length of the
link label.
l If you press Ctrl to select multiple topology objects at
the same time, the items in the node label for the first
topology object are displayed in separated lines, but
the node labels for the remaining topology objects are
displayed in abridged mode.

Clear the Abridged label check


box but select the Display each
label item in separate lines in
the topology view check box.

The labels for each node and link are completely


displayed. This indicates that the items in each node label
are displayed in separated lines.

Select the Abridged label check


box but clear the Display each
label item in separate lines in
the topology view check box.

l If you do not select any topology objects or if you rightclick a topology object, the labels of all topology
objects are displayed in abridged mode. The items in
each node label are separated by colons (:).
l If you click a node, the node label is completely
displayed. If the label length exceeds the abridged
label length, the node label is displayed in new lines.
l If you click a link, the link label is completely
displayed in one line, regardless of the length of the
link label.
l If you press Ctrl to select multiple topology objects at
the same time, the items in the node label for the first
topology object are displayed in separated lines, but
the node labels for the remaining topology objects are
displayed in abridged mode.

Clear the Abridged label and


Display each label item in
separate lines in the topology
view check box.

Issue 03 (2014-12-10)

The labels of each node and link are displayed in one line,
and the items in each node label are separated by colons
(:).

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

117

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 4 Click OK.


Open the Main Topology and view the display effect.
----End

1.8.5 Setting the Font Size


You can set the font size on the U2000 client.

Context
l

After setting the font size, you must re-log in to the U2000 client for the settings to take
effect.

The settings take effect for the current user that logs in different clients, but is invalid for
other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, select Font.

Step 3 Select an option in Font size.


NOTE

Font size can be as follows:


l Small: The font size is 11 points.
l Medium (Default): The font size is 12 points.
l Large: The font size is 13 points.

Step 4 Click OK.


----End

1.8.6 Setting the Output Information


The output window is at the bottom of the U2000 client. It displays the prompt messages and
feedback information of the events that affect the running of the U2000.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

118

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, select Output Window.

Step 3 Set relevant parameters in the Output Window area.


Step 4 Click OK.
----End

Follow-up Procedure
You can perform the following operations in the information output area at the bottom of the
interface.
Operations

Description

Copy

1. Choose the displayed output information.


2. Right-click and choose Copy to copy the information to the clipboard.

Select All

1. Right-click in the output window and choose Select All.


2. Right-click again and choose Copy to copy all the displayed output
information to the clipboard.

Clear

Issue 03 (2014-12-10)

Right-click in the output window and choose Clear to clear all the displayed
output information.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

119

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Operations

Description

Find

1. Right-click in the output window and choose Find.

1 Getting Started

2. In the Find dialog box, type the key words to be searched for in Find
what.
NOTE
l Match case: To set whether the search content is case sensitive. The default is case
insensitive.
l Match whole word only: To perform a fuzzy search, clear Match whole word
only. To perform a precise search, select Match whole word only.
l Direction: To set the direction for a key word search.

Save As

Right-click in the output window and choose Save As. In the Save dialog
box, save the current output to a .txt file.
NOTE
Code formats ISO-8859-1 and UTF-8 are supported. The default encoding format is
ISO-8859-1. You are advised to use the default encoding format if the saved file does
not need to support multiple languages; otherwise, UTF-8 is recommended.

AutoScroll

Right-click in the output window and choose AutoScroll. The output


information scrolls automatically to the latest information. Right-click in the
output window again and choose AutoScroll, the auto scroll is disabled.

Parameter
Settings

Right-click in the output window and choose Parameter Settings. The


Output Window pane is displayed in the Preferences window.

1.8.7 Setting the Workbench


This topic describes how to set the workbench display for the client. In addition, you can create
function links on the workbench to access operation GUIs quickly.

Prerequisites
You have logged in to a client in the traditional style.

Context
l

After setting the workbench display, you must re-log in to the U2000 client for the settings
to take effect.

The maximum number of links on the workbench is 100.

The settings take effect for the current user that logs in different clients, but is invalid for
other users.

You can perform the following operations on the workbench.

Procedure

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

120

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Option

Description

Enable/disable the workbench

Enable/disable the workbench


1. Choose File > Preferences from the main
menu.
2. In the Preferences window, choose
Workbench in the navigation tree on the left.
3. Select or clear the Enable workbench check
box.
4. Click OK.
NOTE
l After enabling the workbench, the workbench
page is directly displayed when you log in to the
U2000 client next time.
l After disabling the workbench, the workbench
page is not displayed when you log in to the
U2000 client next time. In this case, you can
choose Help > Workbench (traditional style)
from the main menu to enable the workbench.

Create workbench

1. Log in to the U2000 client to go to the workbench


operation interface.
2. Right-click in a blank area of the workbench list
and choose Create Workbench from the
shortcut menu.
3. In the Create Workbench dialog box, enter the
workbench name and description, and select a
workbench icon and background.
NOTE
Clients support a maximum image size of 100 KB.
However, you are advised to use the default icon size
of 4 KB.

4. Click Create.
Modify workbench

1. Right-click a workbench in the workbench list


and choose Modify Workbench from the
shortcut menu.
2. In the Modify Workbench Link dialog box,
modify the workbench information such as the
workbench name, description, and icon.
NOTE
Clients support a maximum image size of 100 KB.
However, you are advised to use the default icon size
of 4 KB.

3. Click Modify.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

121

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Option

Description

Remove workbench

1. Right-click a workbench in the workbench list


and choose Remove Workbench from the
shortcut menu.
2. In the Confirm dialog box, click Yes.

Import Workbench

The U2000 provides the function of importing the


workbench data from a file. You can import the
workbench data from a file to a new workbench of
the U2000. This facilitates workbench creation.
1. Right-click a workbench in the workbench list
and choose Import Workbench from the
shortcut menu.
2. In the Import Workbench dialog box, select the
workbench file to be imported, and then click
Import.

Export Workbench

The U2000 provides the function of exporting the


workbench data. You can export the data on the
workbench to a file on the local client for future
maintenance and browse.
1. Right-click a workbench in the workbench list
and choose Export Workbench from the
shortcut menu.
2. In the Export Workbench dialog box, set the
name and format of the export file, and click
Export.

Create a shortcut for U2000


function

In the Workbench window, you can create


shortcuts for U2000 functions.
1. In the right pane of the Workbench window,
right-click in a blank area and choose Create
Shortcut from the shortcut menu.
2. In Create Shortcut dialog box, select a function.
3. Click Create.

Modify a shortcut of U2000


function

1. In the right pane of the Workbench window,


right-click the shortcut icon of an U2000
function and choose Modify from the shortcut
menu.
2. In the Modify Shortcut dialog box, change the
name, description, icon or move to.
3. Click Modify.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

122

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Option

Description

Arrange Icons by Name

In the right pane of the Workbench window, rightclick in a blank area and choose Arrange Icons by
Name from the shortcut menu to sort shortcut icons.
After sorting, icons are listed horizontally.

Delete a shortcut of U2000


function

1. In the right pane of the Workbench window,


right-click the shortcut icon of an U2000
function and choose Remove from the shortcut
menu.
2. In the Confirm dialog box, click Yes. The
function link icon is deleted from the
Workbench window.

Copy an icon

Copy the selected workbench icon to the clipboard.


Choose the shortcut menu Paste to copy the icon to
another workbench.

Cut an icon

Cut the selected workbench icon to the clipboard.


Choose the shortcut menu Paste to move the icon to
another workbench.

Drag an icon to another position In the Workbench window, drag an icon to a proper
position.
----End

1.8.8 Setting the Menu Collapse


This function allows you to display the frequently used menu items and hide the seldom used
menu items. This helps you quickly find the menu to perform common operations.

Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Menu Settings in the navigation tree on the left.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

123

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 Select Enable folding menus to enable the menu folding feature.
NOTE

By default, menu folding is enabled after the U2000 client is installed.

Step 4 Set the parameters for menu folding.


Table 1-14 Parameters for menu folding
Parameter

Description

Setting

Default number of
visible menu items

Default number of visible menu


items in each main menu.

Value range: 1-50


Default value: 5

Within the configured login times,


if the number of used menu items
exceeds this value, menus are
displayed based on the actual
number.
Hide menu items if
they are not used for X
consecutive logins

Value range: 1-50


Default value: 10

Step 5 Click OK.


----End

1.8.9 Setting the Colors of Alarms


You can set a color for each alarm severity. This helps you browse the alarms of different
severities clearly.

Context
l

Issue 03 (2014-12-10)

After setting colors for alarms, the alarm icons in the topology view, the alarm record you
have queried, and the alarm indicator on the alarm panel are displayed in the specified
colors.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

124

iManager U2000 Unified Network Management System


Operation Guide for Common Features

By default, the U2000 provides colors for four types of alarms. critical:
, minor:

1 Getting Started

, and warning:

, major:

The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose Color Settings in the navigation tree.

NOTE

For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.

Step 3 In the Color Settings area, click

in each row to select the colors of alarms.

Step 4 Click OK.


----End

1.8.10 Highlighting Alarms


After you set the alarm highlighting, alarms that are not cleared within a specified period are
highlighted in the query result window so that you can concern the alarms.

Context
l

For the alarm that meets the highlighting condition, if the difference between the local time
of the client and the alarm occurrence time reaches the threshold time for highlighting, the
alarm is highlighted.

The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

125

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
Highlighting in the navigation tree.

NOTE

For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.

Step 3 In the Highlighting area, set the time and alarm status for alarms of a certain severity, and then
select Enable.
NOTE

The validity period ranges from 1 to 1000000 minutes.

Step 4 Click OK.


----End

1.8.11 Setting the Alarm Font


You can set font, size, style, and color for alarms displayed in the current alarm, alarm logs,
event logs, and other windows to distinguish alarms that are not viewed from alarms that are
already viewed.

Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
Alarm Fonts from the navigation tree on the left.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

126

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In the Alarm Fonts area, set fonts, sizes, styles, and colors for alarms that are not read and that
are already read.
Step 4 Click OK.
----End

1.8.12 Setting the Alarm Display Mode


You can set the alarm and event background colors in windows, such as the current alarm, alarm
log, and event log windows.

Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
Alarm Display Mode in the navigation tree on the left.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

127

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.

Step 3 In the Alarm Display Mode area, select an alarm display mode, and set background colors for
different alarm states.
Table 1-15 Alarm background colors in different display modes
Display Mode

Field

Alarm Background Color

Icon

Severity

The background color is determined based on


the state. The severity icon is displayed in the
Severity field, and the color of the severity icon
is determined based on the severity.

All the other fields

The background colors of all the other fields are


determined based on the state.

Severity

The background color is determined based on


the severity.

All the other fields

The background colors of all the other fields are


determined based on the state.

Severity

The background color is determined based on


the severity.

All the other fields

The background colors of unacknowledged and


uncleared alarms are determined based on
severity, and users cannot change the color.
Whereas the background colors of the alarms
in other states are determined based on the state.

Cell Background

Row Background

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

128

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

The first columns of the current alarms, historical alarms, and alarm or event logs query windows are not
affected by the setting of the alarm display mode and are not rendered.

Step 4 Click OK.


----End

1.8.13 Setting the Display Properties of New Alarm/Event


You can set the display properties of new alarms or events to view newly reported alarms or
events clearly.

Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
New Alarm/Event in the navigation tree on the left.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

129

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.

Step 3 Select Alarm Severities Shown at Top of Screen and the alarm severity that needs to take
effect.
Step 4 In the New Alarm/Event group box, click Display at the top or Display at the bottom.
Step 5 In the Alarm Severities Shown in Alarm Lamps group box, select the severity to be displayed
on the alarm indicator.
Step 6 In the Others group box, set the display properties.
Step 7 Click OK.
----End

1.8.14 Setting the Alarm Display in the Topology View


After you set the alarm display in the topology view, when the devices in the network generate
alarms, the alarms of the highest severity will be displayed on the corresponding topology objects
in the topology view. This helps you learn about the device faults timely.

Context
l

Acknowledged and cleared alarms are not displayed in the topology view, because they
indicate that the faults are already rectified. For details about the meaning of each alarm
status, see 6.1.3 Alarm Status.

A subnet does not generate alarms. However, when the NEs or links in the subnet generate
alarms, the subnet displays the alarms of the highest severity. The alarm display mode for
subnets is the same as that for NEs.

A container NE can generate alarms. The alarm status display mode for a container NE is
the same as that for an NE. When an NE in a container NE generates an alarm, an alarm
icon appears on the container NE in the topology view. For details, see Icons Indicating
That Alarms Are Contained.

The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree of the Preferences dialog box, choose Topology Status Display.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

130

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In Topology Status Display, set the alarm display properties in the topology view.
Set the Alarm Display in the Operations
Topology View
Display Style of Alarm States

In Display Style of Alarm States, set the display style of


alarm states.
NOTE
Links support only the Use icon colors display style regardless of
the value of Display Style of Alarm States.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

131

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Set the Alarm Display in the Operations


Topology View
Alarm States to Display in the In Alarm States to Display in the Topology View, set the
Topology View
alarm state to be displayed in the topology view.
l If you select only Unacknowledged alarms, only the
unacknowledged alarms of the highest severity are
displayed.
For NEs, if Use icon colors is selected, the alarm
state is displayed in the color of NE icon frame. If
Use state icons is selected, the alarm state is
displayed in the round icon.
For links, the links are rendered.
l If you select only Uncleared alarms, only the uncleared
alarms of the highest severity are displayed.
For NEs, if Use icon colors is selected, the alarm
state is displayed in the color of NE icon frame. If
Use state icons is selected, the alarm state is
displayed in the triangle icon.
For links, the links are rendered.
l If you select both Unacknowledged alarms and
Uncleared alarms, for NEs, unacknowledged alarms of
the highest severity and uncleared alarms of the highest
severity generated on NEs are displayed; for links,
unacknowledged alarms and uncleared alarms of higher
severity generated on links are displayed.
NOTE
The unacknowledged alarms and uncleared alarms generated
on links are displayed by rendering the links. Therefore, if you
select both Unacknowledged alarms and Uncleared
alarms, you cannot determine the whether generated alarms
are unacknowledged alarms or uncleared alarms. To check
whether unacknowledged alarms or uncleared alarms are
on the
generated on a link, you can select this link, click
topology toolbar, and choose Properties tab page to check the
alarm information.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

132

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Set the Alarm Display in the Operations


Topology View
Additional Display Effects

In Additional Display Effects, set additional display


effects.
l When you select only Show alarm prompt, for NEs, a
pop-up message that contains the number and highest
severity of alarms is displayed if uncleared alarms are
generated on NEs, for links, no pop-up message is
displayed even if uncleared alarms are generated on
links.
l When you select only Blink, the icon that displays the
alarm status blinks.
l You can select Show alarm prompt and Blink at the
same time.
NOTE
Show alarm prompt is available only when Display Style of
Alarm States is set to Use icon colors.

Example

In Example, check the display effect of the alarm state.

Step 4 Click OK.


----End

1.8.15 Setting the Number Format of the Client


You can customize the number display format of the client, such as, the display mode of the
system monitoring data.

Context
l

After setting the number format, you must re-log in to the U2000 client for the settings to
take effect.

After you modify the number settings, the display of the number may be changed. You can
view the display effect in the Positive number text box and Negative number text box.

The settings take effect for the current user that logs in different clients, but is invalid for
other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, select Number Format from the navigation tree on the left.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

133

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 Set the number display format in the Number Format area.
NOTE

l Digits after decimal point: To set the number of digits after the decimal point. The value ranges from
0 to 3, and the default value is 2.
l Number separator: To select the separator for the integer part of a number. The value can be empty
or comma (,), and the default value is comma (,).
l 0 before decimal point: whether to add 0 before the decimal point. By default, 0 is added before the
decimal point.

Step 4 Click OK.


----End

1.8.16 Setting Board Color


On the U2000, you can customize a board color, which indicates that the board works in the
normal state.

Context
The U2000 provides two colors, which indicate that a board works in the normal state: gray and
green.

Procedure
Step 1 Choose Administration > NE Software Management > FTP Settings from the main menu
(traditional style); alternatively, double-click Fix-Network NE Software Management in
Application Center and choose NE Software Management > FTP Settings from the main
menu (application style).
Step 2 In the Preferences window, choose Board State from the navigation tree.
Step 3 In Normal State, select a skin color for the board.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

134

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 4 Click OK.


----End

1.8.17 Setting the Time and Date Formats of the Client


You can set the time format, time mode, and date format that are displayed on the client.

1.8.17.1 Setting the Time Format of the Client


This topic describes how to set the time format of the client.

Context
l

After setting the time format, you must re-log in to the U2000 client for the settings to take
effect.

Next time when you log in to the client, the U2000 client automatically uses the settings
that you set last time.

The settings take effect for the current user that logs in different clients, but is invalid for
other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, expand the Region Settings
node and choose Time.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

135

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In the Time group box, set the time format. The time display effect that you set is displayed in
the Time example.
Step 4 Click OK.
----End

1.8.17.2 Setting the Date Format of the Client


This topic describes how to set the date format of the client.

Context
l

After setting the date format, you must re-log in to the U2000 client for the settings to take
effect.

Next time when you log in to the client, the U2000 client automatically uses the settings
that you used last time.

The settings take effect for the current user that logs in different clients, but is invalid for
other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree on the left of the Preferences window, expand the Region Settings node
and select Date.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

136

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In the Date group box, set the date format.


NOTE

l Date separator: symbol to separate the date. There are three symbols for you to select: "/", "-", and
".". The default is "/".
l Date format: display format of the date. It can be set to "yyyy/MM/dd", "MM/dd/yyyy", or "dd/MM/
yyyy". The default is "MM/dd/yyyy".

Step 4 Click OK.


----End

1.8.17.3 Setting the Time Mode of the Client


After you set the time mode of the client, the time on the U2000 is displayed based on the
specified time mode (U2000 server time mode or U2000 client time mode).

Context
l

After setting the time mode, you must re-log in to the U2000 client for the settings to take
effect.

Next time when you log in to the client, the U2000 client automatically uses the settings
that you used last time.

The settings take effect for the current user that logs in different clients, but is invalid for
other users.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree on the left of the Preferences window, select Time Mode.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

137

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In the Time Mode group box, select time mode.


NOTE

l Server time: If you select this option, the time on the U2000 client is displayed based on the time zone
where the server is located. For example, if the time of the client in UTC +08:00 is 10:00, and the server
is in the UTC +07:00, the time displayed on the U2000 client is 9:00. Server time is used by default.
l Client time : If you select this option, the time on the U2000 client is displayed based on the client OS
time.

Step 4 Click OK.


----End

1.8.18 Setting the Toolbar


You can set toolbars and shortcut buttons that are displayed on the toolbar tray and the positions
of the toolbars.

Procedure
Step 1 Choose File > Customize Toolbar from the main menu.
Step 2 In the Customize Toolbar dialog box, select System, Security, Fault or Main Topology in the
Toolbars group box.
Step 3 Click Advanced.
The Customize Toolbar dialog box displays the Toolbar Buttons group box.
NOTE

l Click Advanced again. The Toolbar Buttons group box is hidden.


l The Toolbar Buttons group box consists of two parts: Available Tools and Customized Tools. All
the buttons in Customized Tools are displayed on the toolbar, and the buttons in Available Tools are
not displayed on the toolbar.

Step 4 In the Toolbar Buttons group box, set the buttons you want to display on the toolbar.
l

In the Available Tools group box, select one button or hold down Ctrl or Shift to select
to move the selected buttons to the

multiple buttons you want to display. Click


Customized Tools group box.
l

In the Customized Tools group box, select one or hold down Ctrl or Shift to select multiple
buttons you do not want to display. Click
Available Tools group box.

Issue 03 (2014-12-10)

to move the selected buttons to the

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

138

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

You can click Reset or Reset All to restore the selected or all toolbars to their initial state. These operations
help you adjust the display mode of buttons on the toolbar based on the initial state.

Step 5 Click OK.


The selected toolbars are displayed in the toolbar tray based on your settings.
Step 6 Optional: Adjust the positions of the toolbars in the toolbar tray.
1.

Right-click in the blank area and choose Lock Toolbar from the shortcut menu. If Lock
Toolbar is not selected, you can skip this step.

2.

Drag the toolbars to change their positions.

3.

After that, right-click in the blank area and choose Lock Toolbar from the shortcut menu.
The toolbars are locked, which prevent the toolbars from being moved by mistake.
NOTE

Right-click in the blank area and choose Reset Toolbar from the shortcut menu. The toolbars are restored
to their initial states.

----End

1.9 Setting the Alert upon Network Disconnections


After you set the disconnection alert on the U2000 client, the sound box connected to the client
plays the sound if the U2000 client is disconnected from the server.

Context
l

The audio files used for prompting network disconnections support only the audio files of
the WAV type in the PCM format. The audio files of the WAV type can be recorded in two
formats: PCM and Microsoft ADPCM.

The settings apply only to the current user on the current client.

Some computers in sleep mode may close network connections automatically. When this
occurs, the U2000 plays the sound. You can change the sleep mode to solve this problem.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose Disconnection Alert from the navigation tree on the left.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

139

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In the Disconnection Alert area, select Sound an alert when the client is disconnected from
the server.
Step 4 Click

. In the Open dialog box, select an audio file and click Open.

Step 5 Click

to play the sound.

Step 6 Click OK.


----End

1.10 Checking Whether the Client Needs Upgrade


You can perform this operation to check whether the client version matches the server version.
If the versions do not match, you must upgrade the client.

Context
If the U2000 server is upgraded but the client is not upgraded, it is possible that the version of
the client does not match that of the server.

Procedure
Step 1 Choose Help > Check for Upgrades from the main menu (traditional style); alternatively,
double-click Security Management in Application Center and choose OSS Security > Check
for Upgrades from the main menu (application style) to check whether the client version
matches the server version.
l

If the versions match, the client does not need to be upgraded. In this case, click OK.

If the versions do not match, you must upgrade the client. In this case, perform the following
operations to upgrade the client:
1.

Click OK.

2.

In the Update Wizard: Update Applications window, click Continue. The upgrade
progress is displayed.

3.

In the Update Wizard: Update Applications window, click Finish.

----End

1.11 Setting the Interval of Client Upgrade Check


After the server is upgraded, the server version and the client version do not match. Therefore,
the client must also be upgraded. After the interval for upgrade checking is set, the U2000
periodically checks whether the client needs to be upgraded.

Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

140

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose Upgrade from the navigation tree.

Step 3 Select an interval for upgrade checking from the Interval drop-down list.
Step 4 Click OK.
----End

1.12 Locking the Client


You can lock the U2000 client to prevent unauthorized operations.

Prerequisites
The U2000 client is not locked.

Context
In the Preferences dialog box, select Show main window when terminal locked in the Lock
Settings area. Thus, after the client is locked, the main window of the client is visible.

Procedure
l

The following table describes how to set the client to be locked manually or automatically.
Lock Mode

Operations

Automatically

After you set the client to be locked automatically, the client is


automatically locked if it does not receive any operation
instructions in the specified period.
To set the client to be locked automatically, see 3.3.1.8 Setting
Auto-locking for a Client.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

141

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Lock Mode

Operations

Manually

To ensure U2000 system security, if you do not perform operations


on the U2000 client for a period, you can lock the client to prevent
others from performing illegal operations on the U2000 client. You
can lock the client manually by using the following method:
l Choose File > Lock Terminal from the menu bar.
l Click

on the toolbar.

----End

1.13 Unlocking the Client


After a client is locked by the current login user or by the system automatically, the current user
can unlock it, or ask a user in the SMManagers group to reset the password and then log in
again, or ask a user in the Administrators group to unlock the client.

Prerequisites
The U2000 client is locked.

Procedure
The following table describes how to unlock the client in different scenarios.

Issue 03 (2014-12-10)

Operation
Scenarios

Operation Method

If the current user


konws the password

1. Press Ctrl+Alt+U or click

2. Enter the current user name and password, and click OK.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

142

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Operation
Scenarios

Operation Method

If the current user


forgets the password

l A user in the SMManagers group need to reset the current user


password. For details, see 3.3.3.2 Resetting the Password of an
NMS user. Then log in to the client again using the user name and
the new password.
NOTE
A user in the SMManagers group cannot reset the password of the
admin user. If the current user is admin, only a user in the
Administrators group can unlock the client.

l The current user must ask a user in the Administrators group to


unlock the client. After the client is unlocked, the current user is
logged out.
1. Press Ctrl+Alt+U or click

2. Enter the user name and password of the user in the


Administrators group, and click OK.
NOTE
In remote authentication mode, only Administrators group users that have
logged in to U2000 can unlock the client locked by the current user.

NOTE

If the number of password retries reaches the upper limit (3 by default), the user account is locked for a
specified period (30 minutes by default). The U2000 user is automatically unlocked after the auto-unlocking
duration. The U2000 user can also be unlocked by security administrators manually. For details, see 3.3.4.4
Unlocking Users.

1.14 Setting the Level of Operation Logs Recorded by the


Client
You can set the level of operation logs recorded by the client, which enables you to focus on
desired operation logs.

Context
l

The settings take effect only for the current client. You need to set the log level again if the
client is restarted.

The log file records the client running information, such as user login and logout time,
helping the maintenance personnel locate the problems on the live network.

Procedure
Step 1 Press Ctrl+Alt+Shift+L.
Step 2 Select Enable Logging in the Log Settings dialog box.
NOTE

If you clear the Enable Logging check box, the log level cannot be set and the client does not record logs.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

143

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 3 In the Log Settings dialog box, click the drop-down icon next to Log Level and select the level.
NOTE

The available log levels are described as follows:


l Detail: This is the lowest and default log level. It indicates that the client records all operation logs.
l Debug: This log level is higher than Detail, and it indicates that the client records operation logs at the
Debug, Warning, and Error/Exception levels.
l Warning: This log level is higher than Debug, and it indicates that the client recordsoperation logs at
the Warning and Error/Exception levels.
l Error/Exception: This is the highest log level, and it indicates that the client records logs only at the
Error/Exception level.

Step 4 Click OK.


----End

Result
After you set the log level, the client record operation logs in Client installation directory\client
\client\var\log.

1.15 Setting a Scheduled Task


The U2000 can automatically execute certain tasks in a scheduled time without manual
intervention. You can set and modify these scheduled tasks as required.

Prerequisites
You are an NMS user with Operator Group authority or higher.

Context
If a large number of performance data need to be collected, this may cause communication
congestion and thus the communication between the U2000 and NEs stops. Hence, observe the
following rules to collect the performance data:
l

When creating a single performance data collection task, the number of NEs related to the
same GNE does not exceed 5.

Run the performance data collection task when network traffic is low.

Procedure
Step 1 Choose Administration > Task Schedule > Task Management from the main menu
(traditional style); alternatively, double-click System Management in Application Center and
choose Task Schedule > Task Management from the main menu (application style).
Step 2 Optional: Create a scheduled task.
1.

Click New and the New Task is displayed.

2.

Enter a task name and select the task type of the scheduled task and the run type. Then,
click Next.

3.

Set the Time Setting or the Period Setting. Click Next.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

144

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

If the Run now check box is selected, a scheduled task will run immediately.
At other time except DST, the option DST is unavailable.

4.

Follow the task creation wizard to set the parameters of the scheduled task and click
Next for several times until the Finish button is displayed.

5.

Click Finish. A scheduled task is successfully created.

Step 3 Optional: Double-click a scheduled task to modify the parameters of the task.
Step 4 Optional: Right-click a scheduled task and choose Suspend/Resume Schedule to set the
suspend time or the resume time for the task. Click OK.
Step 5 Optional: Right-click a scheduled task and choose Run now to start executing the task.
NOTE

Run now means to immediately execute the task, no matter the scheduled time comes or not. Resume
means to start the scheduled task. The task is executed at the scheduled time.

----End

1.16 Broadcast Messages


The broadcast message functions include setting the broadcast parameters and sending the
broadcast messages. The broadcast message functions of the U2000 enable you to send messages
to other users easily.

1.16.1 Setting Broadcast Parameters


You can set the number of historical broadcast messages displayed on the client and the number
of messages stored in the buffer on the server as required.

Procedure
Step 1 Choose Administration > Broadcast Message from the main menu (traditional style);
alternatively, double-click System Management in Application Center and choose System >
Broadcast Message from the main menu (application style).
Step 2 In the Broadcast Message dialog box, click Options.

Step 3 In the Options dialog box, enter values in Max. messages to display and Max. messages to
save, and click Save.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

145

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

l The setting of Max. messages to display takes effect only for the current client, not for the server.
l The setting of Max. messages to save takes effect for all clients that are connected to the server. The
parameter configured by a user affects the experience of other users.
l It is recommended that you set only Max. messages to display so that the setting takes effect only for
your client, and Max. messages to save is set by the administrator of the U2000 server.
l The displayed messages are read from the buffer on the server. Therefore, you need to set Max.
messages to display to a value that is smaller than or equal to Max. messages to save.

Step 4 In the Information dialog box, click OK.


----End

1.16.2 Sending Broadcast Messages


You can send broadcast messages so that online users on other clients can view messages sent
from the local client.

Context
l

The client can receive its own broadcast messages. The output area in the lower part of the
U2000 client displays corresponding prompts.

You have permissions to set broadcast message parameters and send broadcast messages.

Only the online U2000 client can receive broadcast messages.

Procedure
Step 1 Choose Administration > Broadcast Message from the main menu (traditional style);
alternatively, double-click System Management in Application Center and choose System >
Broadcast Message from the main menu (application style).

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

146

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 2 In the Broadcast Message dialog box, enter the message content in the New Message field.

CAUTION
Do not enter important information such as passwords.
Step 3 Click Send.
Step 4 In the Information dialog box, click OK.
----End

Result
When the sending is complete, the Information dialog box that contains the broadcast message
is displayed on other clients.

1.17 Applying for and Updating the U2000 License


This topic describes the license file of the U2000, and how to apply for, install, and use the
U2000 license.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

147

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.17.1 U2000 License Precautions


This topic describes the U2000 license file. The license file is used to control the functions and
management capabilities of the U2000. If the U2000 license file is unavailable, you cannot log
in to the U2000 client.
l

The U2000 license file naming format is: xxxxxxx.dat.

On Solaris/SUSE Linux OS, the encoding format of the U2000 license file must be UNIX,
not DOS. For details about how to confirm the encoding format of the U2000 license file,
see How to Confirm the Encoding Format of the U2000 License File.

One license file corresponds to the equipment serial number (ESN) in an NMS computer
and can be used only on the corresponding computer.

Do not disable the NIC whose corresponding ESN is bound to the U2000 license file.

The formal U2000 licenses are not OS-specific. That is, U2000 licenses do not need to be
applied for according to OS (SUSE Linux, Solaris, or Windows) differences.

Do not make any change to the license file. Otherwise, the license becomes invalid.

The U2000 provides a grace period of 60 days for commercial permanent licenses. No grace
period is specified for other types of licenses.
Within the grace period, overloaded license items are allowed, and the associated
resources can be added and used. The MTOSI XML NBI can be used to synchronize
NE inventory and alarm information on the entire network.
When the grace period ends, the associated message or alarm information will be
displayed. In this case, new access services, including adding NEs or service objects,
are not allowed. You must apply for a license as soon as possible. Otherwise, some
functions may be unavailable. The MTOSI XML NBI can be used to synchronize
network-wide NE inventories and the alarm information indicating that the number of
equivalent NEs exceeds the license restriction.

1.17.2 Applying for a U2000 License


This topic describes how to apply for a U2000 license.

Context
l

The license file is not delivered to customers along with the U2000 installation DVD.
Contact Huawei engineers to apply for the licenses according to the contract number and
the equipment serial numbers (ESNs) of the oss server.

To prevent the failure in finding the license file for possible U2000 reinstallation, save the
license application email and the license file properly.

Before using the U2000, apply for the formal U2000 license in advance because the
U2000 license application goes through a long process.

An ESN is a string consisting of 40-digit numerals or letters obtained by encrypted


calculation on the MAC addresses of the U2000 server network interface. The number of
ESNs is the same as the number of network interfaces on the U2000 server. To avoid
applying for a new license due to replacing certain network interface cards (NICs), save
all the ESNs to ensure proper use of the U2000 license.
Generally, the ESN for a server does not change. It can be used for the U2000 license
that is normally applied for.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

148

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

If the ESN for a U2000 license is changed due to NIC or server replacement or ESN
application error, apply for a U2000 license again and contact Huawei technical support
engineers.
l

The requirements for the ESNs of the server to which a license needs to be bound vary
according to the installation scheme. You must obtain ESNs of the server based on the
installation scheme.
In a centralized single-server system scheme, the license needs to be bound to the ESNs
of the server.
In a centralized high availability system (Veritas hot standby) scheme, the license needs
to be bound to the ESNs of the servers on both the primary site and the secondary site.

Procedure
Step 1 Obtain the contract number.
Step 2 Use the ESN tool provided by the U2000 to view ESNs of the server.
NOTE

If the U2000 has been installed, using the ESN tool of the U2000 to view the ESN is recommended.

Mode 1: View the ESN using the ESN tool of the NMS after installing the U2000.
On Solaris OS or SUSE Linux, perform the following steps to obtain ESNs:
1.

Log in to the OS of the U2000 server as the root user.


