Professional Documents
Culture Documents
Operation Guide
01 2008-01-15 00382994
Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any assistance, please contact our local office or company headquarters.
Website: Email:
Copyright Huawei Technologies Co., Ltd. 2008. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.
Notice
The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.
Contents
Contents
About This Document.....................................................................................................................1 1 Huawei Local Maintenance Terminal....................................................................................1-1
1.1 LMT System Components..............................................................................................................................1-2 1.1.1 Local Maintenance Terminal..................................................................................................................1-2 1.1.2 FTP Client..............................................................................................................................................1-3 1.1.3 FTP Server..............................................................................................................................................1-4 1.1.4 LMT Service Manager...........................................................................................................................1-5 1.1.5 Trace Viewer..........................................................................................................................................1-7 1.1.6 Monitor Viewer......................................................................................................................................1-8 1.1.7 Performance Browse Tool......................................................................................................................1-8 1.1.8 Convert Management System................................................................................................................1-9 1.2 Help System..................................................................................................................................................1-10
2 SSH Management.......................................................................................................................2-1
2.1 Overview of SSH Management.......................................................................................................................2-2 2.2 Creating a Session...........................................................................................................................................2-3 2.2.1 Generating a Private-Public Key Pair....................................................................................................2-4 2.2.2 Downloading a Client Public Key..........................................................................................................2-9 2.2.3 Adding an SSH User..............................................................................................................................2-9 2.2.4 Configuring a Profile..............................................................................................................................2-9 2.2.5 Configuring General Settings...............................................................................................................2-18 2.2.6 Managing Server Keys.........................................................................................................................2-29 2.2.7 Starting a Session.................................................................................................................................2-31 2.2.8 Connecting the LMT to the SGSN9810 through the SSH Client........................................................2-37 2.3 Applying a Session........................................................................................................................................2-38 2.3.1 Applying an SFTP Session...................................................................................................................2-38 2.3.2 Applying an MML Session..................................................................................................................2-42 2.3.3 Creating a Session Log File.................................................................................................................2-43 2.3.4 Browsing Session Trace Messages......................................................................................................2-43 2.3.5 Setting Interactive Mode......................................................................................................................2-43 2.3.6 Running Scripts....................................................................................................................................2-44
3 Authorization Management.....................................................................................................3-1
3.1 Basic Concepts................................................................................................................................................3-3 Issue 01 (2008-01-15) Huawei Technologies Proprietary i
Contents
HUAWEI SGSN9810 Serving GPRS Support Node Operation Guide 3.1.1 Office......................................................................................................................................................3-3 3.1.2 User Type...............................................................................................................................................3-3 3.1.3 Operation Privileges...............................................................................................................................3-4 3.1.4 User Name and Password.......................................................................................................................3-5 3.1.5 Valid Operation Period...........................................................................................................................3-6 3.1.6 Command Groups..................................................................................................................................3-6
3.2 Adding an Office.............................................................................................................................................3-7 3.3 Logging in to the LMT....................................................................................................................................3-8 3.4 Logging out of the LMT..................................................................................................................................3-9 3.5 Managing Users...............................................................................................................................................3-9 3.5.1 Setting User Management Function.....................................................................................................3-10 3.5.2 Querying User Management................................................................................................................3-10 3.5.3 Adding a User Account........................................................................................................................3-10 3.5.4 Querying User Details..........................................................................................................................3-11 3.5.5 Modifying User Details........................................................................................................................3-12 3.5.6 Deleting a User Account......................................................................................................................3-13 3.5.7 Disconnecting a Client.........................................................................................................................3-14 3.5.8 Setting Collective Lock/Unlock Function............................................................................................3-15 3.5.9 Querying Collective Lock/Unlock Function........................................................................................3-15 3.5.10 Manually Unlocking a User Account.................................................................................................3-15 3.6 Managing Command Groups........................................................................................................................3-16 3.6.1 Querying the Commands in a Command Group..................................................................................3-16 3.6.2 Setting the Commands in a Command Group......................................................................................3-16 3.6.3 Editing the Name of a Command Group..............................................................................................3-17 3.7 Managing User Passwords............................................................................................................................3-17 3.7.1 Setting Password Policy.......................................................................................................................3-18 3.7.2 Querying Password Policy...................................................................................................................3-19 3.7.3 Changing Password..............................................................................................................................3-19 3.8 Locking the System.......................................................................................................................................3-20 3.8.1 Auto Locking........................................................................................................................................3-20 3.8.2 Manual Locking...................................................................................................................................3-20
Contents
4.2.4 Swapping Boards..................................................................................................................................4-10 4.2.5 Displaying Power Status or Temperature in the PSM Subrack...........................................................4-11
5 Monitor Management................................................................................................................5-1
5.1 Monitoring CPU Usage...................................................................................................................................5-2 5.1.1 Querying Board CPU Usage..................................................................................................................5-2 5.1.2 Adding or Deleting a CPU Usage Monitoring Task..............................................................................5-4 5.1.3 Saving Monitored Data..........................................................................................................................5-7 5.2 Browsing CPU Monitoring Results Offline....................................................................................................5-7
6 Tracing Management.................................................................................................................6-1
6.1 Creating an Interface Tracing Task.................................................................................................................6-2 6.2 Browsing Traced Messages Online.................................................................................................................6-3 6.3 Saving Traced Messages.................................................................................................................................6-5 6.3.1 Automatically Saving Traced Messages................................................................................................6-5 6.3.2 Manually Saving Traced Messages........................................................................................................6-5 6.4 Stopping Tracing.............................................................................................................................................6-6 6.5 Browsing Traced Messages Offline................................................................................................................6-6
7 Alarm Management...................................................................................................................7-1
7.1 Concepts Related to the Alarm Management..................................................................................................7-2 7.1.1 Alarm Type............................................................................................................................................7-2 7.1.2 Alarm Severity.......................................................................................................................................7-3 7.1.3 Event Type.............................................................................................................................................7-3 7.1.4 Alarm Box..............................................................................................................................................7-4 7.2 Browsing Alarms.............................................................................................................................................7-5 7.3 Querying Alarm Logs......................................................................................................................................7-7 7.4 Saving Alarms...............................................................................................................................................7-10 7.5 Printing Alarms.............................................................................................................................................7-11 7.5.1 Printing Alarms in Real-Time..............................................................................................................7-11 7.5.2 Printing the Reported Alarms...............................................................................................................7-12 7.6 Handling an Alarm........................................................................................................................................7-14 7.6.1 Manually Clearing an Alarm................................................................................................................7-15 7.6.2 Deleting a Cleared Alarm.....................................................................................................................7-15 7.6.3 Querying Alarms..................................................................................................................................7-15 7.6.4 Querying More Alarm Information......................................................................................................7-16 7.6.5 Querying the Alarm Configuration......................................................................................................7-17 7.6.6 Modifying the Alarm Configuration....................................................................................................7-18 7.6.7 Resetting the Alarm Configuration......................................................................................................7-20 7.6.8 Updating the Alarm Status...................................................................................................................7-22 7.7 Operating the Alarm Box..............................................................................................................................7-22 7.7.1 Set Location of the Alarm Box............................................................................................................7-23 7.7.2 Query Location of the Alarm Box........................................................................................................7-25 7.7.3 Set Shield Severity of the Alarm Box..................................................................................................7-25 Issue 01 (2008-01-15) Huawei Technologies Proprietary iii
Contents
HUAWEI SGSN9810 Serving GPRS Support Node Operation Guide 7.7.4 Query Shield Severity of the Alarm Box.............................................................................................7-26 7.7.5 Query Active Alarms of the Alarm Box..............................................................................................7-26 7.7.6 Resetting the Alarm Box......................................................................................................................7-26 7.7.7 Turning Off the Alarm Sound..............................................................................................................7-27 7.7.8 Turning Off the Alarm Indicator..........................................................................................................7-28 7.7.9 Query Alarm Lamp State.....................................................................................................................7-29 7.7.10 Querying the Alarm Box Version......................................................................................................7-30
8 Performance Management........................................................................................................8-1
8.1 Overview of Performance Management..........................................................................................................8-2 8.2 Querying the Performance Results..................................................................................................................8-2 8.2.1 Configuring Parameters..........................................................................................................................8-2 8.2.2 Downloading the Performance Result....................................................................................................8-4 8.2.3 Setting Automatically Download...........................................................................................................8-7 8.2.4 Querying the Performance Results.........................................................................................................8-9 8.2.5 Querying Through Template................................................................................................................8-13 8.3 Filtering the Performance Results.................................................................................................................8-15 8.4 Exporting the Performance Results...............................................................................................................8-18 8.5 Maintain Custom Template...........................................................................................................................8-20 8.5.1 Add a Template....................................................................................................................................8-20 8.5.2 Modify a Template...............................................................................................................................8-21 8.5.3 Delete Templates..................................................................................................................................8-22 8.6 Listing the Measurement Description Files..................................................................................................8-22
10 Log Management....................................................................................................................10-1
10.1 Overview of Log Management...................................................................................................................10-2 10.2 Querying a Log............................................................................................................................................10-2 10.2.1 Querying an Operation Log................................................................................................................10-2 10.2.2 Querying a Security Log....................................................................................................................10-3 10.3 Setting and Querying Parameters of a Log File..........................................................................................10-3 10.3.1 Setting Parameters of a Log File........................................................................................................10-3 10.3.2 Querying Parameters of a Log File....................................................................................................10-3 10.4 Backing Up a Log File................................................................................................................................10-3 iv Huawei Technologies Proprietary Issue 01 (2008-01-15)
Contents
10.4.1 Backup Log Files Automatically........................................................................................................10-4 10.4.2 Backup Log Files Manually...............................................................................................................10-4
Index.................................................................................................................................................i-1
Issue 01 (2008-01-15)
Figures
Figures
Figure 1-1 Shows the interface of the version to be selected...............................................................................1-3 Figure 1-2 GUI of the SGSN9810 LMT..............................................................................................................1-3 Figure 1-3 GUI of FTP Client..............................................................................................................................1-4 Figure 1-4 FTP server configuration window......................................................................................................1-5 Figure 1-5 LMT Service Manager Window.........................................................................................................1-6 Figure 1-6 GUI of the Trace Viewer....................................................................................................................1-7 Figure 1-7 GUI of Monitor Viewer......................................................................................................................1-8 Figure 1-8 GUI of the performance browse tool..................................................................................................1-9 Figure 1-9 Convert Management System Window............................................................................................1-10 Figure 2-1 Work principle of SSH.......................................................................................................................2-2 Figure 2-2 Key Generation Wizard dialog box.................................................................................................2-5 Figure 2-3 Key Generation Wizard window for setting the type and the length of a public key......................2-6 Figure 2-4 Key Generation Wizard window for setting the passphrase of a private key..................................2-6 Figure 2-5 Key Generation Wizard window containing the progress bar.........................................................2-7 Figure 2-6 Key Generation Wizard window for saving the key pair................................................................2-8 Figure 2-7 Profile Management window.........................................................................................................2-10 Figure 2-8 Add New Profile dialog box............................................................................................................2-11 Figure 2-9 Port Forwarding window...............................................................................................................2-13 Figure 2-10 Add Port Forwarding window.....................................................................................................2-14 Figure 2-11 List of algorithms............................................................................................................................2-15 Figure 2-12 Authentication window...................................................................................................................2-17 Figure 2-13 Profile Public Key Authentication dialog box............................................................................2-18 Figure 2-14 LMT Proxy window.......................................................................................................................2-20 Figure 2-15 Add LMT Listener window............................................................................................................2-21 Figure 2-16 Add LMT Mapping window...........................................................................................................2-22 Figure 2-17 Terminal Setting window...............................................................................................................2-23 Figure 2-18 Bind Address window...................................................................................................................2-24 Figure 2-19 Connection Parameter window....................................................................................................2-25 Figure 2-20 Global Client Key window...........................................................................................................2-28 Figure 2-21 Application Log window...............................................................................................................2-29 Figure 2-22 Server Key Management window................................................................................................2-30 Figure 2-23 Connect-Server Profile window...................................................................................................2-33 Figure 2-24 Quick Connect window-SSH Client.............................................................................................2-35 Issue 01 (2008-01-15) Huawei Technologies Proprietary vii
Figures
HUAWEI SGSN9810 Serving GPRS Support Node Operation Guide Figure 2-25 Quick Connect window-SFTP Client...........................................................................................2-36 Figure 3-1 Procedure for EMS login to the SGSN9810.......................................................................................3-4
Figure 3-2 Adding a user....................................................................................................................................3-11 Figure 3-3 Selecting an user account..................................................................................................................3-12 Figure 3-4 Modifying user details......................................................................................................................3-13 Figure 3-5 Selecting an user account to be deleted............................................................................................3-14 Figure 3-6 Selecting a command group.............................................................................................................3-17 Figure 3-7 Password Policy Setting dialog box.................................................................................................3-18 Figure 3-8 Change Password dialog box..........................................................................................................3-20 Figure 4-1 Device Panel navigator.......................................................................................................................4-3 Figure 4-2 Failure bar...........................................................................................................................................4-3 Figure 4-3 panel color legend...............................................................................................................................4-4 Figure 4-4 Panels of the back boards in the PSM subrack...................................................................................4-5 Figure 4-5 The shortcut menu after right-clicking a board..................................................................................4-6 Figure 4-6 List board dialog box........................................................................................................................4-7 Figure 4-7 Query result........................................................................................................................................4-7 Figure 4-8 Board query report..............................................................................................................................4-8 Figure 4-9 Query result of board version.............................................................................................................4-9 Figure 4-10 The shortcut menu after right-clicking a board..............................................................................4-10 Figure 4-11 The shortcut menu after right-clicking a board..............................................................................4-11 Figure 4-12 Shortcut menu for the UALU board...............................................................................................4-12 Figure 4-13 Querying the power status of the subrack.......................................................................................4-12 Figure 4-14 Querying subrack temperature........................................................................................................4-13 Figure 5-1 CPU Usage window...........................................................................................................................5-3 Figure 5-2 Add Task dialog box.........................................................................................................................5-3 Figure 5-3 CPU Usage window...........................................................................................................................5-4 Figure 5-4 Add Task dialog box.........................................................................................................................5-5 Figure 5-5 CPU Usage window...........................................................................................................................5-6 Figure 5-6 CPU Usage window...........................................................................................................................5-6 Figure 5-7 List tab in Monitor Viewer...............................................................................................................5-8 Figure 5-8 Chart tab in Monitor Viewer............................................................................................................5-8 Figure 6-1 SAAL Trace window..........................................................................................................................6-2 Figure 6-2 Message browse window for interface tracing...................................................................................6-3 Figure 6-3 Message details...................................................................................................................................6-4 Figure 6-4 Trace Viewer window.......................................................................................................................6-7 Figure 6-5 Message details...................................................................................................................................6-8 Figure 6-6 Querying the trace review properties..................................................................................................6-9 Figure 7-1 Huawei alarm box...............................................................................................................................7-5 Figure 7-2 Alarm Browse window......................................................................................................................7-6 Figure 7-3 General Option tab of Query Alarm Log dialog box......................................................................7-8 Figure 7-4 Detailed Option tab of Query Alarm Log dialog box.....................................................................7-8 Figure 7-5 Physical Option tab of Query Alarm Log dialog box.....................................................................7-9 viii Huawei Technologies Proprietary Issue 01 (2008-01-15)