NOTE

When a high availability system scheme is used, you must log in to the OSs of the primary and
secondary sites as the ossuser user.

2.

Run the following commands to view ESNs:


# cd /opt/oss/server/platform/bin
# ./esn

A message similar to the following will be displayed:


ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD
ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
.....
NOTE

If a high availability system scheme is used, you must respectively save the ESNs for the primary and secondary
sites. During the application for a formal license, you must provide the ESNs of the network interfaces of the
primary and secondary sites for external communication.

On Windows, perform the following steps to obtain ESNs:


1.

Choose Start > Run.

2.

In the Run dialog box, enter cmd. A command line interface (CLI) is displayed.

3.

Run the following commands:


>esn

A message similar to the following will be displayed:


ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

149

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
.....

Mode 2: Use the ESN tool to generate ESNs before installing the U2000.
NOTE

Make the following preparations:


l Contact Huawei engineers to obtain the ESN tool package. Huawei engineers can go to http://
support.huawei.com/carrier to download the ESN tool delivered with the version. The ESN tool is
named as follows:
l Solaris OS: U2000version_ESN_solaris_SPARC.tar
l SUSE Linux OS: U2000version_ESN_sles_x64.tar
l Windows OS: U2000version_ESN_win32_x86.zip
l Copy the ESN tool package to the computer.

Solaris or SUSE Linux is used as an example to describe how to use the downloaded ESN tool
to generate ESNs.
1.

Use SFTP to upload the ESN tool to the U2000 server as the root user. For example, upload
the ESN tool to the /opt path. For details, see How to Use the FileZilla to Transfer Files by
SFTP.

2.

Run the following commands to decompress the ESN tool package:


# cd /opt
# tar xvf U2000version_ESN_solaris_SPARC.tar

3.

Run the following command to view the ESN:


# ./esn

Information similar to the following is displayed:


ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD
ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
...

Step 3 After the esn command is executed, the system automatically generates the Esn.txt path. Send
the contract number and the server ESNs to Huawei engineers or the local Huawei office.
NOTE

Huawei engineers access http://license.huawei.com to obtain the license based on the contract number
and ESNs.

Step 4 Huawei engineers send the license file to you after obtaining it.
NOTE

The license file provided with the U2000 exists as a .dat file.

----End

1.17.3 Updating the U2000 License


This topic describes how to update the U2000 license.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

150

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Prerequisites
l

The OS and database must run properly. For details on how to start the OS and database,
see 1.2 Starting the U2000 System.

The processes of the U2000 must be properly started. For details on how to start the
U2000 processes, see 1.2 Starting the U2000 System.

You must log in to the U2000 client as the admin user.

The license file of the U2000 must be obtained. The license file name can contain digits,
letters, and special characters excluding the space or \ /:*?"<>|.
Through the GUI of the client: Save the new U2000 license to the server where the
U2000 client is located.
Through the CLI: The new license file must be transferred to the U2000 server through
SFTP.
In the Solaris OS, upload the license file to the /export/home/ossuser path on the
server as the ossuser user.
In the SUSE Linux OS, upload the license file to the /export/home/ossuser path on
the server as the ossuser user.
In the high availability system, upload the new U2000 license file to the /export/
home/ossuser path on the server on the primary site through SFTP. The U2000
license only need to be loaded on the primary site. It will be synchronized to the
secondary site automatically after the U2000 license has been loaded on the primary
site.

After the U2000 is installed, you must load the U2000 license to ensure that the U2000 is
available.
For details, see the updated contents about the U2000 license in this topic.

Confirm that the license file is transferred in text mode, that is, in ASCII mode.

If the U2000 license file is unavailable, you cannot log in to the U2000 client. Update the
U2000 license file in time.

During the update of the U2000 license file, you can replace the formal U2000 license file
with the temporary one; It is recommended to use the formal U2000 license as soon as
possible.

The licenses of different R versions of the U2000 are incompatible. For example, the license
of V100R001 cannot be used by V100R002.

Determine whether to update the U2000 license file based on the U2000 license use
conditions.

Context

In the case that the device types supported by the new license are different from those
supported by the original license, the license is updated as follows:
If the device types supported by the new license are more than the device types
supported by the original license and the added device types are supported by the
current version, the license can be updated. If the added device types are not
supported by the current version, the license cannot be updated.
If the device types supported by the new license are less than the device types
supported by the original license and no NEs of the reduced device types are created
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

151

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

in the NMS, the license can be updated. If certain NEs of the reduced device types
are created in the NMS, the license cannot be updated.
For IP domain, if the function items supported by the new license are less those
supported by the original license, the license cannot be updated.
In the case that the number of clients supported by the new license is different from that
supported by the original license, the license is updated as follows:
If the number of clients supported by the new license is less than that supported by
the original license but the number of online clients is less than the number of clients
supported by the new license, the license can be updated. If the number of online
clients is greater that the number of clients supported in the new license, the license
cannot be updated.
If the number of clients supported by the new license is greater than that supported
by the original license, the license can be updated.
l

In scenarios where you can change the license, you can update the U2000 license and then
restart the server.
You can update the U2000 license through the GUI or CLI.
Restart the client after you replace a license. Then, the client automatically reloads the
menu items according to the control items defined in the new license.
Through the GUI of the Client:
Application scenario: This method is recommended if you can log in to the
U2000 client and access the GUI.
Operation method: Log in to the U2000 client, and then click Update License
to update the license.
Restart the client after you update the license. Then, the client automatically
reloads GUI elements according to control items defined in the new license.
Through the CLI:
Application scenario: This method is applicable to the scenario where you need
to remotely update the license through commands because logging in to the
U2000 client is not allowed and the client does not provide any GUI.
Operation method: Check that the processes of the U2000 are properly started,
and then run the updateLicense -file filename command to update the license
file.
It is recommended that you update the U2000 license through the GUI of the client.
If the license updated through the GUI of the client requires deploying the NE Explorer
or other processes, a message will be displayed when you start the U2000 processes
after updating the license. Viewing the process startup status on the System Monitor
client and performing operations after all the processes have been started are
recommended.
To ensure the normal running of the U2000, do not manually replace the license file.
NOTE

To make both the U2000 commercial and temporary licenses take effect, use the GUI mode.

Procedure
l

Through the GUI of the Client


For the single-server system:

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

152

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1.

1 Getting Started

On the U2000 workstation, back up the original license file.


In the Windows OS: Create the backup folder in the default directory D:\oss
\server\etc\conf\license. Copy the original license file to the created folder.
In the Solaris or SUSE Linux OS:
run the following commands to back up the any other license file to the /opt/oss/
server/etc/conf/license path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup
NOTE

After SetSolaris is enabled, only the SSH service for the ossuser user has the login right. The
SSH login mode is recommended for your system security. To use another login mode such as
Telnet, you must enable the access right for the Telnet service and the login user. For details,
see How to Start/Stop the FTP, SFTP, and Telnet Services and How to Enable and Disable the
FTP/Telnet Authority of user root on Solaris OS.

2.

Update the U2000 License file through the GUI of the U2000 Client.
a.

Choose Help > License Management > License Information from the main
menu (traditional style); alternatively, double-click System Management in
Application Center and choose License Management > Licenes
Information from the main menu (application style).

b.

In the License Information dialog box, click Update License.

c.

Select the new license file and click Open.

d.

Click Next.

e.

Select a scenario and perform the associated operations as required:


If Incremental is unavailable, click Next.
If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
If Incremental is available and both the new and in-use U2000 licenses need
to be effective, select Incremental and click Next. If the in-use U2000 license
has a commercial license and a temporary license, the new license will replace
the license of the same type. For example, if the new license is a commercial
license, the commercial license in the in-use U2000 license will be replaced.

3.

f.

Click Finish.

g.

Click Yes and confirm the updated license.

h.

Click Yes to close all windows.

i.

Click Yes to log out of the system.

Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.

For the HA system:


1.

Log in to the U2000 server on the primary and secondary sites.

2.

Back up the original U2000 license file on the primary and secondary sites.
Create the backup folder in the default path. Then, copy the original license file to
this folder.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

153

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

l The default path of U2000 license file in the Solaris or SUSE Linux OS is /opt/oss/server/
etc/conf/license.
l The default path of U2000 license file in the Windows OS is D:\oss\server\etc\conf
\license.

3.

Update the license file on the primary site.


a.

Log in to the OS where the U2000 client is installed.


In Windows, log in to the OS as the administrator user.
In Solaris, log in to the OS as the ossuser user.

Issue 03 (2014-12-10)

b.

Save the license to be loaded to the server where the U2000 client is installed.

c.

On the desktop, double-click U2000 Client. The Login dialog box is displayed.

d.

In the Server drop-down list, select the server (server on the primary site) to be
logged in to. Then, set User Name and Password to the valid values, and click
Login. The initial password of the admin user is Changeme_123 (It is
Admin_123 for a U2000 that comes preinstalled). The password must be
changed during the first login to ensure system security. Keep the password
confidential and change it regularly.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

154

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

l If a message indicating that no license is available is displayed when you log in to


the U2000 client.
1. In the Confirm dialog box, click Yes. The Open dialog box will be displayed.
2. In the Open dialog box that is displayed, select the new license file and click
Open. The License Comparison Results dialog box will be displayed.
3. Click OK.
4. Click Yes and confirm the loaded license.
5. Click OK.
l If U2000 license is loaded before.
1. Choose Help > License Management > License Information from the main
menu (traditional style); alternatively, double-click System Management in
Application Center and choose License Management > Licenes
Information from the main menu (application style).
2. In the License Information dialog box, click Update License.
3. Select the new license file and click Open.
4. Click Next.
5. Select a scenario and perform the associated operations as required:
l If Incremental is unavailable, click Next.
l If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
l If Incremental is available and both the new and in-use U2000 licenses need
to be effective, select Incremental and click Next. If the in-use U2000
license has a commercial license and a temporary license, the new license
will replace the license of the same type. For example, if the new license is
a commercial license, the commercial license in the in-use U2000 license
will be replaced.
6. Click Finish.
7. Click Yes and confirm the updated license.
8. Click Yes to close all windows.
9. Click Yes to log out of the system.

4.
l

Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.

Through the CLI


For the single-server system:
1.

On the U2000 workstation, back up the original license file.


In the Windows OS: Create the backup folder in the default directory D:\oss
\server\etc\conf\license. Copy the original license file to the created folder.
In the Solaris or SUSE Linux OS:
run the following commands to back up the any other license file to the /opt/oss/
server/etc/conf/license path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

155

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

After SetSolaris is enabled, only the SSH service for the ossuser user has the login right. The
SSH login mode is recommended for your system security. To use another login mode such as
Telnet, you must enable the access right for the Telnet service and the login user. For details,
see How to Start/Stop the FTP, SFTP, and Telnet Services and How to Enable and Disable the
FTP/Telnet Authority of user root on Solaris OS.

2.

Update the U2000 license.


In the Windows OS:
a.

Log in to the OS of the server.

b.

Run the following command to update the U2000 license file:


> updateLicense -file License_file_name
NOTE

In the command, License_file_name indicates the combination of an absolute path


and a file name. For example, if the license fine is named license123.dat and stored
in d:\, the command to rename the U2000 license file is > updateLicense -file d:
\license123.dat.
If illegible characters are displayed, set the environment variable:
FILEIO_LOCAL_CHARSET=1.

Information similar to the following is displayed:


state
old value
no change:
Client
no change:
Client
no change:
Export
no change:
Client

product
feature
new value
U2000
COMMON
500
500
U2000
COMMON
1
1
U2000
COMMON
1
1
U2000
COMMON
1
1

item

name

LSW1CAPA01
LSW1CAPA01
LSW1FMCLT01

Alarm

LSW1RENOTI01

Are you sure to update the license?(Y/N)

c.

Enter Y, and then press Enter.

In the Solaris OS:


a.

log in to the OS of the U2000 server as the ossuser user.

b.

Run the following command to update the U2000 license file:


$ cd /export/home/ossuser
$ updateLicense -file License_file_name
NOTE

In the command, License_file_name indicates a file name or the combination of an


absolute path and a file name.

Information similar to the following is displayed:


state
old value
no change:
Client
no change:
Client
no change:
Export
no change:
Client

Issue 03 (2014-12-10)

product
feature
new value
U2000
COMMON
500
500
U2000
COMMON
1
1
U2000
COMMON
1
1
U2000
COMMON
1
1

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

item

name

LSW1CAPA01
LSW1CAPA01
LSW1FMCLT01

Alarm

LSW1RENOTI01

156

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Are you sure to update the license?(Y/N)

c.

Enter Y, and then press Enter.

In the SUSE Linux OS:


a.

log in to the OS of the U2000 server as the ossuser user.

b.

Run the following command to update the U2000 license file:


$ cd /export/home/ossuser
$ updateLicense -file License_file_name.dat

Information similar to the following is displayed:


state
product feature item
name
old
value
new value
used value
new:
iManager U2000
VALUET
LNSDAASC01
Alarm
Application Software
license-Transmission
Network
1
new:
iManager U2000
VALUET
LNSDAEASC01
SDH-ASON
Management Function
Component-Transport
Network
1
new:
iManager U2000
VALUET
LNSDAEASC02
license Per
Equivalent VC4 for SDH ASON Service
10
new:
iManager U2000
VALUET
LNSDAEASC03
ASON NG WDM
Application Software
license-Transmission Network
1
...
Are you sure to update the license?(Y/N):

c.
3.

Enter Y, and then press Enter.

Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.

For the HA system:


1.

Log in to the U2000 server on the primary and secondary sites.

2.

Back up the original U2000 license file on the primary and secondary sites.
Create the backup folder in the default path. Then, copy the original license file to
this folder.
NOTE

l The default path of U2000 license file in the Solaris or SUSE Linux OS is /opt/oss/server/
etc/conf/license.
l The default path of U2000 license file in the Windows OS is D:\oss\server\etc\conf
\license.

3.

Run the updateLicense command to update the license file on the primary site. For
details, see Step 2.

4.

Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.

----End

Result
After the preceding operations are performed, the license file is automatically loaded to the /opt/
oss/server/etc/conf/license path.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

157

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

1.17.4 Checking the Status of the U2000 License


This topic describes how to check the status of the U2000 license. By checking the license status,
you can learn the usage of the license, so as to apply for a new license file from Huawei in time
before the NMS needs to be expanded or the validity of the license is due.

Context
By checking the U2000 license status, you can learn whether the U2000 license control items
are correct. If a license control item is incorrect, the related functional module is unavailable.
For example, if the license control item for the U2000 E2E module is absent, tunnels cannot be
created.

Procedure
Step 1 Log in to the U2000 Client.
Step 2 Choose Help > License Management > License Information from the main menu (traditional
style); alternatively, double-click System Management in Application Center and choose
License Management > Licenes Information from the main menu (application style).
Step 3 In the License Information dialog box that is displayed to view the condition of the license.
----End

1.17.5 Revoking a License on the U2000


The U2000 supports the function of revoking a License. You can revoke the License that is not
in use to obtain the revocation code and then use the code to apply for a new License.

Prerequisites
You have logged in as a user who belongs to the Administrators or SMManagers user group.

Context
The Revoke License dialog box displays only available License files and does not display
revoked and invalid Licenses.

Procedure
Step 1 Choose Help > License Management > Revoke License from the main menu (traditional style);
alternatively, double-click System Management in Application Center and choose License
Management > Revoke License from the main menu (application style).

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

158

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 2 In the Revoke License dialog box, select the License that will not be used any more, and then
click Revoke License.
NOTE

l Product: Name of the product.


l License SN: SN of a License file.
l License File: Name of a License file.

Step 3 In the Confirm dialog box, click Yes.


The License file is revoked.
----End

Result
If you revoke a License file but do not apply a new License, the U2000 displays a dialog box
every hour, prompting you to update the License. The U2000 also displays License SN,
Revocation Time, and Valid Date (indicating the date before which the revoked License can
still be used) of the License, and License File.

1.17.6 Querying the License Revocation Code on the U2000


This topic describes how to view the License revocation code on the U2000 client. When
applying for a new License, you need to provide the revocation code of the old License.

Procedure
Step 1 Choose Help > License Management > Query License Revocation Code from the main
menu (traditional style); alternatively, double-click System Management in Application
Center and choose License Management > Query License Revocation Code from the main
menu (application style).
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

159

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 2 In the Query License Revocation Code dialog box, view the License SN, License revocation
code and revocation setting time.
NOTE

l License SN: SN of a License file.


l License Revocation Code: a string generated after a License file is revoked. According to this unique
string, you can check that its corresponding License file is revoked. When changing the equipment
serial number (ESN) or License capacity, you need to provide the License revocation code.
l Revocation Time: time when you set a License file to be revoked.

Step 3 Right-click the information about the revocation code and choose Copy from the shortcut menu
to copy the information.
The copied information about the revocation code can be used to apply for a license.
NOTE

You can also select the information about the queried revocation code, and then press Ctrl+C to copy the
information.

----End

1.17.7 Setting Periodic Export of the U2000 License


When the upper-layer OSS needs to collect statistics on Licenses used by U2000 recently (for
example, usage of License items and License update time), you can perform U2000 License
export tasks periodically or instantly to dump the Licenses information used by the U2000, and
save them as an XML file to the specified folder.

Context
If the current License file used by the U2000 becomes invalid due to a License initialization
failure, the exporting task can not executed, and users need to contact Huawei technical support
to update the License.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

160

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Procedure
Step 1 Choose Administration > Task Schedule > Task Management from the main menu
(traditional style); alternatively, double-click System Management in Application Center and
choose Task Schedule > Task Management from the main menu (application style).
Step 2 In the Take Type navigation tree, choose File Interface > OSS License Export.
Step 3 In the task list on the right, double-click the OSS License Export task.
Step 4 In the Attributes dialog box, set the parameters on the Common Parameters and Extended
Parameters tabs, and then click OK.

Step 5 Perform the OSS License Export task.


l

If Status of the task is Suspend, right-click the task and choose Resume from the shortcut
menu. Then right-click the task again and choose Run Now from the shortcut menu.

If Status of the task is Idle, right-click the task and choose Run Now from the shortcut
menu.

----End

1.17.8 Setting the NE Capacity Threshold for the U2000 License


When the proportion of the number of accessed NEs to the License capacity reaches the threshold
specified for the License capacity, the U2000 generates an alarm and periodically displays an
Information dialog box.

Procedure
Step 1 Choose Administration > Settings > Management Capacity Alarm Settings from the main
menu (traditional style); alternatively, double-click System Management in Application
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

161

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Center and choose Settings > Management Capacity Alarm Settings from the main menu
(application style).

Step 2 In the Management Capacity Alarm Settings dialog box, enter the License threshold in
Threshold.
Step 3 Optional: Select the Display periodical warning check box. In Warning interval(minutes),
set the interval.
Step 4 Click OK.
----End

Result
When the proportion of the number of accessed NEs to the License capacity reaches the threshold
specified for the License capacity, the U2000 generates The NE Capacity Reached the
Threshold Alarm and periodically displays an Information dialog box. When the proportion
is less than the threshold specified for the License capacity, the U2000 clears The NE Capacity
Reached the Threshold Alarm and the Information dialog box is not displayed any more.

1.17.9 Collecting Port Statistics of Service Licenses


This topic describes how to use the U2000 to collect port statistics of service licenses
automatically. The number of service license items that are consumed and charged is measured
by the number of ports that network services occupy. The automatic statistics collection enables
you to quickly obtain the service license usage.

Prerequisites
This operation applies only to the service licenses that are consumed and charged based on ports.

Context
l

License items are subtracted when you add a board rather than when you create a service.
The number of service license items is subtracted by the number of ports on the new board.

The U2000 checks the number of service license items at scheduled time every day and
enters the grace period when the number of remaining license items reaches the threshold.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

162

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

During the grace period, there is no restriction on your operations. When the grace period
expires, you cannot create services. However, existing services are still functioning
properly. Because the deleted services cannot be recreated, excise caution when deleting
the services.
l

The grace period ends for the U2000 when you update the service license with a new valid
one. If resources are still insufficient, the start and end time of the grace period are
recalculated.

The U2000 reports ALM-801 OSS License Beyond Limitation when it enters the grace
period. Contact your Huawei engineers for new licenses.

Service licenses do not restrict NE functions. That is, NE licenses are not affected by service
licenses.

Procedure
Step 1 Choose Help > License Management > Statistics of Service Ports from the main menu
(traditional style); alternatively, double-click System Management in Application Center and
choose License Management > Statistics of Service Ports from the main menu (application
style).
Step 2 In the Statistics of Service Ports dialog box, view the number of ports consumed in each service
license.
NOTE

Choose Help > License Management > License Information from the main menu (traditional style);
alternatively, double-click System Management in Application Center and choose License
Management > Licenes Information from the main menu (application style). In the License
Information dialog box, click the Resource Control Item tab and view Capacity, Consumption, and
Overflow Time of different resource control items in the current licenses.

Step 3 Optional: Click Advanced. In the Advanced Settings dialog box, view the number of free
inventory resources.
Step 4 Optional: Click Export and save the port statistics to a TXT, CSV, HTML, or XLS file.
----End

1.18 Starting the Web Client


Certain NEs must be configured by using the Web LCT. Before you configure services for these
NEs, you need to first start the Web LCT client.

Prerequisites
l

You are an NMS user with Operator Group authority or higher.

It is applicable to the OptiX OTU 40000, and OptiX OSN 900A.

Procedure
Step 1 Optional: Double-click an optical NE on the topology. The NE Panel is displayed. Select an
NE from the object tree on the left.
Step 2 Right-click an NE and choose Start WEB Client from the shortcut menu. The Web LCT user
interface is displayed.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

163

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

Enter the default user name proxyuser and password Changeme_123. If the user name and password need
to be changed, see Security Management > User Security Policy Management > Managing Web Proxy
Users in the U2000 System Administrator Guide.

----End

1.19 Starting the NE Data Collection


When an NE is faulty, you can collect the NE data for fault identification and analysis. There
are fast fault collection and full fault collection.

Prerequisites
l

You are an NMS user with Guests authority or higher.

It is applicable to the MSTP series, WDM series, WDM (NA) series, RTN series, PTN
series (except PTN 6900 series) and marine series NEs.

Context
NOTE

The product feature you have purchased may use personal information of users when providing services
or maintenance. Therefore, you are obligated to take considerable measures, in compliance with the laws
of the countries concerned and the user privacy policies of your company, to ensure that the personal data
of users is fully protected.

Procedure
Step 1 In the Main Topology, right-click an NE and choose Collect NE Data from the shortcut menu.
The Datacollector window is displayed.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

164

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

NOTE

In the Datacollector window, press F1 to display the Online Help topic relevant to data collection
operations and troubleshooting methods of common problems.

----End

1.20 Customizing Naming Rule


When you create fibers or trails, the U2000 automatically creates the names of the fibers, trails,
ASON trails, Tunnel, Tunnel protection group PWE3 Service and Native Ethernet E-Line
Service based on the naming rule. The settings can be modified according to actual requirements.
This section takes the fiber naming rule as an example to illustrate how to customize the naming
rule.

Context
l

Applies to the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series,
ATN series, Marine series, NE series, CX series and Access series NEs.

The naming rule is a string that comprises a series of fields. The U2000 provides some
fields by default. The user can add new fields, modify or delete the existing fields and adjust
the field position according to the actual requirements, to customize the naming rule.

Procedure
Step 1 Choose Administration > Settings > Naming Define Rule from the main menu (traditional
style); alternatively, double-click System Management in Application Center and choose
Settings > Naming Define Rule from the main menu (application style).
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

165

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

The Naming Define Rule dialog box is displayed.


Step 2 Choose the fiber or trail which want to be named from the Function Tree of Function
Configuration. The naming rule is displayed on the right-hand pane.
Step 3 Optional: Click Refresh to obtain the latest naming rule customized by other users.
Step 4 Click Create Rule and enter the name of the newly created rule in the first row.
Step 5 Add new fields.
1.

Right-click on the Field Descriptions list, and choose Add Field from the shortcut menu
to add a new field.

2.

Select the field type in the Type list and define its value.
There are four types of fields.
l Fixed Field: This type of field defines fixed strings contained in all names. Enter the
string in Fixed Field field.
l Connector Field: This type of field defines the connector used in the name. Select the
connector in the Connector Field field.
l Dynamic Field: In this type of field, you can select some attributes of the fiber or cable
and add the value to the name, for example, contain the name of Source NE in the
naming rule. Select the attributes in the Dynamic Field field.
l Digital Field: In this type of field, the numerals contained in the naming rule can be set
to change regularly so that the names of fibers or cables following the same rule is not
repeated. In the Digital Field field, set Current Value, Min. Value, Max. Value and
Step Length.
NOTE

It is recommended that there is only one Digital Field in the naming rule. If there are multiple digital
fields, it is recommended to set others to Fixed Field.

3.

Define the field name in the Name list.

4.

Define the field length in the Length list.

Step 6 Optional: Delete fields. Select the field to delete in the Field Descriptions list. Right-click it
and choose Delete Field from the shortcut menu.
Step 7 Optional: Set how the field is sequenced in the naming rule. Select the field and click
to move the field forward and click

to move it backward.

Step 8 Click Apply to set the current naming rule as the default rule on the client.
Step 9 In the Such As field, you can preview the current naming rule.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

166

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Step 10 Click Save to save the current naming rule and set it as the default rule.
Step 11 Click Apply to set whether to apply the current naming rule as the naming rule of the current
client.
----End

1.21 U2000 Process List


This topic describes the information about U2000 processes,such as the functions and dependent
processes of each process and the port occupied by each process.
l

The name of a multi-instance process contains numbers to distinguish from a process with
the same function. Table 1-16 shows a process with numbers omitted. For example,
ds_agent refers to the ds*_agent process,with the asterisk character (*) indicating a number.

Every instance is responsible for some independent service data. Stopping an instance will
certainly affect related services.

Table 1-16 shows the description of U2000 services and processes. Required Process specifies
the processes that a specified process depends on during startup. The System Monitor displays
the direct and indirect dependencies.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

167

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Table 1-16 U2000 process list

Issue 03 (2014-12-10)

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Active
MQ

ActiveMQ

ST_ActiveMQ,
server/
platform/
sacscript/
standalone

None

TCP,

serve
r/cbb/
nbi/
nbicb
b_3p/
activ
emq/
data/
activ
emq.l
og.*

ActiveMQ
Service. Provides
the northbound
interface which
supports JMS
notifications.

TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

168

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Agent
_COR
BA

Agent_CORB
A

Agent_CORB
A,server/nbi/
corba/bin

None

TCP,

serve
r/var/
logs/
Deve
lop/
nbi/
Agen
t_CO
RBA/
unbi_
corba
debu
g_%y
%m
%d_
%H
%M
%
S_*.*

CORBA Service.
This process
provides the
CORBA NBI
management
service.

TCP

serve
r/var/
logs/
Deve
lop/
nbi/
Agen
t_CO
RBA/
unbi_
corba
notif
y_%y
%m
%d_
%H
%M
%
S_*.*
serve
r/var/
logs/
Deve
lop/

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

169

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

nbi/
Agen
t_CO
RBA/
unbi_
corba
sys_
%y%
m%
d_%
H%
M%
S_*.*
serve
r/var/
logs/
Deve
lop/
nbi/
Agen
t_CO
RBA/
unbi_
debu
g_%y
%m
%d_
%H
%M
%
S_*.*
serve
r/var/
logs/
Deve
lop/
nbi/
Agen
t_CO
RBA/
unbi_
sys_
%y%

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

170

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

m%
d_%
H%
M%
S_*.*

Issue 03 (2014-12-10)

AgentI
ntegrat
e

AgentIntegrate

java,server/$
{IMAP_JAVA
_HOME}/bin

None

None

None

Integrate Interface
Service. Provide
integrate interface
service to uTraffic.

agt_cst
_xml

agt_cst_xml

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP

serve
r/var/
logs/
Deve
lop/
nbi/
xml2t
l1/
xml2t
l1.*

XML northbound
interface (non
MTOSI). This
process provides
XML NBI
Management
service for Access
NE(non MTOSI).

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

171

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BmsA
ccess

BmsAccess

BmsAccess,ser
ver/nemgr/
nemgr_access/
bin

mc

TCP

serve
r/var/
logs/
Deve
lop/
Bms
Acce
ss_*/
Bms
Acce
ss_%
y%m
%d_
%H
%M
%S.*

Access Device
Manager. This
process provides
the equipment
management of the
access domain.

serve
r/var/
logs/
Deve
lop/
Bms
Acce
ss_*/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
Bms
Acce
ss_*_
%y%
m%
d_%

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

172

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

173

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BmsAt
ur

BmsAtur

BmsAtur,serve
r/nemgr/
nemgr_access/
bin

mc

None

serve
r/var/
logs/
Deve
lop/
Bms
Atur_
*/
Bms
Atur_
%y%
m%
d_%
H%
M%
S.*

Access Device
ATUR Manager.
This process
provides the xDSL
terminal
management
service.

serve
r/var/
logs/
Deve
lop/
Bms
Atur_
*/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
Bms
Atur_
*_p8
6_%y
%m
%d_

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

174

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

%H
%M
%S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

175

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BmsC
ommo
n

BmsCommon

BmsCommon,s
erver/nemgr/
nemgr_access/
bin

mc,lic
_agen
t

TCP

serve
r/var/
logs/
Deve
lop/
Bms
Com
mon/
Bms
Com
mon_
%y%
m%
d_%
H%
M%
S.*

Access Device
Common Service.
This process
provides license,
task
scheduling,etc.
management of the
access domain.

serve
r/var/
logs/
Deve
lop/
Bms
Com
mon/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p2
42_%
y%m

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

176

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

%d_
%H
%M
%S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

177

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BmsH
GMPD
m

BmsHGMPDm

BmsHGMPDm
,server/nemgr/
nemgr_access/
bin

None

None

serve
r/var/
logs/
Deve
lop/
Bms
HGM
PDm/
Bms
HGM
PDm
_%y
%m
%d_
%H
%M
%S.*

HGMP Manager
Process. HGMP
manager service
provides the
function of
managing HGMP

serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p2
34_%
y%m
%d_
%H
%M
%S.*
BmsN
mCom
mon

Issue 03 (2014-12-10)

BmsNmComm
on

BmsNmComm
on,server/
common/
access/bin

None

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

None

Access Network
Manager. Supports
Access network
manage
functions.Including the functions of
Access network
searching.

178

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BmsPo
nAlar
mTL1

None

BmsPonAlarm
TL1,/nemgr/
nemgr_access/
bin

mc,lic
_agen
t

TCP,

serve
r/var/
logs/
Deve
lop/
Bms
PonA
larm
TL1

PON TL1 Alarm


Process. This
process provides
PON TL1 Alarm
NBI Management
service.

TCP,
TCP

serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p4
008_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

179

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BmsPo
nEmsT
L1

BmsPonEmsT
L1

BmsPonEmsT
L1,server/
nemgr/
nemgr_access/
bin

mc,lic
_agen
t

TCP,

serve
r/var/
logs/
Deve
lop/
Bms
PonE
msT
L1

Access PON TL1


Processs. Provides
service
provisioning and
fault diagnosis for
PON TL1 services.

TCP,
TCP

serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p4
007_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

180

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BmsTe
st

BmsTest

BmsTest,server
/nemgr/
nemgr_access/
bin

mc

None

serve
r/var/
logs/
Deve
lop/
Bms
Test

Access Device
Line Test. This
process provides
line test of the
access domain.

serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p7
9_%y
%m
%d_
%H
%M
%S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

181

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BmsTi
mingT
ask

BmsTimingTas
k

BmsTimingTas
k,server/
nemgr/
nemgr_access/
bin

mc

None

serve
r/var/
logs/
Deve
lop/
Bms
Timi
ngTa
sk/
Bms
Timi
ngTa
sk_%
y%m
%d_
%H
%M
%S.*

TL1 Timing Task


Manager. This
process provides
TL1 timing task
management.

serve
r/var/
logs/
Deve
lop/
Bms
Timi
ngTa
sk/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p3

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

182

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

8_%y
%m
%d_
%H
%M
%S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

BmsW
ebServ
ice

BmsWebServi
ce

BoxS
WMgr
Dm

BoxSWMgrD
m

java,server/$
{IMAP_JAVA
_HOME}/bin

None

BoxSWMgrD
m,server/
nemgr/
nemgr_switch
mgr/
switchmgr_box
/bin

None

TCP,

None

Access Web
Service. This
process provides
web service for the
access domain.

serve
r/var/
logs/
Deve
lop/
BoxS
WMg
rDm/
BoxS
WMg
rDm_
%y%
m%
d_%
H%
M%
S.*

Case-shaped
Switch NE
Management.
Manages caseshaped Quidway
switches.

TCP,
TCP

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

183

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

BulkC
ollecto
rDm

BulkCollector
Dm_*

BulkCollector
Dm,server/
common/
pmscollector/
bin

None

TCP

serve
r/log/
Bulk
Colle
ctor*.
log

Bulk Collector.
This process
provides the
function of
collecting
performance data
in batches.

catserv
er

catserver

java,server/
base_service/
catserver

None

None

serve
r\var
\logs
\catse
rver

Category Service.
Provide categore
service about
resource.

cdc

cdc

java,None

None

None

None

Configuration Data
Center. System
configuration data
center, providing
centralized
managing/
querying of system
configuration data
of U2000.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

184

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

CFMS
iDm

CFMSiDm

CFMSiDm,ser
ver/common/
access_commo
n/pccw112/bin

mc

TCP,

serve
r/var/
logs/
Deve
lop/
CFM
SiDm
/
CFM
SiDm
_%y
%m
%d_
%H
%M
%S.*

Customer Feature
Management NBI.
This process
provides Customer
Feature
Management NBI
service.

TCP

serve
r/var/
logs/
Deve
lop/
CFM
SiDm
/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p8
1_%y
%m
%d_

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

185

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

%H
%M
%S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

186

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

cltsi

None

cltsi,server/
common/
access_commo
n/pccw112/bin

mc

TCP

serve
r/var/
logs/
Deve
lop/
cltsi/
cltsi_
%y%
m%
d_%
H%
M%
S.*

Access 112 Test


(CLTSi). This
process provides
the CLTSi 112 test.

serve
r/var/
logs/
Deve
lop/
cltsi/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
cpgrap
h

Issue 03 (2014-12-10)

cpgraph

java,server/
combine_servi
ce/boardgraph

None

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

var
\logs
\Devl
og
\boar
dgrap
h

Board Graph
Application. Board
Graph Application

187

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

dam

dam

dam,server/
common/
frame/dam/bin

None

None

serve
r/var/
logs/
Deve
lop/
dam/
dam_
%y%
m%
d_%
H%
M%
S.*

Device Access
Manager. Creates
SNMP NEs.

datacol
lectors
vr

datacollectorsv
r

datacollectorsv
r,server/tools/
datacollector/
bin

None

None

serve
r/
tools/
datac
ollect
or/
log/
Datac
ollect
orlog
/*.*

NE Data Collector
Process. The
Datacollector is
mainly used for
collecting the
complete and
correct fault data in
case of NE failure
and helps to locate
faults quickly

serve
r/
tools/
datac
ollect
or/
log/
Scrip
tLog/
*.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

188

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

DCSer
ver

DCServer

DCServer,serv
er/common/dc/
bin

None

TCP,

serve
r/var/
logs/
Deve
lop/
DCS
erver/
DCS
erver
*.log

DC. This process


provides the
function of NE
software
management and
disaster recovery
management. The
detailed functions
are NE software
upgrade, patch
installation, data
backup and
recovery for
disaster recovery,
and plug-andplay
automatic upgrade
of case-shaped
equipment.

UDP,
TCP,
TCP

serve
r/var/
logs/
Deve
lop/
DCS
erver/
Boot
Log*
.log
serve
r/var/
logs/
Deve
lop/
DCS
erver/
Bms_
ne*_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
Deve
lop/
DCS
erver/
Dms
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

189

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

_ne*
_%y
%m
%d_
%H
%M
%S.*
serve
r/var/
logs/
Deve
lop/
DCS
erver/
tkdll_
log/
serve
r/var/
logs/
Deve
lop/
DCS
erver/
back
up*/
DmsB
aseDm

Issue 03 (2014-12-10)

DmsBaseDm

DmsBaseDm,s
erver/common/
ip/base/bin

None

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/var/
logs/
Deve
lop/
Dms
Base
Dm/
*.log

Basic IP Service.
Provides basic IP
services, such as
link search, system
log, interface
inventory, and
change audit.

190

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

DmsN
etAclD
m

DmsNetAclD
m

DmsNetAclD
m,server/
common/ip/
base/acl/bin

None

None

serve
r/var/
logs/
Deve
lop/
Dms
NetA
clDm
/
Dms
NetA
clDm
_%y
%m
%d_
%H
%M
%S.*

NetACL.
Configures ACLs
for multiple NEs in
batches.

DrlDm

DrlDm

DrlDm,server/
common/
syslog/bin/

None

None

serve
r/var/
logs/
iMA
P.log
_age
nt.tra
ce

NE Run Log. NE
Run Log

serve
r/var/
logs/
mrbl
og/
DrlD
m_p4
99_%
y%m
%d_
%H
%M
%S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

191

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

ds_age
nt

DesktopServic
e

None

None

TCP,

serve
r/var/
logs/
ds/
ds*/
deskt
op_d
s*_Y
YYY
MM
DDh
hmm
ss*.lo
g

Desktop Service
Process. Supports
data presentation
and operations on
various types of
client interfaces,
such as Java and
Web interfaces.
Multiple DSs can
be deployed to
reduce pressure on
the server to
connect to a large
number of clients.

TCP,
TCP,
TCP,
TCP,
TCP,
TCP

serve
r/var/
logs/
ds/
ds*/
deskt
op_st
artup
_ds*.
log

Issue 03 (2014-12-10)

eam_a
gent

EAMService

imapsvcd,serve
r/platform/bin

None

None

serve
r/var/
logs/
iMA
P.ea
m_ag
ent.tr
ace

EAM Process.
Maintains a global
NE list for NE
management.

eam_a
gent

TopoService

imapsvcd,serve
r/platform/bin

EAM
Servic
e

TCP,

None

Topo Process.
Provides the
functions of
topology
management.

TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

192

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

emaucl
ient

emauclient

java,server/
base_service/
emau/
emau_client

None

None

serve
r\var
\logs
\Dev
elop
\ema
u
\trace
--%y
%m
%d_
%H
%M
%
S.log

Device Quick
Adapter Client.
NM node device
static data auto
upgrate

emaus
erver

emauserver

java,server/
base_service/
emau/
emau_server

None

TCP

serve
r\var
\logs
\Dev
elop
\ema
u
\trace
--%y
%m
%d_
%H
%M
%
S.log

Device Quick
Adapter Server.
NM node device
static data auto
upgrate

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

193

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

EmfG
nlDev
Dm

EmfGnlDevD
m

EmfGnlDevD
m,server/
common/topo/
lbin

None

None

var/
logs/
iMA
P.Em
fGnl
Dev
Dm.t
race

General Device
Process. Provides
the function of
managing thirdparty NEs.

var/
logs/
mrbl
og/
iMA
PGnl
Dev_
p48_
YYY
MM
DD_
hhm
mss.l
og

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

194

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Eml_C
acheSv
r

Eml_CacheSvr

java,server/$
{IMAP_JAVA
_HOME}/bin

None

None

serve
r/var/
logs/
Deve
lop/
uflig
ht_tra
ns_da
tacac
he/
com
muni
cate%y.
%m.
%d%H.
%M.
%S.*

Transmit Data
Cache. This
process provides
the data cache of
NEs, boards, ports
and etc. for client.

serve
r/var/
logs/
Deve
lop/
uflig
ht_tra
ns_da
tacac
he/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

195

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Eml_D
CCVie
w

Eml_DCCVie
w

Eml_DCCVie
w,server/tools/
dccview/bin

None

None

serve
r/var/
logs/
Deve
lop/
Eml_
DCC
View
/
Eml_
DCC
View
_%y
%m
%d_
%H
%M
%S.*

DCC View Tool.


Transmit Ne
communication
DCC view
Management.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

196

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Eml_D
evCmd
Svr

Eml_DevCmd
Svr

java,server/
common/
trans_mmlserv
er

None

None

serve
r/var/
logs/
Deve
lop/
uflig
ht_tra
ns_m
mlser
ver/
com
muni
cate%y.
%m.
%d%H.
%M.
%S.*

Transmit NE
Commad service.
Support MML
command service
for transmit NE.

serve
r/var/
logs/
Deve
lop/
uflig
ht_tra
ns_m
mlser
ver/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

197

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Eml_f
aultdia
g

Eml_faultdiag

Eml_faultdiag,
server/
common/
trans_faultdiag
/controller/
plugins

None

None

serve
r/var/
logs/
Deve
lop/
uflig
ht_ne
mgr_
diagn
osis/
com
muni
cate%y.
%m.
%d%H.
%M.
%S.*

Diagnosis of
transport packet
services. Provides
fault diagnosis for
transport packet
services, covering
the PWE3 E-Line
services of the
OptiX RTN 905,
OptiX RTN 910,
OptiX RTN 950,
OptiX RTN 980,
OptiX OSN 500,
OptiX OSN 550,
OptiX OSN 3500,
OptiX OSN 7500,
OptiX OSN
7500II, and OptiX
OSN 8800, and the
Native Ethernet ELine services of the
OptiX RTN 310,
OptiX RTN 905,
OptiX RTN 910,
OptiX RTN 950,
OptiX RTN 980,
OptiX OSN 500,
and OptiX OSN
550.

serve
r/var/
logs/
Deve
lop/
uflig
ht_ne
mgr_
diagn
osis/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

198

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Eml_f
aultdia
gtsk

Eml_faultdiagt
sk

Eml_faultdiagt
sk,server/
common/
trans_faultdiag
/bin

None

None

serve
r/var/
logs/
Deve
lop/
trans
_fault
diag/
com
muni
cate%y.
%m.
%d%H.
%M.
%S.*

---. Provides the


function to
diagnose transport
packet services.
Only PWE3 ELine service of the
Optix RTN910,
RTN950 and
RTN980
equipments is
supported.

serve
r/var/
logs/
Deve
lop/
trans
_fault
diag/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

199

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

EML_
GNEP
roxy

EML_GNEPro
xy

EML_GNEPro
xy,server/
common/
trans_core/bin

None

TCP,

serve
r/var/
logs/
Deve
lop/
EML
_GN
EPro
xy/
EML
_GN
EPro
xy_%
y%m
%d_
%H
%M
%S.*

Transmit GNE
Proxy. This
process provides
the function of
Connection service
for Transmit GNE.

Eml_
mml

Eml_mml

Eml_mml,serv
er/nbi/mml/bin

None

serve
r/var/
logs/
Deve
lop/
Eml_
mml/
Eml_
mml_
%y%
m%
d_%
H%
M%
S.*

MML Service.
This process
provides the MML
NBI service.

TCP

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

200

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Eml_P
erfSvr

Eml_PerfSvr

Eml_PerfSvr,s
erver/common/
trans_core/bin

None

None

serve
r/var/
logs/
Deve
lop/
Eml_
PerfS
vr/
Eml_
PerfS
vr_%
y%m
%d_
%H
%M
%S.*

Transmit
Performance
Service. This
process provides
the transferdomain
performance
management
function.

Eml_P
ubSvr

Eml_PubSvr

Eml_PubSvr,se
rver/common/
trans_core/bin

None

None

serve
r/var/
logs/
Deve
lop/
Eml_
PubS
vr/
Eml_
PubS
vr_%
y%m
%d_
%H
%M
%S.*

Transmit Common
Service. This
process provides
the function of
inter-NE
management on
transferdomain
NEs and reports.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

201

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Enpow
erDm

EnpowerDm

EnpowerDm,se
rver/common/
env/bin

None

None

serve
r/var/
logs/
Deve
lop/
Enpo
werD
m/
back
up*/

Access
environment and
power monitor.
This process
provides the
function of
centralized
monitoring on the
access NE
environment status
and the power
supply status.

serve
r/var/
logs/
Deve
lop/
Enpo
werD
m/
Enpo
werD
m_%
y%m
%d_
%H
%M
%S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

202

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Frame
SWMg
rDm

FrameSWMgr
Dm

FrameSWMgr
Dm,server/
nemgr/
nemgr_switch
mgr/
switchmgr_fra
me/bin

None

None

serve
r/var/
logs/
Deve
lop/
Fram
eSW
Mgr
Dm/
Fram
eSW
Mgr
Dm_
%y%
m%
d_%
H%
M%
S.*

Chassis-Shaped
Switch NE
Management.
Manages chassisshaped Quidway
switches.

ftpd

None

ftpd,/usr/sbin

None

None

/var/
logs/
vsftp
d.log

FTP Service. This


process provides
the FTP service.

/var/
log/
vsftp
dlogb
ak/
*.*
Gcli

Issue 03 (2014-12-10)

Gcli

Gcli,server/
common/ip/
gcli/bin

mc

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

None

IP Graphical CLI.
Provides GUI
command line
functions for
switches and
routers.

203

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Health
_check

Health_check

com.huawei.he
althcheck.webs
erver_1.0.0.jar,
server/
common/
health_check/
plugins

None

None

serve
r/var/
logs/
Deve
lop/
uflig
ht_he
alth_
check
/
com
muni
cate%y.
%m.
%d%H.
%M.
%S.*

PTN Health
Check. PTN
Health Check,
support Optix PTN
905, Optix PTN
910, Optix PTN
910-F, Optix PTN
950, Optix PTN
960, Optix PTN
1900, Optix PTN
3900-8, Optix PTN
3900.

serve
r/var/
logs/
Deve
lop/
uflig
ht_he
alth_
check
/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

204

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

hedex_
agent

None

None

None

None

var/
logs/
hede
x/
hede
x*.lo
g

Help Process.
Provides help
document.

httpd

apache

httpd,server/
3rdTools/
apache/bin

None

TCP,

serve
r/var/
logs/
apach
e/
apach
e.log

Apache Http
Service. Distribute
Http Request.

TCP

serve
r/var/
logs/
apach
e/
monit
or_ap
ache.
log
serve
r/var/
logs/
apach
e/
apach
ectl.l
og
serve
r/
3rdT
ools/
apach
e/
logs/
*.log

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

205

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

ifms_a
gent

FaultService

imapsvcd,serve
r/platform/bin

None

TCP,

var/
logs/
iMA
P.ifm
s_age
nt.tra
ce

Fault Process.
Collects and saves
fault information
from managed
devices using NE
engines, and
queries and
analyzes the fault
information.

TCP

var/
logs/
iMA
P.ifm
s_age
nt_pr
oduct
.trace
var/
logs/
iMA
P.ifm
s_age
nt_db
err.tr
ace
var/
logs/
mrbl
og/
ifms_
agent
_p56
_YY
YYM
MDD
_hhm
mss.l
og

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

206

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

imap_s
ysmon
itor

None

imap_sysmonit
or,server/
platform/bin

None

None

serve
r/var/
logs/
iMA
P.ima
psys
monit
or_pe
rf.tra
ce

System Monitor.
Provides service to
monitor the
process of the
system. This
process monitors
resources, which
include CPUs,
memory, hard
disks, services,
processes,
databases, and
generates alarms
when faults occur.

serve
r/var/
logs/
iMA
P.ima
p_sys
monit
or.tra
ce
serve
r/var/
logs/
iMA
P.ima
psys
monit
or_pe
rf.tra
ce
serve
r/var/
logs/
mrbl
og/
imap
_sys
monit
or_p6
6_%y
%m
%d_
%H
%M
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

207

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

%
S.log
imape
ventm
gr

None

imapeventmgr,
server/
platform/bin

None

None

serve
r/var/
logs/
iMA
P.ima
peve
ntmg
r.trac
e

Daemon Process
(Event Manager
Process). This
process forwards
events.

serve
r/var/
logs/
iMA
P.ima
peve
nts.tr
ace
imapm
rb

Issue 03 (2014-12-10)

None

imapmrb,serve
r/platform/bin

None

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.log

Daemon Process
(mrb Process).
This process
forwards
messages. This
process is a
daemon process.

208

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

imapsy
sd

None

imapsysd,serve
r/platform/bin

None

TCP,

var/
logs/
iMA
P.ima
psysd
.trace

Daemon Process.
This process is a
daemon process.

TCP

var/
logs/
mrbl
og/
iMap
Sysd
_p65
_YY
YM
MDD
_hhm
mss.l
og
imapw
atchdo
g

Issue 03 (2014-12-10)

None

imapwatchdog,
server/
platform/bin

None

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

None

Daemon Process
(watchdog
Process). This
process monitors
daemons.

209

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

inTL1
NBiD
m

inTL1NBiDm

inTL1NBiDm,
server/nemgr/
nemgr_access/
bin

mc

TCP

serve
r/var/
logs/
Deve
lop/
inTL
1NBi
Dm/
inTL
1NBi
Dm_
%y%
m%
d_%
H%
M%
S.*

TL1 Proxy Inner


Interface. This
process provides
the XML NBI
Proxy,Service
Provisioning
Profile
management.

serve
r/var/
logs/
Deve
lop/
inTL
1NBi
Dm/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p2
37_%
y%m

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

210

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

%d_
%H
%M
%S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*

Issue 03 (2014-12-10)

Invent
oryD
M

InventoryDM

InventoryDM,s
erver/common/
inventory/bin

None

None

serve
r/var/
logs/
Deve
lop/
Inven
toryD
M/
Inven
toryD
M_%
y%m
%d_
%H
%M
%S.*

Inventory
Manager. Provides
the management of
inventory data,
such as physical
resources, fibers/
cables, and
customers.

invent
orysvc

inventorysvc

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP

None

Inventory Service.
Inventory Servcie

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

211

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

ipcom
mon

ipcommon

ipcommon,serv
er/common/ip/
common/bin

sm_ag
ent

None

serve
r/var/
logs/
Deve
lop/
ipco
mmo
n/
ipco
mmo
n_%y
%m
%d_
%H
%M
%S.*

Common IP
Application
Management.
Provides common
IP services, such as
the diagnosis
function.

ipfpm_
cfg

IPFPM_CFG

ipfpm_cfg,serv
er/common/
pms/bin

None

None

None

IP Flow
Peformance
Management
Configuration.
Provide
configuration for
IPFPM (IP Flow
Peformance
Management).

is_age
nt

is_agent

java,server/
base_service/
is_agent

None

TCP,

serve
r\var
\logs
\Dev
elop
\isage
nt

Integrate System
Agent. provide
proxy and cache
service of data
from IS node

is_serv
er

is_server

java,server/
base_service/
is_server

isdb

serve
r/var/
logs/
is

Integrate Service.
Provide address
service and
configuration
service.

TCP

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

212

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

isdb

isdb

java,server/bin

None

TCP

serve
r/var/
logs/
isdb

Integrate System
Database. ISDB is
the third party open
source database
named h2 for
Integrate System.

itm_ag
ent

ItmService

imapsvcd,serve
r/platform/bin

None

TCP,

serve
r/var/
logs/
iMA
P.itm
_age
nt.tra
ce

Integrated Task
Management.
Provides the
functions of
integrated task
management.

TCP

serve
r/var/
logs/
mrbl
og/
itm_a
gent_
p999
2_%y
%m
%d_
%H
%M
%S.*
lic_age
nt

Issue 03 (2014-12-10)

LicenseService

imapsvcd,serve
r/platform/bin

None

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/var/
logs/
iMA
P.lic_
agent
.trace

License Process. A
service interface is
provided to check
the validity of the
license file of the
current version

213

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

log_ag
ent

LogService

imapsvcd,serve
r/platform/bin

None

None

serve
r/var/
logs/
iMA
P.log
_age
nt.tra
ce

Log Process.
Records and
manages operation
logs, system logs,
and security logs.

log_ag
ent

DolService

imapsvcd,serve
r/platform/bin

LogSe
rvice

TCP,

serve
r/var/
logs/
iMA
P.log
_age
nt.tra
ce

Log Process.
Records operation
logs of devices.

serve
rvar/
logs/
iMA
P.log
_age
nt.tra
ce

Syslogagent
Process. Forwards
OSS logs to thirdparty Syslog
servers over the
BSD Syslog
protocol.

TCP,
TCP

log_ag
ent

ForwardingSer
vice

imapsvcd,serve
r/platform/bin

LogSe
rvice

None

serve
r/var/
logs/
mrbl
og/
log_a
gent_
p46_
YYY
YM
MDD
_hhm
mss.l
og

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

214

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

manag
er_age
nt

SystemService

imapsvcd,serve
r/platform/bin

None

TCP,

serve
r/var/
logs/
iMA
P.ma
nager
_age
nt.tra
ce

System
Management
Process. Provides
OSS management
functions, for
example, version
checks for CAU
and management
of preferences and
broadcast
messages.

TCP

serve
r/var/
logs/
mrbl
og/
mana
ger_a
gent_
p999
0_%y
%m
%d_
%H
%M
%
S.log
mc

Issue 03 (2014-12-10)

mc

mc,server/
common/
frame/mc/bin

None

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/var/
logs/
Deve
lop/
mc/
mc_
%y%
m%
d_%
H%
M%
S.*

Distribution
Manager. Provides
basic NE
distribution
services.

215

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

msserv
er

msserver

msserver,/opt/
HWENGR

None

TCP,

None

Engineering
Process. This
process provides
the function of
component
installation,
package
deployment,
system upgrade,
patch installation,
data backup and
recovery for
iManager System.

serve
r/
tao.tr
ace

CORBA Naming
Service(TAO).
Provides Naming
Service for
CORBA interface
(TAO)

serve
r/
base_
servi
ce/
deplo
ytool/
var/
logs/
*.*

NBI Configure
Tools. This tool is
used to configure
U2000 CORBA/
MTOSI/SNMP/
TEXT North
Bound Interface
parameters.

serve
r/var/
logs/
Deve
lop/
nbi/
nbig
w_co
rba/
*.*

CORBA Service.
Providing OSS and
U2000 NM/EM
CORBA
subsystem
processes interact
IIOP packet
forwarding and
session
management in
U2000 distributed
architecture

TCP,
TCP,
TCP,
TCP,
TCP,
TCP,
TCP

Issue 03 (2014-12-10)

Namin
g_Serv
ice

Naming_Servi
ce

Naming_Servi
ce,server/cbb/
nbi/nbicbb_3p/
share/bin

None

nbi_co
nfigtoo
ls

nbi_configtool
s

startConfigToo
l_unix,server/
platform/
sacscript/
standalone

None

nbigw
_corba

nbigw_corba

nbigw_corba,s
erver/nbi/
corba/bin

None

TCP,
TCP

TCP,
TCP,
TCP

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

216

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

nbigw
_xml

nbigw_xml

nbigw_xml,ser
ver/nbi/xml/bin

None

TCP

serve
r/var/
logs/
Deve
lop/
nbi/
nbig
w_x
ml/
*.*

XML Service.
Provides MTOSI
2.0 SOAP
northbound
interface in U2000
distributed
architecture.

nelicS
erver

nelicServer

neLicServer,se
rver/common/
nelic/bin

None

None

serve
r/var/
logs/
Deve
lop/
neLic
Serve
r/
back
up*/

NE License
Management.
Provide the
function of NE
license
Management.

serve
r/var/
logs/
Deve
lop/
neLic
Serve
r/
neLic
Serve
r_%y
%m
%d_
%H
%M
%S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

217

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

nemgr
_bits

nemgr_bits

nemgr_bits,ser
ver/nemgr/
nemgr_bits/bin

None

None

serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p2
36_%
y%m
%d_
%H
%M
%S.*

BITS NE Manager.
This process
provides the
equipment
management of
BITS.

serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
Deve
lop/
nemg
r_bits
_%y
%m
%d_
%H
%M
%S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

218

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

nemgr
_isite

nemgr_isite

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP

None

iSite NE Manager .
This process
provides the
equipment
management of
iSite.

nemgr
_marin
e

nemgr_marine

nemgr_marine,
server/nemgr/
nemgr_marine/
bin

mc,lic
_agen
t

TCP,

serve
r/var/
logs/
Deve
lop/
nemg
r_ma
rine_
*/
nemg
r_ma
rine_
%y%
m%
d_%
H%
M%
S.*

MARINE NE
Manager. This
process provides
the function of
managing
submarine cable
series equipment.

TCP,
TCP,
TCP,
TCP,
TCP

serve
r/var/
logs/
Deve
lop/
nemg
r_ma
rine_
*/
alarm
_%y
%m
%d_
%H
%M
%S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

219

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

nemgr
_rps

nemgr_rps

nemgr_rps,serv
er/nemgr/
nemgr_rps/bin

None

TCP

None

RPS NE Manager.
This process
provides the
equipment
management of
RPS.

nemgr
_trans

nemgr_trans

nemgr_trans,se
rver/nemgr/
nemgr_trans/
bin

mc,lic
_agen
t

TCP,

serve
r/var/
logs/
Deve
lop/
nemg
r_tra
ns_*/
nemg
r_tra
ns_%
y%m
%d_
%H
%M
%S.*

Transmit NE
Manager. This
process provides
the function of
managing transmit
equipment.

TCP

serve
r/var/
logs/
Deve
lop/
nemg
r_tra
ns_*/
alarm
_%y
%m
%d_
%H
%M
%S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

220

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

nemgr
_v8ptn

nemgr_v8ptn

java,server/$
{IMAP_JAVA
_HOME}/bin/

mc

None

None

PTN Management
(VRP V8).
Provides the NE
management
function for VRP8based PTN
devices.

nemgr
_v8tra
ns

nemgr_v8trans

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP,

serve
r/var/
logs/
Deve
lop/
uflig
ht_ne
mgr_
v8tra
ns_*/
*-%y
%m
%d_
%H
%M
%S.*

Transmit Network
Element(VRP V8)
Management.
Manages Transmit
NEs(VRP V8).

TCP,
TCP,
TCP

serve
r/var/
logs/
Deve
lop/
uflig
ht_ne
mgr_
v8tra
ns_*/
nemg
r_v8t
rans/
*-%y
%m
%d_
%H
%M
%S.*

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

221

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Nemgr
_vmf

Nemgr_vmf

Nemgr_vmf,se
rver/nemgr/
nemgr_vmf/bin

mc

TCP,

serve
r/var/
logs/
Deve
lop/
uflig
ht_ne
mgr_
vmf_
serve
r/.*

Router
Management (VRP
V8). Manages
VRP V8 routers.

TCP,
TCP,
TCP

Issue 03 (2014-12-10)

neprox
y

neproxy

neproxy,server/
tools/
datacollector/
bin

None

None

serve
r/
tools/
datac
ollect
or/
log/
nepro
xylog
/*.*

Data Collector NE
Proxy Process.
Data Collector NE
Proxy Process

netcon
fproxy

netconfproxy

netconfproxy,s
erver/server/
common/sbi/
netconfproxy/
bin

None

None

None

netconfproxy. .

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

222

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Nml_a
son_ot
n

Nml_ason_otn

Nml_ason_otn,
server/nml/
ason_otn/bin

Eml_
PubSv
r,lic_a
gent

None

serve
r/var/
logs/
Deve
lop/
Nml_
ason_
otn/
Nml_
ason_
otn_
%y%
m%
d_%
H%
M%
S.*

OTN ASON
Network Manager.
This process
provides the OTN
ASON network
management
function.

Nml_a
son_sd
h

Nml_ason_sdh

Nml_ason_sdh,
server/nml/
ason_sdh/bin

Eml_
PubSv
r,lic_a
gent

None

serve
r/var/
logs/
Deve
lop/
Nml_
ason_
sdh/
Nml_
ason_
sdh_
%y%
m%
d_%
H%
M%
S.*

SDH ASON
Network Manager.
This process
provides the SDH
ASON network
management
function.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

223

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Nml_c
ommo
n

Nml_common

Nml_common,
server/nml/
nmlcommon/
bin

lic_ag
ent,s
m_ag
ent

None

serve
r/var/
logs/
Deve
lop/
Nml_
com
mon/
Nml_
com
mon_
%Y
%m
%d_
%H
%M
%
S.log

Network Common
Service. This
process provides
the E2E common
management
service. The other
E2E processes all
depend on this
process.

Nml_c
ps

Nml_cps

Nml_cps,serve
r/nml/nmlcps/
bin

lic_ag
ent,s
m_ag
ent

None

serve
r/var/
logs/
Deve
lop/
Nml_
cps/
Nml_
cps_
%Y
%m
%d_
%H
%M
%
S.log

Composite Service
Manager. Supports
management of
composite services
and Router/Switch/
PTN/MSTP/
MSTP NEs.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

224

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Nml_e
ow

Nml_eow

Nml_eow,serv
er/nml/nmleth/
bin

Nml_
comm
on

None

serve
r/var/
logs/
Deve
lop/
Nml_
eow/
Nml_
eow_
%Y
%m
%d_
%H
%M
%S.*

EoW and EoO.


Provides the endto-end Ethernet
service
management
function for the
EoW/EoO
equipment, which
helps to quickly
configure or
maintain EPL,
EVPL, EPLAN,
RPR EVPL, RPR
EVPLAN, and
ATM services.

Nml_e
th

Nml_eth

Nml_eth,server
/nml/nmleth/
bin

None

None

serve
r/var/
logs/
Deve
lop/
Nml_
eth/
Nml_
eth_
%Y
%m
%d_
%H
%M
%S.*

MSTP ETH and


ATM. Supports
end-to-end
configuration of
EPL, EVPL,
EPLAN, RPR
EVPL, RPR
EVPLAN, and
ATM services.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

225

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Nml_i
p

Nml_ip

Nml_ip,server/
nml/nmlip/bin

lic_ag
ent,s
m_ag
ent

None

serve
r/var/
logs/
Deve
lop/
Nml_
ip/
Nml_
ip_%
Y%m
%d_
%H
%M
%
S.log

IP Service
Manager. Supports
management of IP
services and
Router/Switch/
PTN/MSTP+/RTN
NEs.

Nml_n
ativeet
h

Nml_vlan

Nml_nativeeth,
server/nml/
nmlvlan/bin

None

None

serve
r/var/
logs/
Deve
lop/
Nml_
vlan/
Nml_
vlan_
%Y
%m
%d_
%H
%M
%S.*

Nativeeth Service
Manager. Provides
the end-to-end
nativeeth
management.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

226

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Nml_o
tn

Nml_otn

Nml_otn,server
/nml/nmlotn/
bin

Nml_
comm
on,lic
_agen
t,sm_
agent

None

serve
r/var/
logs/
Deve
lop/
Nml_
otn/
Nml_
otn_
%Y
%m
%d_
%H
%M
%S.*

OTN Network
Manager. Supports
end-to-end
configuration of
WDM services of
OCh, ODUk and
Client levels.

serve
r/var/
logs/
Deve
lop/
Nml_
otn/
Nml_
otn_
wdmt
railse
archl
og*.*
Nml_s
dh

Issue 03 (2014-12-10)

Nml_sdh

Nml_sdh,serve
r/nml/nmlsdh/
bin

None

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/var/
logs/
Deve
lop/
Nml_
sdh/
Nml_
sdh_
%Y
%m
%d_
%H
%M
%S.*

SDH Network
Manager. Supports
end-to-end
configuration of
microwave
services and SDH
services of VC12,
VC3, VC4, and
VC4-Xc levels.

227

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Nmslo
gzipD
m

NmslogzipDm

NmslogzipDm,
server/
common/
nmslogzip/bin

None

None

serve
r/var/
logs/
Deve
lop/
Nmsl
ogzip
Dm/
Nmsl
ogzip
Dm_
unnor
mal.l
og

Zip Server.
Provides the
function of
compressing files.

serve
r/var/
logs/
Deve
lop/
Nmsl
ogzip
Dm/
Nmsl
ogzip
Dm_
%y%
m%d
%H
%M
%
S_un
norm
al.*
Notify
_Servi
ce

Issue 03 (2014-12-10)

Notify_Service

Notify_Service
,server/cbb/nbi/
nbicbb_3p/
share/bin

None

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/
tao.tr
ace

CORBA
Notification
Service(TAO).
Provides Notify
Service for
CORBA interface
(TAO)

228

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

oams

oams

oams,server/
tools/
oamsserver/bin

None

None

serve
r/var/
logs/
Deve
lop/
oams
/
oams
_%y
%m
%d_
%H
%M
%S.*

Optical fiber line


Automatic
Monitoring
System. Monitor
fiber connect state

PathVi
ewerD
m

PathViewerDm

PathViewerDm
,server/
common/ip/
path/bin

None

None

serve
r/var/
logs/
Deve
lop/
Path
View
erDm
/
Path
View
erDm
_%y
%m
%d_
%H
%M
%S.*

Visualized IP
Trail. Provides
visualized IP
service trails.

phyinv
dm

phyinvdm

java,server/$
{IMAP_JAVA
_HOME}/bin

None

None

None

Physical inventory
application.
Physical inventory
application

phyinv
tcollec
tor

phyinvtcollecto
r

java,server/$
{IMAP_JAVA
_HOME}/bin

None

None

None

physical inventory
collector. physical
inventory collector

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

229

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

PMDat
aRecei
ver

PMDataReceiv
er

ST_PMDataRe
ceiver,server/
platform/
sacscript/
standalone

None

TCP

None

Remote Data
Receiver. This
process provides
the function of
receive
performance data
that collected by
other server to
local folder.

PMDat
aRefin
er

PMDataRefine
r

PMDataRefine
r,server/
common/pms/
bin

None

None

/var/
logs/
Deve
lop/
PMD
ataRe
finer/
PMD
ataRe
finer
_%Y
%m
%d_
%H
%M
%
S.log

Performance Data
Refiner. This
process provides
the function to
generate big timegranularity
performance data
through
aggregating small
time-granularity
performance data.

PMDat
aSync
hroniz
er

PMDataSynchr
onizer

PMDataSynchr
onizer,server/
common/pms/
bin

None

None

None

Remote Data
Synchronizer. This
process provides
the function of
importing
performance data
that collected by
other server.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

230

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

PMRe
sMgr

PMResMgr

PMResMgr,ser
ver/common/
pms/bin

None

None

serve
r/var/
logs/
Deve
lop/
PMR
esMg
r/
PMR
esMg
r*.lo
g

PM Resource
Management. This
process provides
the function of
resource
management.