Figures
Figure 7-6 Query result........................................................................................................................................7-9 Figure 7-7 Saving alarms into a file...................................................................................................................7-10 Figure 7-8 The Print dialog box........................................................................................................................7-11 Figure 7-9 Print to File dialog box....................................................................................................................7-12 Figure 7-10 The Print dialog box......................................................................................................................7-13 Figure 7-11 Print to File dialog box..................................................................................................................7-14 Figure 7-12 Querying alarm details....................................................................................................................7-16 Figure 7-13 Setting the query condition.............................................................................................................7-17 Figure 7-14 Query Alarm Configuration window..........................................................................................7-18 Figure 7-15 Setting the query condition.............................................................................................................7-19 Figure 7-16 Query Alarm Configuration window..........................................................................................7-19 Figure 7-17 Modify Alarm Configuration dialog box....................................................................................7-20 Figure 7-18 Setting the query condition.............................................................................................................7-21 Figure 7-19 Query Alarm Configuration window..........................................................................................7-21 Figure 7-20 Connections between the LMT alarm forward system, UOMU board, and alarm box .................7-23 Figure 7-21 Configuring alarm forward system.................................................................................................7-24 Figure 7-22 Alarm Box Shield Severity Setting dialog box............................................................................7-26 Figure 7-23 Alarm Box Control dialog box.....................................................................................................7-27 Figure 7-24 Alarm Box Control dialog box.....................................................................................................7-28 Figure 7-25 Alarm Box Control dialog box.....................................................................................................7-29 Figure 7-26 Query Result dialog box...............................................................................................................7-29 Figure 7-27 Query Result window....................................................................................................................7-30 Figure 8-1 Net Configure dialog box..................................................................................................................8-3 Figure 8-2 Download Measurement Results window.......................................................................................8-5 Figure 8-3 Root directory of the server................................................................................................................8-6 Figure 8-4 Measurement result files that can be downloaded..............................................................................8-6 Figure 8-5 Downloading some files.....................................................................................................................8-7 Figure 8-6 Auto Download Settings window.....................................................................................................8-8 Figure 8-7 Add window.......................................................................................................................................8-8 Figure 8-8 Auto Download Settings window.......................................................................................................8-9 Figure 8-9 Counters Information tab in Query Performance Results..........................................................8-10 Figure 8-10 Time Information tab in Query Performance Results...............................................................8-11 Figure 8-11 APN data table................................................................................................................................8-12 Figure 8-12 Particular Information dialog box...............................................................................................8-12 Figure 8-13 Add dialog box...............................................................................................................................8-13 Figure 8-14 Add a custom template node in navigation tree..............................................................................8-14 Figure 8-15 Query Performance Results dialog box.......................................................................................8-15 Figure 8-16 Selecting Filter Results.................................................................................................................8-16 Figure 8-17 Setting the filter conditions.............................................................................................................8-17 Figure 8-18 Data table refreshed after the filtering based on measurement objects..........................................8-18 Figure 8-19 Selecting Export Data from the shortcut menu.............................................................................8-19 Figure 8-20 Entering the file name and saving path...........................................................................................8-19 Issue 01 (2008-01-15) Huawei Technologies Proprietary ix
Figures
HUAWEI SGSN9810 Serving GPRS Support Node Operation Guide Figure 8-21 Add dialog box...............................................................................................................................8-20 Figure 8-22 Add a custom template node in navigation tree..............................................................................8-21 Figure 8-23 Measurement description file.........................................................................................................8-23 Figure 8-24 Particular Information dialog box...............................................................................................8-23 Figure 11-1 SGSN9810 information collector window...................................................................................11-2 Figure 11-2 LoginWindow................................................................................................................................11-2 Figure 12-1 System Setting window.................................................................................................................12-2 Figure 12-2 Output Window Setting window.................................................................................................12-3 Figure 12-3 Save Input Commands dialog box...............................................................................................12-5 Figure 12-4 Save Input Commands dialog box...............................................................................................12-5 Figure 12-5 Timer Batch Command tab page.................................................................................................12-7 Figure 12-6 Add Batch Task dialog box..........................................................................................................12-8 Figure 12-7 Immediate Batch Command window..........................................................................................12-9 Figure 12-8 Immediate Batch Command window........................................................................................12-10 Figure 12-9 Set dialog box...............................................................................................................................12-10
Issue 01 (2008-01-15)
Tables
Tables
Table 1-1 Fields in the FTP Server configuration window..................................................................................1-5 Table 1-2 Status combination of Name Service and LMT Server........................................................................1-7 Table 2-1 Formats of a key file to be saved......................................................................................................... 2-8 Table 2-2 Profile parameter................................................................................................................................2-11 Table 2-3 Connection parameters.......................................................................................................................2-25 Table 2-4 Log parameters...................................................................................................................................2-29 Table 2-5 Description of new connections.........................................................................................................2-31 Table 2-6 Quick connect parameters..................................................................................................................2-36 Table 2-7 SFTP commands list..........................................................................................................................2-39 Table 3-1 Differences between an EMS and a local user.....................................................................................3-4 Table 3-2 User groups and operation privileges...................................................................................................3-5 Table 3-3 Examples of valid operation period..................................................................................................... 3-6 Table 3-4 Command group functions...................................................................................................................3-7 Table 6-1 Fields in SAAL Trace.......................................................................................................................... 6-2 Table 6-2 Available trace message file types.......................................................................................................6-6 Table 7-1 Alarm types..........................................................................................................................................7-2 Table 7-2 Alarm severities................................................................................................................................... 7-3 Table 7-3 Alarm event types................................................................................................................................ 7-4 Table 7-4 Alarm forward system attributes........................................................................................................7-25 Table 8-1 Fields in Net Configure dialog box.....................................................................................................8-3 Table 11-1 Relation between file types and paths..............................................................................................11-3 Table 12-1 Execution types..............................................................................................................................12-11
Issue 01 (2008-01-15)
xi
Interfaces and starting methods of the LMT, FTP client, FTP server, LMT service manager, trace viewer, monitor viewer, performance browse tool, and convert management system How to use Online Help of the LMT Procedure for session establishment on the SSH client and related operations Authorization management, equipment management, monitor management, tracing management, alarm management and forwarding, performance management, log management, information collection, and data backup and restoration on the LMT Setting the system output and command timeout duration, saving input commands, executing batch files, searching commands, and right-click menu in the MML result output area
l l l
Related Versions
The following table lists the product versions related to this document. Product Name SGSN9810 Version V800R008,UAG
Intended Audience
The intended audiences of this document are:
l l
Organization
1 Huawei Local Maintenance Terminal The Huawei Local Maintenance Terminal (LMT) in this manual refers to the operation and maintenance (O&M) software of the Huawei SGSN9810. The host of the LMT is connected to
Issue 01 (2008-01-15) Huawei Technologies Proprietary 1
the UOMU board through a local area network (LAN) or a wide area network (WAN) to communicate with the SGSN system. The UOMU board is a packet service O&M unit in the Huawei SGSN9810 system. 2 SSH Management Describes the related operations to implement the SSH function. 3 Authorization Management The LMT system supports multiple clients at the same time. The LMT provides the authorization management to ensure the system security. 4 Equipment Management In the Device Panel pane, you can list boards, reset boards, and perform other operations. On the MML client, you can view all the MML commands in the system. 5 Monitor Management Monitor management is used in system routine maintenance. It monitors the CPU usages of the boards. Monitor management has a great impact on system performance. The Monitor Viewer displays the monitored data, which is also stored in an mrf file. You can browse these files offline in charts or lists through the Monitor Viewer. 6 Tracing Management Tracing management is used in equipment routine maintenance. You can locate the failure in the service procedure by using tracing management. 7 Alarm Management Various software and hardware faults generated during operation of the alarm management checking device on the LMT and the monitored faults are exported as alarm information reports in the alarm subsystem. Then these faults display as the audible and visual alarms on the alarm box or they are informed to maintenance personnel through tray falsh on the LMT. 8 Performance Management The performance measurement collects information such as the hardware, users, and system resource usages. The collected data is useful for designing and managing of the communication network. 9 Backing Up and Restoring Data The SGSN9810 data files are stored on the hard disk of the UFSU board which is the back board of the UOMU board. To secure the data, the SGSN9810 offers the functions of data backup and restoration. 10 Log Management The SGSN9810 can generate the following log files: operation log file, alarm log file, security log file, system log file. 11 Information Collection The SGSN9810 requires periodically collecting its operation information. To enhance the maintenance efficiency of the SGSN, the LMT uses the information collector to collect the maintenance information. 12 System Management
2 Huawei Technologies Proprietary Issue 01 (2008-01-15)
Describes the system management operations you can execute in the LMT.
Conventions
1. Symbol Conventions The following symbols may be found in this document. They are defined as follows Symbol Description Indicates a hazard with a high level of risk that, if not avoided, will result in death or serious injury. Indicates a hazard with a medium or low level of risk which, if not avoided, could result in minor or moderate injury. Indicates a potentially hazardous situation that, if not avoided, could cause equipment damage, data loss, and performance degradation, or unexpected results. Indicates a tip that may help you solve a problem or save your time. Provides additional information to emphasize or supplement important points of the main text.
DANGER
WARNING
CAUTION
TIP
NOTE
2. General Conventions Convention Times New Roman Boldface Italic Courier New 3. Command Conventions Convention Boldface Italic [] {x | y | ...} Description The keywords of a command line are in boldface. Command arguments are in italic. Items (keywords or arguments) in square brackets [ ] are optional. Alternative items are grouped in braces and separated by vertical bars.One is selected.
Huawei Technologies Proprietary 3
Description Normal paragraphs are in Times New Roman. Names of files,directories,folders,and users are in boldface. For example,log in as user root . Book titles are in italics. Terminal display is in Courier New.
Issue 01 (2008-01-15)
Description Optional alternative items are grouped in square brackets and separated by vertical bars.One or none is selected. Alternative items are grouped in braces and separated by vertical bars.A minimum of one or a maximum of all can be selected. Alternative items are grouped in braces and separated by vertical bars.A minimum of zero or a maximum of all can be selected.
4. GUI Conventions Convention Boldface > Description Buttons,menus,parameters,tabs,window,and dialog titles are in boldface. For example,click OK. Multi-level menus are in boldface and separated by the ">" signs. For example,choose File > Create > Folder .
5. Keyboard Operation Convention Key Key1+Key2 Key1,Key2 Description Press the key.For example,press Enter and press Tab. Press the keys concurrently.For example,pressing Ctrl+Alt+A means the three keys should be pressed concurrently. Press the keys in turn.For example,pressing Alt,A means the two keys should be pressed in turn.
6. Mouse Operation Action Click Double-click Drag Description Select and release the primary mouse button without moving the pointer. Press the primary mouse button twice continuously and quickly without moving the pointer. Press and hold the primary mouse button and move the pointer to a certain position.
Update History
Updates between document versions are cumulative. Therefore, the latest document version contains all updates made to previous versions. Updates in Issue 01 (2008-01-15)
4 Huawei Technologies Proprietary Issue 01 (2008-01-15)
Issue 01 (2008-01-15)
Issue 01 (2008-01-15)
1-1
To learn more about the MML commands, refer to the MML online help.
Figure 1-1shows a version to be selected when you log in to the LMT. Figure 1-1 Shows the interface of the version to be selected.
LMT GUI
Figure 1-2 shows the GUI of the LMT. Figure 1-2 GUI of the SGSN9810 LMT
When data is backed up through the FTP Client, the UOMU serves as the FTP Server. Thus, you must enable the FTP server function on the UOMU board by running the SET FTPENABLE command.
1-4
Issue 01 (2008-01-15)
Table 1-1 lists description of the parameters in the FTP Server configuration window. Table 1-1 Fields in the FTP Server configuration window Field User name Password Working directory Description User name. The initial user name is admin. Password of the user. The initial password is admin. Directory that stores the executable files. The system default path is: \adaptor \serveradaptor\sgsn9810\lib. The log files are automatically saved in this directory. FTP port number. The initial port number is 21. Number of threads that can be run at the same time. The initial number is 50.
CAUTION
Problem description: During operation of the LMT, do not change the system operating time. If the time is changed, the LMT may run abnormally and unexpected fault may occur. Solution: If the time is changed, restart the LMT Service Manager and log in to the LMT again.
Issue 01 (2008-01-15)
1-5
Choose Start > Programs > HUAWEI Local Maintenance Terminal > LMT Service Manager. After the LMT software is installed, the LMT service manager automatically starts when the LMT is started.
Right-click the icon and choose Startup from the shortcut menu. The LMT Service Manager window is displayed, as shown in Figure 1-5. You can right-click service manager. and then select Stop from the shortcut menu to deactivate the LMT
LMT Server is the LMT server process module. A LMT client communicates with this module through the CORBA interface. It connects the LMT client and the UOMU. Name Service is the name service process module. It provides the naming service defined in the CORBA specifications for the server and client.
The following are two ways of setting up the connection between the LMT and the server or disconnect the LMT from the server through the LMT service manager:
l
Select the line of Name Service or LMT Server. Right-click and then choose Start to run the tool or choose Stop to stop the tool. Choose Operation > Start to run the tool. Choose Operation > Stop to stop the tool.
If the status of the LMT service manager is Stopped, you cannot log in to the LMT, or the LMT and the LMT server are disconnected. Table 1-2 lists the three status combinations of the Name Service and LMT Server. When the Name Service is Stopped, the LMT Server is always Stopped.
1-6 Huawei Technologies Proprietary Issue 01 (2008-01-15)
Table 1-2 Status combination of Name Service and LMT Server Service Name Status 1 Name Service LMT Server Stopped Stopped 2 Started Stopped 3 Started Started
To start the trace viewer, choose Start > Programs > HUAWEI Local Maintenance Terminal > Trace Viewer. Select from the toolbar on the LMT.
l l
Issue 01 (2008-01-15)
1-7
To start the monitor viewer, choose Start > Programs > HUAWEI Local Maintenance Terminal > Monitor Viewer. Select from the toolbar on the LMT.
l l
1-8
Issue 01 (2008-01-15)
To open the Convert Management System window, you can click the icon and then select Restore from the shortcut menu.
Issue 01 (2008-01-15) Huawei Technologies Proprietary
1-9
To quit the convert management system, you can right-click shortcut menu. If the serial port that connects the alarm box is faulty, an icon Figure 1-9 shows the GUI of the convert management system. Figure 1-9 Convert Management System Window
l l l
Choose Help > Help Topics . Click Help in a dialog box, if any.
The MML help provides the functions, notes, parameters, and examples for each MML command. To start the MML help, perform the following: 1. 2. Log in to the LMT. Enter the MML command into the MML command field and then press Enter. The help information about this command is displayed on the Help Information page.
Huawei Technologies Proprietary Issue 01 (2008-01-15)
1-10
2 SSH Management
2
About This Chapter
SSH Management
Describes the related operations to implement the SSH function. 2.1 Overview of SSH Management Describes the principles, functions and brief operation steps of SSH. 2.2 Creating a Session To realize secure data transfer between the LMT and the SGSN9810, you must create a session on the SSH Client, so that the LMT can connect the SGSN9810 through the SSH Client. 2.3 Applying a Session When a session is started, you can: creating a session log file, browsing session trace messages, setting interactive mode and running scripts.
Issue 01 (2008-01-15)
2-1
2 SSH Management
CAUTION
The SSH feature is optional for the HUAWEI SGSN9810. To implement the feature, you must purchase the license. Figure 2-1 shows how the SSH management function is realized. Figure 2-1 Work principle of SSH
Client Server Server Program Listener Port Plain Text Transfer Listener Port SSH Client SSH Ciphering Transfer Port 22 Plain Text Transfer SSH Server
Client Program
NOTE
SSH is used to ensure that all the data is encrypted for transfer between the LMT and the SGSN. If the data to be transferred does not require encrypting, do not use SSH.
You can start the following sessions through the SSH Client:
l
SSH session: used for port forwarding and Stelnet connection. Currently, STelnet provides only the interface. The SSH Client forwards the encrypted data from the LMT to the SGSN9810.
Huawei Technologies Proprietary Issue 01 (2008-01-15)
2-2
2 SSH Management
SFTP session: used to encrypt FTP transfer data. When an SFTP session is started, the port forwarding function is not automatically enabled. MML session: used to encrypt MML commands to be delivered. When an MML session is started, the port forwarding function is automatically enabled.
Operations of SSH are as follows: 1. Enable the SSH Client software: choose Start > Programs > I3SAFE SSH > SFTP Client > SSH Broker . The tray icon
NOTE
2. 3.
Connect the SSH Client to the SGSN9810: Creating a Session. Connect the LMT and the SGSN9810 through the SSH Client. (1) Enable the port forwarding function of the SSH Client:
l l
Setting up a session using Connect mode Setting up an SSH session or MML session using Quick Connect mode
NOTE
l l
Only when the port forwarding function of the SSH Client is enabled, the LMT can be connected to the SGSN9810 through the SSH Client. Setting up an SFTP session cannot automatically enable the port forwarding function.
(2) Start the LMT to connect it to the SGSN9810 through the SSH Client.
If an SSH session or an SFTP session is started in quick connect mode, you can skip the steps to configure a profile, general settings, and management mode of a public key for the server.
When the SGSN9810 establishes a session, it has the following limits to the numbers of connections and channels:
l
Issue 01 (2008-01-15)
2 SSH Management
l
Each connection supports up to five ciphering channels, and up to only one channel can operate SSH in one connection. One SFTP channel must occupy one connection.
2.2.1 Generating a Private-Public Key Pair You can use Key Generation Wizard to generate a private-public key pair. 2.2.2 Downloading a Client Public Key The public key file generated by the client must be downloaded to the server. 2.2.3 Adding an SSH User Before establishing an SSH connection, you must add an SSH user and specify the user name, public key file, and service type of this user. The configured user name must be the same as in the SSH Client. 2.2.4 Configuring a Profile A profile is a set of user-defined connection details used to connect to the SSH Server or to a target system through the SSH Server. 2.2.5 Configuring General Settings The general settings for SSH are: LMT proxy, terminal settings, proxy server, bind address, connection, global client key and application log. 2.2.6 Managing Server Keys Managing server keys indicates how to manage the unknown public keys received from the SSH Server, during server authentication. 2.2.7 Starting a Session Session refers to all the connections that a single client might make to a server in the course of viewing any pages associated with a given application. They are specific to both the individual user and the application. 2.2.8 Connecting the LMT to the SGSN9810 through the SSH Client You can connect the LMT to the SGSN9810 through the SSH Client.