PMSD
m

PMSDm

PMSDm,server
/common/pms/
bin

None

TCP

serve
r/log/
PMS
*.log

Performance
Service. This
process provides
the collector
management
function.

PMS
Web

PMSWeb

com.huawei.p
msweb.framew
ork_1.0.0,serve
r/common/
pms/pmsweb/
plugins/
com.huawei.p
msweb.framew
ork_1.0.0

None

TCP

None

Performance Web
Service. Provide
web access to
browse
performance data

PonAl
armTL
1GW

PonAlarmTL1
GW

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP,

None

PON Alarm TL1


NBI Gateway. This
process provides
PON Alarm TL1
NBI Gateway
service for Access
NE.

PonE
msTL1
GW

PonEmsTL1G
W

java,server/$
{IMAP_JAVA
_HOME}/bin

None

None

PON TL1 NBI


Gateway. This
process provides
PON TL1 NBI
Gateway service
for Access NE.

TCP

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

231

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

porttru
nk_age
nt

PortTrunkingS
ervice

imapPortTrunk
Svc,server/
platform/bin

None

TCP

serve
r/var/
logs/
iMA
P.Por
tTrun
kServ
ice.tr
ace

Port Trunk
Service . The port
trunking service is
used to have the
ports of
independent
services converge
at one port.

serve
r/var/
logs/
mrbl
og/
imap
PortT
runk
Svc_
p989
8_%y
%m
%d_
%H
%M
%
S.log
profile

Issue 03 (2014-12-10)

profile

profile,server/
common/
frame/profile/
bin

mc

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/var/
logs/
Deve
lop/
profil
e/*_
%y%
m%
d_%
H%
M%
S.*

Global Profile
Manager. Manages
profiles..

232

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

qbridg
e

qbridge

java,server/
base_service/
qbridge

None

TCP

var
\logs
\Devl
og
\qbri
dge

Message Bridge
Service. Message
forward and event
forward between
nodes

quickd
isplay

quickdisplay

java,server/$
{IMAP_JAVA
_HOME}/bin

mc

None

None

quickdisplay.
Provides
quickdisplay web
service.

Resour
ceMon
itor

None

ResourceMonit
or,server/
platform/bin

None

UDP

var/
logs/
iMA
P.res
ource
monit
or.tra
ce

Daemon Process
(Resource
Monitor). This
process is a
resource
monitoring agent
used to monitor
resources. This
process must be
deployed on nodes
whose resources
are to be
monitored. This
process is a
daemon process. It
is not monitored by
the System
Monitor.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

233

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Router
MgrD
m

RouterMgrDm

RouterMgrDm,
server/nemgr/
nemgr_router/
routermgr/bin

None

None

serve
r/var/
logs/
Deve
lop/
Rout
erMg
rDm/
Rout
erMg
rDm_
%y%
m%
d_%
H%
M%
S.*

Router NE
Management.
Manages Quidway
routers.

secdev
regdm

secdevregdm

secdevregdm,s
erver/vsm/
seccomm/
secdevreg/bin

None

None

serve
r/var/
logs/
Deve
lop/
secde
vregd
m/
secde
vregd
m_%
y%m
%d_
%H
%M
%S.*

Security Device
Register Manager.
Security Device
Register Manager

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

234

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

secpoli
cymgr

secpolicymgr

secpolicymgr,s
erver/vsm/
secpolicymgr/
bin

None

None

serve
r/var/
logs/
Deve
lop/
secpo
licym
gr/
secpo
licym
gr_%
y%m
%d_
%H
%M
%S.*

Policy Manager.
This process
provides the
functions such as
centralized policy
configuration and
attack defense
configuration.

Securit
yMgr
Dm

SecurityMgrD
m

SecurityMgrD
m,server/
nemgr/
nemgr_securitymgr/bin

None

None

serve
r/var/
logs/
Deve
lop/
Secur
ityM
grDm
_180/
Secur
ityM
grDm
_%y
%m
%d_
%H
%M
%S.*

Security NE
Manager. This
process provides
the function of
managing FW/
USG, SIG, and
SVN series
security
equipment.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

235

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Issue 03 (2014-12-10)

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

secvpn
mgr

secvpnmgr

secvpnmgr,ser
ver/vsm/
secvpnmgr/bin

None

UDP

serve
r/var/
logs/
Deve
lop/
secvp
nmgr
/
secvp
nmgr
_%y
%m
%d_
%H
%M
%S.*

VPN Manager.
This process
provides the IPSec/
L2TP VPN
management
function.

sm_ag
ent

SecurityServic
e

sm_agent,serve
r/platform/bin

None

TCP,

iMA
P.sm
_age
nt.tra
ce

Security Process.
Provides the
functions of
managing network
management
system (NMS)
users, NMS user
rights, and NE user
rights.

smldap
_agent

SMLDAPServi
ce

smldap_agent,s
erver/platform/
bin

sm_ag
ent

None

SMLDAPService.
Provides the LDAP
northbound
interfaces for
managing OSS
accounts.

TCP

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

236

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

snmpa
gent

SnmpAgent

ST_SNMPAge
nt,server/
platform/
sacscript/
standalone

Securi
tyServ
ice

UDP,

serve
r/var/
logs/
nbi/
snmp
/
Snmp
Agen
t*.log

SNMP
Northbound
Interface. Provides
the northbound
interface which
adopts the SNMP
protocol.

UDP

serve
r/var/
logs/
nbi/
snmp
/
Snmp
Agen
t*.zip

Issue 03 (2014-12-10)

SNMP
Collect
orDm

SNMPCollecto
rDm_*

SNMPCollecto
rDm,server/
common/
pmscollector/
bin

None

None

serve
r/log/
SNM
PColl
ector
*.log

SNMP Collector.
This process
provides the
function of
collecting
performance data
through SNMP.

SNMP
Server

SNMPServer

SNMPServer,s
erver/common/
ip/base/bin

None

None

None

SNMP Service
(H3C). Forwards
SNMP services for
H3C switches.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

237

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

StdClt
siDm

StdCltsiDm

StdCltsiDm,ser
ver/common/
access_commo
n/std112/bin

BmsT
est

TCP,

serve
r/var/
logs/
Deve
lop/
StdCl
tsiD
m/
StdCl
tsiD
m_%
y%m
%d_
%H
%M
%S.*

Access 112 Test .


This process
provides the 112
test.

TCP

serve
r/var/
logs/
Deve
lop/
StdCl
tsiD
m/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p8
8_%y
%m
%d_

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

238

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

%H
%M
%S.*
Syslog
Collect
orDM

Issue 03 (2014-12-10)

SyslogCollectorDM

SyslogCollecto
rDM,server/
common/
syslog/bin

None

UDP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/var/
logs/
mrbl
og/
Syslo
gColl
ector
Dm_
p302
1_%y
%m
%d_
%H
%M
%
S.log

System Log
Collector. This
process provides
the function of
collecting NE
operation and
running log data,
and managing
files.

239

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

textage
nt

textagent

textagent,serve
r/nbi/text/bin

None

TCP

serve
r/var/
logs/
Deve
lop/
nbi/
texta
gent/
text_
debu
g-%
y.%
m.%
d-%
H.%
M.%
S.*

Text Service. This


process provides
the Text NBI
management
service.

serve
r/var/
logs/
Deve
lop/
nbi/
texta
gent/
com
muni
cate_
text%y.
%m.
%d%H.
%M.
%S.*
serve
r/var/
logs/
Deve
lop/
nbi/
texta
gent/

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

240

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

doma
in_de
bug_t
ext%y.
%m.
%d%H.
%M.
%S.*
serve
r/var/
logs/
Deve
lop/
nbi/
texta
gent/
uflig
ht_te
xt-%
y.%
m.%
d-%
H.%
M.%
S.*
TL1A
gent

TL1Agent

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP,

None

TL1 Agent.
Supports network
managent for
Access NBI
Gateway.

None

TL1 NBI Gateway.


This process
provides TL1 NBI
Gateway service
for Access NE.

TCP,
TCP,
TCP

TL1G
W

Issue 03 (2014-12-10)

TL1GW

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

241

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

TL1N
BiDm

TL1NBiDm

TL1NBiDm,se
rver/nemgr/
nemgr_access/
bin

mc

TCP,

serve
r/var/
logs/
Deve
lop/
TL1
NBi
Dm/
TL1
NBi
Dm_
%y%
m%
d_%
H%
M%
S.*

TL1NBiDm
Process. This
process provides
TL1 NBI
Management
service.

TCP,
TCP

serve
r/var/
logs/
Deve
lop/
TL1
NBi
Dm/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p4
7_%y
%m

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

242

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Proce
ss
Name

Service Name

Executable
Files and Path

1 Getting Started

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

%d_
%H
%M
%S.*
serve
r/var/
logs/
mrbl
og/
iMA
PMrb
_p2_
%y%
m%
d_%
H%
M%
S.*
tomcat

toolkit

tomcat

ToolkitService

tomcat,server/
3rdTools/
tomcat/bin

None

toolkit,server/
common/
toolkit/server

None

TCP,
TCP,
TCP

TCP,
TCP,
TCP,
TCP

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

com
mon/
Tomc
at/
logs/
*.%
y-%
m-%
d.log

Tomcat Service.
This process
provides Web
services.

serve
r/var/
logs/
Deve
lop/
DCS
erver/
tkser
ver_l
og/
debu
g*.lo
g

Toolkit. This
process provides
the service of
upgrading
boardlevel
transmission
equipment.

243

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

Trans
NmCo
mmon

TransNmCom
mon

TransNmCom
mon,server/
common/
TransNmCom
mon/bin/
TransNmCom
mon

None

None

serve
r/var/
logs/
Deve
lop/
Trans
NmC
omm
on/
Trans
NmC
omm
on_%
y%m
%d_
%H
%M
%S.*

Transmit NM
Common Service.
This process
provides the
function of multiNE management,
such as alarm
template and script
management.

trapdis
patche
r

trapdispatcher

trapdispatcher,
server/
common/
trapdispatcher/
bin

None

UDP,

serve
r/var/
logs/
iMA
P.Tra
pDis
patch
er.tra
ce

Trap Dispatcher.
Receives and
dispatches traps.

UDP,
UDP

serve
r/var/
logs/
mrbl
og/
iMA
PBas
e_p4
5445
_%y
%m
%d_
%H
%M
%
S.log
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

244

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

trapr_a
gent

TrapReceiver

EmfTrapRecei
ver,server/
common/
trapreceiver/
bin

FaultS
ervice

None

var/
logs/
iMA
P.Em
fTrap
Recei
ver*.t
race

Trap Receiver
Process. Receives
traps that are sent to
the server over
SNMP.

var/
logs/
mrbl
og/
iMA
PTra
pRec
eiver
_p10
000_r
*_Y
YYY
MM
DD_
hhm
mss.l
og

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

245

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

TrapTr
ansPro
xy

TrapTransProx
y

TrapTransProx
y,server/
nemgr/
nemgr_access/
bin

None

TCP

serve
r/var/
logs/
Deve
lop/
Trap
Trans
ferPr
oxy/
Trap
Trans
Prox
y_%y
%m
%d_
%H
%M
%S.*

Access Trap
Transfer Proxy
Service. This
process provides
trap transfer proxy
management
service.

serve
r/var/
logs/
Deve
lop/
Trap
Trans
ferPr
oxy/
Boot
Log_
%y%
m%
d_%
H%
M%
S.*
TXTN
BIDm

Issue 03 (2014-12-10)

TXTNBIDm

TXTNBIDm,se
rver/common/
pms/bin

None

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

serve
r/log/
TXT
NBI*
.log

Text Export. This


process provides
the NBI function. It
is used to transmit
performance data
in the text format
through FTP.

246

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

uflight
_dispat
cher

uflight_dispatcher

java,server/$
{IMAP_JAVA
_HOME}/bin/
java

None

TCP,

serve
r/var/
logs/
Deve
log/
uflig
ht_di
spatc
her/
dispa
tcher%y%
m%
d_%
H%
M%
S.log

Java Application
Server Dispatcher.
Dispatches UFlight
web requests.

serve
r/var/
logs/
Deve
lop/
Unite
UitlD
M/
Unite
UitlD
M_%
y%m
%d_
%H
%M
%S.*

United Manager.
Provides basic
functions for the
inter-domain
NMS, such as
importing and
exporting scripts,
managing NE time,
synchronizing
NEs, and
managing NE
objects.

None

UTraffic adapter.
Support data
adapter interface
Between the
U2000 and
UTraffic

TCP,
TCP,
TCP,
TCP,
TCP,
TCP

Issue 03 (2014-12-10)

Unite
UitlD
M

UniteUitlDM

UTraff
icAdap
ter

UTrafficAdapt
er

UniteUitlDM,s
erver/common/
unitedmgr/bin

lic_ag
ent

UDP,

java,server/$
{IMAP_JAVA
_HOME}/bin/
java

None

None

TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

247

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

VmfDi
ag

VmfDiag

VmfDiag,serve
r/nemgr/
nemgr_vmf/bin

None

None

serve
r/var/
logs/
Deve
lop/
Vmf
Diag/
Vmf
Diag
_%y
%m
%d_
%H
%M
%S.*

Router (V8) NE
Test and
Diagnosis.
Provides diagnosis
functions for VRP
V8 routers.

xmlag
ent

XMLAgent

ST_XMLAgen
t,server/
platform/
sacscript/
standalone

Securi
tyServ
ice

TCP

serve
r/var/
logs/
Deve
lop/
nbi/
xmla
gent/
frame
*.log

XML Northbound
Interface. Provides
the northbound
interface which
adopts the SOAP
protocol.

serve
r/var/
logs/
Deve
lop/
nbi/
xmla
gent/
frame
*.zip
XmlSo
apAge
nt

Issue 03 (2014-12-10)

XmlSoapAgent

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP,
TCP

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

None

XML1.0 Agent.
Supports network
managent for
Access XML1.0
NBI Gateway.

248

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Proce
ss
Name

Service Name

Executable
Files and Path

Requ
ired
Proce
ss/
Servi
ces

Proto
col
Type

Log
Files

Function
Description

XmlSo
apGW

XmlSoapGW

java,server/$
{IMAP_JAVA
_HOME}/bin

None

TCP,

None

XML1.0 NBI
Gateway. This
process provides
XML1.0 NBI
Gateway service
for Access NE.

TCP

1.22 GUI Input and Display Conventions


The topic describes the input conventions for the text boxes and display conventions for GUI
elements on the U2000. These rules specify the typing requirements for the text boxes in the
U2000 operation interface. These text boxes are used to enter character strings, file names, IP
addresses, MAC addresses, numerals, passwords, dates, time, and so on.

Types of Character Strings


The character string is a kind of descriptive text and usually there is no limitation for the
characters typed in. But, when you enter the names in the U2000 (including the names of the
PDH path, MSTP path, NE, subnet, virtual NE board, telecommunications room, subrack, card,
Transmission NM, optical fiber, NE user, protection subnet, circuit, logical system, J0, J1, PM
(C)U relay, DIP switch, EMU input and output paths and Ethernet user) and all remarks, or when
some functions involve typing in characters that are subject to naming rules, you are
recommended to use the standard characters listed as follows:
l

Languages used in nine countries, namely, China, America, Italy, Spain, France, UAE,
Germany, Russia, and Portugal.

Input of various types of characters.


NOTE

l The name of a rule, trail, fiber, subnet, or customer can contain "+" and ":",
l The name of an NE or a subnet can contain "+".
l The Tab key input cannot be contained in the above names or the values of overheads J0, J1, and J2.
l These rules are made in order to avoid database operation errors or errors occurred when an HTML
report is generated. The Tab key input cannot be contained in command lines.

NOTICE
When you enter characters in Microsoft Pinyin IME and keep pressing a key, too many characters
will be typed in. This leads to the exit of the U2000 client.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

249

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Directory
l

When files are transferred between different OSs, both Chinese and English directories are
supported.

When performance data is dumped at the server end, both Chinese and English directories
are supported. In other cases, only English directories are supported.

File Name
The general rule is file name + extension name. The extension name consists of letters, numerals
or underscores, and should not exceed three characters.
The naming rule is that a file name consists of letters, numerals or underscores. It cannot exceed
eight characters. A file name cannot contain spaces or any of the following characters: \ " . * ;
> [ ] ( ) ! $ { } < >. If you need to separate two characters, you may use "_".
Nine languages are supported, with each language corresponding to a naming rule.
Folder Name

Language

zh_CN

China

en_US

America

it_IT

Italy

es_ES

Spain

fr_FR

France

ar_SA

Saudi Arabia

de_DE

Germany

ru_RU

Russia

pt_PT

Portugal

IP Address
The IP address is decimal, for example, 10.10.0.254:9801 (9801 is the port ID, and can be
omitted).

MAC Address
The MAC address is hexadecimal, for example, 00-06-5B-84-50-84.

Types of Numerals
Integer type: In this mode, only integral numbers can be typed in.
Decimal fraction type: In this mode, besides numerals, characters f and e, as well as the decimal
point are allowed.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

250

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Password
Each time you enter a character in the password text box, a dot is displayed instead. The password
cannot be copied.

Date and Time


Generally, the date and time can be selected from or typed in the Time/Date Attribute dialog
box.
To navigate to the window for customizing the type of the date and time, choose File >
Preferences > Region Settings from the main menu and click the Time or Date tab.
The default format of time and date is as follows:
l

Time: 16:06:06 (Hour:Minute:Second)

Date: 06-06-2000 (Month-Day-Year)

Table
The parameters on the GUI are presented in tables to display parameter values of different
objects.
l

If -- or - is displayed in the table cell of a selected record, it indicated that the parameter is
not supported. This type of table cell in not editable.

If / or Unknown is displayed in the table cell of a selected record, the parameter is supported
but the parameter value is unavailable for a certain reason at the moment.

1.23 Mutual Exclusion List for Multiclient Operations


The mutual exclusion list for multiclient operations is given below.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

251

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-38 Mutual exclusion list for multiclient operations

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

252

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Figure 1-39 Mutual exclusion list for multiclient operations on ASON SDH trails

Figure 1-40 Mutual exclusion list for multiclient operations on ASON WDM trails

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

253

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1 Getting Started

Example
The "script import" and "upload" operations are mutually exclusive. If "script import" is being
performed on one client, "upload" cannot be performed on another client.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

254

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Network Management Process

About This Chapter


This topic describes the process of managing network equipment on the U2000.
2.1 MSTP Network Management Process
The MSTP network management process describes the operation tasks of managing an MSTP
network by using the U2000, and the relationships between the operation tasks.
2.2 WDM Network Management Process
The WDM network management process describes the operation tasks of managing a WDM
network by using the U2000, and the relationships between the operation tasks.
2.3 RTN Network Management Process
The RTN network management process describes the operation tasks of managing a RTN
network by using the U2000, and the relationships between the operation tasks.
2.4 PTN Network Management Process
The PTN network management process describes the operation tasks of managing the PTN
network by using the U2000, and the relationships between the operation tasks.
2.5 Router and Switch Network Management Process
This topic describes the operation tasks of managing a router and switch network with the
U2000 and the relationships between these operation tasks.
2.6 Access Network Management Process
This topic describes the operation tasks of managing an access network with the U2000 and the
relationships between these operation tasks.
2.7 Core Network Management Process
This topic describes the operation tasks of managing a core network with the U2000 and the
relationships between these operation tasks.
2.8 Security NE Network Management Process
This topic describes the operation tasks of managing a security NE network with the U2000 and
the relationships between these operation tasks.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

255

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

2.1 MSTP Network Management Process


The MSTP network management process describes the operation tasks of managing an MSTP
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the MSTP network by referring to the processes as shown in Figure
2-1.
NOTE

The landscape orientation of the configuration flow chart shows the main phases of managing the MSTP network
by using the U2000. The phases include network deployment, service configuration, network maintenance, and
SDH ASON feature management. In the case of the service configuration, the end-to-end service configuration
mode requires a license that supports the end-to-end SDH management, and the SDH ASON feature management
requires a license that supports the SDH ASON feature.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

256

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Figure 2-1 MSTP network management process


Deploying a
Network

Topology
Management

Configuring Services

Configuring Services
on a Per-NE Basis

Configuring Endto-End Services

DCN
Management

Configuring SDH
Services

Manage SDH
Protection
Subnet

Configuring the
NE Time

Configuring
Ethernet
Services

Manage SDH
Trail

Configuring
Clocks

Configuring RPR
Services

Deploying a
Tunnel

Configuring
Orderwire

Configuring ATM
Services

Deploying
VPLS Services

Configuring DDN
Services

Deploying
PWE3 Services

Configuring
Protection
Configuring
Board
Parameters

Configuring SAN
Services
Configuring
Broadcast Data
Port Services
Configuring F1
Data Port
Services

Configuring
Feature

Configuring
QoS

Managing the
Optical Power

Configuring
LPT

Alarm
Management

Configuring
LCAS

Performance
Management

Configuring
QinQ Service

Configuration
Data
Management

Configuring
STP and RSTP

Software
Management

Configuring
IGMP Snooping

Deploying EAGGR Services

Configuring
LAG/DLAG

Deploying
Composite
Services

Configuring
BPS/RPS

Customer
Management

Configuring
SNCTP

Configuring Builtin WDM

Configuring
Transmux

Configuring
MPLS Tunnel

Configuring
TCM

Configuring
CES/ATM
Services

Configuring
AU3

Configuring
Ethernet
Services
Configuring
MSTP
Configuring PW
APS/MS-PW

Maintaining a
Network

Configuring
IPA
Configuring
SDH ASON
Networks

Report
Management
Configuring
OAM

Configuring
Data Test
Frame
Configuring
BPS/RPS/PR
BS
Adjusting
Networks

Routine
Maintenance
for an ASON
Network
Handling ASON
Network
Failures

2.2 WDM Network Management Process


The WDM network management process describes the operation tasks of managing a WDM
network by using the U2000, and the relationships between the operation tasks.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

257

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Configure and manage the Metro WDM&LH WDM network by referring to the processes as
shown in Figure 2-2.
NOTE

The landscape orientation of the configuration flow chart shows the main phases of managing the WDM network
by using the U2000. The phases include network deployment, service configuration, WDM feature
configuration, network maintenance, and WDM ASON feature management. In the case of the service
configuration, the end-to-end service configuration mode requires a license that supports the end-to-end WDM
management, and the WDM ASON feature management requires a license that supports the WDM ASON
feature. The WDM ASON feature is unique to the NG WDM. An NG WDM NE can use the WDM ASON
feature management function only after the WDM ASON feature is enabled.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.

Figure 2-2 Metro WDM&LH WDM network management process


Deploying a
Network

Creating a
Network

Configuring
WDM Features

Maintaining a
Network

Configuring Endto-End Services

Configuring
ROADM

Managing the
Optical Power

Configuring Services

Configuring Services
on a Per-NE Basis

Configuring DCN

Configuring Optical
Cross-Connections

Customer
Management

Configuring IPA

Alarm
Management

Configuring the
NE Time

Configuring WDM
Services

Manage WDM
Protection
Subnet

Configuring ALC

Performance
Management

Configuring
Clocks

Configuring
Overhead

Manage WDM
Trail

Configuring APE

Configuring
Orderwire

Configuring
Ethernet Services

Configuring
Board
Parameters
Configuring
Protection

Configuring
Broadcast Data
Port Services

Configuring
EAPE
Configuring Fiber
Link Check

Configuration
Data
Management
Software
Management
Report
Management

Configuring F1 Data
Port Services

For the detailed process for managing the OptiX OSN 6800, refer to Figure 2-3.
NOTE

The procedure for managing the OptiX OSN 3800 is similar to the procedure for managing the OptiX OSN
6800.

For the detailed process for managing the OptiX OSN 6800A, refer to Figure 2-3.
NOTE

The procedure for managing the OptiX OSN 3800A is similar to the procedure for managing the OptiX
OSN 6800A.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

258

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Figure 2-3 OptiX OSN 6800/6800A equipment management process


Deploying a
Network

Configuring Services

Configuring
WDM Features

Maintaining a
Network

Creating a
Network

Configuring
Services on a PerNE Basis

Configuring
End-to-End
Services

Configuring
ROADM

Managing the
Optical Power

Configuring
DCN

Configuring
Optical CrossConnections

Customer
Management

Configuring IPA

Alarm
Management

Configuring the
NE Time

Configuring WDM
Services

Manage WDM
Protection
Subnet

Configuring
ALC

Performance
Management

Configuring
Clocks

Configuring
Overhead

Manage WDM
Trail

Configuring
APE

Configuration
Data
Management

Configuring
Orderwire

Configuring
Ethernet Services

Configuring
EAPE

Configuring
Board
Parameters

Configuring WDM
ASON Networks

Software
Management
Report
Management
Routine
Maintenance for an
ASON Network

Configuring
Protection

Handling ASON
Network Failures

Deploying a
Network

Configuring Services

Configuring
WDM Features

Maintaining a
Network

Creating a
Network

Configuring
Services on a PerNE Basis

Configuring
End-to-End
Services

Configuring
ROADM

Managing the
Optical Power

Configuring
DCN

Configuring
Optical CrossConnections

Customer
Management

Configuring IPA

Alarm
Management

Configuring the
NE Time

Configuring WDM
Services

Manage WDM
Protection
Subnet

Configuring
ALC

Performance
Management

Configuring
Clocks

Configuring
Overhead

Manage WDM
Trail

Configuring
APE

Configuration
Data
Management

Configuring
Board
Parameters

Configuring
Ethernet Services

Configuring
EAPE

Software
Management
Report
Management

Configuring
Protection

For the detailed process of managing the OptiX OSN 8800 series equipment, see Figure 2-4.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

259

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

NOTE

The OptiX OSN 8800 T32 V100R001 does not support orderwire and Ethernet service configuration.
The OptiX OSN 8800 T32 V100R002 or a later version supports the SDH-related functions, including
configuring SDH protection, SDH features, and SDH-ASON feature management.

Figure 2-4 OptiX OSN 8800 series equipment management process


Deploying a
Network

Configuring WDM Services

Configuring
WDM Features

Configuring
SDH Features

Creating a
Network

Configuring
Services on a PerNE Basis

Configuring
End-to-End
Services

Configuring
ROADM

Configuring
SDH Services

Configuring
DCN

Configuring
Optical CrossConnections

Customer
Management

Configuring IPA

Configuring
Overhead

Configuring the
NE Time

Configuring WDM
Services

Manage WDM
Protection
Subnet

Configuring
ALC

Configuring
Ethernet Services

Configuring
Clocks

Configuring
Overhead

Manage WDM
Trail

Configuring
APE

Configuring
Orderwire

Configuring
Ethernet Services

Configuring
Board
Parameters

Configuring
WDM Protection

Configuring SDH
ASON Networks

Configuring
EAPE
Configuring WDM
ASON Networks

Configuring Packet Services

Configuring
Services on a PerNE Basis

Configuring
End-to-End
Services

Configuring the
Ethernet
Boards

Deploying a
Tunnel

Configuring MPLS
Tunnel

Deploying VPLS
Services

Configuring
Ethernet Services

Deploying PWE3
Services

Configuring
Configuring the
QoS Policy

Deploying
Composite
Services

Maintaining a
Network

Managing the
Optical Power
Alarm
Management
Performance
Management
Configuration
Data
Management
Software
Management
Report
Management
Routine
Maintenance for an
ASON Network

Configuring
SDH Protection

Handling ASON
Network Failures

For the detailed process for managing the OptiX OSN 1800, refer to Figure 2-5.
For the detailed process for managing the OptiX OSN 1800(NA), refer to Figure 2-5.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

260

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Figure 2-5 OptiX OSN 1800/1800(NA) equipment management process


Deploying a
Network

Configuring Services

Maintaining a
Network

Creating a
Network

Configuring
Services on a PerNE Basis

Configuring
End-to-End
Services

Managing the
Optical Power

Configuring
DCN

Configuring WDM
Services

Customer
Management

Alarm
Management

Configuring the
NE Time

Configuring
Overhead

Manage WDM
Protection
Subnet

Performance
Management

Manage WDM
Trail

Configuration
Data
Management

Configuring
Clocks
Configuring
Board
Parameters

Software
Management

Configuring
Protection

Report
Management

2.3 RTN Network Management Process


The RTN network management process describes the operation tasks of managing a RTN
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the RTN network by referring to the processes as shown in Figure 2-6.
NOTE

The landscape orientation of the configuration flow chart shows the main phases of managing the RTN network
by using the U2000. The phases include network deployment, service configuration, and network maintenance.
In the case of the service configuration, the end-to-end service configuration mode requires a license that supports
the end-to-end RTN and SDH management.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

261

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Figure 2-6 RTN network management process


Deploying a
Network

Topology
Management
DCN
Management
Configuring the
NE Time
Configuring
Clocks
Configuring
Orderwire

Configuring
Protection
Configuring
Board
Parameters

Configuring Services

Configuring Services
on a Per-NE Basis

Configuring
Radio Links
Configuring SDH
Services
Configuring
Packet-Based
Ethernet
Services
Configuring
EoS/EoPDHBased Ethernet
Services

Configuring Endto-End Services

Configuring
Feature

Configuring IF
Protection

Maintaining a
Network

Alarm
Management
Performance
Management

Deploying a
Tunnel

Configuring
ATPC

Deploying
VPLS Services

Configuring
XPIC

Configuration
Data
Management

Deploying
PWE3 Services

Configuring
Hybird/AM

Software
Management

Configuring QoS

Report
Management

Configuring LPT

Configuring
The Ethernet
Service OAM

Deploying
Composite
Services
Deploying
Native Ethernet
Services

Configuring
MPLS Tunnel
Configuring
PWE3 Services
(CES/ATM/ETH)

Configuring
Physical LAG
Configuring
LAG

Configuring
The Ethernet
Port OAM
Diagnosis &
Maintenance

2.4 PTN Network Management Process


The PTN network management process describes the operation tasks of managing the PTN
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the PTN network by referring to the processes as shown in Figure 2-7.
NOTE

The landscape orientation of the configuration flow chart shows the main phases of managing the PTN network
by using the U2000. The phases include network deployment, service configuration, configuring feature and
network maintenance.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

262

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Figure 2-7 PTN network management process


Deploying a
Network

Creating
Network

Configuring Services

Configuring
Services on a
Per-NE Basis

Configuring
End-to-End
Services

Configuring
Feature

Configuring
the MSTP

Configuring
Communicatio
ns

Configuring the
Control Plane

Configuring
Tunnel

Configuring
the BFD

Configuring
Inband DCN

Configuring
MPLS /IP/GRE
Tunnel

Configuring
PWE3
Service

Configuring
the LPT

Configuring
the NE Time

Configuring the
QoS Policy

Configuring
VPLS Service

Configuring
Clocks

Configuring
CES Services

Configuring
PTP Clock

Configuring an
ATM Service

Configuring
L3VPN
Service

Configuring a
TOP Clock

Configuring an
Ethernet
Service

Configuring the
EquipmentLevel Protection

Configuring
Interfaces

Configuring
Composite
Service

Configuring
the IGMP
Snooping

Maintaining a
Network

Configuring
Network Level
Protection
OAM
Management
Configuring
Orderwire
Port Mirror
802.1X/
RADIUS
Authentication
Common
Maintenance
Operations

Configuring
Services for
the Offload
Solution

Hop
Management

2.5 Router and Switch Network Management Process


This topic describes the operation tasks of managing a router and switch network with the
U2000 and the relationships between these operation tasks.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

263

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

IP Network Deployment
Figure 2-8 IP network deployment flowchart
Network
planning

Scenario
stage

Import the
BoQ
Generate the port
information table

Network
deployment

Service
deployment

Method 1: Deploy the network


using the NE Explorer.

Deploy tunnels.

Method 2: Deploy the network


using the plug-and-play
management.

Deploy VPN
services.

Generate the NE
information table

Deploy service
guarantee.

Tool and
module

UniStar

U2000

Role

Network planning
engineers

Software commissioning engineers

NOTE

After network planning engineers obtain the LLD document (including the port information table and NE
configuration table) based on the Bill of Quantity (BoQ) list, software commissioning engineers can use the
U2000 to complete IP network deployment. This topic does not contain network planning information. For
details about network planning, see the network planning guide associated with the solution used by the site.

Table 2-1 Quick navigation for deployment tasks

Issue 03 (2014-12-10)

Task

Descri
ption

Function Module and


Usage Scenario

Navigation Path

Reference
Chapter

Netw
ork
deplo
ymen
t

Deploy
basic
configur
ations,
such as
configur
ations
for the
manage
ment
channel,
device
interfac
e, IGP
and

Deployment scenario: Use the


U2000 Plug-and-Play
Management to deploy
configurations.

Configuration >
Router/Switch/
Security
Configuration >
Plug-and-Play
Management

Router and
Switch
Network
Management >
Network
Deployment >
Deploying a
Network Using
the Plug-andPlay
Management

The U2000 Plug-and-Play


Management can be used to
remotely launch multiple NEs
and perform basic
configurations for multiple
NEs; therefore, on-site software
commissioning is not required
and this greatly improves the
deployment efficiency.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

264

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Task

2 Network Management Process

Descri
ption

Function Module and


Usage Scenario

Navigation Path

Reference
Chapter

BGP
route,
MPLS,
tunnel
policy,
and
routing
policy.

Applies to the following


scenarios:

Right-click a
desired NE in the
Main Topology and
choose NE
Explorer from the
shortcut menu.