Context
The file name of a public key is the same as that of a private key, but their suffix names are different.
l l
The suffix name of a public key is .pub. The suffix name of a private key is .pvt.
CAUTION
The public key file and the private key file must in the same directory and of the same name.
2-4
Issue 01 (2008-01-15)
2 SSH Management
Procedure
Step 1 Open the client window as following:
l
Choose Start > Programs > I3SAFE SSH > SSH Client. The SSH Client window is displayed, and the tray icon is displayed on the taskbar. is displayed on the taskbar.
Choose Start > Programs > I3SAFE SSH > SFTP Client. The SFTP Client window is displayed, and the tray icon
Step 2 In the SSH Client window or the SFTP Client window, choose Tools > Key Generation. The Key Generation Wizard dialog box is displayed, as shown in Figure 2-2. Figure 2-2 Key Generation Wizard dialog box
Step 3 After reading the introduction on the first page, click Next. The Key Generation Wizard window for setting the type and the length of a public key is displayed, as shown in Figure 2-3.
Issue 01 (2008-01-15)
2-5
2 SSH Management
Figure 2-3 Key Generation Wizard window for setting the type and the length of a public key
Step 4 In the Key Type drop-down list, set Key Type to RSA. Step 5 In the Key Length drop-down list, set Key Length to 1024, 2048, or 4096.
NOTE
l l
The SGSN9810 supports only RSA public key type. A longer public key is more secure, but it requires more time to be generated.
Step 6 Click Next. The Key Generation Wizard window for setting the passphrase of a private key is displayed, as shown in Figure 2-4. Figure 2-4 Key Generation Wizard window for setting the passphrase of a private key
Step 7 Enter passphrase in Passphrase. Step 8 Reenter the passphrase in Confirm Passphrase.
2-6 Huawei Technologies Proprietary Issue 01 (2008-01-15)
2 SSH Management
Step 9 Enter the comment that is to be stored with the key. This comment will be displayed in the dialog box when you are asked for the private key passphrase.
NOTE
l l
The passphrase must be of a printable character type. Printable characters are a-z, A-Z, 0-9, and special characters, such as ' = ( ) + , - . / : ? and space. During the procedure for authentication, the private key can be decrypted only if the entered passphrase is valid.
Step 10 Click Next. The Key Generation Wizard window containing the progress bar is displayed, as shown in Figure 2-5. Figure 2-5 Key Generation Wizard window containing the progress bar
Step 11 Move the mouse randomly to generate random bits that are used for key content. After the key is generated, the Next button is activated.
NOTE
Time for key generation is different, which relies on the set key length and the processor speed of the computer.
Step 12 Click Next. The Key Generation Wizard window for saving the key pair is displayed, as shown in Figure 2-6. After the format of the key file to be saved is chosen, the Save Key Pair button is activated.
Issue 01 (2008-01-15)
2-7
2 SSH Management
Figure 2-6 Key Generation Wizard window for saving the key pair
Table 2-1 lists the formats of a key file to be saved. Table 2-1 Formats of a key file to be saved Format SSH.com Open SSH Putty Application Scenario A key pair can be applied to the SSH.com server. A key pair can be applied to the Open SSH Server. A key pair can be applied to the putty application. Note Not supported Supported
l
Select the Open SSH option in the right side of Format. Select the Open SSH check box to generate a public-private key pair for the corresponding server, in addition to the putty private key file. Thus, the Open SSH public key is used with the putty private key.
2-8
Issue 01 (2008-01-15)
2 SSH Management
l l
Only when Putty is chosen, the explanation texts can be displayed in the right side of the window. Select the format to make the key compatible with the corresponding server. For instance, the key pair is saved in Open SSH format, indicating that the key pair can be used in the Open SSH Server and the SSH Server. You can select one or all of the available format types.
Step 13 Click Save Key Pair to save the key pair in the selected format (s). Step 14 Click Finish to exit the Key Generation Wizard. ----End
Procedure
Run DLD SSHPUBKEY on the MML Client. ----End
Procedure
Run ADD SSHUSER on the MML Client. ----End
Context
A profile is a set of user-defined connection details used to connect to the SSH Server or to a target system through the SSH Server. The SSH Profile consists of a profile name and connection details, such as host IP, user name, port number, and password. When the client requires connecting to multiple remote hosts, you can select different settings defined for each host to manage different host configurations. The SSH Profile makes it easy to manage different host configurations. The management module of the SSH Profile enables you to create, modify, and delete a profile, and define advanced configurations for the profile. 2.2.4.1 Creating a Profile You can create a profile and define the connection details for the profile in the SSH Client Configuration window. This profile is specific for each SSH Server and is stored in the SSH Client for the particular server:
Issue 01 (2008-01-15) Huawei Technologies Proprietary 2-9
2 SSH Management
2.2.4.2 Configuring Port Forwarding You must create a profile to configure the port forwarding settings. 2.2.4.3 Configuring Algorithms You must create a profile to configure the algorithms that can be executed by the server. 2.2.4.4 Configuring Client Authentication You must create a profile to configure the client authentication that can be executed by the client.
Creating a Profile
You can create a profile and define the connection details for the profile in the SSH Client Configuration window. This profile is specific for each SSH Server and is stored in the SSH Client for the particular server:
Procedure
Step 1 Defining basic settings: The basic requirements for creating a profile involve providing the profile name and the connection details. 1. Select the Profile Management node in the navigation tree of the SSH Client Configuration window. The Profile Management window is displayed, as shown in Figure 2-7. Figure 2-7 Profile Management window
2.
Click Add Profile. The Add New Profile dialog box is displayed, as shown in Figure 2-8.
2-10
Issue 01 (2008-01-15)
2 SSH Management
3.
Enter the required parameters in the Connection Details panel. Table 2-2 lists the description of each parameter. Table 2-2 Profile parameter Parameter Profile Host IP User name Port Number Terminal Type Description The name of the profile. The IP address of the SGSN9810. The user name for the profile. The port number through which the client can connect to the server. The type of the client terminal. There are two options to choose from: ANSI and VT100. The proxy defined for the profile (optional).
Proxy
4.
Click OK to save the profile and return to the Profile Management window. The Profile Management window containing the list of added profiles is displayed.
NOTE
l l l
Select the checkbox next to the profile if you want the profile and listeners associated with it to be connected at the time when SSH starts. You can repeatedly add a profile through the Add Profile button. You can delete a profile through the Delete Profile button.
5. 6.
Issue 01 (2008-01-15)
Click Apply to save the profile to the database. Click OK to save the profile and exit the window.
Huawei Technologies Proprietary 2-11
2 SSH Management
NOTE
You can also add a profile by using the and SFTP Client applications.
----End
Context
The applicable ports that the SGSN9810 can realize are:
l l l
6000: forwards command messages. 6001: forwards alarm messages. 6006: forwards data messages. If there is a tracing task on the LMT, it is not recommended to use 6006 for encrypted data forwarding because of heavy data traffic. You can forward the tracing data without being encrypted on 6006.
You can start a session through other ports supported by the SGSN9810, but these ports cannot transfer data.
Procedure
Step 1 Choose Profile Management > Profile name > Port Forwarding from the navigation tree of the SSH Client Configuration window. The Port Forwarding window is displayed, as shown in Figure 2-9.
2-12
Issue 01 (2008-01-15)
2 SSH Management
Step 2 Click Add. The Add Port Forwarding window is displayed, as shown in Figure 2-10.
Issue 01 (2008-01-15)
2-13
2 SSH Management
Step 3 In the Type group box, click Local as the type of port forwarding.
CAUTION
It is recommended to click Local as the type of port forwarding to ensure security. This type requires that the application client must be on the same PC with the listener port for data forwarding. If they are not on the same PC, the connection request initiated by the application client is rejected. Step 4 In the Port Number field, enter the port number to which the client connects for port forwarding. Step 5 In the Host IP and Host Port fields, enter the IP address of the destination and the port number of the destination application respectively. Step 6 Click OK to save the port forwarding settings and exit the window. ----End
Configuring Algorithms
You must create a profile to configure the algorithms that can be executed by the server.
2-14 Huawei Technologies Proprietary Issue 01 (2008-01-15)
2 SSH Management
Context
You must create a profile to configure the following algorithms:
l l l
Cipher: used to encrypt data. MAC: used to check data integrity. Key exchange: used to obtain the symmetric key that is required for transferring encrypted data between the client and the server. Compression: used to compress input and output algorithms.
Procedure
Step 1 Choose Profile Management > Profile name > Advance from the Profile tree menu. A list of algorithms is displayed, as shown in Figure 2-11. Figure 2-11 List of algorithms
Step 2 Select the required algorithms respectively in the Cipher, MAC, Key Exchange, and Compression tabs.
Issue 01 (2008-01-15)
2-15
2 SSH Management
CAUTION
The SGSN9810 supports only part of the algorithms in the list:
l l l l
Cipher: DES3 CBC and AES128 CBC MAC: HMAC SHA1, HMAC SHA1 96, HMAC MD5, and HMAC MD5 96 Key exchange: DH G1 SHA1 and DH GEXCHANGE SHA1 Compression: not supported or to
Step 3 The priorities of all algorithms decline from the top down. You can use the icon move the selected algorithm up or down. Step 4 Click Apply to apply the settings. Step 5 Click OK to save the settings and exit the window. ----End
Context
Client authentication can only be performed through a public-private key pair in the SGSN9810. The Prerequisites of configuring client authentication:
l l
The client and the server must have passed the key exchange phase. The private-public key pair must have been generated.
During authentication, the client sends an authentication request message that contains the user name, service name, and authentication method (public key). On receiving the response from the server, the client initiates the authentication methods (public key) based on the set options.
Procedure
Step 1 Choose Profile Management > Profile name > Client Authentication > from the Profile tree menu. The Authentication window is displayed, as shown in Figure 2-12.
2-16
Issue 01 (2008-01-15)
2 SSH Management
CAUTION
The SGSN9810 supports only public key authentication, but not password authentication. Therefore, Password Authentication under Algorithm must not be clicked. Step 3 Click the Properties button. The Profile Public Key Authentication dialog box is displayed, as shown in Figure 2-13. Step 4 Select the key for the profile.
l l
Select the Use Global Key option, if you want to use the global private key for the profile. Select the Use Session Key option, if you want to use a specific private key for this profile.
Click Generate Key, if you want to generate a public-private key pair for the session. Click Browse to select a Private Key File path. Enter Pass phrase for decryption of the private key. Click Change if you want to change the decryption passphrase of the private key.
Issue 01 (2008-01-15)
2-17
2 SSH Management
Step 5 Click OK to save the settings and return to the SSH Client Configuration window. Step 6 Click Apply to apply the settings. Step 7 Click OK to save the settings and exit the window. ----End
Context
NOTE
The SGSN9810 does not support LMT and SOCKS proxy Server.
In the navigation tree of the SSH Client Configuration window, you can set the general parameters through the General Settings node. You can open the SSH Client Configuration window as follows:
l
Choose Start > Programs > I3SAFE SSH > SSH Broker. The tray icon is displayed on the taskbar. Right-click the icon and choose Open Configuration in the shortcut menu.
Choose Start > Programs > I3SAFE SSH > SSH Client. In the SSH Client window, choose Tools > Configuration. Choose Start > Programs > I3SAFE SSH > SSH Client. In the SFTP Client window, choose Tools > Configuration.
The General Settings window consists of the Configuration File panel that displays the location of the .xml configuration file for the application. This file can be customized according to your requirements. This configuration file can be used for another client who requires the same specifications. In this scenario, the .xml file can be copied to the client's system. 2.2.5.1 Configuring LMT Proxy
2-18 Huawei Technologies Proprietary Issue 01 (2008-01-15)
2 SSH Management
When the LMT connects the SGSN9810 through SSH Client serving as an agent, a LMT proxy must be configured. 2.2.5.2 Configuring Terminal Parameters The terminal settings of SSH client are applied to all the open interactive sessions. 2.2.5.3 Defining Bind Address If the system on which the SSH Client application is executing has more than one network addresses, then you must select an address as bind address on which to accept or create connections. 2.2.5.4 Configuring Connection Parameters You can set certain restrictions for the I3SAFE SSH application. 2.2.5.5 Configuring Global Client Key You can configure a global key that can be used for all the sessions. 2.2.5.6 Configuring Log File All the operations performed in a session are logged in a file. You can configure the name and the size of the log file.
Context
LMT is a Huawei internal protocol that uses the SSH client for transmitting data to the Backend Administration Management (BAM) server through a secure network. When the LMT connects the SGSN9810 through SSH Client serving as an agent, a LMT proxy must be configured. Add a LMT listening port through which the LMT client connects to the SSH client. The SSH client acts like a LMT proxy server and transmits the data from the LMT client through the SSH Server to the BAM server. This process requires you to add a range of the listening ports and to map a profile to the BAM server. You have the option to transmit the data in an encrypted format or in an unencrypted format to the destination server. You can add a LMT listener and map the BAM IP to a profile in the SSH Client Configuration window while configuring the LMT proxy. You can add or delete a LMT listener. LMT proxy involves the following scenarios:
l
When the data transmission is encrypted and direct: In this scenario, the LMT client sends data to the SSH client that acts as a LMT proxy server. Since the data transmitted is encrypted, it passes through the SSH Server to the BAM server. When the data transmission is unencrypted and direct: In this scenario, the data from the LMT client is passed through the SSH client directly to the BAM server. As the data is unencrypted, it does not pass through the SSH Server.
When the LMT client sends a request with a BAM IP which is not mapped to a profile, the system checks all the profiles to find a matching IP address with that of the BAM. This is based on the assumption that the BAM server and the SSH Server are existing on the same machine. If there are no matching profiles found, the connection gets disconnected.
Issue 01 (2008-01-15)
2-19
2 SSH Management
Procedure
Step 1 Select General Settings > LMT Proxy from the navigation tree of the SSH Client Configuration window. The LMT Proxy window is displayed, as shown in Figure 2-14. Figure 2-14 LMT Proxy window
Step 2 Click Add in the Listeners tab. The Add LMT Listener window is displayed, as shown in Figure 2-15.
2-20
Issue 01 (2008-01-15)
2 SSH Management
Step 3 Enter the range of listening ports in the From and To fields. If the To port is the same as the From port, then only one port is added to the existing list of listeners. The available ports are:
l l
Select the Allow Local Only option, if connections are to be accepted only from application clients that are on the same machine as the listener for port forwarding. If this option is not selected, then connections from any client application are accepted. Select the Enable Encryption option, if you want the incoming data to be routed through a secure SSH tunnel before it is forwarded to the destination application. Select the Text port option. When establishing a connection, the proxy server sends a response packet to the LMT client.
l l
Step 5 Click OK to save the settings and return to the LMT Proxy window. The information of the configured listening port is displayed in the LMT Proxy window.
NOTE
Issue 01 (2008-01-15)
2-21
2 SSH Management
Step 6 Click Add in the Mapping tab. The Add LMT Mapping window is displayed, as shown in Figure 2-16. If the mappings details are already defined, then click the Mapping tab. The Destination IP and the mapped profiles are displayed.
NOTE
Step 7 Enter the destination IP address in the Destination field. The IP of the BAM server serves as the destination IP. Step 8 Select the server profile from the Server drop-down list. The drop-down list shows all the server profiles that are created by the user. Step 9 Click OK to update the mapping details. The LMT Proxy window is displayed with the current settings. Step 10 Click Apply to apply the settings. Step 11 Click OK to exit the SSH Client Configuration window after saving the settings. ----End
Context
You can also set the modes in which the terminal works and specify the display characteristics, such as font and color. You can also configure the scroll back buffer, which allows the user to view the lines of text that have scrolled off the screen due to additional lines being displayed.
Procedure
Step 1 Select General Settings > Terminal Setting from the navigation tree of SSH Client Configuration window. The Terminal Setting window is displayed, as shown in Figure 2-17.
2-22 Huawei Technologies Proprietary Issue 01 (2008-01-15)
2 SSH Management
Step 2 Select the terminal type from the Terminal drop-down list. The available terminal types are VT100 and ANSI. Step 3 In the Display panel, click the Font button. The Font window is displayed. Step 4 Select the required font and font size. Click OK to return to the Terminal Setting window. Step 5 In the Window Size panel, select the required number of rows and columns from the Rows and Columns drop-downs. This decides the number of lines displayed in the terminal without scrolling. Step 6 In the Color panel, click on the font color. The color palette is displayed. Step 7 Select the required color for font color. Click OK. Perform the same step to set the background color. Step 8 In the Scroll Back Buffer panel, select the required lines from the Lines of drop-down. Step 9 Click Apply to apply the settings. Step 10 Click OK to save the settings and exit the window. ----End
2 SSH Management
Context
There are two types of IP addresses associated with the SSH Client:
l
IP Address exposed to Internal Network: receives or establishes connections in the internal network. IP Address exposed to External Network: receives or establishes connections with the external network servers.
Procedure
Step 1 Select General Settings > Bind Address from the navigation tree of the SSH Client Configuration window. The Bind Address window is displayed, as shown in Figure 2-18. Figure 2-18 Bind Address window
Step 2 Select the IP address for Internal and IP address for External connections from the dropdown list box. Step 3 Click Apply to apply the changes. Step 4 Click OK to save the changes and exit the window. ----End
2 SSH Management
Procedure
Step 1 Select General Settings > Connection from the navigation tree of the SSH Client Configuration window. The Connection Parameter window is displayed, as shown in Figure 2-19. Figure 2-19 Connection Parameter window
Step 2 Set the values for the required parameters in the Connection Restrictions panel and in the Connection Properties panel. Table 2-3 shows the description of parameters. Table 2-3 Connection parameters Parameter Name Response Time Out Unit Time in seconds Description This is the time during which a response should be elicited from the server. During this period, the client must receive the response from the server. If no response is received, the session is disconnected. Connection Retry Count Number This is the number of times a user can attempt to reconnect to the server.
2-25
Issue 01 (2008-01-15)
2 SSH Management
Description This is the interval between each retry. This is the maximum number of channels that a SSH client can establish within a connection. If one connection reaches the maximum number of channels, a user requires a new connection to establish a new channel. The restrictions of a channel are: One connection can establish up to five channels, and up to only one channel can operate SSH in one connection.
This is the maximum number of SSH/SFTP channels that an SSH client can establish within a connection. The restrictions of a channel are: The total number of the established SSH channels and SFTP channels must be less than or equal to the Maximum Channels number, and up to one SSH channel can be established.
Time in minutes
This is the time interval during which the client has to rekey in to establish the connection. This is the size specified beyond which the SSH client is required to re-key in to establish the connection. This is the time interval after which ignore messages are sent to the SSH Server to keep the SSH protocol connection alive.
Size in MB
Time in seconds
2-26
Issue 01 (2008-01-15)
2 SSH Management
Unit -
Description Select this option to keep the TCP connection alive when there is no actual transfer of data, by sending messages at regular intervals. TCP keep Alive Interval is the system default value.
If this optional is selected, one SFTP channel occupies one connection. For details, see Table 2-3.
Step 3 Click Apply to apply the settings. Step 4 Click OK to save the settings and exit the window. ----End
Procedure
Step 1 Select General Settings > Global Client Key from the navigation tree of SSH Client Configuration window. The Global Client Key window is displayed, as shown in Figure 2-20.
Issue 01 (2008-01-15)
2-27
2 SSH Management
Step 2 Click the Browse button to locate the client private key file. Step 3 Enter Pass phrase for encryption of the global client key. Step 4 Use the Change button if you want to change the pass phrase. Step 5 Click Apply to apply the changes. Step 6 Click OK to save the settings and exit the window. ----End
Context
If the size of the file exceeds the specified value, the log file is archived.
Procedure
Step 1 Select General Settings > Application Log from the navigation tree of the SSH Client Configuration window. The Application Log window is displayed, as shown in Figure 2-21.
2-28
Issue 01 (2008-01-15)
2 SSH Management
Step 2 Enter the required parameters. Table 2-4 shows the description of parameters. Table 2-4 Log parameters Parameter Log File Log Directory File Size Description The name of the log file. The location where you want the log file to be located. The size of the log file. Value Range 1 MB to 10 MB
Step 3 Click Apply to apply the settings. Step 4 Click OK to save the settings and exit the window. ----End
Issue 01 (2008-01-15)
2-29
2 SSH Management
Context
This page also enables you to manually add the known server key details to the database, view the details of the stored server public keys, export the server key details to an excel sheet, and also delete the unwanted server key details.
NOTE
In the Server Key Management window, you also can export, import, view, and delete server key.
Procedure
Step 1 Select Server Key Management from the navigation tree of the SSH Client Configuration window. The Server Key Management window is displayed, as shown in Figure 2-22. Figure 2-22 Server Key Management window
NOTE
If server public key details are already stored in the database, then on launch of this page, the IP address of the server and the fingerprint associated with the corresponding server public key are displayed.
Step 2 When receiving the public key of an unknown server, the client processes the key in the following ways:
l
Select Prompt User, if the user must be prompted each time an unknown server public key is received. The prompt dialog enables the user to either Accept and Save, Accept Once, or Reject the server public key. Select Always Accept, if the unknown server public key must be accepted without prompting the user.
Huawei Technologies Proprietary Issue 01 (2008-01-15)
2-30
2 SSH Management
Select Always Reject, if the unknown server public key must be rejected.
Step 3 Click Apply to update the settings. Step 4 Click OK to save the profile and exit the window. ----End
Context
Session refers to all the connections that a single client might make to a server in the course of viewing any pages associated with a given application. They are specific to both the individual user and the application. You can open sessions in the SSH client or the SFTP Client using following modes:
l
Connect
The connection established in the SSH Client window realizes the STlenet function. The connection established in the SFTP Client window realizes the SFTP function.
Quick connect
When starting different types of sessions through the preceding modes, you can see Table 2-5 to check whether a new connection is established. The prerequisite of Table 2-5: The number of established connections does not exceed the limit. Table 2-5 Description of new connections Connect Type Whether a New Connection Is Established A new connection is established. A new connection is established. Occupied Channel
5 1
Issue 01 (2008-01-15)
2-31
2 SSH Management
Connect Type
Whether a New Connection Is Established A new connection is established in the following cases:
l
Occupied Channel
No available channel and no SFTP connection exist. There is no available channel, but an SFTP connection exists and One SFTP per tunnel in the General Settings > Connection is selected.
NOTE If there is no available channel, but an SFTP connection exists and One SFTP per tunnel in the General Settings > Connection is not selected, the session cannot be established.
Connect
When an SSH connection is established in quick connect mode, a new connection is established even if there are available channels exist for this established connection. No available channel and no SFTP connection exist. There is no available channel, but an SFTP connection exists and One SFTP per tunnel in the General Settings > Connection is selected.
NOTE If there is no available channel, but an SFTP connection exists and One SFTP per tunnel in the General Settings > Connection is not selected, the session cannot be established.
2.2.7.1 Connect You can start a session through the connect mode.
2-32 Huawei Technologies Proprietary Issue 01 (2008-01-15)
2 SSH Management
2.2.7.2 Quick Connect You can start a session in quick connect mode.
Connect
You can start a session through the connect mode.
Prerequisite
Create a profile before establishing a session through the connect mode.
Procedure
Step 1 Choose File > Connect or click in the SSH Client or the SFTP Client window.
The Connect-Server Profile window is displayed, as shown in Figure 2-23. Figure 2-23 Connect-Server Profile window
Step 2 Select a profile from the list of existing profiles and click Connect.
NOTE
In the Connect-Server Profile window, you can add or delete corresponding icons to query the SSH configuration items or start a session in quick connect mode.
----End
Result
The operation results of a session started through the connect mode are as follows:
l
If the client application establishes a connection with the SSH Server, a session opens for the selected profile. If the client application fails to establish a connection with the SSH Server, a failure message is displayed.
Huawei Technologies Proprietary 2-33
Issue 01 (2008-01-15)
2 SSH Management
Quick Connect
You can start a session in quick connect mode.
Context
To start a session in quick connect mode, perform the following steps:
l
In the SSH Client window, you can start an SSH session, an SFTP session, and an MML session.
In the SFTP session window, you can deliver FTP commands through the command line mode, and the system simultaneously returns the execution results of the SGSN9810. In the MML session window, you can enter and deliver MML commands, and the system simultaneously returns the execution results of the SGSN9810. The function is the same as the MML command line of the LMT.
NOTE
Currently, the STelnet function realized by an SSH session can provide only the port for data forwarding.
l
In the SFTP Client window, you can start only SFTP sessions.
The operation of starting an SSH session in the SSH Client window are the same as that of starting an SFTP session in the SSH Client or the SFTP Client window. The operation of starting an MML session in the SSH Client window is slightly different from that of starting other sessions.
l l
You must create a Profile whose configuration items match the IP address of BAM. In the Quick Connect window, the User, Proxy, and Authentication are in deactivated states.
When starting an SSH session or an SFTP session in quick connect mode, use the default algorithms that are described as follows:
l l l l l
Cipher: AES128 CBC MAC: HMAC SHA1 Key exchange: DH G1 SHA1 Authentication: password authentication Compression: Not supported
When starting an MML session in quick connect mode, search for and use the Profile that corresponds to the host IP address to set up a quick connection. If the IP address cannot be found, the session fails to be started.
CAUTION
l
Before starting an SFTP session, run the SET SFTPENABLE command to enable the SFTP function of the UOMU. If an SFTP session is not set up within 15 minutes, the SFTP function of the UOMU is automatically closed, but the started sessions are not affected.
2-34
Issue 01 (2008-01-15)
2 SSH Management
Procedure
Step 1 Choose File > Quick Connect or click in the SSH Client or the SFTP Client window.
The Quick Connect window in the SSH Client is displayed, as shown in Figure 2-24. Figure 2-24 Quick Connect window-SSH Client
The Quick Connect window in the SFTP Client is displayer, as shown in Figure 2-25.
Issue 01 (2008-01-15)
2-35
2 SSH Management
Step 2 For Quick Connect in the SSH Client window, set Connect Type to SFTP in the Connect Type panel. Step 3 Set other parameters in the window. Table 2-6 shows the description of parameters. Table 2-6 Quick connect parameters Parameter Host IP Port Number Description The IP address of the destination server. The port number through which the client connects to the server. The name of the user at the client side. The proxy used while establishing connection with the destination server. The default is set as No Proxy. Parameter Type 1 to 65535 numeric characters 1 to 31 text characters Name of the proxy server
If the Public Key option is selected, the Property button is enabled. You can provide the details of the client private key in the Select Clients Private Key window.
2-36
Issue 01 (2008-01-15)
2 SSH Management
CAUTION
The SGSN9810 does not support password authentication. Step 5 Select the Start Debug check box, if you want the debug process to start at the time of connection. Step 6 Click Connect to save the settings and exit the window. ----End
2.2.8 Connecting the LMT to the SGSN9810 through the SSH Client
You can connect the LMT to the SGSN9810 through the SSH Client.
Procedure
Step 1 Set up an SSH session or MML session to enable the port forwarding function of SSH Client.
NOTE
l l
Setting up an SFTP session cannot automatically enable the port forwarding function. When the LMT is connected to the SGSN9810 through the SSH Client, the port forwarding function of the SSH Client must be enabled.
Step 2 Open the LMT. The User Login dialog box is displayed. Step 3 If it is the first time for you to log in to the LMT, use the super account admin and password sgsnadmin for login. Step 4 In the Office group box, click the icon
l
Set the office to the destination IP address in the SSH Profile. Thus, the relation between Listeners and Mapping must be configured in the LMT Proxy window.
Set the office to the host IP address. Thus, the items in the LMT Proxy window need not be configured.
CAUTION
It is not recommended to use this setting mode when a tracing task is performed. Step 5 Set Proxy Server.
l
If the office is set to the IP address of the network element, select the check box on the left of Proxy Server, and set the IP address of the proxy server to the local host IP address. If the office is set to the local host IP address, the proxy server does not need to be set.
2 SSH Management
Creating a Session Log File Browsing Session Trace Messages Setting Interactive Mode Running Scripts
NOTE
The SGSN9810 does not support the SSH/SFTP clone function because the restriction on the number of channels to be set up.
2.3.1 Applying an SFTP Session In the SFTP session window, you can deliver SFTP commands. The command requests will be transferred to the SSH Server or to a remote destination, and the corresponding responses will be displayed to the user. 2.3.2 Applying an MML Session After opening a MML session, log in to the SGSN9810 by running the MML command LGI. Once you log in to the SGSN9810, you can deliver MML commands in the MML session window. 2.3.3 Creating a Session Log File You can create a log file for SSH sessions to record all the session activities. 2.3.4 Browsing Session Trace Messages You can view the trace messages of the started sessions. 2.3.5 Setting Interactive Mode You can set the transfer mode for a SFTP session. The files that are uploaded to the server from the client or downloaded to the client from the server will be transferred in the set transfer mode. 2.3.6 Running Scripts You can store a list of commands or scripts in a file, and run the file using an open SSH session.
2-38
Issue 01 (2008-01-15)
2 SSH Management
Context
In the SFTP session window, you can deliver SFTP commands, as listed in Table 2-7. The command requests will be transferred to the SSH Server or to a remote destination, and the corresponding responses will be displayed to the user. Table 2-7 SFTP commands list Command cd Descriptio n Command for changing the directory on remote host Syntax cd path Example cd d:\ Output If the path is valid, cd changes the current working directory to the d:\ of the remote system The permission for file execution is given to the user If the file1 is present in local system, get successfully downloads the file from server to the local system Displays the help information about the cd command Remarks -
chmod
Command for changing permissions of a file/ directory Command for downloading a file from remote server to local system
get
get filename
get file1
help
help cd
If no command name is given, then the help description of all the supported SFTP commands will be displayed.
Issue 01 (2008-01-15)
2-39
2 SSH Management
Command lcd
Descriptio n Command for changing the current working directory of the local system Command for listing all the files and directories in the local system
Output The current working directory will be changed to c: \ -rw-rw-rw1196117 Feb 09, 2006 15:39 vsh.exe
Remarks -
lls
lls [path]
lls (lists file/ directories present in the current working directory of the local system)
lls without any path lists the files/ directories present in the working directory of the remote system. The output contains the file/directory permissions, link count, user name, group name, modification time, file/ directory name. All the files in the parent directory and with an extension .h will be displayed. The output contains the file/directory permissions, link count, user name, group name, modification time, file/ directory name.
ls
ls ../*.h
-rwxrwxrwx 1 M70989 unknown 300544 Apr 19 12:15 ssl.h -rwxrwxrwx 1 M70989 unknown 300544 Apr 19 13:15 SFTP.h
2-40
Issue 01 (2008-01-15)
2 SSH Management
Command lpwd
Descriptio n Command for printing the current working directory of the local system
Syntax lpwd
Example lpwd
Output Prints the current working directory of the local system If the file1 and file2 are present in local system, mget successfully downloads the files from server to the local system Directory dir1 is created on the remote system If the file1 and file2 are present in local system, mput successfully uploads the files to the server If the file1 is present in local system, put successfully uploads the file to the server Prints the current working directory of the remote system
Remarks -
mget
Command mget for filename downloading multiple files from remote server to local system
mkdir
mkdir path
mkdir dir1
mput
Command mput for filename uploading multiple files from local system to remote system Command for uploading a file from local system to remote system Command for printing a current working directory on the local system put filename
put
put file1
pwd
pwd
pwd
Issue 01 (2008-01-15)
2-41
2 SSH Management
Command rename
Descriptio n Command for renaming a file or directory of the server Command for deleting the file Command for removing a directory
Example rename a1 b1
Output If the a1 is a valid path, a1 is changed to b1 Removes file1 present in the remote system Removes the directory 'a' present in the remote system
Remarks -
rm
rm filename
rm file1
rmdir
rmdir a
NOTE
The SFTP need encrypt the data to be transferred; therefore the SFTP transfer rate is slower than the common FTP transfer rate.
Context
MML commands are forwarded to the UOMU and are executed on the SGSN9810 through the dynamic port forwarding tunnel that is established on opening a MML session. The execution result is displayed to the user.
NOTE
l l l
MML commands must always end with a semicolon. You cannot input Chinese characters to the MML sessions, but if any Chinese characters are received from the BAM terminal, it is displayed to the user. The commands are directly forwarded to the BAM. It is recommended that users who are working with MML sessions should be familiar with MML commands.
Example
After opening a MML session, log in to the SGSN9810 by running the following MML command: LGI:OP = "username" , pwd = "xxxxxx";
2-42 Huawei Technologies Proprietary Issue 01 (2008-01-15)
2 SSH Management
Context
You can create a log file for SSH sessions to record all the session activities. You can refer to the log file for information on the session activities.
NOTE
After a session log file is saved, the real-time session information is displayed in the client window.