Router and
Switch
Network
Management >
Network
Deployment >
Deploying a
Network Using
the NE
Explorer

l Service >
Tunnel >
Manage
Tunnel

l Router and
Switch
Network
Managemen
t > Service
Deployment
> Deploy
Tunnel

l Deploy configurations
during network deployment
or routine maintenance
when not so many devices
are located on the live
network.
l Check configurations. After
the U2000 Plug-and-Play
Management is used to
deploy basic configurations,
the U2000 NE Manager can
be used to check whether the
deployed configurations are
correct.
l Modify basic configuration
for a single NE.

Servi
ce
deplo
ymen
t

Rapidly
deploy
services
on the
U2000
accordi
ng to the
service
plan.

Applies to the following


scenarios:
l Deployment scenario in
which tunnels and VPN
services need to be created.
The service management
module provides a
simplified GUI for you to
complete all configuration
operations in this GUI.
l Routine maintenance
scenario in which VPN
services need to be
monitored, diagnosed, or
tested and checked.

l Service >
L3VPN
Service >
Manage
L3VPN
Service
l Service >
VPLS Service
> Manage
VPLS Service
l Service >
PWE3 Service
> Manage
PWE3 Service

l Router and
Switch
Network
Managemen
t > Service
Deployment
> Deploy
VPN
Service

l Service >
Composite
Service >
Manage
Composite
Service

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

265

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

IP Network Maintenance
Figure 2-9 IP Network Maintenance Process

Table 2-2 Monitoring and maintenance process


Task

Description

Reference Chapter

Perfor
mance
monito
ring

The U2000 supports real-time network


quality monitoring. The monitoring
results can be used for trend analysis and
identifying areas and nodes where
network quality deteriorates, helping
monitoring engineers proactively respond
to network faults.

Router and Switch Network


Management > Network Monitoring
and Maintenance > Performance
Monitoring

Alarm
monito
ring

The U2000 supports alarm monitoring for


immediate identification of network
faults and rapid response to the faults.

Router and Switch Network


Management > Network Monitoring
and Maintenance > Monitoring
Network Status

Report
statisti
cs
collecti
on

The U2000 allows you to analyze and


collect statistics about network running
status in different ways.

l Router and Switch Network


Management > Network
Monitoring and Maintenance >
NE Routine Maintenance >
Collecting Network Resource
Statistics > Using the U2000
Report System to Collect
Network Resource Statistics
l Router and Switch Network
Management > Network
Monitoring and Maintenance >
NE Routine Maintenance >
Collecting Performance
Monitoring Results

NE
config
uration
file
backup
Issue 03 (2014-12-10)

The U2000 backs up NE configuration


files on a regular basis to provide
assistance in fault rectification.

Router and Switch Network


Management > Network
Monitoring and Maintenance > NE
Routine Maintenance > Backing Up
NE Configuration Files

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

266

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Task

Description

Reference Chapter

U2000
mainte
nance

The U2000 is maintained on a regular


basis, which ensures healthy U2000
operation.

Router and Switch Network


Management > Network
Monitoring and Maintenance >
U2000 Routine Maintenance

Table 2-3 Fault diagnosis process

Issue 03 (2014-12-10)

Task

Descri
ption

Usage Scenario

Navigation
Path

Reference
Chapter

Locate
faults
based
on
alarm
inform
ation.

If the
U2000
receive
s an
alarm
from an
IP NE,
rectify
the
fault
accordi
ng to
the
alarm
inform
ation.

The U2000 receives alarms


from IP NEs.

Fault > Browse


Current Alarm

Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Common Alarm
Locating

Performance alarms or TCAs


are generated on the U2000.

Fault > Browse


Current Alarm

Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Locating
Performance
Faults

NOTE
The names of these alarms
contain Performance or
threshold, for example, Port
Performance Minor Alarm or
The number of BRAS accesses
exceeds the threshold.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

267

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Task

Issue 03 (2014-12-10)

2 Network Management Process

Descri
ption

Usage Scenario

Navigation
Path

Reference
Chapter

NOTE
This
task is
applic
able to
the
NEs
for
which
the
value
of
Alar
m
Sourc
e is the
name
of an
NE
\CX
\ATN
\PTN
6900
\ME\S
series
NE.

Service-related alarms are


generated on the U2000.

Fault > Browse


Current Alarm

Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Locating Service
Faults

Refer to the Trail Domain to


check whether the alarm
affects services, as shown in
Figure 2-10.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

268

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Task

Descri
ption

Usage Scenario

Navigation
Path

Reference
Chapter

Locate
faults
based
on IP
networ
k
trouble
shootin
g.

If the
U2000
does
not
receive
any
alarm
but the
voice
service
quality
on the
manage
d
mobile
bearer
networ
k
deterior
ates,
locate
and
resolve
the
quality
deterior
ation
issue.

IP network troubleshooting
can be used to locate and
troubleshoot faults including
incontinuous calls or voice
services of poor quality caused
by packet loss or delay.

Fault > IP
Network
Troubleshooting

Fault Diagnosis
> Locating
Faults Based on
IP Network
Troubleshooting

Figure 2-10 Viewing the trail domains of faults

2.6 Access Network Management Process


This topic describes the operation tasks of managing an access network with the U2000 and the
relationships between these operation tasks.
It is recommended that you configure and manage an access network in accordance with the
flowchart shown in Figure 2-11.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

269

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

NOTE

The horizontal direction of the flowchart shows the primary stages of managing an access network with the
U2000, which include:
l

Network deployment

Feature configuration

Network maintenance

Bulk network configuration

The vertical direction of the flowchart shows the relationships between the operation tasks of these stages.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

270

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

Figure 2-11 Flowchart of managing an access network


Network deployment

Feature
configuration

Network
maintenance

Bulk network
configuration

Topology
management

Device
management

Alarm
management

FTTx predeployment

General
configuration
template

Interface
management

Inventory
management

Ethernet feature
management

Performance
management

Ethernet OAM
management

NE software
management

GPON
management

Test diagnosis

EPON
management
xDSL management
Multicast
management
TDM management

VoIP management
PWE3
management
ACL management

BFD management

QoS management
DHCP Relay
management
MSTP
management

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

271

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

2.7 Core Network Management Process


This topic describes the operation tasks of managing a core network with the U2000 and the
relationships between these operation tasks.
It is recommended that you configure and manage a core network in accordance with the
flowchart shown in Figure 2-12.
NOTE

The horizontal direction of the flowchart shows the primary stages of managing a core network with the U2000,
which include:
l

Network deployment

Feature configuration

Network maintenance

Bulk network configuration

The vertical direction of the flowchart shows the relationships between the operation tasks of these stages.

Figure 2-12 Flowchart of managing a core network


Network deployment

Feature configuration

Network
maintenance

Bulk network
configuration

Topology
management

Dual homing
management

Security
management

iSStar

NE data configuration

Service management

Alarm management

Subscriber signaling
tracing

Inventory
management

Network health check

Performance
management

NE information
collection

Software
management

Authority and domain


based management
of sub-resources

Test management

Device panel

2.8 Security NE Network Management Process


This topic describes the operation tasks of managing a security NE network with the U2000 and
the relationships between these operation tasks.
It is recommended that you configure and manage a security NE network in accordance with
the flowchart shown in Figure 2-13.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

272

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2 Network Management Process

NOTE

The horizontal direction of the flowchart shows the primary stages of managing a security NE network with the
U2000, which include:
l

Network deployment

Feature configuration

Network maintenance

Security service

Network security management

The vertical direction of the flowchart shows the relationships between the operation tasks of these stages.

Figure 2-13 Flowchart of managing a security NE network


Network
deployment

Feature
configuration

Network
maintenance

Security
service

Network Security
Management

Topology
management

Device
management

Alarm
management

IPSec end-toend service


management

Security policy

Interface
management

Inventory
management

Remote
access service
management

Attack defense

Single-point
Web
configuration

Performance
management

SSL VPN
service
management

Port mapping

NE software
management

NAT

IPS

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

273

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Security Management

About This Chapter


Security management is a crucial function to prevent an unauthorized user from logging in to
the network and ensure network data security. Security management includes the NMS user
rights management, user security policy management, NE security management, and other
security policy management.
3.1 User Security
U2000 user security management mainly involves user rights management, password and
account policies, access control management, and user monitoring.
3.2 Managing User Rights
Security administrators assign proper rights to U2000 and NE maintenance personnel and adjust
rights based on service changes, which ensure that maintenance personnel have sufficient rights
to regularly maintain the U2000 and NEs and prevent unauthorized operations.
3.3 User Security Policy Management
User security policies can efficiently strengthen U2000 system security and prevent
unauthorized user operations. The policies include setting access control rules, managing
passwords and locking clients, and monitoring login users.
3.4 Managing NE Security
With the NE security management function provided on the U2000, logins to NEs and the
running of NEs are monitored effectively. Therefore, the U2000 can protect NEs against
unauthorized logins and operations.
3.5 Configuring NE RADIUS
Remote authentication dial-in user service (RADIUS) is an industrial standard. RADIUS
provides the authentication functions for the remote access to a network or dialup access to a
network.
3.6 Change Audit
If changes occur on a device in the network, information about the changes can be queried
through the U2000.
3.7 Database Security Policy

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

274

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

The U2000 data is saved in the database. Therefore, ensure the database security with priority,
including protecting the security of the database password, backing up the database
periodically, viewing the database status, and dumping the database.
3.8 Log Management
Logs record operations and important system events on the U2000. Using log management
functions, you can query, collect statistics on, synchronize, forward, and dump log information.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

275

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

3.1 User Security


U2000 user security management mainly involves user rights management, password and
account policies, access control management, and user monitoring.

Security Management Entities


Concept

Description

Object Set

A collection of managed objects.


Object sets facilitate user rights management. If a user or user
group is assigned the operation rights of an object set, the user
or users from the user group can perform authorized
operations on all the objects in the object set. This obviates
the need to set operation rights for NEs one by one.
Object sets can be created by geographical area, network
layer, and device type.

Operation Set

A collection of operations.
Operation sets facilitate user rights management. Operations
that have similar impacts on system security are assigned to
an operation set. If a user or user group is assigned the rights
of an operation set, the user or users from the user group can
perform all the operations in the operation set.
The U2000 provides default operation sets. If the default
operation sets do not meet right assignment requirements,
create operation sets as required.
By default, the U2000 operation sets are classified into the
following types by operation object:
l All Object Operations contains operations that can be
performed on all network devices.
l All Application Operations contains operations that can
be performed on all network management applications
except security applications.

Security object

U2000 objects on which only users that are authorized by


users from the SMManagers group can perform operations.
Security objects, such as devices, object sets, and subnets, are
managed by the U2000.
NOTE
Not all devices in the Main Topology are managed by the U2000. If
a user from the SMManagers group creates a common user and does
not assign any operation rights to the common user, the common user
can view some objects in the Main Topology after logging in to the
U2000. However, these objects are not security objects because they
are not managed by the U2000.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

276

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Concept

Description

Domain

The scope of security objects (including devices, object sets,


and subnets) that users or user groups can manage. Users can
perform operations only on the security objects in their own
domains.

Operation Rights

A collection of rights assigned to users to perform an


operation. Operation rights are associated with domains.
Users can only perform authorized operations on the security
objects in their own domains.

User

A U2000 client user. The user name and password of a user


identify the user's U2000 operation and management rights.
After being added to a user group, a user inherits the operation
rights of the user group. A user can be added to multiple user
groups. The operation rights of a user comprise those of the
user and user groups to which the user belongs.
The U2000 provides the default user admin as the system
administrator. The admin user belongs to the
Administrators and SMManagers groups by default and has
more rights than the SMManagers group. You cannot change
the admin user's rights or add this user to other user groups.
NOTE
The admin user's initial password is Changeme_123. (The initial
password is Admin_123 for a preinstalled U2000.) You must change
the password upon the first login as the admin user to ensure system
security. Keep the password secure and change it regularly.

User Group

A collection of U2000 users that have the same operation


rights. Adding users to user groups on the U2000 enables the
management of user rights in batches and reduces
management costs.
A user group has the following attributes: details (group name,
description, group type, and maximum number of sessions),
members, domain, operation rights, and current session.
The U2000 provides the following default user groups:
Administrators, SMManagers, Maintenance Group,
Guests, Operator Group, and NBI User Group.

User Group
Type

Issue 03 (2014-12-10)

Administrat
or Group

Only the Administrators group belongs to this type of group.


This administrator group has a domain that contains all
network objects and has all operation rights except security
management rights. The domain and operation rights cannot
be changed, and this type of user group cannot be created.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

277

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Concept

3 Security Management

Description
Security
Manager
User Group

Only the SMManagers group belongs to this type of group.


The security manager user group has a domain that contains
all network objects and has rights related to security
management. For example, a user that belongs to the security
manager user group can manage users, user groups, user
names and passwords, user logins, operation sets, device sets,
and security logs, and can set user security policies. This type
of user group cannot be created.
To ensure U2000 security, passwords of users from the
SMManagers group must be kept secure and changed
regularly.
NOTE
Security administrators (users from the SMManagers group) are
responsible for creating and authorizing users. The SMManagers
group has the following characteristics:
l Rights of the SMManagers group cannot be modified.
l The SMManagers group has only the rights related to security
management.

Subdomain
Security
Administrat
or Group

User groups of this type are created by security administrators,


who also define this user groups' domains. This type of user
group has only the rights related to security management. The
rights cannot be modified.
NOTE
When the U2000 manages a large-scale network that has a large
number of objects, a security administrator can divide the entire
network into several areas, each of which is assigned to a subdomain
security administrator group for management. A subdomain security
administrator can create and authorize users in the corresponding
area.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

278

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Concept

3 Security Management

Description
Default User
Group

The U2000 provides three default user groups: Operator


Group, Guests, and Maintenance Group. The domain of a
default user group is All Objects. The operation rights for the
default user groups are described as follows:
l Users from the Guests group have the rights for default
monitor operation sets. They can perform query
operations, such as querying statistics, but cannot create
or configure objects.
l Users from the Operator Group group have the rights for
default operator operation sets. In addition to the rights of
the Guests group, users from the Operator Group group
have the rights to create, modify, and delete (rights to
perform potentially service-affecting operations are not
involved). For example, they can create NEs, change
alarm severities, and configure SDH trails.
l Users from the Maintenance Group group have the rights
for default maintenance operation sets. In addition to the
rights of the Guests and Operator Group groups, users
from the Maintenance Group group have the rights to
perform configurations that affect the running of the
U2000 and NEs. For example, they can search for SDH
protection subnets and trails, delete composite services,
and reset boards.
The default user groups are listed in descending order of rights
as follows: Maintenance Group, Operator Group, and
Guests. Operation sets of a default user group that has highlevel rights include the operations in operation sets of a user
group that has low-level rights. For example, maintenance
operation sets contain all operations in operator operation
sets.

Common
User Group

User groups of this type are created by security administrators


(belonging to the SMManagers group) or subdomain security
administrators (belonging to subdomain security
administrator groups). Domains and operation rights of
common user groups are also specified by security
administrators or subdomain security administrators.

NBI User
Group

The OSS interconnects with the U2000 through NBIs. The


NBI user group is created on the U2000 to manage access of
the OSS.
NOTE
NBI User Group is available only when the NBI instance is
deployed.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

279

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Rights- and Domain-based Management


Rights- and domain-based management relies on assignment of operation rights and domains.
Rights-based management enables you to divide U2000 rights into function domains. Domainbased management enables you to create network domains based on NEs. User rights can be
effectively controlled by granting the rights of any function domain and network domain
portfolio to U2000 users.
You can use the following methods to assign rights to a user or a user group:
l

Add a user to a default user group so that the user has all the rights of this group. This
method applies to O&M scenarios in which users require only the basic rights of a
U2000 default user group.

Create a user group and add a user to this user group. This method applies to scenarios in
which default user groups do not meet O&M requirements. For example, if a default user
group has excessive or insufficient rights, you can create a user group that has appropriate
rights and add a user to this user group.
NOTE

It is recommended that you authorize a user by adding the user to a user group that has appropriate rights.
Authorizing a user directly or by adjusting the rights of the default user groups is not recommended.

Account Policy and Password Policy


Concept

Description

Account Policy

Specifies the minimum length of a user name, login policy,


and unlocking policy. You can set the account policy to ensure
account security.

Password Policy

Specifies the password complexity, update interval, and


character restrictions. The password policy prevents users
from setting simple passwords or using one password for a
long time.

Client Access Control


Concept

Description

Remote Maintenance User


Management

The U2000 supports remote maintenance. It allows a remote


maintenance terminal to log in to the U2000 server to perform
operations on NEs that the U2000 manages. Remote
maintenance is commonly used for remote NE fault locating
and periodical checks.
The remote maintenance user is a U2000 user that logs in to
the U2000 server from the remote maintenance terminal. By
default, the remote maintenance user is disabled. Before
starting remote maintenance, enable the remote maintenance
user and set parameters for the user as required.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

280

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Concept

Description

SSL Protocol

The Secure Sockets Layer (SSL) protocol ensures data


security and integrity for network communication. The SSL
protocol configured for the server that communicates with
clients can efficiently protect customers' network information.

Single-User Mode

The admin user uses the single-user mode to perform special


operations such as rights assignment. In single-user mode,
only one user is allowed to log in to the U2000 as the
admin user, which prevents other users' interference during
operations. When the login mode is switched to the singleuser mode, all the users except the admin user are forcibly
logged out and cannot log in again.

Client Lockout

To ensure network security, the U2000 locks out a U2000


client if a user does not perform any operations on the client
for a specified period. Client lockout does not affect the
running of the U2000.

ACL
Access control lists (ACLs) are a secure access control mechanism. It restricts users to log in to
the U2000 server only from clients that have specified IP addresses.
To improve the security of the U2000, ACLs restrict what client IP addresses users can use to
log in to the U2000. If user accounts and passwords are stolen, unauthorized users cannot log
in to the U2000. The U2000 provides two types of ACLs:
l

System ACL
ACL for the U2000. All the users can log in to the U2000 only from the IP addresses or
network segments specified in the system ACL.

User ACL
ACL for a user. The current user can log in to the U2000 only from the IP addresses or
network segments specified in the ACL for the user.
NOTE

The IP addresses or network segments in a user ACL must be within the range of the IP addresses
or network segments in the system ACL.

User Monitoring
The U2000 monitors user access to resources. User monitoring comprises session monitoring
and operation monitoring. For session monitoring, the U2000 monitors users' online status. For
operation monitoring, the U2000 monitors operation objects, time, and specific operation items.
If a user performs unauthorized operations or operations that potentially affect the system, a
security administrator of the U2000 can forcibly log out the user.

Network Management System Maintenance Suite


The network management system maintenance suite (MSuite for short) is a graphical
maintenance tool developed for the U2000. The MSuite is used to debug, maintain, and redeploy
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

281

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

the U2000. The password used to log in to the MSuite must be changed regularly to ensure
U2000 security.

3.2 Managing User Rights


Security administrators assign proper rights to U2000 and NE maintenance personnel and adjust
rights based on service changes, which ensure that maintenance personnel have sufficient rights
to regularly maintain the U2000 and NEs and prevent unauthorized operations.

3.2.1 Getting to Know Operation Rights Management


This section describes concepts related to operation right managements, such as operation rights,
object sets, domains, operation sets, and U2000 authorization principles. Knowing these
concepts before authorization helps you understand the purpose of each step in authorization.

3.2.1.1 Rights
Rights specify operations that can be performed and objects on which the operations are
performed. Operations that can be performed vary according to user.
Rights elements include objects and operations, as shown in Figure 3-1.
Figure 3-1 Rights elements

Operable objects mainly involve the U2000 and NEs, which are managed as devices.
U2000 users can perform operations on the U2000 or NEs only when they are authorized to
access and operate the U2000 or NEs.
Figure 3-2 shows the operations that can be performed on the U2000 and NEs.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

282

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-2 Operations that can be performed on the U2000 and NEs
Rights

Objects

Operations

U2000

Login to the U2000

NEs

Login to the NE

Access
rights

U2000 application
operations
Operation
rights

U2000
Network device
operations

Rights

Operation

Description

Access
rights

Logging in to
the U2000

To log in to the U2000, a user must have a valid account and


password.

Logging in to
an NE

To log in to an NE, a user must have a valid account and


password.

Network
management
application
operations

Network management application operations refer to the


operations unrelated to NEs, such as querying system logs
and creating topology objects. Before performing such
operations, users must log in to the U2000 first.

Network
device
operations

Network device operations refer to the operations related to


NEs, such as querying NE measurement results, connecting
NEs, and synchronizing NE data. Before performing such
operations, users must log in to the U2000 first.

Operation
rights

3.2.1.2 U2000 Authorization Principles


This topic describes the U2000 authorization principles, which help security administrators
understand authorization on the U2000.

Authorization Methods
Security administrators can authorize users using the following methods:
l
Issue 03 (2014-12-10)

Authorize users directly. Specifically, set domains and operation rights for the users.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

283

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Authorize users by binding them to a user group. Specifically, authorize a user group by
setting domains and operation rights of the user group, and then add users to the user group
so that the users inherit the user group's rights.

The second method (binding users to a user group) is recommended. This method enables the
security administrators to simultaneously authorize all the users who hold the same post. When
users' posts change, the security administrators can authorize new users by removing original
users from and adding the new users to the user groups.

Operation Right Configuration Modes


A large number of devices are deployed on a live network. Adding devices to user groups'
domains and setting operations performed on the devices one by one result in repeated workload
and low efficiency. To improve efficiency, the U2000 provides various operation right
configuration modes, as shown in Figure 3-3.
Table 3-1 describes the operation right configuration modes. The subnet device set mode and
user-defined object set mode are commonly used.
Figure 3-3 Operation right configuration modes

Table 3-1 Operation right configuration modes


NOTE
l The subnet device set mode is the best mode regarding device management authorization and is
recommended for the networks of all scales.
l In a domain, subnets may appear:
l Under the Subnet Device Set node: If security administrators grant operation rights to the user, the
user can view and perform operations on all devices in the subnet. If a new device is added to the
subnet, this device is added to the domain automatically.
l Under the Subnet node: If security administrators grant operation rights to the user, the user can view
the subnet, and move, modify, or delete the subnet in the Main Topology.
l Under the Device node: If security administrators grant operation rights to the user, the user can view
and perform operations on all devices in the subnet except the subnet itself. If a new device is added
to the subnet, this device is not added to the domain automatically.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

284

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Mode

Description

Method of
Assigning
Operation
Rights

Advantage

Disadvantage

Appl
icabl
e
Scen
ario

All
Objects

The default
object set All
Objects
provided by
the U2000 is
assigned as a
managed
object to users
or user groups.

The three
modes are
object set
modes. In
these modes,
security
administrators
must assign
operation
rights by
binding
operation sets
to object sets.

The All Objects


mode co-works
with the default
operation set All
Object
Operations
provided by the
U2000 to assign all
operation rights for
all devices to users.

This mode is
rarely used
because few
users except
users in the
Administrators
or
SMManagers
group need to
manage all
devices.

This
mode
appli
es to
the
scena
rio
wher
e
users
must
mana
ge all
devic
es.

If a user group
wants to have
operation
rights for an
object, the
following
conditions
must be met:
l The user
group's
object set
contains
the object.
l The
operation
set bound
to the
object set
contains
the
operations
correspond
ing to the
operation
rights.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

285

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Mode

Description

Object
set
(userdefined
object
set)

Though All
Objects and
Subnet
Device Set are
object sets, the
object set in
this mode
indicates only
a userdefined
object set
planned and
created by a
security
administrator.
In userdefined object
set mode,
security
administrators
add planned
devices to
object sets
defined by
themselves
and assign the
object sets to
users or user
groups.

Issue 03 (2014-12-10)

Method of
Assigning
Operation
Rights

3 Security Management

Advantage

Disadvantage

Appl
icabl
e
Scen
ario

The combination
of user-defined
object sets and
operation sets can
improve
authorization and
operation right
maintenance
efficiency in the
following ways:

Authorization
for a userdefined object
set is less precise
than
authorization for
a single
managed object
in terms of
operation right
control.
Authorization
preciseness
relies on security
administrators'
planning.

This
mode
appli
es to
the
scena
rio
wher
e
multi
ple
users
have
the
same
mana
ged
objec
ts but
the
mana
ged
objec
ts are
deplo
yed
on
differ
ent
subne
ts.

l If user groups
have the same
managed
objects, a
security
administrator
can use an
object set to set
the user groups'
domains and to
adjust the
domains by
adjusting
objects in the
object set,
which helps
avoid repeated
workload.
l If an object set
contains n
devices of the
same type, a
security
administrator
can assign or
reclaim
operation rights
for these
devices by
adding
operations to or
deleting
operations
from the

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

l If multiple
user groups
use the same
object set or
operation set,
adjustments
to the object
set or
operation set
may affect
user groups
that do not
require
operation
right
adjustments.
l An operation
set bound to
an object set
is apt to lack
operations
that are
performed on
objects in the
object set, or
the object set
is apt to lack
objects on

286

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Mode

Description

Method of
Assigning
Operation
Rights

3 Security Management

Advantage

operation set
bound to the
object set
respectively.
Compared with
single-device
authorization,
the
authorization
based on object
sets
significantly
improves
efficiency.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Disadvantage

Appl
icabl
e
Scen
ario

which
operations
contained in
the operation
set are
performed.

287

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Mode

Description

Subnet
device
set

Subnet device
sets are
assigned as
managed
objects to
users or user
groups.

Method of
Assigning
Operation
Rights

3 Security Management

Advantage

Disadvantage

Appl
icabl
e
Scen
ario

The combination
of subnet device
sets and operation
sets have the same
advantages of
improving
authorization and
operation right
maintenance
efficiency as the
combination of
user-defined
object sets and
operation sets. It
also has the
following
advantages:

Authorization
for a subnet
device set is less
precise than
authorization for
a single
managed object
in terms of
operation right
control.
Authorization
preciseness
relies on security
administrators'
planning.

This
mode
appli
es to
the
scena
rio
wher
e
mana
ged
objec
ts are
assig
ned to
users
by
subne
t.

l No object set
needs to be
created.
l Objects in
subnet device
sets are
synchronized
with objects on
subnets in
topology views
in real time,
which
facilitates
network
deployment
planning and
avoids frequent
operation right
adjustments
due to object
addition and
deletion.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

l If multiple
user groups
use the same
operation set
that is bound
to a subnet
device set,
adjustments
to the
operation set
may affect
user groups
that do not
require
operation
right
adjustments.
l An operation
set bound to a
subnet
device set is
apt to lack
operations
that are
performed on
objects in the
subnet
device set, or
the subnet

288

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Mode

Description

Method of
Assigning
Operation
Rights

3 Security Management

Advantage

Disadvantage

Appl
icabl
e
Scen
ario

device set is
apt to lack
objects on
which
operations
contained in
the operation
set are
performed.
Device

Devices are
assigned to
users or user
groups one by
one.
NOTE
In this
configuration
mode, there is
one special
device,
Operations
Support
System OSS,
which
indicates the
U2000 server.
Users can find
the OSS in
topology
views and
view alarms
reported by
the U2000
server only
after the OSS
is added to the
users'
domains. No
operation
rights can be
set for the
OSS.

Issue 03 (2014-12-10)

Security
administrators
must assign
operation
rights by
binding
operations to
each device.

Operations are
direct and easy to
understand.
Operation right
control is more
precise.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Security
administrators
must set
operation rights
for each device,
resulting in
heavy
authorization
workload.
Operation right
maintenance
workload
increases if
rights are
adjusted.

The
mode
appli
es to
small
sized
netw
orks.

289

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Mode

Description

Method of
Assigning
Operation
Rights

Advantage

Disadvantage

Appl
icabl
e
Scen
ario

Subnet

A subnet
(excluding
devices on the
subnet) is
assigned as an
object to users
or user groups.

N/A

None

None

This
mode
is
rarely
used.

This mode
enables users
only to view
subnets on
U2000 clients.
Therefore,
subnets can be
added to users'
domains, but
no operation
rights can be
set for the
subnets.

3.2.1.3 Users and User Groups


A user indicates an U2000 user. A user logs in to the U2000 using a user account. A user group
is a collection of user accounts.

Users
By default, U2000 provides the user account admin that can be used to manage all devices and
has all operation rights. By default, the admin user belongs to the Administrators and
SMManagers user groups and has the most operation rights on the U2000.

User Groups
A user group is a collection of user accounts. After a user account is added to a user group, the
user has domains and operation rights of the user group. A user account can belong to multiple
user groups.
A user account can belong to multiple user groups. When a user account belongs to multiple
user groups, the user has all managed domains and operation rights of these user groups.
NOTE

To delete right A of a user, you also need to delete right A of the user groups that the user account belongs
to, or delete the user account from the user groups that have right A.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

290

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Managing users' operation rights based on user groups makes right management convenient and
clear.
The U2000 provides six default user groups. For details, see Table 3-2.
The default user groups cannot be deleted. The management domain of the default user groups
is All Objects. The rights of the default user groups are provided by the U2000 by default, and
these rights cannot be modified.
The U2000 supports user-defined user groups created based on application requirements. The
management domain and operation rights for user-defined user groups must be appropriate.

NOTICE
Users in the Administrators or SMManagers user group must perform operations as required.
Any operations that may cause damages or pose risks to the U2000 are forbidden.

Table 3-2 Default user groups on the U2000


User Group

Operation Rights Description

Administrators

This user group has all operation rights except those of the
SMManagers user group. Users in the Administrators user group
can perform operations such as maintaining U2000 servers and setting
global parameters.
Users in the Administrators and SMManagers user groups can
manage all objects. Other users can manage only authorized objects.

SMManagers

This user group has operation rights only for Security


Management, which include permissions to configure a security
policy, query security logs, manage users/user groups/object sets/
operation sets/use permissions/security log templates, monitor user
dialogues/operations, force users to exit, unlock users, and re-set user
passwords. The users added to the user group can manage all the users
on the U2000, except for the admin and other security administrators.
Users in the SMManagers user group are U2000 security
administrators.

Maintenance Group

Issue 03 (2014-12-10)

By default, the domain of this user group is All Objects, and it has
operation rights for default maintenance operation sets. In addition to
the rights of the Guests and Operator Group groups, users in this
group have the rights to perform configurations that affect the running
of the U2000 and NEs. For example, they can search for SDH
protection subnets and trails, delete composite services, and reset
boards.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

291

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

User Group

Operation Rights Description

Operator Group

By default, the domain of this user group is All Objects, and it has
operation rights for default operator operation sets. In addition to the
rights of the Guests group, users in this group have the rights to create,
modify, and delete (rights to perform potentially service-affecting
operations are not involved). For example, they can create NEs,
change alarm severities, and configure SDH trails.

Guests

By default, the domain of this user group is All Objects, and it has
operation rights for default monitor operation sets. They can perform
query operations, such as querying statistics, but cannot create or
configure objects.

NBI User Group

By default, this user group has operation rights related to northbound


Service.

3.2.1.4 Object and Object Set


An object on the U2000 is an entity on which only users authorized by security administrators
can perform operations. An object set is a collection of objects.

Object
Objects are classified into security and non-security objects. This topic focuses on security
objects.
On the U2000, a security object is an entity on which only users authorized by security
administrators can perform operations. For example, devices, subnets, and object sets are
security objects.
On the U2000, a non-security object is an entity on which users can perform operations without
the authorization of security administrators. In the Main Topology, not all devices can be
managed by the U2000. If a security administrator creates a common user but does not grant
any rights to the user, the user still can view some objects in the Main Topology after logging
in to the U2000. However, these objects are not security objects because they are not managed
by the U2000.

Object Set
An object set is a collection of objects. The U2000 provides the default object set All Objects
that includes all objects managed by the U2000. The objects in the All Objects set cannot be
modified or deleted.
A maximum number of 99 object sets is recommended in addition to the default object set. The
maximum limit helps prevent performance problems.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

292

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Table 3-3 Object sets provided by the U2000


Object Set

Description

Subnet
device set

The U2000 creates a subnet device set that shares the same name as a subnet
for each subnet in the physical topology view.
Subnet device sets have the following features:
l A subnet device set contains a subnet in the physical topology view and all
objects on the subnet.
l If a subnet contains a lower-layer subnet in the physical topology view, the
corresponding subnet device set contains the lower-layer subnet and
objects on the lower-layer subnet.
l If objects on a subnet in the physical topology view are adjusted, the
adjustments are synchronized to the corresponding subnet device set in the
security management module. The U2000 does not allow security
administrators to directly adjust objects in a subnet device set in the security
management module.
l A subnet device set cannot be added to a user-defined object set.
l All subnet device sets are displayed only in the window in which security
administrators set domains. They are not displayed under the Object Set
node of the navigation tree in the Security Management window.

All objects

The U2000 provides one default object set, the All Objects set that includes
all objects managed by the U2000. This object set cannot be modified or
deleted.

Userdefined
object set

Object sets manually created by a user are user-defined object sets.


User-defined object sets have the following features:
l A user-defined object set can contain NEs, subnets, and other user-defined
object sets.
l When a user-defined object set contains subnets, it contains only the
subnets, excluding objects on the subnets.
l A user-defined object set cannot contain subnet device sets.
l A user-defined object set that contains subobject sets cannot be added to
another user-defined object set.
l Objects in a user-defined object set can only be manually adjusted.