Procedure
Step 1 Choose File > Log Session in the SSH Client or the SFTP Client window. Step 2 In the pop-up Save As dialog box, find the path to save the log and enter the file name. Step 3 Click Save. ----End
Context
The trace messages include all the protocol messages that were sent and received during connection, authentication and opening a session, and all errors at protocol level, pertaining to an SSH session.
Procedure
Step 1 Choose View > Debug in the SSH Client or SFTP Client window.
NOTE
In the Connect-Server Profile or the Quick Connect window, you can select the Start Debug check box to view the trace messages at the time of connection.
Step 2 In the session window, view the trace messages pertaining to the current session operation. ----End
Context
The file transfer mode can be any of ASCII, Binary or Automatic.
Issue 01 (2008-01-15) Huawei Technologies Proprietary 2-43
2 SSH Management
NOTE
l l
Only when an SFTP session is open, you can set the file transfer mode. If the file transfer mode settings are updated when a file transfer command is being executed, the set mode will be applicable for the next file transfer command.
Procedure
Step 1 Click the File Transfer menu in the SSH Client or SFTP Client window. Step 2 Select the interactive mode.
l l l
Select the Binary option, if you want the files to be transferred in binary format. Select the ASCII option, if you want the files to be transferred in ASCII format. Select the Automatic option, if you want the application to identify the transfer mode as binary or ASCII during file transfer.
----End
Context
The file that contains the command or script list is known as the batch file. The commands will be transmitted to the SSH Server or to the remote host and the response will be displayed in the SSH session. Each command will be transferred only after the preceding command has been executed successfully. If an error occurs during execution of a command, the command execution will be terminated. The succeeding commands will not be executed. A batch file must be created and stored in the client, before a batch file is run.
Procedure
Step 1 Choose Script > Run in the SSH Client or the SFTP Client window. Step 2 In the Open dialog box, select a required batch file. Step 3 Click Open to run the batch file.
NOTE
Choose Script > Stop to stop the running of scripts during execution. The script execution will be stopped immediately.
----End
2-44
Issue 01 (2008-01-15)
3 Authorization Management
3
About This Chapter
l l l
Authorization Management
The LMT system supports multiple clients at the same time. The LMT provides the authorization management to ensure the system security. A user must log in to the LMT using the correct user name and password to operate and maintain an office in the SGSN system. A LMT administrator can add or remove users, set user groups and privileges, set user valid periods, and set up command groups. A user can lock the LMT so that other users cannot access the LMT.
3.1 Basic Concepts The following are some basic concepts related to the authorization management: office, user type, operation privileges, user name and password, valid operation period and command groups. 3.2 Adding an Office Describes how to add an office to the LMT. 3.3 Logging in to the LMT Domain-based management can be applied to different users, EMSs and local users. You can log in to a remote server for authentication to enhance security. 3.4 Logging out of the LMT You can log out and then log in again as another user, so as to change the operation privileges to the LMT. 3.5 Managing Users The super user admin, administrator users, and authorized custom users can manage other user accounts. 3.6 Managing Command Groups The admin, administrator level users, and authorized custom level users can manage the command groups. 3.7 Managing User Passwords You can manage user passwords through the following ways: setting password policy, querying password policy and changing Password. 3.8 Locking the System
Issue 01 (2008-01-15) Huawei Technologies Proprietary 3-1
3 Authorization Management
A user can lock the LMT to prevent other users from accessing this LMT.
3-2
Issue 01 (2008-01-15)
3 Authorization Management
3.1.1 Office
Before logging in to the LMT, a user must configure the office to be operated and maintained. The office is the SGSN9810. You can configure an office through only the LMT subsystem. In this manual, an office refers to an SGSN9810. The office data includes the office name and the IP address of the UOMU board. One LMT may store the details of multiple offices, but can be connected to only one office at a time. You can configure an office through only the LMT subsystem. The office data then applies to all the subsystems in the Huawei LMT.
Domain user (EMS): the user account managed by the M2000. Local user: the user account managed by the SGSN.
The differences between the two types of users are listed in Table 3-1.
Issue 01 (2008-01-15)
3-3
3 Authorization Management
Table 3-1 Differences between an EMS and a local user Operation Object Information of user login and authentication. Addition, modification, deletion, or query of a user. Procedures for user login and password change. EMS Stored in the M2000. Realized at the M2000 side. An EMS must send a request to the M2000. After receiving the request, the M2000 sends an authentication result to the SGSN9810 whether authentication succeeds or fails. Local User Stored in the SGSN9810. Realized at the SGSN9810 side. Realized at the SGSN9810 side.
EMS
Figure 3-1 shows the procedure for EMS login to the SGSN9810. Figure 3-1 Procedure for EMS login to the SGSN9810
SGSN9810 2 LMT 1 6000 Port 5 6099 Port 6000 Port 3 4 M2000
1. 2. 3. 4. 5.
An EMS sends the login request through the LMT to the SGSN9810. The SGSN9810 forwards the authentication request to the M2000 after confirming that the user is an EMS. The M2000 sends the authentication packet to the SGSN9810. The SGSN9810 returns the ACK packet to the M2000. Based on the packet from the M2000, the SGSN9810 decides whether to allow the user to log in (or the user can log in to the SGSN9810 after the password is changed).
Local User
A local user can directly log in to the SGSN9810 without sending the request to the M2000 for authentication.
3 Authorization Management
Table 3-2 User groups and operation privileges User Group Guest User Operator Administrator Custom Data Query YES YES YES YES System Maintenance NO YES YES YES Data Configuration NO NO YES YES Administratio n NO NO NO YES
When adding a user, you can assign every privilege to this user.
The command groups for the Guest, User, Operator, and Administrator are predefined in the LMT system. They cannot be changed. An administrator can set the command groups for a custom user.
Special characters that can be used are: ~ ! @ # $ % ^ & * ( ) _ + - { } | [ ] \ : < > ? . / and space. Special characters that cannot be used are: , ; = " and '. Special characters cannot use the following combinations:
l l l l
Two or more %. Two or more spaces. Start symbol +++ of an MML packet. End symbol --- of an MML packet.
Admin: The initial password is sgsnadmin. It has all the operation privileges and cannot be deleted. Guest: The initial password is guestguest. It has the log in, log out, and query privileges. You can delete guest.
Issue 01 (2008-01-15)
3-5
3 Authorization Management
NOTE
l l l
A user can change its own password. The super user admin can change the password of any user. An administrator or a custom user with administration privilege can change the password of any user but not admin.
Mon. to Fri.
08:00:00 to 18:00:00
3-6
Issue 01 (2008-01-15)
3 Authorization Management
Table 3-4 Command group functions Command Group G_0 G_1 G_2 G_3 G_4 G_5 G_6 G_7 G_8 G_9 G_10 G_11 G_12 G_13 G_14 G_15 to G_30 Function Guest group Alarm query Alarm modification Performance query Performance creation Performance modification Equipment query Equipment modification Configuration query Configuration modification Trace query Trace creation BNET query BNET modification SGSN information management Custom group The commands in these groups can be queried and modified. Predefined MML command groups. The commands in these groups can be queried but cannot be modified. Remarks Predefined MML command groups. The commands in these groups can be queried but cannot be modified.
G_31
System group
Procedure
Step 1 Start the LMT, and then click in the User Login dialog box or choose System > Office Management. The Office Management window is displayed. Step 2 Click Add in the Office Management window. The Add dialog box is displayed.
Issue 01 (2008-01-15) Huawei Technologies Proprietary 3-7
3 Authorization Management
Step 3 Enter the office name and the IP address of the UOMU board connected to this office, for example, SGSN9810 and 172.22.5.191. Step 4 Click OK to add the office or click Cancel to cancel the operation. ----End
Context
The SGSN9810 can support up to eight users, only including local users and EMSs, for simultaneous online operation. The procedure for logging to the SGSN9810 through the SSH Client is different from direct login procedure.
CAUTION
l l
Choose Authority > Change Password to change the password immediately after the login. The user name is not case sensitive, but the password is case sensitive. The password contains up to 16 characters. If the login fails, check if the user name and password you have entered are correct.
Procedure
Step 1 Click the icon on the toolbar, or choose System > Relogin, or press Ctrl+O.
The User Login dialog box is displayed. If an office is added to the LMT, the User Login dialog box is displayed automatically each time a user starts the LMT. Step 2 For the initial login, use the account admin and the password sgsnadmin. Step 3 In the Office group box, click the icon
l
EMS
If it is the first time for an EMS to log in to the LMT or the password is expired, the dialog box that indicates the password must be changed is displayed. If you do not change the password or the change fails, you cannot log in to the LMT. If the dialog box that prompts to change the password is displayed (The remaining days of a valid password is smaller than or equal to the prompt days indicating that the password will expire), whether change of the password succeeds or is canceled, you can log in to the LMT.
Local user
Huawei Technologies Proprietary Issue 01 (2008-01-15)
3-8
3 Authorization Management
After entering a correct user name and password, you can log in to the LMT. Neither of the dialog box that indicates the password must be changed or that prompts to change the password is displayed. Step 4 After the login, choose Authority > Account > Add to add a user. You can log in to the LMT as the new user. ----End
Procedure
To log out of the LMT, choose System > Log Out. ----End
3 Authorization Management
This task is aimed at unlocking the locked state of a local user account.
Context
This operation can be applied to only local users.
Procedure
Run SET OPSW on the MML client.
NOTE
The SET OPSW command can be delivered by the local admin, emscomm, and EMS.
----End
Context
This operation can be applied to only local users.
Procedure
Run LST OPSW on the MML client. ----End
Context
This operation can be applied to only local users. The super user admin, administrator users, and authorized custom users can add user accounts. To add a user account, you must specify the user name, password, operator type, authorized command groups, and valid operating period. An authorized user can add a user account in both GUI mode and MML mode.
Procedure
l Operation Procedure in GUI Mode 1. Choose Authority > Account > Add. The Operator Management dialog box is displayed, as shown in Figure 3-2.
3-10 Huawei Technologies Proprietary Issue 01 (2008-01-15)
3 Authorization Management
2.
Enter the user name, password, and operator type. If you select Custom as the operator type, you must specify the command groups.
3. 4.
Set the valid operating period. Click OK. A confirmation box is displayed.
5. l
----End
Context
This operation can be applied to only local users. All users can query the user details. If no user account is specified, the system displays the user names, status, IP addresses, services, and login time of all the users.
Issue 01 (2008-01-15) Huawei Technologies Proprietary 3-11
3 Authorization Management
If a user account is specified, the system displays the user name, description, valid operating period, status, and command groups of that user. An authorized user can query the user details in MML mode.
Procedure
Run LST OP on the MML client. ----End
Context
This operation can be applied to only local users. The super user admin, administrator users, and authorized custom users can modify the user details, which include the user name, user group, command groups, and valid operating period. The new password takes effect the next time when the user logs in to the system. All of the other details take effect immediately after the modification. An authorized user can modify the user details in both GUI mode and MML mode.
Procedure
l Operation Procedure in GUI Mode 1. Choose Authority > Account > Modify. The Modify Operator dialog box is displayed, as shown in Figure 3-3. Figure 3-3 Selecting an user account
2.
3-12
3 Authorization Management
3.
Click Modify. The Operator Management dialog box is displayed, as shown in Figure 3-4.
4. 5.
Modify the use details. Click OK. The system prompts that the operation succeeded.
6. l
Click OK.
----End
Context
This operation can be applied to only local users. The admin, administrator users, and authorized custom users can delete a user account. No user can delete admin. An authorized user can delete a user account in both GUI mode and MML mode.
Issue 01 (2008-01-15) Huawei Technologies Proprietary 3-13
3 Authorization Management
Procedure
l Operation Procedure in GUI Mode 1. Choose Authority > Account > Delete. The Delete Operator dialog box is displayed, as shown in Figure 3-5. Figure 3-5 Selecting an user account to be deleted
2. 3.
4.
5. 6. l
Click OK. Repeat step 2 to step 5 to delete another user account or click Close to exit.
----End
Procedure
Step 1 Run DSP LNK on the MML client. The details of the login user are displayed. Step 2 Run RMV LNK on the MML client to disconnect the client from the UOMU board. ----End
3-14 Huawei Technologies Proprietary Issue 01 (2008-01-15)
3 Authorization Management
Context
Perform the lock/unlock function to all the local users except two default accounts, admin and guest. Admin can choose to lock all the undefault accounts and then prohibit all local users from using the user management function.
CAUTION
Only the super account admin can lock and unlock the local users without default accounts.
Procedure
Run SET OPLOCK on the MML client.
NOTE
The SET OPLOCK command can be delivered by the local admin, emscomm, and EMS.
----End
Procedure
Run LST OPLOCK on the MML client. ----End
Context
NOTE
Only the users with admin levels can unlock the locked state of a local user account.
Procedure
Run ULK USR on the MML client. ----End
Issue 01 (2008-01-15) Huawei Technologies Proprietary 3-15
3 Authorization Management
Context
The system provides 32 command groups from G_0 to G_31. An authorized user can query the commands in a command group only in MML mode.
Procedure
Run LST CCG on the MML client. ----End
Context
The command groups from G_0 to G_14 and G_31 are predefined in the system. They cannot be modified. The admin, administrator level users, and authorized custom level users can add or remove commands into or from the command groups from G_15 to G_30. An authorized user can set a command group in both GUI mode and MML mode.
Procedure
l Operation Procedure in GUI Mode 1. Choose Authority > Command Group > Modify Command Group. The Modify Command Group dialog box is displayed, as shown in Figure 3-6.
3-16 Huawei Technologies Proprietary Issue 01 (2008-01-15)
3 Authorization Management
2. 3. 4. 5. l 1. 2. ----End
Select one command group from G_15 to G_30. Select the commands to be added to the command group or deselect the commands to be removed. Enter the name of the command group. Click OK. Run LST CCG to list the commands in the command group. Run ADD CCG to add commands into the command group, or run RMV CCG to remove commands from the command group.
Context
The admin, administrator level users, and authorized custom level users can edit the name of the command groups from G_15 to G_30. An authorized user can edit the description of a command group only in MML mode.
Procedure
Step 1 Run LST CCGN to query the name of the command group. Step 2 Run SET CCGN to edit the name of the command group. ----End
3 Authorization Management
3.7.1 Setting Password Policy The LMT supports an admin to configure the password minimal length, password complexity, password maximum miss times, and auto unlock time. 3.7.2 Querying Password Policy This task is aimed at querying the password policy that must be conformed when logging in to the SGSN9810. 3.7.3 Changing Password This task is aimed at changing user password.
Context
You can set the user password policy in both GUI mode and MML mode.
NOTE
Only the local user with admin authority can set the password policy.
Procedure
l Operation Procedure in GUI Mode 1. Choose Authority > Password Policy Setting. The Password Policy Setting dialog box is displayed, as shown in Figure 3-7. Figure 3-7 Password Policy Setting dialog box
2. 3.
Set the password minimal length ranging from 6 to 32. In Password Complexity, select the character types, Lowercase, Uppercase, Number, and Special Character.
3-18
Issue 01 (2008-01-15)
3 Authorization Management
Special characters that can be used are: ~ ! @ # $ % ^ & * ( ) _ + - { } | [ ] \ : < > ? . / and space. Special characters that cannot be used are: , ; = " and '. Special characters cannot use the following combinations:
l l l l
Two or more %. Two or more spaces. Start symbol +++ of an MML packet. End symbol --- of an MML packet.
4. l
Click OK.
Operation Procedure in MML Mode Run SET PWDPOLICY on the MML client.
----End
Procedure
Run LST PWDPOLICY on the MML client. ----End
Context
All users can change their own passwords.
CAUTION
You must modify the password of admin with caution because the UOMU software has to be re-installed if you forget the new password.
Procedure
Step 1 Choose Authority > Change Password. The Change Password dialog box is displayed, as shown in Figure 3-8.
Issue 01 (2008-01-15)
3-19
3 Authorization Management
Step 2 Enter the old password for authentication. Step 3 Enter a new password and confirm the new password. Step 4 Click OK. ----End
Procedure
Step 1 Choose System > System Setting. The System Setting window is displayed. Step 2 Enter a number in the minute(s) later this client will be automatically locked field. The number range is from 1 to 1,440. If no operation is carried out on the LMT within this time, the LMT is automatically locked. You can resume the LMT with the correct user name and password. ----End
3 Authorization Management
Procedure
You can manually lock the LMT in the following three ways:
l l l
Choose System > Lock . Press Ctrl+Alt+M. Click the icon on the toolbar.
----End
Issue 01 (2008-01-15)
3-21
4 Equipment Management
4
About This Chapter
Equipment Management
In the Device Panel pane, you can list boards, reset boards, and perform other operations. On the MML client, you can view all the MML commands in the system. 4.1 Device Panel Operation Describes the operations you can perform in Device Panel. 4.2 Board Operation Describes the operations that you can perform on a board.
Issue 01 (2008-01-15)
4-1
4 Equipment Management
Procedure
Step 1 Click the Device Panel tab in the navigation pane. Step 2 Double-click the subrack under the Device Management node, or click the subrack and then press Enter. The equipment panel is displayed, as shown in Figure 4-1.
4-2
Issue 01 (2008-01-15)
4 Equipment Management
----End
Procedure
Right-click the rim of the rack, and then select Show Failure Bar or Hide Failure Bar to show or hide the Failure Bar, as shown in Figure 4-2. Figure 4-2 Failure bar
----End
Result
Figure 4-2 shows that the front UALU board in slot 16, subrack 0 of rack 0 is faulty.
Procedure
Click the button on the top right corner of the Device Panel pane to show or hide the panel color legend, as shown in Figure 4-3.
Issue 01 (2008-01-15) Huawei Technologies Proprietary 4-3
4 Equipment Management
----End
4.1.4 Displaying the Panels of the Back Boards in the PSM Subrack
Describes how to display the panels of the back boards in the PSM subrack.
Procedure
Double-click the rim of the rack, or right-click the rim of the rack and then select Switch Shelf Direction to view the panels of the back boards. The configuration details and status of the back boards in the PSM subrack is displayed, as shown in Figure 4-4.
4-4
Issue 01 (2008-01-15)
4 Equipment Management
----End
Procedure
You can right-click the rim of the rack and then select Refresh Shelf to refresh the display of the rack. ----End
4 Equipment Management
4.2.3 Resetting a Board Board reset is a common way to handle a possible board fault. The problems occurred in the running procedure are solved by initializing the board. 4.2.4 Swapping Boards Swapping boards means switching the services from the active board to the standby board. In other words, the active board becomes a standby board, and the standby board becomes an active board. 4.2.5 Displaying Power Status or Temperature in the PSM Subrack The power and temperature of the PSM subrack must stay at normal ranges. If they exceed the ranges, operation of the system is affected.
Procedure
l Operation Procedure in GUI Mode 1. 2. Right-click the board in the Device Panel pane. Select List Board from the shortcut menu, as shown in Figure 4-5. If the board to be queried is a back board, double-click the rim of the rack to show the board panel, and then select the board. Figure 4-5 The shortcut menu after right-clicking a board
4 Equipment Management
3. 4.
Set the parameters to query the board information of the specified board. If you want to query the information of the board displayed, skip this step. Click OK to obtain the board information, as shown in Figure 4-7. Figure 4-7 Query result
5.
In the List board dialog box, select Original Report in the Report Type box. The system displays the messages, as shown in Figure 4-8.
Issue 01 (2008-01-15)
4-7
4 Equipment Management
Operation Procedure in MML Mode Run the LST BRD command on an MML client.
----End
Procedure
Step 1 Right-click the board in the Device Panel pane. Step 2 Select Query Version from the shortcut menu. The query result is displayed, as shown in Figure 4-9.
4-8
Issue 01 (2008-01-15)
4 Equipment Management
----End
Context
CAUTION
Board reset may affect the traffic. Perform this operation with caution.
NOTE
The boards such as UACU, UBIU, UPWR, and UALU do not need resetting. You can reset the PCI mezzanine card (PMC) on the front board (I/O board) using the MML command.
Procedure
l Operation Procedure in GUI Mode 1. In the Device Panel pane, right-click the board.
NOTE
If the board to be reset is a back board, double-click the rim of the rack to show the back board panel.
2.
Select Reset Board from the shortcut menu, as shown in Figure 4-10.
Issue 01 (2008-01-15)
4-9
4 Equipment Management
l l
Operation Procedure in MML Mode Run RST BRD on the MML client. Operation Procedure in Hardware Reset Mode If the board develops a critical fault and the reset command cannot be delivered, you can reset the board in the hardware reset mode.
CAUTION
For the UOMU, UCDR, and UMPU, hardware reset may result in a hard disk fault in their back boards or in the board itself. Therefore, you must not reset a board in the hardware reset mode unless necessary. ----End
Context
It is often used before board replacement to avoid service interruption.
4-10
Issue 01 (2008-01-15)
4 Equipment Management
CAUTION
Before swapping boards, ensure that the standby board is functional. Do not run the command of swapping boards frequently. Board swapping may affect the traffic. Perform this task when the traffic is low.
Procedure
l Operation Procedure in GUI Mode 1. 2. In the Device Panel pane, right-click the board. Select Swap Board from the shortcut menu, as shown in Figure 4-11.
Operation Procedure in MML Mode Run SWP BRD on the MML client.
----End
Procedure
l Operation Procedure in GUI Mode 1.
Issue 01 (2008-01-15)
4 Equipment Management
2.
Select Display Power Status In Subrack or Display Temperature In Subrack from the shortcut menu, as shown in Figure 4-12.
NOTE
l l
You can query the power supply status and temperature of the PSM subrack in GUI mode only when the UALU board is operational. If the UALU board is faulty, you can query it only in the MML mode. In this case, if you right-click the UALU board, only the reset function is enabled.
3.
In the Display Power Status In Subrack dialog box, select Power status in subrack in the Report Type box to view the power status information, as shown in Figure 4-13. Figure 4-13 Querying the power status of the subrack
4.
Select Temperature information in subrack in the Report Type box. The temperature of the subrack is displayed, as shown in Figure 4-14.
4-12
Issue 01 (2008-01-15)
4 Equipment Management
Operation Procedure in MML Mode Run DSP PWRSTATE to query the power status of the PSM subrack. Run DSP SUBRACKTEM to query the temperature of the PSM subrack.
----End
Issue 01 (2008-01-15)
4-13
5 Monitor Management
5
About This Chapter
Monitor Management
Monitor management is used in system routine maintenance. It monitors the CPU usages of the boards. Monitor management has a great impact on system performance. The Monitor Viewer displays the monitored data, which is also stored in an mrf file. You can browse these files offline in charts or lists through the Monitor Viewer. 5.1 Monitoring CPU Usage Describes how to monitor the CPU usage of a board. 5.2 Browsing CPU Monitoring Results Offline You can browse the CPU monitoring results offline through the Monitor Viewer. The CPU monitoring results have be saved in .mrf file.
Issue 01 (2008-01-15)
5-1
5 Monitor Management
Procedure
Step 1 Click the Maintenance tab. Step 2 Double-click CPU Usage under the Service/Common Monitoring navigation tree, or press Enter after select CPU Usage. The CPU Usage window is displayed at the right side of the navigation tree, as shown in Figure 5-1. At the same time, the Add Task dialog box is displayed, as shown in Figure 5-2.
NOTE
The upper part contains two tabs, List and Chart. In the Chart tab, the vertical coordinate denotes the CPU usage (unit: %), and each scale on the horizontal coordinate denotes a report period (5s). There are five periods between any two adjacent time marks. The lower part displays the list of all monitored tasks. The list has the following fields: Task ID, Subrack No., Slot No., Usage%, Task Status, Show Line, Line Color, Line Type and Line Width.
5-2
Issue 01 (2008-01-15)
5 Monitor Management
Step 3 In the Add Task dialog box, select the subrack number and slot number, and then select Show Line In Chart to view the monitoring results in the Chart tab.
l
In the Chart tab, the CPU usage is displayed in a chart, as shown in Figure 5-1.
Huawei Technologies Proprietary 5-3
Issue 01 (2008-01-15)
5 Monitor Management
l
In the List tab, the CPU usage is displayed in the list, as shown in Figure 5-3.
Step 4 Right-click the upper part of the window and deselect Auto Scroll to disable the scroll. To view the latest data, select Auto Scroll . ----End
Procedure
l Adding a CPU usage monitoring task There are two ways to add a task of monitoring the CPU usage:
Right-click the lower part of the CPU Usage window and then select Add Task from the shortcut menu. The Add Task dialog box is displayed, as shown in Figure 5-4.
5-4
Issue 01 (2008-01-15)
5 Monitor Management
In the Window Panel Management window, right-click the board to be monitored and then select Display CPU Usage. The CPU Usage window is displayed, as shown in Figure 5-5.
Issue 01 (2008-01-15)
5-5
5 Monitor Management
You can query the CPU usage of several boards through the LMT, as shown in Figure 5-6. You can monitor up to 10 tasks at the same time. Figure 5-6 CPU Usage window
Deleting a CPU usage monitoring task 1. Right-click the task to be deleted at the lower half part of the window and then select Delete Task . You can also select the task to be deleted, right-click anywhere in the window, and then select Delete Task .
Huawei Technologies Proprietary Issue 01 (2008-01-15)
5-6
5 Monitor Management
The system displays: Are you sure to delete the selected task(s) and all the sub-tasks? 2. Click Yes to delete this task. You can also click No to cancel this operation. ----End
Procedure
Step 1 Right-click the lower part of the window and select Start Save Review Data to save the monitored data to a file. Step 2 The default location is client/output/monitorreview under the software installation directory. The file is named as: CPU Reviewyear_month_hour_minute_second_task NO.mrf. Step 3 To cancel the saving operation, right-click the lower part of the window and then select Stop Save Review Data . ----End
Procedure
Step 1 Choose Start > Programs > HUAWEI Local Maintenance Terminal > Monitor Viewer. Step 2 In the Open dialog box, select the CPU monitoring file, and then click Open. The file contents are displayed in the Monitor Viewer, as shown in Figure 5-7 and Figure 5-8. ----End
Issue 01 (2008-01-15)
5-7
5 Monitor Management
Result
Figure 5-7 List tab in Monitor Viewer
5-8
Issue 01 (2008-01-15)
6 Tracing Management
6
About This Chapter
Tracing Management
Tracing management is used in equipment routine maintenance. You can locate the failure in the service procedure by using tracing management. 6.1 Creating an Interface Tracing Task Interface tracing includes the following tasks: SAAL Trace, SCTP Trace, SCCP Trace, eIu Trace, AG-Iu Trace, Hg Trace, and QAAL2 Trace. 6.2 Browsing Traced Messages Online After creating a tracing task, you can browse and query the traced messages in the message browse window in real time. 6.3 Saving Traced Messages Traced messages can be saved automatically or manually. 6.4 Stopping Tracing If a tracing task is useless, stop it in time to release system resources. 6.5 Browsing Traced Messages Offline You can browse the traced messages offline through the Trace Viewer.
Issue 01 (2008-01-15)
6-1
6 Tracing Management
Context
This section gives an example of creating a SAAL interface tracing task. Refer to this example to create other tracing tasks.
Procedure
Step 1 Click the Maintenance tab. Step 2 Click Interface Trace Task under Trace Management. Step 3 Select the object to be traced. The SAAL Trace dialog box is displayed, as shown in Figure 6-1. Figure 6-1 SAAL Trace window
Step 4 Set the fields in the dialog box. Press F1 to view the descriptions as listed in Table 6-1. Table 6-1 Fields in SAAL Trace Field Name Link No. Message Type Description SAAL link No. BGN/END POLL SD
6-2
Issue 01 (2008-01-15)
6 Tracing Management
Description The traced message file is automatically saved in the trace directory under the software installation directory. The file is named in this format: OfficeName_TraceType_year-month-dayhour-minute-second.tmf. For example, SGSN_ SAALTrace_2006-02-05-12-46-24.tmf. Each file may contain up to 5,000 records. When the number of records exceeds 5,000, system creates a new file.
Step 5 Click OK to start the tracing task. The message browse window displays the traced signaling in real time, as shown in Figure 6-2. Figure 6-2 Message browse window for interface tracing
----End
Issue 01 (2008-01-15)
6-3
6 Tracing Management
Context
During the online browsing, you can perform the following:
l l
Procedure
Step 1 Double-click a message in the message browse window. The Message Browser window is displayed, as shown in Figure 6-3. Figure 6-3 Message details
NOTE
The Message Browser window consists of two parts, the lower part and the upper part. You can drag the middle line to change the size of the two parts. When you select a line in the upper window, the contents of the line are displayed in hexadecimal code in the blue part in the lower window.
Step 2 Perform the following operations through the shortcut menu in the Message Browser window.
6-4 Huawei Technologies Proprietary Issue 01 (2008-01-15)
6 Tracing Management
Select Property to view the Trace Property window that displays the tracing messages in detail, including the user name, creation time, office name, office IP address, and other attributes. Select Auto Scroll to refresh and scroll the messages in the Message Browser window in real time.
----End
Procedure
Select Auto Save from the Interface Tracing dialog box while creating a tracing task. The traced message file is automatically saved in \trace under the LMT installation directory. ----End
Procedure
Step 1 Right-click the Message Browser window. Step 2 Select Save All Messages or Save Selected Message(s) from the shortcut menu. The Save As dialog box is displayed.
NOTE
l l
If you select Save All Messages, the system dynamically saves all messages displayed in the message browse window of this task. To select a message, click the message in the window. Press and hold the key Ctrl or Shift to select multiple messages. To select all the messages after a particular point to the final record, drag the mouse pointer from the selected first record to the end of the message file.
Step 3 In the Save As dialog box, specify the path, file name, and file type. Table 6-2 lists the available file types.
Issue 01 (2008-01-15)
6-5
6 Tracing Management
Table 6-2 Available trace message file types File Type Trace message file (.tmf) Interface text file (.txt) CSV file (.csv) Description Can be opened with the Trace Viewer only. Contains messages displayed in the traced interface. Contains the complete message code flow. A CSV file is a plain text file. The GUI displays only part of the code flow. Contains protocol explanation of the messages. Support text search. Note Not support text search. Support text search.
----End
Procedure
Stop a tracing task in the following ways:
l l
Click the Close button on the top right corner of the Message Browse window. Right-click the window and then select Stop Trace Task. You can select Restart Trace Task to restart this tracing task. Right-click the message browse window, and then select Close All abc Trace Message Trace Tasks to disable all abc tracing tasks.
NOTE
The string abc is the name of a tracing interface, such as SAAL and User.
----End
Procedure
Step 1 Choose Start > Program > HUAWEI Local Maintenance Terminal > Trace Viewer to start the Trace Viewer. Step 2 Select a tracing message file (.tmf) in the Open dialog box, and then click Open. The Trace Viewer window displays the contents of this file, as shown in Figure 6-4.
6-6 Huawei Technologies Proprietary Issue 01 (2008-01-15)
6 Tracing Management
Step 3 Double-click a message. The details of the message are displayed, as shown in Figure 6-5.
Issue 01 (2008-01-15)
6-7
6 Tracing Management
NOTE
The Message Browser window consists of two parts, the lower part and the upper part. You can drag the middle line to change the size of the two parts. When you select a line in the upper part, the contents of this line are displayed in hexadecimal code in the lower part.
Step 4 Click a button, such as Message ID and Message Type, on the title bar to sort the messages by that attribute. Step 5 Right-click the Trace Viewer window. Select Properties from the shortcut menu. The Trace Review Properties dialog box displays the tracing messages in detail, as shown in Figure 6-6.
6-8
Issue 01 (2008-01-15)
6 Tracing Management
----End
Issue 01 (2008-01-15)
6-9
7 Alarm Management
7
About This Chapter
Alarm Management
Various software and hardware faults generated during operation of the alarm management checking device on the LMT and the monitored faults are exported as alarm information reports in the alarm subsystem. Then these faults display as the audible and visual alarms on the alarm box or they are informed to maintenance personnel through tray falsh on the LMT. 7.1 Concepts Related to the Alarm Management Describes the following concepts related to the alarm management: alarm type, alarm severity, event type and alarm box. 7.2 Browsing Alarms The Alarm Browse window displays the fault alarms and event alarms reported by the system. 7.3 Querying Alarm Logs You can query the history alarms that satisfy the query condition. After the command for querying the alarm log is delivered, the real-time alarm is automatically displayed on the interface for querying the alarm log. 7.4 Saving Alarms The alarm management of the LMT offers the function of saving part or all of the alarms. 7.5 Printing Alarms The SGSN9810 LMT offers the function of alarm printing. The printed alarms can be saved in pm files through the Print To File function. 7.6 Handling an Alarm You can handle the single alarm generated by the system and can also change the alarm configuration predefined by the system. 7.7 Operating the Alarm Box The alarm box produces audible and visual alarms.
Issue 01 (2008-01-15)
7-1
7 Alarm Management
A clear alarm is reported when this fault alarm is cleared. One fault alarm corresponds one clear alarm. Usually, a fault alarm has a higher severity than an event alarm. Event alarm Triggers: A occasional event occurs while the system is running. An event alarm notifies that the system is in a special state, such as channel congestion. Some event alarms are reported periodically. No clear alarm corresponds to an event alarm.