3.2.1.5 Domain
A domain refers to the scope of NE objects managed by a user or user group. After a user logs
in to the U2000 client, only the NE objects in the user's domain are available to this user.
Objects managed by users or user groups vary according to authorization modes for domains.
For details, see Table 3-4.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

293

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Table 3-4 Authorization modes for domains


Authorization
Mode

Description

All Objects

Users or user groups can manage all objects.

Object Set

Users or user groups can manage only NE objects in selected object


sets. They cannot automatically have the operation rights for new NE
objects that are of the same types as those in selected object sets.

Subnet Device Set

Users or user groups can manage all NE objects in selected subnet


device sets. If NE objects in the selected subnet device sets are
adjusted, the NE objects managed by the users or user groups are
adjusted simultaneously.

Device

Users or user groups can manage only selected NE objects. They


cannot automatically have the operation rights for NE objects that are
of the same types as the selected NE objects and are added to the
U2000 later.

Subnet

Users or user groups can perform operations only on selected subnets


on the U2000 client. They cannot view or set operation rights for the
NEs on the selected subnets.
NOTE
If the users or user groups also select a subnet in the subnet device set, the users
or user groups can manage all the NEs objects on the selected subnet, including
NEs that are added to the subnet on the U2000 later.

3.2.1.6 Operation and Operation Set


An operation set is a collection of operations. Security administrators use operation sets to
quickly assign operation rights for objects to users in batches.

Operation Types
On the U2000, users can perform operations on both the U2000 and NEs. Therefore, operations
are classified into two types: NMS application operations and network device operations.
l

NMS application operations are performed on the U2000, such as Acknowledge


Alarms, Add Alarm/Event Mask Rules, Modify Object Position, and Query a Board.

Network device operations are performed for managed NEs, such as Configure the NE
Type, Reset Board, Suppress Device Alarm, and Modify Routing Policy.

The object of NMS application operations is the U2000. For example, those operations involving
topology objects constitute the Topo Management rights and those alarm-related operations
constitute the Fault Management rights. The following Figure 3-4 shows the Select Operation
Rights window. The NMS application operations are classified into more than 20 types and listed
under the Operation node in the Operation area.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

294

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-4 NMS application operations

The objects of network device operations are NEs. All operations for an NE on the U2000
constitute the rights for the NE. A Router NE (CX600-144) is used as an example. All rights for
it are listed under the Operation node in the Operation area as shown in the following figure.
Figure 3-5 Network device operations

Operation Set Types


Based on the two types of operation objects, operation sets provided by the U2000 are also
classified into two types: NMS application operation set and network device operation set.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

295

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Network management application operation set: contains various network management


application operations. Network management application operations correspond to
U2000 functions unrelated to NEs, for example, system log query and topology object
creation.

Network device operation set: contains various network device operations. Network device
operations correspond to U2000 functions related to NEs, for example, NE measurement
result query, NE connection, and NE synchronization.
NOTE

Operation sets that contain operation subsets cannot be added to another operation set because an operation
set cannot contain two levels of operation sets.

The U2000 provides more than 20 types of default NMS application rights (corresponding to
more than 60 types of operation sets) and more than 70 types of network device rights in all
domains (corresponding to more than 200 operation sets). If the default operation sets do not
meet requirements, create operation sets manually.
NOTE

It is not recommended to assign the All Application Operations and All Object Operations operation
sets to common users. All Application Operations contains operations for all U2000 applications except
security applications. All Object Operations contains operations for all NEs managed by the U2000. A
user who is assigned both of the two operation sets has all operation rights for the U2000 and NEs.

Relationships Between Operations and Operation Sets


This section uses topology management as an example to describe relationships between
operations and operation sets.
Topology management belongs to NMS application operations, including about 30 operation
rights that are allocated to operation sets as follows:
l

Low-level rights Set Background and Modify Object Position are allocated to the Topo
Monitor Operation Set.

Medium-level configuration rights Create Link, Export Project Document, Modify


Subnet are allocated to the Topo Operator Operation Set.

High-level rights Period Discovery and Lock/Unlock View are allocated to the Topo
Maintainer Operation Set.

Users can create an operation set and add the desired topology management operations to it to
facilitate operation rights assignment.
NOTE

l A default operation set of the U2000 contains all operations in the operation sets at lower levels.
l The U2000 may define the high and low levels of operation sets differently from O&M engineers'
expectations. In this situation, O&M engineers can create operation sets based on the actual O&M
scenarios.

Specifically, administrators can assign rights for topology management to a user on the New
User Group > Operation Rights > Select > Select Operation Rights GUI in the following
ways:
l

Issue 03 (2014-12-10)

Assign default operation sets to a user. The following operation sets can be assigned: Topo
Monitor Operation Set, Topo Maintainer Operation Set, and Topo Monitor Operation
Set. To view which operations are included in an operation set, right-click it and choose
View Operation Set Member from the shortcut menu. This method is used when the
default operation sets meet the requirement for rights assignment.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

296

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Create operation sets, add desired operations in Topo Management to them, and assign
them to users. This method is used when the default operation sets cannot meet the
requirement for rights assignment.

Assign operation rights in Topo Management to users directly. This method is


inconvenient for management and maintenance. Therefore, it is not recommended.

Default Operation Sets


The U2000 provides more than 200 default operation sets with different types of operations and
levels of rights. You can query the operations contained in all operation sets by 3.2.5.1 Exporting
Operation Sets or query the operations contained in a single operation set by 3.2.8.5 Viewing
Operations in an Operation Set. If the default operation sets do not meet requirements, create
operation sets manually.

3.2.2 Scenarios for Operation Right Management


This section describes all scenarios for operation right management. You can click a desired
scenario to access the corresponding section and view operation details.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

297

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-6 Scenarios for operation right management


Performing the Initial
Authorization

Maintaining Operation Rights

Authorization Plan

Operation Right Adjustment


After Device Addition or
Deletion

Assigning Rights to Users

Operation Right Adjustment


After Personnel's
Responsibilities Change

Transferring
Operation Sets

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

298

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Scenario

Scenario Description

Subscenario or Subtask

Performing the
Initial
Authorization

When performing the initial


authorization for the installed
U2000, you need to plan
management personnel for each
device and assign management
rights to corresponding users.

1. 3.2.3 Authorization Plan


A proper domain and operation
set plan before authorization
can reduce authorization and
maintenance workloads.
2. 3.2.4 Assigning Rights to
Users
After operation rights are
planned, security
administrators can authorize
users based on the plan.
3. 3.2.5 Transferring
Operation Sets
If multiple U2000s are
deployed on the global
network (for example, one
U2000 is deployed in each
region to manage devices) and
operation sets required by the
U2000s are similar according
to an authorization plan,
security administrators can use
the operation set import and
export functions provided by
the U2000 to transfer operation
sets from one U2000 to other
U2000s.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

299

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Scenario

Scenario Description

Subscenario or Subtask

Maintaining
Operation Rights

You need to maintain operation


rights after the initial
authorization is performed. When
a device is added or deleted, or
user responsibilities change,
security administrators need to
change operation rights for users.

l 3.2.6 Operation Right


Adjustment After Device
Addition or Deletion

NOTE
The operation right maintenance
instructions described in this
document are based on the
assumption that users are authorized
by being bound to user groups. For
some sites that use the direct user
authorization, see 3.2.9 FAQs
About Authorization for
processing.

After new devices (NEs or


subnets) are deployed for
maintenance, security
administrators must assign
operation rights for the new
devices to user groups. After
devices are deleted, operation
rights for the devices are
automatically deleted from
users or user groups' operation
rights.
l 3.2.7 Operation Right
Adjustment After
Personnel's Responsibilities
Change
If topology positions of
managed objects remain
unchanged whereas
personnel's responsibilities
change, for example, changes
to managed NE scopes,
operation rights, and posts,
security administrators must
adjust users' operation rights.

3.2.3 Authorization Plan


A proper domain and operation set plan before authorization can reduce authorization and
maintenance workload.

Authorization Planning Process


Figure 3-7 shows the authorization planning process.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

300

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-7 Authorization planning process


Start

Sort original right


management data.

Plan user groups.

Plan domains.

Plan operation sets.

Sort data and create a


user group attribute table.

End

Table 3-5 describes the activities and rules for each procedure in the process.
Table 3-5 Activities and rules for each procedure in the process
Procedure

Description

Rule

Sorting
original
right
manageme
nt data

Sort data based on a carrier's


organization structure and
networking, and obtain the following
data:

l Personnel who manage the same


devices, that is, personnel who
have the same domain
l Personnel who have the same
responsibilities, that is, personnel
who can perform the same
operations on the same devices

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

301

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Procedure

Description

Rule

Planning
user
groups

Classify personnel into groups based


on their responsibilities.

l Place personnel who have the


same responsibilities in a user
group.
l Place a person whose
responsibilities are partially
different from others' in a separate
user group.

Planning
domains

Plan modes for adding managed


objects to domains to improve
authorization and maintenance
efficiency.

Plan domains collectively for


personnel who have the same
management scope. Plan domains
separately for personnel whose
management scopes are partially
different from others'. The subnet
device set mode is preferred for
planning domains. Devices that are
not included in a subnet device set are
added to a user-defined object set to
avoid repeated authorization for
individual devices. To facilitate future
adjustment, it is recommended that a
user-defined object set not include
subobject sets.

Planning
operation
sets

Analyze operation rights required for


personnel to fulfill their
responsibilities and classify the
operation rights into operation sets.

l If user groups support the same


network management application
operations, plan the same network
management application
operation set for the user groups.
Otherwise, plan network
management application
operation sets separately for the
user groups.

Plan network device operation sets


and network management
application operation sets according
to the engineers' management
responsibilities.
NOTE
If the device modes are used in a domain
management plan, you do not need to plan
operation sets.

Issue 03 (2014-12-10)

l If user groups support the same


network device operations, plan
the same network device operation
set for the user groups. Otherwise,
plan network device operation sets
separately for the user groups.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

302

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Procedure

Description

Rule

Sorting
data and
creating a
user group
attribute
table

Sort data and create a user group


attribute table for reference during
authorization and right management.

l The domain column must specify


the subnet device set, user-defined
object set, or device mode in
which managed objects are added
to a domain.

The user group attribute table must


include the user group member,
domain, and operation right columns.

l If the subnet device set mode and


user-defined object set mode are
used, the operation right column
must specify an operation set that
includes all required operations.

Sorting Original Right Management Data


A carrier provides a device management responsibility table based on the carrier's organization
structure and networking, which serves as the original right management data.
The following uses the organization and networking structures for region A as an example to
help you better understand original right management data.
Eleven devices, numbered from 01 to 11, of different types are located in region A. Among them,
devices numbered from 01 to 04 are located on Subnet01; devices numbered from 07 to 10 are
located on Subnet02; Device05, Device06, and Device11 are not located on any subnets. See
Figure 3-8.
Figure 3-8 Networking structure in region A

Eight persons are assigned to manage the devices in region A. Figure 3-9 shows device
management division. Table 3-6 describes the division, providing the original right management
data generated based on the organization and networking structures for region A.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

303

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-9 Device management division

Subnet02

Subnet01

Device01

Device07

Device02

Device05
Device03

Device08

Device06

Device04

Device09

Device10

Device11

A
B
Network
monitoring
engieer

C
D
Data
System maintenance
configuration engineer and partengineer and
time data
part-time system
configuration
maintenance
engineer
engineer

Network
monitoring
engineer

G
H
System maintenance
Data
configuration engineer and parttime data
engineer and
configuration
part-time system
engineer
maintenance
engineer

Table 3-6 Device management division


Management
Scope

Mana
geme
nt
Perso
n

Role and Responsibilities

Subnet01 (Device01,
Device02, Device03,
and Device04),
Device05, Device06,
and Device11

Network monitoring engineer who monitors the device


running status during the daytime.

Network monitoring engineer who monitors the device


running status at night.

l Full-time data configuration engineer who configures


data for managed devices.
l Part-time system maintenance engineer who performs
routine device maintenance when system maintenance
engineer D (full-time) is absent.

l Full-time system maintenance engineer who performs


routine device maintenance.
l Part-time data configuration engineer who configures
data for managed devices when data configuration
engineer C (full-time) is absent.

Subnet02 (Device07,
Device08, Device09,
and Device10),
Device06, and
Device11

Issue 03 (2014-12-10)

Network monitoring engineer who monitors the device


running status during the daytime.

Network monitoring engineer who monitors the device


running status at night.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

304

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Management
Scope

3 Security Management

Mana
geme
nt
Perso
n

Role and Responsibilities

l Full-time data configuration engineer who configures


data for managed devices.
l Part-time system maintenance engineer who performs
routine device maintenance when system maintenance
engineer H (full-time) is absent.

l Full-time system maintenance engineer who performs


routine device maintenance.
l Part-time data configuration engineer who configures
data for managed devices when data configuration
engineer G (full-time) is absent.

To help the authorization planning later, sort out the following items based on the original right
management data:
l

Personnel who manage the same devices, that is, personnel who have the same domain

Personnel who have the same responsibilities, that is, personnel who can perform the same
operations on the same devices

Sort the data in Table 3-6 based on these two items to generate Table 3-7 and Table 3-8.
Table 3-7 Personnel who manage the same devices
Personnel

Managed Devices

A, B, C, and D

Subnet01 (Device01, Device02, Device03, and Device04), Device05,


Device06, and Device11

E, F, G, and H

Subnet02 (Device07, Device08, Device09, and Device10), Device06, and


Device11

Table 3-8 Personnel who have the same responsibilities

Issue 03 (2014-12-10)

Personn
el

Responsibilities

A and B

Manage Subnet01 (Device01, Device02, Device03, and Device04), Device05,


Device06, and Device11.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

305

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Personn
el

Responsibilities

C and D

Work full time or part time to configure data and perform routine maintenance
for Subnet01 (Device01, Device02, Device03, and Device04), Device05,
Device06, and Device11.
l Full-time data configuration engineer C and part-time data configuration
engineer D configure data for the same managed devices.
l Part-time system maintenance engineer C and full-time system maintenance
engineer D perform routine maintenance for the same managed devices.

E and F

Monitor Subnet02 (Device07, Device08, Device09, and Device10), Device06,


and Device11.

G and H

Work full time or part time to configure data and perform routine maintenance
for Subnet02 (Device07, Device08, Device09, and Device10), Device06, and
Device11.
l Full-time data configuration engineer G and part-time data configuration
engineer H configure data for the same managed devices.
l Part-time system maintenance engineer G and full-time system maintenance
engineer H perform routine maintenance for the same managed devices.

Return to Authorization Planning Process.

Planning User Groups


User group planning aims to classify personnel into groups based on their responsibilities. To
help initial authorization and subsequent right maintenance, it is recommended that a person
whose responsibilities are partially different from others' be placed in a separate user group. For
example, personnel who have the same responsibilities in region A, who are described in Table
3-8, are classified into the same user group. Region A does not have persons whose
responsibilities are partially different from others' and therefore you do not need to plan a
separate user group for region A. Table 3-9 describes the user group plan for region A.
Table 3-9 User group plan

Issue 03 (2014-12-10)

User Group

User
Group
Membe
rs

Responsibilities

Network monitoring
engineer group 1

A and B

Monitor Subnet01 (Device01, Device02, Device03, and


Device04), Device05, Device06, and Device11.

Data configuration
and system
maintenance
engineer group 1

C and D

Configure data and perform routine maintenance for


Subnet01 (Device01, Device02, Device03, and
Device04), Device05, Device06, and Device11.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

306

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

User Group

User
Group
Membe
rs

Responsibilities

Network monitoring
engineer group 2

E and F

Monitor Subnet02 (Device07, Device08, Device09, and


Device10), Device06, and Device11.

Data configuration
and system
maintenance
engineer group 2

G and H

Configure data and perform routine maintenance for


Subnet02 (Device07, Device08, Device09, and
Device10), Device06, and Device11.

Return to Authorization Planning Process.

Planning Domains
Domain planning aims to improve authorization and maintenance efficiency by specifying the
modes for adding managed objects to domains.
Plan domains collectively for personnel who have the same management scope. Plan domains
separately for personnel whose management scopes are partially different from others'. Use the
management personnel in region A as an example. A, B, C, and D have the same management
scope, E, F, G, and H have the same management scope (see Table 3-7), and in these two groups
there is no person whose management scope is partially different from others'. In this example,
only two domains are required: one for A, B, C, and D, and the other for E, F, G, and H.
Comply with the following rules when planning domains: Prefer the subnet device set mode.
Devices that cannot be included in a subnet device set are included in a user-defined object
set, avoiding authorization on a device basis. To ensure a clear object set structure and facilitate
maintenance, it is recommended that a user-defined object set not include subobject sets.
Table 3-10 describes domains for region A based on the rules. Figure 3-10 shows management
division based on managed objects in each domain.
Table 3-10 Domains for region A
Personnel

Mode for Adding Objects to a Domain

A, B, C, and
D

l Subnet device set Subnet01.


l User-defined object set Objectset01.
Subnet01 contains Device01, Device02, Device03, and Device04.
Objectset01 contains Device05, Device06, and Device11.

E, F, G, and
H

l Subnet device set Subnet02.


l User-defined object set Objectset02.
Subnet02 contains Device07, Device08, Device09, and Device10.
Objectset02 contains Device06 and Device11.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

307

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-10 Device management division


Domain01

Domain02
Objectset02

Subnet01

Subnet02

Objectset01
Device01

Device02

Device07
Device05

Device03

Device08

Device06

Device04

Device09

Device10

Device11

A
B
Network
monitoring
engineer

C
D
System maintenance
Data
engineer and partconfiguration
time data
engineer and
configuration
part-time system
engineer
maintenance
engineer

E
F
G
H
Data
System maintenance
Network
configuration engineer and partmonitoring engineer and
time data
engineer part-time system
configuration
maintenance
engineer
engineer

Return to Authorization Planning Process.

Planning Operation Sets


To improve efficiency and simplify maintenance, the U2000 supports authorization only by
binding operation sets to personnel after domains are configured in subnet device set and userdefined object set modes. Therefore, security administrators must analyze operation rights
required for personnel to fulfill their responsibilities and classify the operation rights into
operation sets.
If the device modes are used in a domain management plan, you do not need to plan operation
sets.
1.

Analyze operation rights required for personnel to fulfill their responsibilities.


Analyze operation rights based only on user groups because personnel have been classified
into user groups based on their responsibilities during user group planning. Use the user
group plan for region A described in Table 3-9 as an example. Table 3-11 describes
operation rights required for the user groups in this region.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

308

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Table 3-11 Operation rights required for user groups in region A

2.
Issue 03 (2014-12-10)

User Group

User
Group
Memb
ers

Responsibilitie
s

Required Operation Rights

Network
monitoring
engineer
group 1

A and
B

Monitor
Subnet01
(Device01,
Device02,
Device03, and
Device04),
Device05,
Device06, and
Device11.

l Rights to monitor Subnet01


(Device01, Device02, Device03, and
Device04), Device05, Device06, and
Device11.

Configure data
and perform
routine
maintenance for
Subnet01
(Device01,
Device02,
Device03, and
Device04),
Device05,
Device06, and
Device11.

l Rights to configure data and perform


routine maintenance for Subnet01
(Device01, Device02, Device03, and
Device04), Device05, Device06, and
Device11.

l Rights to perform network


management application operations
during device monitoring.

Data
configuration
and system
maintenance
engineer
group 1

C and
D

Network
monitoring
engineer
group 2

E and F Monitor
Subnet02
(Device07,
Device08,
Device09, and
Device10),
Device06, and
Device11.

l Rights to monitor Subnet02


(Device07, Device08, Device09, and
Device10), Device06, and Device11.

Data
configuration
and system
maintenance
engineer
group 2

G and
H

l Rights to configure data and perform


routine maintenance for Subnet02
(Device07, Device08, Device09, and
Device10), Device06, and Device11.

Configure data
and perform
routine
maintenance for
Subnet02
(Device07,
Device08,
Device09, and
Device10),
Device06, and
Device11.

l Rights to perform network


management application operations
during device configuration and
maintenance.

l Rights to perform network


management application operations
during device monitoring.

l Rights to perform network


management application operations
during device configuration and
maintenance.

Plan operation sets.


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

309

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Plan operation sets based on operations that user groups perform on the same type of device.
If user groups support operations on different types of devices, the user groups must be
assigned different operation rights. For example, if user groups have the right to view
Device01 and Device02, and Device01 and Device02 are of different types, the user groups
must be assigned different operation rights.
l If user groups support the same network management application operations, plan the
same network management application operation set for the user groups. Otherwise,
plan network management application operation sets separately for the user groups.
l If user groups support the same network device operations, plan the same network
device operation set for the user groups. Otherwise, plan network device operation sets
separately for the user groups.
For example, network monitoring engineer groups 1 and 2 require the same network
management application operation rights; therefore, the same operation set is planned for
the two groups. Table 3-12 describes the operation set plan for region A.
Table 3-12 Operation set plan for region A
Operation
Set Type

Operation Sets

Network
device
operation
set

l Device monitoring operation set 1: rights to monitor Subnet01


(Device01, Device02, Device03, and Device04), Device05, Device06,
and Device11.
l Device monitoring operation set 2: rights to monitor Subnet02
(Device07, Device08, Device09, and Device10), Device06, and
Device11.
l Device configuration and maintenance operation set 1: rights to
configure and maintain Subnet01 (Device01, Device02, Device03, and
Device04), Device05, Device06, and Device11.
l Device configuration and maintenance operation set 2: rights to
configure and maintain Subnet02 (Device07, Device08, Device09, and
Device10), Device06, and Device11.

Network
manageme
nt
application
operation
set

l Network management application operation set for system monitoring


engineers: rights to perform network management application
operations during device monitoring.
l Network management application operation set for data configuration
and system maintenance engineers: rights to perform network
management application operations during device configuration and
maintenance.
NOTE
The U2000 provides Default Operation Sets. To save operation set creation time,
use these operation sets with preference when planning user authorization.

Return to Authorization Planning Process.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

310

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Sorting Data and Creating a User Group Attribute Table


After planning user groups, domains, and operation sets, create a user group attribute table for
reference during authorization and right maintenance.
The user group attribute table must include the user group member, domain, and operation right
columns. The domain column must specify modes in which managed objects are added to
domains. The operation right column must specify modes in which rights are assigned to
personnel. Table 3-13 is the user group attribute table generated based on Table 3-9, Table
3-10, Table 3-11, and Table 3-12.
Table 3-13 User group attribute table for region A
User
Group

User
Group
Membe
rs

Responsibili
ties

Domain

Operation Rights

Network
monitori
ng
engineer
group 1

A and B

Monitor
Subnet01
(Device01,
Device02,
Device03, and
Device04),
Device05,
Device06, and
Device11.

l Subnet device
set Subnet01.

Network device operation


set: device monitoring
operation set 1, specifying
the rights to monitor
Subnet01 (Device01,
Device02, Device03, and
Device04), Device05,
Device06, and Device11.

Data
configur
ation and
system
maintena
nce
engineer
group 1

Issue 03 (2014-12-10)

C and D

Configure data
and perform
routine
maintenance
for Subnet01
(Device01,
Device02,
Device03, and
Device04),
Device05,
Device06, and
Device11.

l User-defined
object set
Objectset01.
Subnet01 contains
Device01,
Device02,
Device03, and
Device04.
Objectset01
contains Device05,
Device06, and
Device11.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Network management
application operation set:
specifying the rights for
network monitoring
engineers.
Network device operation
set: device configuration and
maintenance operation set 1,
specifying the rights to
configure and maintain
Subnet01 (Device01,
Device02, Device03, and
Device04), Device05,
Device06, and Device11.
Network management
application operation set:
specifying the rights for data
configuration and system
maintenance engineers.

311

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

User
Group

User
Group
Membe
rs

Responsibili
ties

Domain

Operation Rights

Network
monitori
ng
engineer
group 2

E and F

Monitor
Subnet02
(Device07,
Device08,
Device09, and
Device10),
Device06, and
Device11.

l Subnet device
set Subnet02.

Network device operation


set: device monitoring
operation set 2, specifying
the rights to monitor
Subnet02 (Device07,
Device08, Device09, and
Device10), Device06, and
Device11.

Data
configur
ation and
system
maintena
nce
engineer
group 2

G and H

l User-defined
object set
Objectset02.
Subnet02 contains
Device07,
Device08,
Device09, and
Device10.
Objectset02
contains Device06
and Device11.

Configure data
and perform
routine
maintenance
for Subnet02
(Device07,
Device08,
Device09, and
Device10),
Device06, and
Device11.

Network management
application operation set:
specifying the rights for
network monitoring
engineers.
Network device operation
set: device configuration and
maintenance operation set 2,
specifying the rights to
configure and maintain
Subnet02 (Device07,
Device08, Device09, and
Device10), Device06, and
Device11.
Network management
application operation set:
specifying the rights for data
configuration and system
maintenance engineers.

Return to Authorization Planning Process.

3.2.4 Assigning Rights to Users


After operation rights are planned, security administrators can authorize users based on the plan.

3.2.4.1 Authorization Process


This section describes the authorization process for users to have an overall understanding of
authorization.
Figure 3-11 shows the authorization process. You can click a procedure in the flowchart to
access the section for more details. The procedures involved in the authorization process are
described based on the example provided in 3.2.3 Authorization Plan.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

312

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

NOTE

If no user-defined object set or user-defined operation set is involved in the authorization plan, you do not
need to create user-defined object sets or user-defined operation sets. That is, you can skip the first two
procedures in the authorization process.

Figure 3-11 Authorization process


Start

Create user-defined
object sets.

Create user-defined
operation sets.

Create user groups and


authorize them.

Create users and add the


users to the user groups.

End

3.2.4.2 Creating User-Defined Object Sets


If user-defined object sets are involved in the authorization plan, create user-defined object sets
before authorizing user groups.

Prerequisites
l

You have logged in as a user in the SMManagers group.

You have planned object sets. For details, see 3.2.3 Authorization Plan.

After creating object sets during the initial phase of site deployment, you can adjust them
or create object sets during site maintenance.

If an object set is allocated to a user group, all members of the user group can view members
of the object set in the physical topology view.

Context

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

313

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

The topic uses the examples in 3.2.3 Authorization Plan to describe how to create an
object set.

Procedure
Step 1 Determine the object sets to be created and their members based on the authorization plan.
Object sets to be created and their members are listed in the Domain column of Table 9 in 3.2.3
Authorization Plan. The following steps use Objectset01 as an example.
Step 2 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 3 In the NMS User Management navigation tree, right-click the Object Set node and choose
New Object Set.
Step 4 On the Details tab of the New Object Set dialog box, set Type to Network Device, Name to
Objectset01, and Description to Object set for region A.

Step 5 Set members of the object set.


1.

On the Members tab, click Select.

2.

In the Select Object Set Member dialog box, expand the Device node in the Available
Devices and Object Sets area and select members for Objectset01. Click
to add the devices to the Selected Devices and Object Sets area, and click OK.
NOTE

l Object sets that do not contain subsets can also be selected as members of an object set. However, you
are not advised to select such object sets as members to simplify right maintenance.
l To select objects in existing object sets as members, click Copy Members from Object Sets in the
New Object Set dialog box and select one or more object sets in the Copy Members from Object
Sets dialog box. The members of the selected object sets are copied to the Members tab for the current
object set.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

314

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

NOTE

l You can click


and choose Sort by topology position or Sort by device type to sort available or
selected devices and object sets.
l You can enter the desired character string in the Find text box and click
and object sets in the up or down direction.

or

to search for objects

to specify whether to use the Match whole word only or Match case rules during
l You can click
an object or object set search.

Step 6 In the New Object Set dialog box, click OK. The object set is created.
----End

Result
The new object set is displayed in the object set list. You can double-click the object set to view
the objects contained in the object set on the Members tab.

Follow-up Procedure
You can click Select in the lower right corner of the Members tab and adjust the members of
the object set in the dialog box that is displayed.

3.2.4.3 Creating User-Defined Operation Sets


If operation sets are involved in the authorization plan, you need to create operation sets before
authorizing user groups.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

315

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Prerequisites
l

You have logged in as a user in the SMManagers group.

You have planned operation sets. For details, see 3.2.3 Authorization Plan.

Operation sets can be allocated to users or user groups.

If an operation set is allocated to a user group, all members of the user group have the
operation rights in the operation set.

The U2000 provides default operation sets.

This topic uses the examples in 3.2.3 Authorization Plan to describe how to create an
operation set.

Context

Procedure
Step 1 Determine the operation sets to be created and their types and members based on the
authorization plan.
Operation sets to be created and their types and members are listed in the Operation Rights
column of Table 9 in 3.2.3 Authorization Plan. The following steps use Device Monitoring
Operation Set 1 (a network device operation set) as an example to describe how to create an
operation set.
Step 2 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 3 In the NMS User Management navigation tree, right-click the Operation Set node and choose
New Operation Set.
Step 4 On the Details tab of the New Operation Set dialog box, set Type to Network Device,
Name to Device Monitoring Operation Set 1, and Description to Operation of monitoring
devices in domain A.

Step 5 Set members of the operation set.


1.

On the Members tab, click Select.

2.

In the Select Operation Set Member dialog box, expand the Operation node in the
Available Rights area and select members for Device Monitoring Operation Set 1. Click
to add the members to the Selected Rights area, and click OK.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

316

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

NOTE

l Operation sets that do not contain subsets can also be selected as members of an operation set.
However, you are not advised to select such operation sets as members to simplify right
maintenance.
l To select operations in existing operation sets as members, click Copy Members from
Operation Sets in the New Operation Set dialog box and select one or more operation sets in
the Copy Members from Operation Sets dialog box. The members of the selected operation
sets are copied to the Members tab for the current operation set.

NOTE

l You can enter the desired character string in the Find text box and click
operations and operation sets in the up or down direction.

or

to search for

to specify whether to use the Match whole word only or Match case rules during
l You can click
an operation or operation set search.

Step 6 In the New Operation Set dialog box, click OK. The operation set is created.
----End

Result
The new operation set is displayed in the operation set list. You can double-click the operation
set to view the operations contained in the operation set on the Members tab.

Follow-up Procedure
You can click Select in the lower right corner of the Members tab and adjust the members of
the operation set in the dialog box that is displayed.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

317

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

3.2.4.4 Creating and Authorizing U2000 User Groups


When the default user groups of the U2000 cannot meet the requirements for user rights, you
can customize user groups according to the operation rights of users and assign operation rights
to users in a centralized manner.

Prerequisites
l

You have logged in as a user in the SMManagers group.

You have planned user groups. For details, see 3.2.3 Authorization Plan.

You are familiar with the operation rights of the U2000 default user groups.

Procedure
Step 1 Determine the user group to be created based on the authorization planning.
User groups to be created and their domains and operation sets are listed in Table 9 in 3.2.3
Authorization Plan. The following steps use Network monitoring engineer group 1 as an
example.
Step 2 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 3 In the NMS User Management navigation tree, right-click the User Group node and choose
New User Group.
Step 4 In the New User Group dialog box, set the attributes of the user group.
1.

On the Details tab, set the user group name, description, type, and maximum number of
sessions.
Set Name to Network monitoring engineer group 1, Description to rights to monitor
Subnet01 (Device01, Device02, Device03, and Device04), Device05, Device06, and
Device11, User group type to Common User Group, and Maximum sessions to the
default value Unlimited.
NOTE

If the operation rights of the new user group are the same with those of existing user groups, you can
copy operation rights from the existing user group. Click Copy Rights from User Groups. In the
Copy Rights from User Groups dialog box, select one or multiple user groups and click OK. After
the copy is complete, the domains and operation rights of the selected user groups are respectively
displayed on the Domain and Operation Rights tabs. Security administrator can adjust the domains
and rights as required.

2.

Optional: Select members.


Click Add. In the Add User dialog box, select the desired user and click OK.
NOTE

You can add users to a user group in any of the following ways:
l When creating a user group, select users as its members.
l When creating a user, add the user to a user group.
l After a user or user group is created, add the user to a user group by setting user groups for the
user or add users by setting members for the user group.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

318

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3.

3 Security Management

Click Next.

Step 5 Set the domain for the user group to specify the object scope that the user group manages.
1.

On the Domain tab, click Select.

2.

In the Select Domain dialog box, set domain parameters and click OK.
l In the Authorization Mode area, click the icon above Object Set. In the Available
Objects area, select Objectset01 and click
added to the Selected Objects area.

. The selected object set is

NOTE

Only user-defined object sets created by security administrators are displayed under the Object
Set node. If no user-defined object set has been created, no object set is displayed under this
node.

l In the Authorization Mode area, click the icon above Subnet Device Set. In the
Available Objects area, select Subnet01 and click
devise set is added to the Selected Objects area.

. The selected subnet

NOTE

You can select other authorization modes in the Authorization Mode area as required.
You can click More or Hide to expand or hide the authorization modes.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

319

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

NOTE

l In the Available Objects area, you can click


subnet device set.

to view members of the selected object set and

l You can enter the desired character string in the Find text box and click
for objects in the up direction or down direction, and click
Match whole word only or Match case rules.

or

to search

to specify whether to set the

l After clicking
to select the Device authorization mode, you can click
and choose Sort
by topology position or Sort by device type to sort available or selected objects.

3.

Click Next.

Step 6 Set operation rights for the user group to assign U2000 application rights and object operation
rights to users.
1.

On the Operation Rights tab, click Select.

2.

In the Select Operation Rights dialog box, set parameters and click OK.
l In the Authorization Objects area, select Network Management Application. In the
Operations area, select Network management application operation set for system
monitoring engineers. Click
Rights area.

. The selected right is added to the Selected

l In the Authorization Objects area, expand the Subnet Device Set node and select
Subnet01. In the Operations area, select Device monitoring operation set 1. Click
. The selected right is added to the Selected Rights area.
l In the Authorization Objects area, expand the Object Set node and select
Objectset01. In the Operations area, select Device monitoring operation set 1. Click
. The selected right is added to the Selected Rights area.

NOTE

After an authorized object is selected, operations that can be bound to the authorized object are
displayed in the Operations area. For details about the binding relationship between authorized
objects and operations, see Operation Rights.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

320

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

NOTE

l In the Authorization Objects and Operations area, you can click


the selected object set, subnet device set, and operation set.
l You can click

to collapse all expanded nodes.

l After binding operations to a selected device, you can click


position or Sort by device type to sort rights for the device.

3.

to view the members of

and choose Sort by topology

Click Finish.

----End

Result
The new user group is displayed in the user group list. You can double-click the user group to
view:
l

Objects managed by the user group on the Domain tab

Operations that users in the user group can perform on the objects on the Operation
Rights tab

Follow-up Procedure
You can click Select in the lower right corner of the Domain and Operation Rights tabs to
adjust the managed objects and operations respectively for the user group in the dialog box that
is displayed.

3.2.4.5 Creating Users and Adding Them to User Groups


By creating users and adding them to user groups, you can quickly assign operation rights to
them.

Prerequisites
l

You have logged in as a user in the SMManagers group.

You are familiar with account and password policies. For details, see Account Policy and
Password Policy.

When you create an U2000 user, ensure that the attributes of the user must comply with
the account and password policies. For details about how to set account and password
policies, see 3.3.1.4 Setting Account Policies and 3.3.1.5 Setting Password Policies.

After the U2000 user is created, add it to a user group so that the operation rights of the
user group are granted to the user. Do not set domains or operation rights for the user
individually.

A user account can belong to multiple user groups. When a user account belongs to multiple
user groups, the user has all managed domains and operation rights of these user groups.

Context

NOTE

To delete right A of a user, you also need to delete right A of the user groups that the user account
belongs to, or delete the user account from the user groups that have right A.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

321

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

You must set the user name and password when creating a user. For the other attributes,
you can use default values or set them after you create the user successfully.

This topic uses the examples in 3.2.3 Authorization Plan to describe how to create a user
and add it to a user group.

Procedure
Step 1 Determine the users to be created based on the authorization plan.
Users to be created and their user groups are listed in Table 9 in 3.2.3 Authorization Plan. The
following steps use user A as an example. Because the user name is too short and does not comply
with the U2000 security policy, the user name is changed to Network monitoring engineer
A.
Step 2 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 3 In the NMS User Management navigation tree, right-click the User node and choose New
User.
Step 4 In the New User dialog box, set general attributes of the user and add it to a user group. For
details, see New User Account.
1.

Set general attributes such as the user name, password, and confirm password.
Set User name to Network monitoring engineer A, Full Name to Network monitoring
engineer Tom, and Description to Network monitoring engineer.
NOTE

l Before setting the password, click Password Policy to view the preset password policy.
l On the Password Policy tab, you can also click Advanced to optimize the user policy.

2.

Click Add. In the Add User Group dialog box, select the desired user group and click
OK.

In the Add User Group dialog box, select Network monitoring engineer group 1.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

322

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Step 5 In the New User dialog box, click OK. The user account is created.
----End

Result
The new user account is displayed in the user list. You can double-click the user account to view
the user groups to which the user has been added on the User Groups tab.

Follow-up Procedure
To add the user to another user group, click Add in the lower right corner of the User Groups
tab. To delete the user from a user group, select the user group on the User Groups tab and click
Delete in the lower right corner of the tab.

3.2.5 Transferring Operation Sets


If multiple U2000s are deployed on the global network (for example, one U2000 is deployed in
each region to manage devices) and operation sets required by the U2000s are similar according
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

323

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

to an authorization plan, security administrators can use the operation set import and export
functions provided by the U2000 to transfer operation sets from one U2000 to other U2000, or
add or modify operation sets on one U2000 in batches.

3.2.5.1 Exporting Operation Sets


By exporting operation sets to a file, you can back up all operation sets to your local computer
and query the operation set to which a right belongs. You can also add operation sets or change
operation set members in the file and import the file to the U2000 using the Import Operation
Sets function.

Prerequisites
You have logged in as the admin user.

Context
l

For a newly installed U2000, you can export network management application operation
sets and network device operation sets to files, add new operation sets to the files, and
import the files to the U2000 using the Import Operation Sets function. In this way, you
can create operation sets in batches at one time.

For an U2000 that has being running for a period of time, you can export existing operation
sets to files on the local computer. This helps you restore operation sets using the Import
Operation Sets function if some operation sets are lost after an upgrade or a batch deletion
of old operation sets.

The exported operation set file does not contain the default U2000 operation sets: Security
Monitor Operation Set, All Object Operations and All Application Operations.

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 On the top of the NMS User Management navigation tree, click
Operation Sets.

and choose Export

Step 3 In the Save dialog box, name the file, specify a path, and then click Save.
Step 4 In the Information dialog box, click OK.
----End
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

324

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Result
l

The Network Management Application and Network Device operation sets are saved in
separate files.
NOTE

All operation information is listed in columns A to E in the exported operation set files. The cells
after column E provide the names of operation sets that exist on the U2000. Operations marked with
the letter Y are members in the corresponding operation sets.

The formats of default file names are


Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device.csv and
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Management_Application.
csv.
NOTE

l You can specify Operation_Sets_YYYY_MM_DD_HH_MM_SS when saving operation set


files.
l An operation set file can contain a maximum of 100 operation sets. When the maximum number
is reached, subsequent data is saved in a new operation set file named in the format
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device@N.csv or
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Management_Application@N.cs
v. N is an integer starting from 1. For example, if exported data includes 300 Network Device
operation sets, the Network Device operation sets are saved in three files named in the following
formats: Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device.csv,
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device@1.csv, and
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device@2.csv.

3.2.5.2 Adding Operation Sets or Changing Operation Set Members in Batches


If you want to add multiple operation sets or adjust the members of multiple operation sets in
batches, you can export the information about all the operation sets in the U2000 system into a
file, add operation sets and change operation set members in the file, and then import the edited
file for it to take effect.

Prerequisites
l

You have logged in as the admin user.

The file containing the exported operation set information should be edited by user
admin based on the right-related policy and operation set planning.

The information about all the operation sets in the U2000 is exported and saved in a file.
For details, see 3.2.5.1 Exporting Operation Sets.

You are familiar with the planning of system operations or operation sets. For details, see
3.2.3 Authorization Plan.

This operation does not apply to the change of operation set names.

The information in columns from A to E in the operation set file cannot be modified. If it
is modified, importing the file will fail. If the information is modified, export operation set
file again.

In the operation set file, the table cells in line 10 and columns except columns from A to E
contain only operation set names.

Context

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

325

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

If the operation set name in the file exists in the current U2000, the operation set fails to
import.

The naming convention of a new operation set is the same as that of an operation set created
in the U2000.

Procedure
Step 1 Open and edit the .csv file containing the exported operation set information.
Figure 3-12 Files containing the U2000 application operation sets

To add an U2000 application operation set, perform the following steps:


l

Adding an operation set


1.

In the .csv file, add a column next to column E, and enter the name of the new operation
set in the first cell of the new column, such as Figure 3-12. Assume that the U2000
has Operation Set A and Operation Set B, you can add New Operation Set C next
to Operation Set B.

2.

Adding members for the new operation set. You can enter Y in the line where an
operation to be performed. See Figure 3-12. The blue area stand for that Create
Subnet and Modify NE are performed for New Operation Set C.
NOTE

Only letter Y is valid.

Modifying the operations of an operation set. Assume Operation Set A already exists in
the U2000. You can modify the operation set members as follows:
1.

Enter Y in the associated table cell of operation set. If you need to delete Query
System Logs of Operation Set A, delete Y of Operation Set A. If you need to add
Create Subnet, type Y in the associated table cell of Operation Set A.

2.

To prevent a file import failure due to inconsistency between operation set information
in the file and that on the U2000 client, delete the operation set modified in the previous
step from the client. In this example, delete Operation Set A.

Step 2 Save the file, and import the file by following the procedure provided in 3.2.5.3 Importing
Operation Set Files for the file to take effect.
----End

Result
After the file is imported successfully, you can view the change of the rights in an operation set.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

326

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

3.2.5.3 Importing Operation Set Files


You can import operation set files to restore the lost operation sets on the U2000. By importing
operation set files. you can also add operation sets or change operation set members in batches
on the U2000.

Prerequisites
l

You have logged in as the admin user.

The information about all the operation sets in the U2000 system has been exported and
saved in a file. For details, see 3.2.5.1 Exporting Operation Sets.

You are familiar with the planning of operation sets. For details, see 3.2.3 Authorization
Plan.

The operation set files to be imported must be files exported using the Export Operation
Sets function.

If an operation set name in the file already exists in the current U2000, the operation set
fails to be imported.

Context

Procedure
Step 1 Optional: In the exported operation set files, add operation sets or modify members in the
operation sets in batches.

NOTICE
l This operation does not apply to the change of operation set names.
l The information in columns from A to E in the operation set file cannot be modified. If it is
modified, importing the file will fail. If the information is modified, export operation set file
again.
l In the operation set file, the table cells in line 10 and columns except columns from A to E
contain only operation set names.
1.

Open and edit the .csv file containing the exported operation set information.
Figure 3-13 File containing network management application operation sets

To add an U2000 application operation set, perform the following steps:


Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

327

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Operation Name

3 Security Management

Operation Method

Add an operation set 1. In the .csv file, add a column next to column E, and enter the
name of the new operation set in the cell next to Operation
Type ID in the new column, such as Figure 3-13. If the
U2000 has Operation Set A and Operation Set B and they
already exist in columns F and G, you can add New
Operation Set C next to Operation Set B.
NOTE
The operation set name contains a maximum of 100 characters.

2. Add members for the new operation set. You can enter Y in
the row corresponding to an operation, as shown in the blue
rectangle in Figure 3-13. Create Subnet and Modify NE are
added for New Operation Set C.
NOTICE
Only letter Y is valid.

Modify the
operation set
members

Assume Operation Set A already exists in the U2000. You can


modify the operation set members as follows:
1. In the Operation Set A column, enter or delete Y at rows of
operations. If you need to delete the Query System Logs
operation from Operation Set A, delete Y at row Query
System Logs, column Operation Set A. If you need to add
the Create Subnet operation, enter Y at row Create
Subnet, column Operation Set A.
2. To prevent a file import failure due to inconsistency of
operation set information between the file and the U2000
client, delete the operation set modified in the previous step
from the client. For example, delete Operation Set A.

2.

Save the file.

Step 2 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 3 On the top of the NMS User Management navigation tree, click
Operation Sets.

and choose Import

Step 4 In the Open dialog box, select the .csv file to be imported and click Open.
Step 5 In the Confirm dialog box, click Yes.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

328

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Step 6 In the Information dialog box, click OK.


----End

Result
Operation sets contained in the imported file are listed under the Operation Set node in the
navigation tree on the left. After you choose an operation set, its members are displayed in the
right pane, which are the same as those specified in the imported file.

3.2.6 Operation Right Adjustment After Device Addition or


Deletion
After new devices (NEs or subnets) are deployed for maintenance, security administrators must
assign operation rights for the new devices to user groups. After devices are deleted, operation
rights for the devices are automatically deleted from users or user groups' operation rights.

3.2.6.1 Adjusting Operation Rights After an NE Is Added


After an NE is added, a security administrator must assign operation rights for the NE to the
user group that manages the NE.

Prerequisites
l

You have logged in as a user in the SMManagers group.

A user group has been planned to manage the new NE.

Context
If initial authorization has met the following conditions, users in the user group automatically
have the operation rights for the new NE, and no adjustment is required.
The subnet device set to which the new NE belongs has been added to the user group's domain.
The operation set bound to the subnet device set contains all required operations on the new NE.
Figure 3-14 shows the process of adjusting operation rights after an NE is added.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

329

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-14 Process of adjusting operation rights after an NE is added


Start

Check user groups' domains


and operation rights. Do the user groups
automatically have operation rights
for the new NE?

Yes

No

After the subnet device set


to which the new NE belongs is added
to the user groups' domains, do the user
groups lack operations performed
on the new NE?

Yes

Add the operations performed on the new NE


to the user groups' operation sets.

No
Add the new NE to the user groups' domains.

Assign the operations performed on the


new NE to the user groups.

End

Procedure
Step 1 Viewing the Domain of a User or User Group and Viewing Operation Rights of a User or
User Group. Determine whether the user group automatically has the operation rights for the
new NE based on the context information mentioned above.
l If yes, the procedure ends.
l If the subnet device set to which the new NE belongs has been added to the user group's
domain, but the user group's operation rights do not contain the operation rights for the NE,
perform Step 2.
l If none of the preceding conditions is met, perform Step 4.
Step 2 Add the operation rights for the new NE to the user group's operation set.
1.

Issue 03 (2014-12-10)

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

330

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Center and choose OSS Security > OSS User Management from the main menu
(application style).
2.

In the NMS User Management navigation tree, expand the Operation Set node and select
the user group's operation set.

3.

On the Members tab page in the right pane, click Select.

4.

In the Available rights area of the Select Operation Set Member dialog box, select
operation rights for the type of the new NE.

5.

Click

6.

Click OK.

to move the operation rights to the Selected Rights area.

The operation rights for the new NE are assigned to the user group.
Step 3 Add the new NE to the user group's domain.
l If the user group is authorized using a user-defined object set, perform the following steps:
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in
Application Center and choose OSS Security > OSS User Management from the
main menu (application style).

2.

In the NMS User Management navigation tree, expand the Object Set node and select
the user group's object set.

3.

On the Members tab page in the right pane, click Select.

4.

In the Available Devices and Object Sets area of the Select Object Set Member dialog
box, expand all nodes and select the new NE.

5.

Click

6.

Click OK.

to move the new NE to the Selected Devices and Object Sets area.

l If the user group is authorized using the device mode, perform the following steps:
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in
Application Center and choose OSS Security > OSS User Management from the
main menu (application style).

2.

In the NMS User Management navigation tree, expand the User Group node and
choose the user group that manages the new NE.

3.

On the Domain tab page in the right pane, click Select.

4.

In the Select Domain dialog box, click More in the Authorization Mode area and
select Device.

5.

In the Available Objects area, select the new NE.

6.

Click

7.

Click OK.

to move the new NE to the Selected Objects area.

Step 4 Verify that the user group's operation rights include the operation rights for the new NE.
l If the user group is authorized using a user-defined object set, perform the following steps:
1.

Issue 03 (2014-12-10)

In the NMS User Management navigation tree, expand the Operation Set node and
select the operation set corresponding to the user-defined object set.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

331

iManager U2000 Unified Network Management System


Operation Guide for Common Features

2.

3 Security Management

On the Members tab page in the right pane, check whether the user group's operation
set contains the operation rights for the new NE.
If yes, the procedure ends.
If no, go to the next step.

3.

On the Members tab page in the right pane, click Select.

4.

In the Available Rights area of the Select Operation Set Member dialog box, select
operation rights for the type of the new NE.

5.

Click

6.

Click OK.

to move the operation rights to the Selected Rights area.

l If the user group is authorized using the device mode, perform the following steps:
1.

On the Operation Rights tab page in the right pane, click Select.

2.

In the Authorization Objects navigation tree of the Select Operation Rights dialog
box, expand the Device node and select the new NE.

3.

In the Operation navigation tree, select required operation rights and add them to
Selected Rights in the right pane.

4.

Click OK.

The operation rights for the new NE are assigned to the user group.
----End

3.2.6.2 Adjusting Operation Rights After a Subnet Is Added


After a subnet is added, a security administrator must assign operation rights for the subnet to
the user groups that manage the subnet.

Prerequisites
l

You have logged in as a user in the SMManagers group.

You have obtained information about user groups that manage the new subnet, types of all
devices on the subnet, and operation rights required for the user groups to manage the
devices.

Based on the original authorization mode, assign operation rights for the new subnet as
follows:

Context

If the original authorization mode is the single-device mode, assign operation rights
based on subnet device sets.
If the original authorization mode is the subnet device set mode or user-defined object
set mode, assign operation rights based on subnet device sets.
l

If the new subnet is managed by multiple user groups, adjust each user group's operation
rights in a similar way. This section describes the process of adjusting a user group's
operation rights.

Figure 3-15 shows the process of adjusting operation rights after a subnet is added.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

332

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-15 Process of adjusting operation rights after a subnet is added


Start

Query user groups' authorization modes.

User groups are authorized in


single-device mode.

User groups are authorized in subnet


device set or user-defined object set mode.

Add the subnet device set corresponding to


the new subnet to the user groups' domains.

Add the subnet device set corresponding to


the new subnet to the user groups' domains.

Create an operation set. Add operations


performed on objects on the new subnet to
the operation set.

Yes

Assign the operation set to the user groups.

Do the user
groups' operation sets contain
operations performed on various
types of devices on the
new subnet?

Bind the operation sets to the


subnet device set.

No

Add the operations performed on various


types of devices on the new subnet to the
user groups' operation sets.

End

Procedure
Step 1 Add the subnet device set corresponding to the new subnet to the user group's domain.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the User Group node and choose
the user group that manages the new subnet.

3.

On the Domain tab page on the right, click Select.

4.

In the Authorization Mode area of the Select Domain dialog box, select Subnet Device
Set.

5.

In the Available Objects area, select the subnet device set that corresponds to the new
subnet and has the same name as the new subnet, and click
device set to the user group's domain.

6.

to add the subnet

Click OK to close the Select Domain dialog box.

Step 2 Query the user group's authorization mode. For details, see 3.2.8.2 Viewing Operation Rights
of a User or User Group.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

333

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

l If the user group is authorized in single-device mode, create an operation set for the new
subnet. For details, see 3.2.4.3 Creating User-Defined Operation Sets. After an operation
set is created, perform Step 5.
l If the user group is authorized in subnet device set mode or user-defined object set mode,
perform Step 3.
Step 3 Check whether the network device operation set contains all operation rights for various types
of devices on the new subnet. For details, see 3.2.8.5 Viewing Operations in an Operation
Set.
l If the network device operation set does not contain all required operation rights, perform
Step 4.
l If the network device operation set contains all required operation rights, perform Step 5.
Step 4 Modify the network device operation set so that it contains all operation rights for various types
of devices on the new subnet.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the Operation Set node and
choose the network device operation set corresponding to the user group.

3.

On the Members tab page in the right pane, click Select.

4.

In the Available Rights area of the Select Operation Set Member dialog box, select
operation rights for various types of devices on the new subnet.

5.

Click

6.

Click OK.

to move the operation rights to the Selected Rights area.

Step 5 Bind the network device operation set that contains all required operation rights for the new
subnet to the subnet device set.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the User Group node and choose
the user group that manages the new subnet.

3.

On the Operation Rights tab page in the right pane, click Select.

4.

In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Subnet Device Set node in the navigation tree and choose the subnet device set
corresponding to the new subnet.

5.

In the Operation area, select the network device operation set that contains all required
operation rights for the new subnet. Click
operation set to the Selected Rights area.

6.

to add the network device

Click OK to close the Select Operation Rights dialog box.

The operation rights for the new subnet are assigned to the user group.
----End
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

334

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

3.2.6.3 Adjusting Operation Rights After the Networking Structure Is Changed


After the networking structure is changed (including NE transfer and global networking structure
modification), management responsibilities may be shifted from one group to another. If this
occurs, security administrators must adjust user groups' operation rights.

Procedure
l

During NE transfer (for example, when an NE is transferred from one subnet to another),
a security administrator adjusts user groups' operation rights by deleting the NE from the
transferor user group's domain and adding the NE to the transferee user group's domain.
For details, see 3.2.6.1 Adjusting Operation Rights After an NE Is Added.
If the NEs are assigned to the transferor user group in subnet device set mode, the
security administrator does not need to adjust the transferor user group's operation rights
after NE transfer.
If the NEs are assigned to the transferor user group in object set mode or device mode,
delete the NEs from the user group's domain. For details, see NE Scope Change.

During global networking structure modification, a security administrator plans


authorization and authorizes users again. For details, see Performing the Initial
Authorization.

----End

3.2.7 Operation Right Adjustment After Personnel's


Responsibilities Change
If the topology of managed objects remains unchanged whereas personnel's responsibilities
change, for example, changes to managed NE scopes, operation rights, and posts, security
administrators must adjust users' operation rights.

3.2.7.1 Adjusting Operation Rights After the Scope of Managed Objects Is Changed
When the topology of managed objects remains unchanged and the management rights are
transferred from a user group to another one, security administrators must adjust the user group
rights.

Prerequisites
You have logged in as a user in the SMManagers group.

NE Scope Change
In subnet device set mode, user groups are assigned operation rights for devices based on subnets.
Therefore, security administrators do not need to adjust operation rights after the scope of
managed objects is changed if user groups are authorized in subnet device set mode.
Step 1 Delete NEs from the transferor user group's domain.
1.

Issue 03 (2014-12-10)

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

335

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Center and choose OSS Security > OSS User Management from the main menu
(application style).
2.

In the NMS User Management navigation tree, expand User Group and select the user
group that no longer manages NEs.

3.

On the Domain tab page in the right pane, delete NEs based on authorization modes.
Operation Right
Configuration Mode

NE Deletion Method

Add an NE to an object
set and assign the object
set to a user group.

1. In the NMS User Management navigation tree, expand


the Object Set node and choose the object set to which
the NE belongs.
2. On the Applicable for tab page in the right pane, check
whether the object set has been assigned to other user
groups.
l If no, perform step 3 to delete the NE from the object
set. The procedure ends.
l If yes, check whether the NE deletion applies to these
user groups.
If yes, perform step 3 to delete the NE from the
object set. The procedure is complete.
If no, perform steps 4, 5, and 6 to change the object
set for the user group that no longer manage the
NE. The procedure is complete.
3. On the Members tab in the right pane, select the NE and
click Delete. In the Confirm dialog box, click OK.
4. Re-create an object set. For details, see Creating UserDefined Object Sets. Copy the members of the original
object set to the new object set and delete the NE that is
no longer managed by the user group.
5. On the Domain tab for the user group, add the new object
set to the user group's domain. On the Operation
Rights tab for the user group, bind the operation set for
the original object set to the new object set.
6. Delete the original object set from the user group's
domain.

Assign an NE to a user
group in device mode.

1. Expand the Device node, choose the NE, and click


Delete in the lower right corner.
2. In the Confirm dialog box, click OK.

Step 2 Adjust the operation rights for the NEs for the transferee user group. For details about how to
adjust operation rights, see 3.2.6.1 Adjusting Operation Rights After an NE Is Added.
----End

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

336

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Subnet Scope Change


The entire subnet is transferred from a user group to another.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand User Group and select a user
group that does not manage the subnet.

3.

On the Domain tab page right to the navigation tree, select the subnet device set and click
Delete.

4.

In the Confirm dialog box, click OK.

5.

For a user group that is going to manage subnet rights, assigning subnet rights to it means
adding a new subnet. For details about how to adjust operation rights, see 3.2.6.2 Adjusting
Operation Rights After a Subnet Is Added.

3.2.7.2 Adjusting Operation Rights After the Scope of Operation Rights Is Changed
If a user group's operation rights for a managed object must be added or deleted due to changes
to personnel's responsibilities, security administrators must adjust operation rights as required.

Prerequisites
You have logged in as a user in the SMManagers group.

Procedure
Step 1 View the operation rights of a desired user group.
Step 2 Adjust the operation rights of the user group as required.
Task

Operations

Adding an operation
right for a managed
object

l For assigning operation rights for a single device or a device


type:
1. On the Operation Rights tab page, click Select.
2. In the Select Operation Rights dialog box, expand
Device or Device Type in the Authorization Objects
navigation tree and select a device or a device type. In the
Operation navigation tree, select the desired operations
and add them to Selected rights in the right pane.
3. Click OK.
l For details about how to assign operation rights for subnet
device sets and user-defined object sets on the basis of existing
operation sets, see step 4 in 3.2.8.5 Viewing Operations in
an Operation Set.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

337

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Task

Operations

Deleting an operation
right for a managed
object

l For assigning operation rights for a single device or a device


type: On the Operation Rights tab page, expand Device or
Device Type, select the desired operations, and click Delete.
l For assigning operation rights for subnet device sets and userdefined object sets: Select the bound operation sets, rightclick, and choose View Members from the shortcut menu.
Check whether the operation sets contain operation rights that
need to be deleted. If the operation sets contain operation
rights that need to be deleted, see step 4 in 3.2.8.5 Viewing
Operations in an Operation Set to delete the operation
rights.
NOTE
An operation may exist in multiple operation sets. The operation right
is deleted from a user group only when all operation sets bound to the
user group do not contain the operation.

----End

3.2.7.3 Adjusting Operation Rights After Management Personnel's Posts Change


After management personnel's posts change due to role changes, recruitment, resignation, or
other reasons, U2000 security administrators must adjust users' operation rights.

Prerequisites
You have logged in as a user in the SMManagers group.

Role Change
After management personnel's roles change, security administrators must perform the following
steps to adjust user groups to which the personnel belong:
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand User and select a user whose user
group is to be adjusted.

3.

On the User Groups tab page in the right pane, select the user group to which the user
belongs and click Delete. In the Confirm dialog box that is displayed, click Yes.

4.

On the User Groups tab page in the right pane, click Add. In the Add User Group dialog
box, select a user group to which the user is to be added and click OK.

Recruitment
If new employees are recruited, security administrators must create user accounts and assign the
user accounts to the new employees. For details about how to create user accounts and assign
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

338

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

operation rights to user accounts, see 3.2.4.5 Creating Users and Adding Them to User
Groups.

Resignation
After an employee resigns, the employee's user account is no longer used or is retained.
l

To delete the user account, security administrators perform the following steps:
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in
Application Center and choose OSS Security > OSS User Management from the
main menu (application style).

2.

In the NMS User Management navigation tree, expand User. Right-click the user to
be deleted and choose Delete from the shortcut menu. In the Confirm dialog box that
is displayed, click Yes.

To retain the user account for future use, security administrators perform the following
steps:
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in
Application Center and choose OSS Security > OSS User Management from the
main menu (application style).

2.

In the NMS User Management navigation tree, expand User and choose a user.

3.

On the Details tab page, set Disable user account to Yes.

NOTICE
l If the policy for deleting a user account when the user account is not used to log
in for a specified period has been set in Setting the Account Policy, the user
account is deleted when it has not been used to log in for the specified period.
l After an employee resigns or a user account is re-enabled, the corresponding user
password must be changed to improve account security.
4.

Click Apply to save the settings.

3.2.8 Querying Authorization


During the period of initial authorization and right maintenance, you can query the user rights
and right assignment and compare the right differences between two users.

3.2.8.1 Viewing Domains of a User or User Group


Security administrators can view domains of a user or user group to identify objects that are
managed by the user or user group.

Prerequisites
You have logged in as a user in the SMManagers group.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

339

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 In the NMS User Management navigation tree, expand the User or User Group node and select
a user or user group.
Step 3 On the Domain tab, view managed objects in the domains.

The following table lists different methods for viewing domains based on the authorization
mode.
Authorization
Mode

Method

All objects

No operation is required. The domain contains all network objects.

Subnet device set

Expand the Subnet Device Set node. Right-click the desired subnet
device set and choose View Member from the shortcut menu.

User-defined
object set

Expand the Object Set node. Right-click the desired user-defined object
set and choose View Member from the shortcut menu.
To change objects in the object set, see step 4 in 3.2.8.6 Viewing Objects
Contained in an Object Set.

Device

Issue 03 (2014-12-10)

Expand the Device node and view managed devices.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

340

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

NOTE

l If you select the Show the domain of the owner user group check box when viewing a user's domain,
managed objects displayed include managed objects that the user inherits from user groups. Perform
the following operations to view the inherited managed objects:
1. Switch to the User Groups tab. View the user groups to which the user belongs.
2. View the managed objects contained in each user group.
l If you select the Sort by device type check box, objects under the Device node on the Domain tab are
grouped by type.
l By default, the Show the domain of the owner user group check box is selected and the Sort by
device type check box is cleared.

----End

3.2.8.2 Viewing Operation Rights of a User or User Group


Security administrators can view operation rights of a user or user group to identify operations
that the user or user group can perform on managed objects.

Prerequisites
You have logged in as a user in the SMManagers group.

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 In the NMS User Management navigation tree, expand the User or User Group node and select
a user or user group.
Step 3 On the Operation Rights tab, expand the object nodes and view the operation rights of the user
or user group on each object.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

341

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

The following table lists different methods for viewing operation rights based on the
authorization mode.
Authorization
Mode

Method

Network
management
application

Expand the Network Management Application node. Right-click the


desired operation set and choose View Member from the shortcut menu.

Subnet device set

Expand the Subnet Device Set node. Right-click the desired operation
set and choose View Member from the shortcut menu.

To change operations in the operation set, see step 4 in 3.2.8.5 Viewing


Operations in an Operation Set.

To change operations in the operation set, see step 4 in 3.2.8.5 Viewing


Operations in an Operation Set.
User-defined
object set

Expand the Object Set node. Right-click the desired operation set and
choose View Member from the shortcut menu.
To change operations in the operation set, see step 4 in 3.2.8.5 Viewing
Operations in an Operation Set.

Device

Expand the Device node and view operation rights of the user on different
devices.

NOTE

If the Show the operation rights of the owner user group check box is selected when you view user
operation rights, the displayed user operation rights contain the operation rights inherited from the user
groups. Perform the following operations to view the inherited operation rights:
1. View the user groups to which the user belongs.
2. View the operation rights of each user group.
By default, the Show the domain of the owner user group check box is selected.

----End

3.2.8.3 Viewing User Groups To Which a User Belongs


Security administrators can view user groups to which a user belong to identify the user groups
whose operation rights are inherited by the user.

Prerequisites
You have logged in as a user in the SMManagers group.

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 In the NMS User Management navigation tree, expand the User node and select a user.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

342

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Step 3 On the User Groups tab, view user groups to which the user belongs.

----End

3.2.8.4 Querying User and User Group Authorization Details


You can query the users and user groups to which a network management application operation
or network device operation is assigned.

Prerequisites
You have logged in as a user in the SMManagers group.

Context
The Administrators group contains all operation rights on the U2000 except Security
Management rights. Therefore, in the Authorization Details dialog box, the
Administrators is always displayed in the Authorized User/User Group area when any
operation or operation set is selected.

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 On the top of the NMS User Management navigation tree, click

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

343

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

NOTE

You can enter the desired character string in the Find text box and click
authorization objects in the up direction or down direction, and click
Match whole word only or Match case rules.

or

to search for

to specify whether to set the

Step 3 In the Authorization Details dialog box, expand the root node or parent node and select a child
node in the navigation tree.
After a node is selected, the corresponding operation or operation set is displayed in the
Operation area.
Step 4 In the Operation area, expand the root node or parent node and select an operation or operation
set.
In the Authorized User/User Group area, you can view the user or user group to which the
operation or operation set is assigned.
----End

3.2.8.5 Viewing Operations in an Operation Set


Security administrators can view operations contained in an operation set and check whether the
contained operations meet requirements.

Prerequisites
You have logged in as a user in the SMManagers group.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

344

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 In the NMS User Management navigation tree, expand the Operation Set node and select the
desired operation set.
Step 3 On the Members tab, view operations contained in the operation set.
NOTE

To query and manage user rights more easily, export users' managed objects and operation rights by rightclicking in a blank area and choosing Save All from the shortcut menu.

NOTE

l On the Details tab, you can view the operation set type (network management application operation
set or network device operation set).
l On the Applicable for tab, you can view the users and user groups to which the operation set is assigned.

Step 4 Optional: Add operations to or delete operations from the operation set.
l Adding operations: On the Members tab, click Select. In the Select Operation Set
Member dialog box, select the desired operation set members and click OK.
l Deleting operations: On the Members tab, select one or multiple operation set members and
click Delete. In the Confirm dialog box, click Yes.
----End

3.2.8.6 Viewing Objects Contained in an Object Set


Security administrators can view objects contained in an object set and check whether the
contained objects meet requirements.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

345

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Prerequisites
You have logged in as a user in the SMManagers group.

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 In the NMS User Management navigation tree, expand Object Set and select the desired object
set.
Step 3 On the Members tab, view objects contained in the object set.

NOTE

l On the Details tab, you can view the details about the object set.
l On the Applicable for tab, you can view the users and user groups to which the object set is assigned.
l If the Sort by device type check box is selected, the members of the object set are sorted by device
type. If the object set does not contain any device, the Sort by device type check box is unavailable.