7-2
Issue 01 (2008-01-15)
7 Alarm Management
Handle the alarm immediately. Otherwise, some major functions may fail.
Handle it in time or observe it to avoid it turns to a serious fault. Be aware of the running state of the system.
Warning
7 Alarm Management
Table 7-3 Alarm event types Event Type Power Environment Alarm Alarms that are related to the power supply. Alarm related to the equipment room environment, such as temperature, humidity, and access control. Alarms that are related to the signaling system. Alarms that are related to the trunk system, including trunk circuits and trunk boards. Alarms that are related to hardware, such as a board, the clock and the CPU. Alarms that are related to software. Alarms that are related to the running state of the system. Alarms that are related to the communication system. Alarms that are related to QoS. Triggered by other errors.
Appearance
The Huawei SGSN9810 uses the Huawei alarm box, as shown in Figure 7-1.
7-4
Issue 01 (2008-01-15)
7 Alarm Management
Functions
The alarm box can be driven only when a fault alarm can be reported and not be shielded. Then it produces sound and one of the indicators on the alarm box is light. When the alarm is cleared, the sound stops, and the indicator is dim. You can also manually turn off the alarm box through the LMT.
Alarm Indicators
The alarm box has four alarm indicators, corresponding to the four alarm severities. When an alarm is raised, the indicator for the correct severity flashes. If all the alarms of a certain severity are cleared, the indicator for that severity is dim. You can also turn off the alarm indicator manually through the LMT. The indicators for different severities are different in colors:
l l l l
Red indicator: critical alarm Orange indicator: major alarm Yellow indicator: minor alarm Green indicator: warning alarm
Issue 01 (2008-01-15)
7 Alarm Management
l l l l l l l l
Alarm Severity Raised/Clear Time Alarm ID Event type Module ID Location Info Alarm Type Office Name
Operation Procedure
On the LMT, you can open the Alarm Browse window in the following ways:
l
Choose Fault Management > Browse Alarm Click the icon Double-click Right-click
NOTE
l l l
In Alarm Browse, there are two panes at the right part, Fault and Event, as shown in Figure 7-2. Figure 7-2 Alarm Browse window
7-6
Issue 01 (2008-01-15)
7 Alarm Management
Context
The query condition is defined based on the following attributes:
l l l l l l l l l l
Alarm Type Alarm Severity Alarm Time Return Amount Alarm Serial Number Event Type Alarm ID Subrack Number Board Type Physical Option
Alarm Serial Number Alarm Name Alarm Severity Raised/Clear Time Alarm ID Event Type Module ID Location Infomation Alarm Type Office Name
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Query Alarm Log or click the icon The Query Alarm Log dialog box is displayed, as shown in Figure 7-3. .
Issue 01 (2008-01-15)
7-7
7 Alarm Management
Figure 7-3 General Option tab of Query Alarm Log dialog box
2.
In the dialog box, select Detailed Option and Physical Option tab, and set the query conditions, as shown in Figure 7-4 and Figure 7-5. Figure 7-4 Detailed Option tab of Query Alarm Log dialog box
7-8
Issue 01 (2008-01-15)
7 Alarm Management
Figure 7-5 Physical Option tab of Query Alarm Log dialog box
3.
Issue 01 (2008-01-15)
7-9
7 Alarm Management
Context
The alarm management of the LMT offers the function of saving part or all of the alarms to the following file:
l l l
CSV file (the postfix name is csv and it is the default saving format.). HTML file (the postfix name is htm). Text file (the postfix name is txt).
Procedure
Step 1 Select the alarms in the Alarm Browse window or Query Alarm Log window. Step 2 Right-click and then select Save Selected Alarms or Save All Alarms to save the alarms. The Save dialog box is displayed, as shown in Figure 7-7. Figure 7-7 Saving alarms into a file
7 Alarm Management
Procedure
Step 1 Click the icon on the toolbar, or choose Fault Management > Alarm Realtime Print.
The Print dialog box is displayed, as shown in Figure 7-8. Figure 7-8 The Print dialog box
7 Alarm Management
Step 3 Select Print To File, and then click Print. The Print To File dialog box is displayed, as shown in Figure 7-9. Figure 7-9 Print to File dialog box
Step 4 Select or enter a file name. Step 5 Click OK. The new alarms are saved in the file in real-time. ----End
Procedure
Step 1 Right-click the selected alarms in the Alarm Browse window or Query Alarm Log window. Select Print Selected Alarms or Print All Alarms. The Print dialog box is displayed, as shown in Figure 7-10.
7-12
Issue 01 (2008-01-15)
7 Alarm Management
Step 2 Click Print. The selected alarms in the Alarm Browse window or Query Alarm Log window is printed out from the printer. Step 3 Select Print To File, and then click Print. The Print To File dialog box is displayed, as shown in Figure 7-11.
Issue 01 (2008-01-15)
7-13
7 Alarm Management
Step 4 Select or enter a file name. Step 5 Click OK. The printed alarms are saved in the file. ----End
7 Alarm Management
7.6.6 Modifying the Alarm Configuration You can modify the alarm configuration attributes such as Alarm ID, Alarm Severity, Shield Flag and To Alarm Box Flag. 7.6.7 Resetting the Alarm Configuration You can restore the initial alarm configuration. 7.6.8 Updating the Alarm Status Multiple users may handle an alarm at the same time. You can update an alarm through the alarm management system.
Procedure
l Operation Procedure in GUI Mode 1. Press Ctrl+Delete, or right-click the alarm and then select Manually Clear Alarm from the shortcut menu. A dialog box is displayed for your confirmation.
NOTE
You can manually clear multiple alarms through pressing Ctrl or Shift.
2. l
Click OK.
Operation Procedure in MML Mode Run RST ALMCFG on the MML client.
----End
Serial No. Alarm Name Alarm Severity Raised Time Clear Time Location Info
Huawei Technologies Proprietary 7-15
Issue 01 (2008-01-15)
7 Alarm Management
l l l l l l
Alarm ID Module ID Event Type Alarm Type Office Name Cleared Type
To query the alarm details, double-click an alarm in the Alarm Browse window or Query Alarm Log window. The Alarm Detailed Information window is displayed, as shown in Figure 7-12. Figure 7-12 Querying alarm details
Context
You can query more information of an alarm, which includes:
l l l l l
Alarm meaning Impact on system System self-processing Correlated Alarm Handling suggestion
7 Alarm Management
Procedure
Step 1 Double-click an alarm in the Alarm Browse window. Step 2 Click Help in the Alarm Detailed Information dialog box. The alarm explanation on the online help of the LMT is displayed. ----End
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Configuration Query. The Query Alarm Configuration dialog box is displayed, as shown in Figure 7-13. Figure 7-13 Setting the query condition
2. 3.
Set the query condition. Click OK. The system either prompts that there is no matched record or displays the Query Alarm Configuration window, as shown in Figure 7-14.
Issue 01 (2008-01-15)
7-17
7 Alarm Management
NOTE
In the Query Alarm Configuration dialog box, if Modification Flag is set to Modified or All, you can view Current/Original Alarm Severity, Current/Original Shield Flag, and Current/ Original Alarm Box Flag for the alarm whose configurations are changed.
Operation Procedure in MML Mode Run LST ALMCFG on the MML client.
----End
Procedure
Step 1 Choose Fault Management > Alarm Configuration Query. The Query Alarm Configuration dialog box is displayed as shown in Figure 7-15.
7-18
Issue 01 (2008-01-15)
7 Alarm Management
Step 2 Set the query condition. Step 3 Click OK. The Query Alarm Configuration window is displayed as shown in Figure 7-16. Figure 7-16 Query Alarm Configuration window
Step 4 Right-click an alarm record. Step 5 Select Modify Alarm Configuration . The Modify Alarm Configuration dialog box is displayed, as shown in Figure 7-17.
Issue 01 (2008-01-15) Huawei Technologies Proprietary 7-19
7 Alarm Management
Step 6 Set the alarm configuration parameters. Step 7 Click OK. The Query Alarm Configuration window is displayed.
NOTE
l l
Shield Flag: If the value is Shield, the UOMU board does not report this alarm to the LMT and you cannot query and browse this alarm in the Alarm Browse window. To Alarmbox Flag: If the value is Report, the system reports this alarm to the alarm box and then the alarm box is triggered. The value Not Report means that the system does not report this alarm to the alarm box.
----End
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Configuration Query. The Query Alarm Configuration dialog box is displayed as shown in Figure 7-18.
7-20
Issue 01 (2008-01-15)
7 Alarm Management
2. 3.
Set the query condition. Click OK. The Query Alarm Configuration window is displayed as shown in Figure 7-19.
4. 5.
Issue 01 (2008-01-15)
7-21
7 Alarm Management
Are you sure to restore this alarm configuration? 6. l Click Yes to open the Query Alarm Configuration window. Click No to cancel the operation of restoring this alarm.
Operation Procedure in MML Mode Run RST ALMCFG on the MML client.
----End
Procedure
Step 1 Select the alarm from the Alarm Browse window or Query Alarm Log window. Step 2 Right-click and then select Refresh from the shortcut menu. ----End
7 Alarm Management
You can judge the alarm severity of the alarm box through querying the alarm lamp state in GUI or MML mode. 7.7.10 Querying the Alarm Box Version You can query the version of the alarm box on the LMT in both the GUI mode and MML mode.
Connecting to the BAM through serial port RS232, that is, interface COM2 on the UFSU, backboard of the UOMU. Connecting to the host where the LMT is located through serial port RS232. After the parameters are configured through Convert Management System, the host forwards alarms to the alarm box. The Convert Management System provides the following functions:
Communicates with the UOMU board through an Ethernet port and with the alarm box through a serial port. Forwards the commands to operate the alarm box, such as querying the alarm box indicator status, querying the alarm box version, resetting an alarm indicator, muting the alarm, and resetting the alarm box through the LMT. Forwards alarm messages to the alarm box to generate audible and visual alarms. Monitors the communications of Ethernet port with the UOMU and that of serial port with the alarm box in real time, and reports alarms.
Before enabling the alarm forward function, you must configure the alarm forward system. The data to be configured includes the IP address of the UOMU and the serial port that is connected to the alarm box. Figure 7-20 shows the connections between the LMT alarm forward system, UOMU board, and alarm box in the second mode. Figure 7-20 Connections between the LMT alarm forward system, UOMU board, and alarm box
The commands used to operate the alarm box LMT Ethernet port Alarm box
Serial port
Alarm
UOMU
The first mode can be realized only in MML mode, but the second mode can be realized in both GUI of the alarm forwarding system and MML mode. 7.7.1.1 Operation Procedure for Connecting the Alarm Box to BAM
Issue 01 (2008-01-15) Huawei Technologies Proprietary 7-23
7 Alarm Management
The alarm box is connected to the BAM through serial port RS232, that is, interface COM2 on the UFSU, backboard of the UOMU. 7.7.1.2 Operation Procedure for Connecting the Alarm Box to LMT The alarm box is connected to the host where the LMT is located through serial port RS232. After the parameters are configured through Convert Management System, the host forwards alarms to the alarm box.
Procedure
l Operation Procedure in GUI Mode 1. 2. 3. Run SET ALMBOXPOS on the MML client, and set the parameter Alarm box location to LOC (Local machine). Connect the alarm box and the serial port on the LMT with a RS232 serial cable. Choose Start > Programs > HUAWEI Local Maintenance Terminal > Convert Management System to start the Convert Management System. The icon 4. is displayed on the taskbar. , and then select Restore from the shortcut menu, or click the
The Convert Management System window is displayed. 5. From the Convert Management System window, choose Operate > Configuration or click the icon .
The Configuration dialog box is displayed, as shown in Figure 7-21. Figure 7-21 Configuring alarm forward system
7-24
Issue 01 (2008-01-15)
7 Alarm Management
6.
Enter the Host IP and the COM Port in the Configuration dialog box. Table 7-4 describes the two fields in the Configuration dialog box. Table 7-4 Alarm forward system attributes Attribute Host IP Description The IP address of the UOMU board that is connected to the Convert Management System. The default value is 127.0.0.1. COM Port The number of the serial port on the host of the Convert Management System, which communicates with the alarm box. The default value is COM1.
NOTE
l l
The configuration data is stored in a configuration file. At the next startup, the Convert Management System automatically configures the alarm forward system based on this file. To change the alarm forward system configuration, repeat the configuration procedure.
7. l
Click OK.
Operation Procedure in MML Mode Run SET ALMBOXPOS on the MML client.
----End
Context
For instance, if the shield severity of the alarm box is critical, the sever prevents the SGSN from sending the alarm whose severity is major, minor, and warning to the alarm box.
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Box Operation > Shield Severity Set . The Alarm Box Shield Severity Setting dialog box is displayed, as shown in Figure 7-22.
Issue 01 (2008-01-15) Huawei Technologies Proprietary 7-25
7 Alarm Management
2. 3.
Select an alarm severity in the Alarm Severity drop-down list box. Click OK. The Prompt dialog box is displayed, which indicates that the alarm severity is set.
Operation Procedure in MML Mode Run SET ALMSCRN on the MML client.
----End
Context
NOTE
The alarm is only in online state, the shield severity can be queried.
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Box Operation > Shield Severity Get . The dialog box that contains the shield severity is displayed. 2. l Click OK. Operation Procedure in MML Mode Run LST ALMSCRN on the MML client. ----End
7 Alarm Management
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Box Operation > Alarm Box Control or click the icon .
The Alarm Box Control dialog box is displayed, as shown in Figure 7-23. Figure 7-23 Alarm Box Control dialog box
2. 3. l
Operation Procedure in MML Mode Run RST ALMBOX on the MML client.
----End
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Box Operation > Alarm Box Control or click the icon .
The Alarm Box Control dialog box is displayed, as shown in Figure 7-24.
Issue 01 (2008-01-15)
7-27
7 Alarm Management
2. 3. l
Operation Procedure in MML Mode Run STP BOXSND on the MML client.
----End
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Box Operation > Alarm Box Control or click the icon .
The Alarm Box Control dialog box is displayed, as shown in Figure 7-25.
7-28
Issue 01 (2008-01-15)
7 Alarm Management
2. 3. l
Select Stop Alarm Status Lamp and select the alarm severity. Click OK.
Operation Procedure in MML Mode Run CLR BOXLGT on the MML client.
----End
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Box Operation > Alarm Lamp State . The Query Result dialog box is displayed, as shown in Figure 7-26. It indicates the numbers of alarms that have different severities. Figure 7-26 Query Result dialog box
Issue 01 (2008-01-15)
7-29
7 Alarm Management
2. l
Click OK.
Operation Procedure in MML Mode Run LST BOXLGT on the MML client.
----End
Procedure
l Operation Procedure in GUI Mode 1. Choose Fault Management > Alarm Box Operation > Alarm Box Version . The alarm box version is displayed in the Query Result window, as shown in Figure 7-27. Figure 7-27 Query Result window
2. l
Click OK.
Operation Procedure in MML Mode Run LST BOXVER on the MML client.
----End
7-30
Issue 01 (2008-01-15)
8 Performance Management
8
About This Chapter
Performance Management
The performance measurement collects information such as the hardware, users, and system resource usages. The collected data is useful for designing and managing of the communication network. 8.1 Overview of Performance Management Descibes the concepts related to the performance measurement. 8.2 Querying the Performance Results The major function of the Performance Browser Tool is to query the performance results. 8.3 Filtering the Performance Results After the performance results are imported, you can filter the data tables by time, object, counter, and condition. 8.4 Exporting the Performance Results After downloading the measurement result files from the server, you can export the performance data table to local as a csv file, and then edit the file using Excel. 8.5 Maintain Custom Template Describes the operations related to the customized template. 8.6 Listing the Measurement Description Files A measurement description file defines the measure objects, counters, file type, and period of the measurement. The performance browse tool explains the measurement result files based on this measurement description file.
Issue 01 (2008-01-15)
8-1
8 Performance Management
Procedure
Step 1 Choose Start > Programs > HUAWEI Local Maintenance Terminal > Performance Browse Tool. Step 2 The Net Configure dialog box is displayed as shown in Figure 8-1. Set the parameters such as Net Name, User, Password, IP Address, Server Path, Local Result, and Target File.
8-2
Issue 01 (2008-01-15)
8 Performance Management
Table 8-1 lists the parameters in the Net Configure dialog box. Table 8-1 Fields in Net Configure dialog box Parameter Net Name User Password IP Address Server Path Description Name of the FTP Server. User name to log in to the FTP Server. Password to log in to the FTP Server. IP address of the FTP Server. Path for saving data on the FTP Server, the default path is the root directory/. The path for saving data on the FTP Server of the SGSN9810 is /bam/data/prf/. FTP Configuration Test Check if the parameters in the FTP Config pane are successfully set. If you click FTP Config, the system displays the prompt message Test Succeed! or Test Failed!.