Step 4 Optional: Add members to or delete members from the object set.
l Adding members: On the Members tab, click Select. In the Select Object Set Member
dialog box, select the desired object set members and click OK.
l Deleting members: On the Members tab, select one or multiple object set members, rightclick, and choose Delete from the shortcut menu. In the Confirm dialog box, click Yes.
----End

3.2.8.7 Comparing U2000 User Rights


This topic describes how to compare the rights of two NMS users to check for the differences.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

346

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Prerequisites
You have logged in as a user in the SMManagers group.

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 On the top of the NMS User Management navigation tree, click

Step 3 In the Compare Users dialog box, select a user from the Source User and Target User list
boxes, click Compare.

Step 4 View the result in the Compare User Rights dialog box.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

347

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

NOTE

l During the comparison of rights between user A and user B, if user A has an operation right but user
B does not have this right, this right node of user B is left blank.
l On the U2000, you cannot compare rights of the same user. If you select the same user from the Source
User and Target User list boxes, the Compare button is unavailable.
l In the Compare User Rights dialog box, the U2000 can display user rights in either of the following
modes:
l Display all rights: All user rights are displayed for each user.
l Display only differences: Only the differences between user rights are displayed.

----End

3.2.9 FAQs About Authorization


This section describes how to rectify faults in authorization.

3.2.9.1 How Do I Determine an Operation Right Type?


Symptom
When creating an operation set for storing specific operation rights, I am not sure whether the
operation right is of the Network Management Application or Network Device type.

Possible Causes
l

I do not know how to determine the type of an operation right.

Names of some device operation rights are similar to those of some network management
application operation rights.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

348

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Procedure
Step 1 Export operation sets to your local PC. For details, see Exporting the Files Containing
Operation Set Information.
NOTE

Only the admin user can export operation sets.

Step 2 Search for the operation right name in the following two files.
l If the operation right name is found in the *_Network_Device.csv file, the right is of the
Network Device type.
l If the operation right name is found in the *_Network_Management_Application.csv file,
the right is of the Network Management Application type.
l If the right name cannot be found in the two files, check the entered name of the operation
right.
NOTE

The formats of default file names are


Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device.csv and
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Management_Application.csv. You can
specify Operation_Sets_YYYY_MM_DD_HH_MM_SS when saving operation set files.

----End

3.2.9.2 How Do I Adjust Operation Rights After an NE Is Added?


After an NE is added, related users' operation rights must be adjusted. If the plan is not found
or users are not authorized by binding to user groups, adjust operation rights by following the
instructions provided in this FAQ.

Question
How do I adjust operation rights after an NE is added?

Answer
If a plan for authorizing users by binding users to user groups is made during initial authorization,
adjust operation rights by following the procedure provided in 3.2.6.1 Adjusting Operation
Rights After an NE Is Added. Otherwise, adjust operation rights based on site requirements
by following the procedure shown in Figure 3-16.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

349

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-16 Process of adjusting operation rights after an NE is added


Start

Determine the users who manage the new


NE.

Plan user authorization and


authorize the users by referring to
the Authorization Plan topic.

No

Do the users exist?

Yes
End

Yes

Do the users belong to the same


user group that contains only the
users?

No

Perform the subsequent


operations on the user group.

Perform the subsequent


operations on each user.

Query each user's or the user group's


authorization modes.

Add the NE to each user's or the


user group's domain.

No

Is the new NE contained in the


subnet whose corresponding
subnet device set is in each user's
or the user group's domain?

Yes

Assign operation rights for the NE to


the users or user group.

Does the network device operation


set bound to the subnet device set
contain operation rights for the
NE?

Yes

No
Add the operation rights to the subnet
operation set.

End

The procedure is described as follows:

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

350

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Step 1 Determine users who manage the new NE, and check whether the users exist.
l If new users are required to manage the new NE, plan user authorization and authorize users
by following the procedure provided in Performing the Initial Authorization.
l If users who manage the new NE exist, perform Step 2.
Step 2 Check whether the users belong to the same user group. If the users who manage the new NE
belong to the same user group and the user group contains only the users, operations described
below are performed on the user group. Otherwise, operations described below are performed
on each user who manages the new NE.
Step 3 Query a user or user group's authorization mode by following the procedure provided in 3.2.8.2
Viewing Operation Rights of a User or User Group.
If the new NE is on a subnet and the user or user group's domain includes the subnet device set
corresponding to the subnet, perform Step 4. Otherwise, perform Step 6.
Step 4 Check whether the network device operation set corresponding to the subnet device set
(described in Step 3) to which the new NE belongs contains operation rights for the new NE.
For details, see 3.2.8.5 Viewing Operations in an Operation Set.
If the operation rights for the new NE exist in the network device operation set, the user or user
group automatically has the operation rights for the new NE. The procedure is complete.
Otherwise, perform Step 5.
Step 5 Add the operation rights for the new NE to the network device operation set corresponding to
the user or user group's subnet device set.
1.

In the NMS User Management navigation tree, expand the Operation Set node and
choose the network device operation set corresponding to the subnet device set.

2.

On the Members tab page in the right pane, click Select.

3.

In the Available Rights area of the Select Operation Set Member dialog box, select
operation rights for the type of the new NE.

4.

Click

5.

Click OK.

to move the operation rights to the Selected Rights area.

The procedure ends.


Step 6 Add the new NE to the user or user group's domain.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand User or User Group and select a
user or the user group that manages the new NE.

3.

On the Domain tab page in the right pane, click Select.

4.

In the Authorization Mode area of the Select Domain dialog box, click More to display
all modes, and select Device.

5.

Select the new NE in the Available Objects area.

6.

Click

Issue 03 (2014-12-10)

to move the NE to the Selected Objects area.


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

351

iManager U2000 Unified Network Management System


Operation Guide for Common Features

7.

3 Security Management

Click OK. The new NE is added to the user or user group's domain.

Step 7 Add the operation rights for the new NE.


1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand User or User Group and select a
user or the user group that manages the new NE.

3.

On the Operation Rights tab page in the right pane, click Select.

4.

In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Device node and select the device corresponding to the new NE.

5.

In the Operation area, select the operations for the new NE.

6.

Click

7.

Click OK. The operation rights for the new NE are added.

to move the operations to the Selected Rights area.

The procedure ends.


----End

3.2.9.3 How Do I Adjust Operation Rights After a Subnet Is Added?


After a subnet is added, related users' operation rights must be adjusted. If the plan is not found
or users are not authorized by binding to user groups, adjust operation rights by following the
instructions provided in this FAQ.

Question
How do I adjust operation rights after a subnet is added?

Answer
If a plan for authorizing users by binding users to user groups is made during initial authorization,
adjust operation rights by following the procedure provided in 3.2.6.2 Adjusting Operation
Rights After a Subnet Is Added. Otherwise, adjust operation rights based on site requirements
by following the procedure shown in Figure 3-17.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

352

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-17 Procedure for adjusting operation rights after a subnet is added
Start

Determine the users who manage the new


subnet.

No

Do the users exist?

Plan user authorization and authorize the users


by referring to the Authorization Plan topic.

Yes

Yes

Do the users belong to


the same user group that contains
only the users?

Perform the subsequent operations


on the user group.

No

Perform the subsequent operations


on each user.

Add the subnet device set corresponding


to the new subnet to each user's or the user
group's domain.

Bind an operation set to the subnet device set.

Assign operation rights for the new subnet to


the users or user group.

End

The procedure is described as follows:


Step 1 Determine users who manage the new subnet, and check whether the users exist.
l If new users are required to manage the new subnet, plan user authorization and authorize
users by following the procedure provided in Performing the Initial Authorization.
l If users who manage the new subnet exist, perform Step 2.
Step 2 Check whether the users belong to the same user group.
If the users who manage the new subnet belong to the same user group and the user group contains
only the users, operations described below are performed on the user group. Otherwise,
operations described below are performed on each user who manages the new subnet.
Step 3 Add the subnet device set corresponding to the new subnet to a user or user group's domain.
1.

Issue 03 (2014-12-10)

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

353

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Center and choose OSS Security > OSS User Management from the main menu
(application style).
2.

In the NMS User Management navigation tree, expand User or User Group and select a
user or the user group that manages the new subnet.

3.

On the Domain tab page in the right pane, click Select.

4.

In the Select Domain dialog box, click

5.

In the Available Objects area, select the subnet device set corresponding to the new subnet.

6.

Click

7.

Click OK. The subnet device set is added to the user or user group's domain.

to move the subnet device set to the Selected Objects area.

Step 4 Add an operation set for the subnet device set by following the procedure provided in 3.2.4.3
Creating User-Defined Operation Sets.
Step 5 Add the operation rights for the new subnet to the user or user group's operation rights.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand User or User Group and select
the user or user group that manages the new subnet.

3.

On the Operation Rights tab page in the right pane, click Select.

4.

In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Subnet Device Set node and select the subnet device set corresponding to the new subnet.

5.

In the Operation area, select the operation set for the new subnet.

6.

Click

7.

Click OK. The operation set for the new subnet is bound.

to move the subnet device set to the Selected rights area.

The procedure ends.


----End

3.2.9.4 How to Adjust Operation Rights After the Scope of Managed NEs Is
Changed?
If NE management responsibilities must be transferred from one user to another, security
administrators must adjust the users' operation rights. If the plan is not found or users are not
authorized by binding to user groups, adjust operation rights by referring to this FAQ.

Question
How to adjust operation rights after the scope of managed NEs is changed?

Answer
If a plan for authorizing users by binding users to user groups is made during initial authorization,
adjust operation rights by referring to 3.2.7 Operation Right Adjustment After Personnel's
Responsibilities Change. Otherwise, adjust operation rights based on site requirements by
following the procedure shown in Figure 3-18.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

354

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-18 Procedure for adjusting operation rights


Start

Identify the two parties involved in


NE transfer.

Query the transferor user's


operation rights.

No

No

Are the transferred NEs


configured in the transferor
user's domain?

Does the user group to which


the transferor user belongs
continue managing the NEs?

Yes

Yes

Delete the user from the original


user group.

Delete the NEs from the user


group's domain.

Create a user group and delete the


NEs from the new user group's
domain.

Add the transferor user to the new


user group.

Query the mode in which the NEs


are added to the transferor user's
domain.

The NEs are added to the domain in


single-device mode.

The NEs are added to the domain in


object set mode.

Delete the NEs from the transferor


user's domain.

Query users and user groups that


manage the object set to which the
NEs belong.

Does deletion of the NEs


from the object set affect
other users and user
groups?

The NEs are added to the domain in


subnet device set mode.

Does the transferor user


continue managing other
NEs in the subnet device
set?

Yes

Yes

No

No

Delete the NEs from the object set.

Delete the subnet device set from


the transferor user's domain.

Query the operation set bound to


the object set to which the NEs
belong.

Query the operation set bound to


the subnet device set to which the
NEs belong.

Create an object set.

Create an object set.

Replace the original object set with


the new one and bind the new
object set to the operation set.

Delete the subnet device set from


the transferor user's domain.

Add the new object set to the


transferor user's domain and bind
the object set to the operation set.

Add the transferred NEs to the


transferee user's domain.

End

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

355

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

The procedure is described as follows:


Step 1 Identify the two parties involved in NE transfer. For example, the transferor (user A) transfers
NEs to the transferee (user B).
Step 2 Query the transferor's (user A's) domain and operation rights.
Query and record the transferor's (user A's) domain and operation rights (including rights
inherited from a user group to which the transferor (user A) belongs) by referring to 3.2.8.1
Viewing Domains of a User or User Group and 3.2.8.2 Viewing Operation Rights of a User
or User Group.
Step 3 Identify the domain where the transferred NEs are configured.
Query the user group to which the transferor (user A) belongs by referring to 3.2.8.1 Viewing
Domains of a User or User Group. Check whether the transferred NEs are configured in the
domain of the transferor (user A) or the user group to which the transferor (user A) belongs.
Assume that the transferor (user A) belongs to UserGroup1.
l If the transferred NEs are configured in the domain of UserGroup1, perform Step 4.
l If the transferred NEs are configured in the transferor's (user A's) domain, perform Step 9.
Step 4 Check whether UserGroup 1 must continue managing the transferred NEs.
l If no, perform Step 5.
l If yes, perform Step 6.
Step 5 Perform Step 9 to Step 20 to delete the transferred NEs from the domain of UserGroup1.
After the transferred NEs are deleted, perform Step 22.
Step 6 Delete the transferor (user A) from UserGroup1.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the User node and choose the user
whose operation rights are to be adjusted.

3.

Select UserGroup1 and click Delete. In the Confirm dialog box, click Yes.
The transferor (user A) is deleted from UserGroup1.

Step 7 Create a user group and delete the transferred NEs from the new user's domain.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, right-click the User Group node and
choose New User Group.

3.

On the Details tab, set the user group name, description, type, and maximum number of
sessions. Assume that the new user group is named UserGroup2.

4.

Click Copy Rights from User Groups. In the Copy Rights from User Groups dialog
box, select UserGroup1 and click OK.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

356

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Operation rights are copied from UserGroup.


5.

On the Details tab, click Finish.

6.

Perform Step 9 to Step 20 to delete the transferred NEs from the domain of UserGroup2.

Step 8 Add the transferor (user A) to UserGroup2.


1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the User node and choose the user
whose operation rights are to be adjusted.

3.

On the User Groups tab in the right pane, click Add. In the Add User dialog box, select
UserGroup2 and click OK.
The transferor (user A) is then added to UserGroup2.

After the transferor (user A) is added to UserGroup2, perform Step 22.


Step 9 Query the mode in which the transferred NEs are added to the transferor (user A) domain.
Query the mode in which the transferred NEs are added to the transferor (user A) domain by
referring to 3.2.8.1 Viewing Domains of a User or User Group.
l If the NEs are added to the domain in object set mode, for example, the NEs are contained
in ObjectSet1, perform Step 10.
l If the NEs are added to the domain in subnet device set mode, for example NEs are contained
in SubNetObjectSet1, perform Step 15.
l If the NEs are added to the domain in device mode, perform Step 21.
Step 10 Query users and user groups that manage the object set to which the transferred NEs belong.
For details, see 3.2.8.6 Viewing Objects Contained in an Object Set.
l If ObjectSet1 is used only by the transferor (user A), or it is shared by other users and user
groups that no longer manage the devices, the deletion of the NEs from the object set takes
no effect on the other users. Perform Step 11.
l If ObjectSet1 is shared by other users and user groups that still manage the devices, perform
Step 12.
Step 11 Delete the NEs from ObjectSet1.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the Object Set node and choose
ObjectSet1.

3.

On the Members tab in the right pane, select the NEs and click Delete.

4.

In the Confirm dialog box, click OK.

After the NEs are deleted from ObjectSet1, perform Step 22.
Step 12 Query the operation set bound to the object set to which the NEs belong.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

357

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Query the operation set bound to ObjectSet1 by referring to 3.2.8.2 Viewing Operation Rights
of a User or User Group. Assume that ObjectSet1 is bound to OperationSet1.
Step 13 Create an object set (ObjectSet2). ObjectSet2 contains all NEs in ObjectSet1 except the
transferred NEs.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, right-click the Object Set node and choose
New Object Set.

3.

On the Details tab in the New Object Set dialog box, select Network Device for Type,
and set Name and Description to create an object set. Assume that ObjectSet2 is created.
Click Copy Members from Object Sets.

4.

In the Copy Members from Object Sets dialog box, select ObjectSet1 and click OK to
add the members of ObjectSet1 to the Members tab as the members of ObjectSet2.

5.

On the Members tab in the New Object Set dialog box, select the transferred NEs and
click Delete. Click OK.
ObjectSet2 is created.

Step 14 Replace ObjectSet1 with ObjectSet2, and then bind ObjectSet2 to the operation set.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the User node and choose the
transferor (user A).

3.

On the Domain tab in the right pane, click Select.

4.

Replace the object set with the new one.


In the Authorization Mode area of the Select Domain dialog box, and select Object
Set.
l In the Available Objects area, select ObjectSet2 and click
ObjectSet2 is added to the Selected Objects area.
l In the Selected Objects area, select ObjectSet1 and click
out of the domain.

. Then
to move ObjectSet1

5.

On the Operation Rights tab in the right pane, click Select.

6.

In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Object Set node and choose Objectset2. In the Operation area, select OperationSet1 and
click

.Then ObjectSet1 is added to the Selected Rights area. Click OK.

After replacing ObjectSet1 with ObjectSet2 and binding ObjectSet2 to the operation set, perform
Step 22.
Step 15 Check whether the transferor (user A) must manage the other devices in the subnet device set.
l If no, perform Step 16.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

358

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

l If yes, perform Step 17.


Step 16 Delete SubNetObjectSet1 from the transferor's (user A's) domain.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the User node and choose the
transferor (user A) who no longer manages SubNetObjectSet1.

3.

On the Domain tab in the right pane, click Select.

4.

In the Authorization Mode area of the Select Domain dialog box, and select Subnet
Device Set.

5.

In the Selected Objects area, select SubNetObjectSet1. Click


SubNetObjectSet1 to the Available Objects area.

6.

Click OK.

to move

After deleting the subnet device set from the transferor's (user A's) domain, perform Step 22.
Step 17 Query the operation set bound to the subnet device set to which the transferred NEs belong.
Query the operation set bound to ObjectSet1 by referring to 3.2.8.2 Viewing Operation Rights
of a User or User Group. Assume that OperationSet2 is bound to SubNetObjectSet1.
Step 18 Create an object set (ObjectSet3). ObjectSet3 contains all NEs in SubNetObjectSet1 except the
transferred NEs.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, right-click the Object Set node and choose
New Object Set.

3.

On the Details tab in the New Object Set dialog box, select Network Device for Type,
and set Name and Description to create an object set. Assume that ObjectSet3 is created.

4.

Click the Members tab and then click Select.

5.

In the Available devices and objects sets area of the Select Object Set Member dialog
box, select the devices in SubNetObjectSet1 managed by the transferor (user A). Click
to add the devices to the Selected devices and objects sets area, and click
OK. Close the Select Object Set Member dialog box.

6.

In the New Object Set dialog box, click OK.

Step 19 Delete SubNetObjectSet1 from the transferor's (user A's) domain by referring to Step 16.
Step 20 Add ObjectSet3 to the transferor's (user A's) domain and bind ObjectSet3 to OperationSet2.
1.

Issue 03 (2014-12-10)

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

359

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

2.

In the NMS User Management navigation tree, expand the User node and choose the
transferor (user A).

3.

On the Domain tab in the right pane, click Select.

4.

In the Authorization Mode area of the Select Domain dialog box, and select Object
Set. In the Available Objects area, select ObjectSet3 and click
ObjectSet3 is added to the Selected Objects area.

. Then

5.

On the Operation Rights tab in the right pane, click Select.

6.

In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Object Set node and choose ObjectSet3. In the Operation area, select OperationSet2 and
click

.OperationSet2 is added to the Selected Rights area. Click OK.

After the NEs are deleted from user A's domain, perform Step 22.
Step 21 Delete the transferred NEs from the transferor's (user A's) domain.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the User node and choose user A.

3.

On the Domain tab in the right pane, click Select.

4.

In the Authorization Mode area of the Select Domain dialog box, click More to display
all modes, and select Device.

5.

In the Selected Objects area, select the NEs to be moved out. Click
the NEs to the Available Objects area.

6.

Click OK.

to move

After the NEs are deleted from user A's domain, perform Step 22.
Step 22 Configure the transferee's (user B's) domain and operation rights.
1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in Application
Center and choose OSS Security > OSS User Management from the main menu
(application style).

2.

In the NMS User Management navigation tree, expand the User node and choose the
transferee (user B).

3.

On the Domain tab in the right pane, click Select.

4.

In the Authorization Mode area of the Select Domain dialog box, and select Device. In
the Available Objects area, select NEs to be transferred and then click
NEs are added to the Selected Objects area.

. The

5.

On the Operation Rights tab in the right pane, click Select.

6.

In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Device node and choose the transferred NEs. In the Operation area, select operations
performed on the NEs by referring to Step 2. Click
the Selected Rights area. Click OK.

to add the operations to

----End
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

360

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

3.2.9.5 How Do I Assign User Operation Rights That Do Not Belong to the User's
User Group?
Question
How do I assign extra operation rights to a user after the user is added to a user group?

Answer
Step 1 Check whether there is a user group that has only the extra operation rights required by the user.
l If yes, add the user to the user group by referring to 3.2.4.5 Creating Users and Adding
Them to User Groups.
l If no, perform Step 2.
Step 2 Follow steps described in 3.2.4 Assigning Rights to Users to create a user group, assign the
operation rights to the user group, and add the user to the user group.
----End

3.2.10 Configuration Examples of Security Management


Examples on security management are provided to enhance your understanding on authority
management.

3.2.10.1 Assigning Specific Operation Rights to an NMS User


In live network maintenance, an NMS user may need to be assigned only part of operation rights.
This topic provides an example for assigning specific operation rights to an NMS user.

Prerequisites
You have logged in as a user in the SMManagers group.

Context
If the topology view is locked, Modify Object Position is unavailable even if the user has this
operation right. Only a user with the Lock/Unlock View operation right can unlock the topology
view and make Modify Object Position available. To unlock the topology view, choose
View > Lock from the main menu.

Scenario
Security administrator A needs to create a topology maintenance engineer (Topo_mtB) to
manage topological objects and ensure that the assigned rights do not contain the Modify Object
Position right.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

361

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Roadmap
Step

Roadmap

Assigns operation rights by adding the user to


a user group. Before this operation, you must
create topology maintenance user group
Topo_mtgroup.

Topology management involves NMS


operations only and does not require NE
authority. Therefore, assign default Network
Management Application operation sets
first to Topo_mtgroup.
After checking the Network Management
Application operation sets exported from the
NMS, you can find that the default NMS
operation sets for topology management such
as Topo Maintainer Operation Set, Topo
Operator Operation Set, and Topo
Monitor Operation Set contain Modify
Object Position. Therefore, the default NMS
operation sets cannot be assigned to
Topo_mtgroup.

The default NMS operation sets contain


Modify Object Position. Therefore, create
an operation set that does not contain Modify
Object Position and assign it to
Topo_mtgroup. For operation details, see
the following section.

Creates topology maintenance user B and


adds it to group Topo_mtgroup.

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management from the main menu
(traditional style); alternatively, double-click Security Management in Application Center
and choose OSS Security > OSS User Management from the main menu (application style).
Step 2 Create an object set for Topo_mtgroup.
1.

In the NMS User Management navigation tree, right-click Object Set and choose New
Object Set from the shortcut menu.

2.

In the New Object Set dialog box, click the Details tab and set common attributes for the
new object set.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

362

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3.

3 Security Management

On the Members tab, configure members for the new object set. These members are the
objects managed by Topo_mtB.

Step 3 Create an operation set for Topo_mtgroup.


1.

In the NMS User Management navigation tree, right-click Operation Set and choose
New Operation Set from the shortcut menu.

2.

In the New Operation Set dialog box, click the Details tab and set common attributes for
the new operation set.

3.

On the Members tab, configure members for the new operation set. Select the topological
management rights other than Modify Object Position in the Topo Management node.

4.

Click OK.

Step 4 Create topology maintenance user group Topo_mtgroup and set its management domain and
operation rights.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

363

iManager U2000 Unified Network Management System


Operation Guide for Common Features

1.

3 Security Management

In the NMS User Management navigation tree, right-click User Group and choose New
User Group from the shortcut menu. Alternatively, click
and choose New User Group.

above the navigation tree

2.

In the New User Group dialog box, click the Details tab and set common attributes such
as User name and Description, and then click Next.

3.

Click Select. In the Select Domain dialog box, select Object Set of Topo_mtGroup, click
OK, and then click Next.

4.

Click Select. In the Select Operation Rights dialog box, select Operation Set of
Topo_mtB, click OK, and then click Next.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

364

iManager U2000 Unified Network Management System


Operation Guide for Common Features

5.

3 Security Management

Click OK.

Step 5 Create topology maintenance user Topo_mtB and add it to group Topo_mtgroup.
1.

In the NMS User Management navigation tree, right-click User and choose New User
from the shortcut menu. Alternatively, click
New User.

above the navigation tree and choose

2.

Set common attributes for the user, such as user name and password.

3.

Click Add, choose Topo_mtgroup from the Add New Group dialog box, and click OK.

4.

Click OK.

----End

Result
Once you have created user Topo_mtB following the preceding procedure, log in to the
U2000 as user Topo_mtB to manage the topology.

3.2.10.2 Adjusting User Rights


Maintenance engineers need to add or delete rights for created users when planning or
maintaining the live network. This topic provides an example for deleting a specific right for an
NMS user.

Prerequisites
l

You have logged in as a user in the SMManagers group.

A clear plan is required before adjusting rights for a user. Before the plan is made, the user's
role must be clear.

Scenario
Security administrator A finds out that a monitoring engineer Monitor_B has the Modify Object
Position rights. However, a monitoring engineer should not have the rights according to the plan
made before the adjustment. Therefore, the rights are to be deleted.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

365

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Configuration Roadmap
Scenario

Configuration Roadmap

Description

1. Monitor_B is a member of the


default user group Guests.

Modify the rights of the default


operation sets in Guests.

Guests has all


the rights of
Monitor
Operation Set
of Region XX.
Checking the
Network
Management
Application
operation sets
exported from
the NMS, Topo
Monitor
Operation Set
contains
Modify Object
Position.
Therefore,
remove Modify
Object
Position from
Topo Monitor
Operation Set.

NOTE
If other members in the Guests require
the Modify Object Position right, you
must remove Monitor_B from
Guests and then grant rights to
Monitor_B separately.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

366

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Scenario

3 Security Management

Configuration Roadmap

Description
NOTE
l A user has
all rights of
its user
groups.
Therefore,
to delete a
specific
right of a
user, delete
the right
from the
groups to
which the
user
belongs.
l A user or
user group
has all rights
of its
operation
sets.
Therefore,
to delete a
specific
right of a
user or user
group,
delete the
right from
the
operation
sets.
l Generally,
modifying
the rights of
default user
groups and
operation
sets is not
recommend
ed. To adjust
user rights,
you can
remove
Guests from
the user
groups to
which
Monitor_B
belongs and
reassign
rights to
Monitor_B.

Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

367

iManager U2000 Unified Network Management System


Operation Guide for Common Features

Scenario
2. Monitor_B is
a member of the
non-default user
group Topo
Guests of
Region XX

Configuration Roadmap

Description

2.1 Topo
Guests of
Region XX
contains a Topo
Monitor
Operation Set
provided by the
U2000 by
default.

Modify the rights of the Topo


Monitor Operation Set provided
by the U2000 by default.

Topo Guests of
Region XX is a
servicefunction-based
user group in the
service
authorization
and planning
phase. Users in
Topo Guests of
Region XX
have the rights
of querying
topology
objects. To
adjust rights for
Monitor_B,
remove Modify
Object
Position from
Topo Monitor
Operation Set.

2.2 Topo
Guests Region
XX contains the
new Topo
Monitor
Operation Set
of Region XX.

Modify the rights of the new Topo


Monitor Operation Set of Region
XX.

3. Monitor_B does not belong to


any user groups.

Issue 03 (2014-12-10)

3 Security Management

NOTE
If other members in the Topo Guests
of Region XX require the Modify
Object Position right, you must
remove Monitor_B from Topo Guests
of Region XX and then grant rights to
Monitor_B separately.

NOTE
If other members in the Topo Guests
of Region XX require the Modify
Object Position right, you must
remove Monitor_B from Topo Guests
of Region XX and then grant rights to
Monitor_B separately.

Modify the rights for Monitor_B


directly.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Topo Monitor
Operation Set
of Region XX is
a new operation
set assigned to
Topo Guests of
Region XX and
has the rights of
querying
topology
objects. To
adjust rights for
Monitor_B,
remove Modify
Object
Position from
Topo Monitor
Operation Set.
In the Select
Operation
Rights window,
deselect Modify
Object
Position for
Monitor_B.

368

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Procedure
l

Operation procedure in scenario 1 (where Monitor_B is a member of Guests):


1.

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in
Application Center and choose OSS Security > OSS User Management from the
main menu (application style).

2.

Choose NMS User Management > Operation Set > Topo Monitor Operation
Set from the navigation tree.

3.

On the Members tab, click Select.

4.

The Select Operation Set Member dialog box is displayed. In the Selected rights
group area, expand the nodes under Network Management Application. Select
Modify Object Position and click

5.
l

Click OK.

Operation procedure in scenario 2 (where Monitor_B is a member of the non-default user


group Topo Guests of Region XX):
The operation procedure is the same as that in scenario 1.
The operation procedure is similar to that in scenario 1. The only difference is Topo
Monitor Operation Set of Region XX is selected from the navigation tree on step 2.

Operation procedure in scenario 3 (where Monitor_B does not belong to any user groups):
1.

Issue 03 (2014-12-10)

Choose Administration > NMS Security > NMS User Management from the main
menu (traditional style); alternatively, double-click Security Management in
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

369

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Application Center and choose OSS Security > OSS User Management from the
main menu (application style).
2.

Choose NMS User Management > User > Monitor_B from the navigation tree.

3.

On the Operation Rights tab, click Select.

4.

The Select Operation Rights dialog box is displayed. In the Selected rights group
area, expand the nodes under Network Management Application. Select Modify
Object Position and click

5.

Click OK.

Result
If Monitor_B has logged in already, restart the client and relog in to the U2000 for the settings
to take effect. Then, Monitor_B does not have the rights of modifying positions for topology
objects.

3.2.10.3 Example for Creating U2000 User Accounts and Allocating Rights in the
Rights- and Domain-based Management Scenario
This topic provides the example for creating U2000 user accounts and allocating rights in the
rights- and domain-based management scenario.

Application Scenario
In an office, all NEs are monitored and managed through the U2000 in a centralized manner and
they are classed into two categories by domain: transport NEs and IP NEs, which are monitored
and managed separately. To enable different users to monitor and manage NEs through the
U2000, you need to assign them different U2000 user accounts and rights.
Issue 03 (2014-12-10)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

370

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

Figure 3-19 shows the networking.


Figure 3-19 Networking of rights- and domain-based management

transport and IP
domain maintainer

NMS

transport domain
maintainer

IP domain
maintainer

PTN
PTN

CX600

CX600

SDH
SDH
MA5200

NE80E

RTN

RTN

NE80E

transport domain network

ME60

IP domain network

Data Planning
Plan the following subnets based on the NE domain division:
l

Transport domain subnet: All managed transport NEs are included.

IP domain subnet: All managed IP NEs are included.

Plan the following four user groups based on user groups' responsibilities:

Issue 03 (2014-12-10)

User Group
Name

Descriptio
n

Responsibility

Managemen
t Domain

Operation Right

T2000groupadmin

Transport
domain
maintainer
group

Responsible for
maintaining NEs
in the transport
domain.

NEs in the
transport
domain

Operation set of the


transport domain NE
maintainer

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Operation set of the


transport domain
service maintainer

371

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

User Group
Name

Descriptio
n

Responsibility

Managemen
t Domain

Operation Right

T2000groupview

Transport
domain
monitor
group

Responsible for
monitoring NEs in
the transport
domain.

NEs in the
transport
domain

Operation set of the


transport domain NE
monitor

IP domain
maintainer
group

Responsible for
maintaining NEs
in the IP domain.

NEs in the IP
domain

DMSgroupadmin

Operation set of the


transport domain
service monitor
Operation set of the IP
domain NE
maintainer
Operation set of the IP
domain service
maintainer

DMSgroupview

IP domain
monitor
group

Responsible for
monitoring NEs in
the IP domain.

NEs in the IP
domain

Operation set of the IP


domain NE monitor
Operation set of the IP
domain service
monitor

NOTE

The operation sets listed in the Operation Right column refer to general operation sets associated with
NEs in the transport or IP domains. Determine the actual operation sets to be added based on the types of
managed NEs and the operation rights of user groups.

Plan the following seven users based on user responsibilities:

Issue 03 (2014-12-10)

User
Name

Descripti
on

Responsibility

User Group

T2000admin

Transport
domain
maintainer

Responsible for maintaining


NEs in the transport domain.

Transport domain maintainer


group

T2000view

Transport
domain
monitor

Responsible for monitoring


NEs in the transport domain.

Transport domain monitor


group

DMSadmin

IP domain
maintainer

Responsible for maintaining


NEs in the IP domain.

IP domain maintainer group

DMS-view

IP domain
monitor

Responsible for monitoring


NEs in the IP domain.

IP domain monitor group

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

372

iManager U2000 Unified Network Management System


Operation Guide for Common Features

3 Security Management

User
Name

Descripti
on

Responsibility

User Group

T2000adminDMS-view

Transport
domain
maintainer
& IP
domain
monitor

Responsible for maintaining


NEs in the transport domain
and monitoring NEs in the IP
domain.

Transport domain maintainer


group
and

DMSadminT2000view

IP domain
maintainer
& transport
domain
monitor

Responsible for maintaining


NEs in the IP domain and
monitoring NEs in the
transport domain.

IP domain maintainer group


and

T2000viewDMS-view

Transport
domain
monitor &
IP domain
monitor

Responsible for maintaining


NEs in the transport and IP
domains.

Transport domain monitor


group
and

IP domain monitor group

Transport domain monitor


group