Issue 01 (2008-01-15)
8-3
8 Performance Management
Description Directory for saving data that is downloaded from the FTP Server, that is, LMT installation directory\adaptor\ clientadaptor\pfbTool\data. Click to select a destination path.
Target File
The default path is LMT installation directory\adaptor\clientadaptor \SGSN9810\product version number \mml\en_US. The measurement description file is in MeasDefinitions.xml format.
For example, in the path D:\HW LMT \adaptor\clientadaptor\SGSN9810 \SGSN9810V800R007C01B012\mml \en_US, MeasDefinitions.xml is the target file. Address List FTP Server address list. If multiple server names exist in the address list, each name must be unique.
NOTE
l l l
The FTP Server described in this chapter indicates the UOMU board that has started the SGSN9810. You must configure the parameters in the FTP Config pane correctly to connect the FTP Server normally. The recommended values for User and Password are default values. You can modify them using LST FTPUSR.
Step 3 Click Add to add the settings to the Address List. Step 4 Click FTP Configuration Test, insure the prompt message is Test Succeed! Step 5 Click Close. ----End
8-4
Issue 01 (2008-01-15)
8 Performance Management
Context
NOTE
You can filter the measurement result files in the FTP Server Directory through the shortcut menu. The following three filter types are available:
l
Default Filtrate: to filter the performance measurement result files and counters. After the filtering, only the performance measurement result files and counter files are shown in the FTP Server Directory. Period Filtrate: to filter the files according to the granularity period of the performance measurement files. Short period includes 5 minutes and 15 minutes. Long period includes 30 minutes and 60 minutes. The SGSN9810 supports the short period of 5 minutes and long period of 30 minutes. Time Filtrate: to filter the time. You can set to filter the measurement result files at that day or during a period.
Procedure
Step 1 From the LMT, run SET FTPENABLE to start the FTP Server on the UOMU board. Step 2 Choose System > Download Measurement Results. The Download Measurement Results window is displayed, as shown in Figure 8-2. Figure 8-2 Download Measurement Results window
Step 3 In the FTP Server Directory, double-click the server message row to be connected. The root directory of the server is displayed under FTP Server Directory, as shown in Figure 8-3.
Issue 01 (2008-01-15)
8-5
8 Performance Management
Step 4 Select bam > data > prf. The measurement result files are displayed in FTP Server Directory, as shown in Figure 8-4. Figure 8-4 Measurement result files that can be downloaded
Step 5 Select the measurement result files to be downloaded in FTP Server Directory and then click Download. The downloaded files are displayed in Local Directory, as shown in Figure 8-5.
8-6
Issue 01 (2008-01-15)
8 Performance Management
----End
Context
NOTE
During the auto download time, a scroll bar is displayed at the right of the toolbar, showing the start time, end time and number of downloaded files.
Procedure
Step 1 Choose System > Auto Download Settings. The Auto Download Settings window is displayed, as shown in Figure 8-6.
Issue 01 (2008-01-15)
8-7
8 Performance Management
Step 2 Click Add. In the displayed Add dialog box, click pane in the Download Flag list and add an auto download setting, as shown in Figure 8-7. Figure 8-7 Add window
Step 3 Select the time for auto downloading from the drop-down list of Download Time.
NOTE
Step 4 Click OK. The system returns to the Auto Download Settings window and sorts the download time, as shown in Figure 8-8.
8-8
Issue 01 (2008-01-15)
8 Performance Management
NOTE
Procedure
Step 1 Choose System > Query Performance Results. The Query Performance Results dialog box is displayed, as shown in Figure 8-9.
Issue 01 (2008-01-15)
8-9
8 Performance Management
Step 2 In the Counters Information tab, click to add measurement object, measurement family, measurement unit, or measurement counter from Available Counters to Selected Counters.
NOTE
l l l
The performance of multiple measurement object types cannot be queried at the same time. Click Save Template and save the selected measurement performance as custom template to facilitate easy query for users. Hold down Shift or Ctrl to select multiple counters.
Step 3 Click the Time Information tab, and set the Query Mode and Data/Time, as shown in Figure 8-10.
8-10
Issue 01 (2008-01-15)
8 Performance Management
Step 4 Click Query to generate a data table. The data table contains such as Incept Time, Granularity Period, Objects, Reliability and so on. You can click the table headings to sort the records. Figure 8-11 shows the data table ordered by Incept Time.
Issue 01 (2008-01-15)
8-11
8 Performance Management
Step 5 Double-click a performance result row. The displayed Particular Information dialog box shows the Attribute Name and Attribute Value in Figure 8-12. Figure 8-12 Particular Information dialog box
----End
8-12
Issue 01 (2008-01-15)
8 Performance Management
Procedure
Step 1 In the navigation tree of the Browse Description File window, use the following methods to open the Add dialog box:
l l
Right-click the Custom Template node and select Add from the displayed shortcut menu. Select the Custom Template node, and then choose Template > Add .
Figure 8-13 shows the Add dialog box. Figure 8-13 Add dialog box
Step 2 In the Add dialog box, click to add measurement object, measurement family, measurement unit, or measurement counter from Available Counters to Selected Counters.
NOTE
l l
Each template can save the performance of only one measurement object type. Hold down Shift or Ctrl to select multiple counters.
Step 3 Click Save Template. The Info dialog box is displayed. Step 4 Enter a template name. Step 5 Press OK to add custom template node in the navigation tree of the Browse Description File window, as shown in Figure 8-14.
Issue 01 (2008-01-15)
8-13
8 Performance Management
NOTE
Alternatively, users can add a template by choosing System > Query Performance Results .
Step 6 Double-click the customized template, or select the customized template, and then press Enter. The Query Performance Results dialog box is displayed, as shown in Figure 8-15.
8-14
Issue 01 (2008-01-15)
8 Performance Management
Step 7 Set the Query Mode and Date/Time in the displayed Query Performance Results dialog box. Step 8 Click Query to query the counters in the template. ----End
Procedure
Step 1 Right-click the data table, and then select Filter Results or F on the key board, as shown in Figure 8-16.
Issue 01 (2008-01-15)
8-15
8 Performance Management
Step 2 In the Filter Results dialog box, set the filter conditions. The filter conditions include measurement start data/time, end data/time, objects, counters, and other conditions, as shown in Figure 8-17.
8-16
Issue 01 (2008-01-15)
8 Performance Management
Step 3 Click OK to filter the required data and refresh the data table. Figure 8-18 shows the data table refreshed after the filtering based on measurement objects.
Issue 01 (2008-01-15)
8-17
8 Performance Management
Figure 8-18 Data table refreshed after the filtering based on measurement objects
----End
Procedure
Step 1 Right-click the data table, and select Export Data or E on the key board, as shown in Figure 8-19.
8-18
Issue 01 (2008-01-15)
8 Performance Management
Step 2 In the Save dialog box, enter the file name and saving path, as shown in Figure 8-20. Figure 8-20 Entering the file name and saving path
8 Performance Management
Procedure
Step 1 In the navigation tree of the Browse Description File window, use the following methods to open the Add dialog box:
l l
Right-click the Custom Template node and select Add from the displayed shortcut menu. Select the Custom Template node, and then choose Template > Add .
Figure 8-21 shows the Add dialog box. Figure 8-21 Add dialog box
Step 2 In the Add dialog box, click to add measurement object, measurement family, measurement unit, or measurement counter from Available Counters to Selected Counters.
8-20 Huawei Technologies Proprietary Issue 01 (2008-01-15)
8 Performance Management
l l
Each template can save the performance of only one measurement object type. Hold down Shift or Ctrl to select multiple counters.
Step 3 Click Save Template. The Info dialog box is displayed. Step 4 Enter a template name. Step 5 Press OK to add custom template node in the navigation tree of the Browse Description File window, as shown in Figure 8-22. Figure 8-22 Add a custom template node in navigation tree
NOTE
Alternatively, users can add a template by choosing System > Query Performance Results .
----End
Procedure
Step 1 From the navigation tree in the Browse Description File window, open the Modify dialog box in either of the following two ways:
l l
Right-click the custom template and choose Modify from the shortcut menu. Select the custom template, and then choose Template > Modify from the menu bar.
Huawei Technologies Proprietary 8-21
Issue 01 (2008-01-15)
8 Performance Management
The Modify dialog box is displayed. Step 2 Re-select the measurement family, measurement unit, or measurement counter of the same measurement object, and then click Save Template. The Confirm dialog box is displayed. Step 3 Click OK.
NOTE
When modifying the customized template, you are not allowed to modify the measurement object.
----End
Procedure
Step 1 From the navigation tree in the Browse Description File window, open the Confirm dialog box in either of the following two ways:
l l
Right-click the Custom Template node and choose Delete from the shortcut menu. Select the Custom Template node, and then choose Template > Delete from the menu bar.
Context
You can obtain such information as measurement counters and objects from the measurement description files.
NOTE
The NE Measurement Information navigation tree consists of four nodes: Common Measurement_ [5,15,30,60] , Append Measurement, Measurement Object Class, and Template Detail. You can select a node and then browse the information of that node.
Procedure
Step 1 Choose System > Browse Description File. The Browse Description File window is displayed, as shown in Figure 8-23.
8-22
Issue 01 (2008-01-15)
8 Performance Management
Step 2 Double-click a row in the MeasDefinitions Detail. The displayed Particular Information dialog box shows the Attribute Name and the Attribute Value, as shown in Figure 8-24. Figure 8-24 Particular Information dialog box
----End
Issue 01 (2008-01-15)
8-23
9
About This Chapter
The SGSN9810 data files are stored on the hard disk of the UFSU board which is the back board of the UOMU board. To secure the data, the SGSN9810 offers the functions of data backup and restoration. 9.1 Overview of Backing Up and Restoring Data Describes the concepts related to the functions of data backup and restoration. 9.2 Backing Up Data Automatically The SGSN9810 can automatically dump the alarm files and operation logs from the UFSU board to the FTP Server every day. 9.3 Backing Up and Restoring Data Through Tools The backup and restoration tools (programs) are stored in ENGLISH_VERSION\SGSN \TOOLS\BACKUP under the installation directory of the host software on the version server. 9.4 Backing Up and Restoring Data Through the FTP Client Before the restoration, ensure that the FTP Client of the LMT is connected with the UOMU board (FTP Server). You can: uploading the file from the local directory to the FTP Server, backing up the files from the FTP Server to the local directory. 9.5 Restoring Office Configuration Files The following office configuration files are saved in \hda0\SGSN\CONFIG\ on the UFSU board: mml.txt, bam.ini, user.ini and usermode.ini.
Issue 01 (2008-01-15)
9-1
Alarm file alarm.hlm Performance data file *.prf Trace data file *.tmf Operation log file *.olg System log file *.slg SM log file *.smg MM log file *.mmg System configuration file mml.txt Software version files
To secure the data, the SGSN9810 offers the functions of data backup and restoration.
CAUTION
The performance statistic data can be stored on the hard disk of the UFSU board for up to seven days. Back up the data to the local disk before it is deleted from the UFSU board.
Procedure
Step 1 Check if the FTP user information on the FTP Server is consistent with the one queried through LST SYS. If it is not consistent, correct the FTP user information on the FTP Server. Step 2 Run SET FINFO to enable the automatic file dump function. ----End
This section describes the procedures for backing up and restoring data using tools. In the following examples, the SGSN9810 host software is in the default directory C: \DOWNLOAD on the version server. The backup and restoration tools are stored in C:\DOWNLOAD\ENGLISH_VERSION \SGSN\TOOLS\BACKUP, which contains the following four files:
l l l l
9.3.1 Backing Up Data Through Backup Tools Describes the procedure for backing up system data through backup tools. 9.3.2 Restoring Data Using Restoration Tools Describes the procedure for restoring system data using restoration tools.
Context
The system continuously displays # on the screen showing the backup progress. If the system stops displaying # displays other error messages, you must check if:
l
The user name and password configured in sgsnbk.txt are consistent with those on the UOMU. The default user name and password are sgsn60. The IP address of the UOMU board is correct. The network is in good condition.
l l
Procedure
Step 1 Run SET FTPENABLE on the LMT to enable the FTP Server function of the UOMU board.
NOTE
You can run LST FTPUSR to check the name of the FTP user and the password: If the FTP user name or the password is not sgsn60, run SET FTPUSR to modify the user name or the password as sgsn60.
The FTP Server function of the UOMU board is automatically disabled if no session is in process for 15 minutes continuously.
Step 2 Run the following command in the backup directory C:\DOWNLOAD\ENGLISH_VERSION \SGSN\TOOLS\BACKUP under DOS: sgsnbk IP address of the UOMU maintenance network port user name password For example, if the FTP user name is sgsn60, and the password is sgsn60, the command is: sgsnbk IP address of the UOMU maintenance network port sgsn60 sgsn60 After the command is run successfully is created under the backup directory, C:\DOWNLOAD \ENGLISH_VERSION\SGSN\TOOLS\BACKUP\SGSN_BAK. The directories and files
Issue 01 (2008-01-15) Huawei Technologies Proprietary 9-3
under \SGSN_BAK are the mirrors of the directories and files under \hda0\SGSN on the UFSU board, except the files in \hda0\SGSN\SOFTWARE_BAK. ----End
Context
CAUTION
The restoration operation will overwrite all the files under \hda0\SGSN on the hard disk of the UOMU with the local backup files. Ensure that the local backup files are correct before the restoration.
Procedure
Step 1 Modifying the Verification Flag of the Configuration Files Modify the verification flag of all the files except cfg_load.ini under C:\DOWNLOAD \ENGLISH_VERSION\SGSN\TOOLS\BACKUP\CONFIG as ;FFFFFFFF FFFFFFFF 00000001. Step 2 Configuring the FTP Server Function of the UOMU 1. 2. Run SET FTPENABLE on the LMT to enable the FTP Server function of the UOMU board. Run LST FTPUSR on the LMT to check the name of the FTP user and the password. If the user name or the password is not sgsn60, run SET FTPUSR to modify.
NOTE
The FTP Server function of the UOMU board is automatically disabled if no session is in process for 15 minutes continuously.
Step 3 Restoring the Active Version of the UOMU Run the following command in C:\SGSN_BACKUP\ in DOS mode to upload the local backup files to the hard disk of the UOMU board: sgsnrt IP address of the UOMU maintenance network port user name password /Y For example, if the FTP user name is sgsn60, and the password is sgsn60, the command is: sgsnrt IP address of the UOMU maintenance network port sgsn60 sgsn60 /Y Step 4 Updating Files on the Standby UOMU Board Run SYN SOFTWARE on the LMT to update the files on the standby UOMU board. ----End
9-4 Huawei Technologies Proprietary Issue 01 (2008-01-15)
Context
NOTE
During the data backup through the FTP Client, the UOMU board serves as the FTP Server.
Procedure
Step 1 Configuring the FTP Server Function of the UOMU Board 1. 2. Run SET FTPENABLE on the LMT to enable the FTP Server function of the UOMU board. Run SET FTPUSR on the LMT to modify the FTP user name and password as sgsn60.
NOTE
The FTP Server function of the UOMU board is automatically disabled if no session is in process for 15 minutes continuously.
Step 2 Starting an FTP Client 1. 2. Choose Start > Programs > HUAWEI Local Maintenance Terminal > FTP Client . Enter the IP address, user name, password, and port number of the FTP Client.
Step 3 Establishing a Connection with the FTP Server You can establish a connection with the FTP Server in the following ways:
l l l
on the toolbar.
Choose System > Connect . Move the cursor to the server input area and then press Enter.
In the Server List window, select the file to be downloaded. Select a directory in the Local Folder List window for saving the file. Download the selected file to the local disk in any of the following ways:
Huawei Technologies Proprietary 9-5
l l l
on the toolbar.
Only one file can be downloaded from the FTP Server at a time.
----End
Prerequisite
Before the restoration, ensure that the FTP Client of the LMT is connected with the UOMU board (FTP Server).
Context
NOTE
Procedure
Step 1 In the Local File List window, select the file to be uploaded. If the file is mml.txt, bam.ini, user.ini, or usermode.ini, modify the verification flag in the file as ;FFFFFFFF FFFFFFFF 00000001. Step 2 Specify a directory in the Server List window. Step 3 Upload the file to the directory in any of the following ways:
l l l
on the toolbar.
Context
You can load one or all of these files from the FTP Server to the active UOMU board using DLD CFG.
NOTE
If a file with the same name exists in \hda0\SGSN\CONFIG\, the system saves the downloaded file as a bak file.
Procedure
Step 1 Ensure that the FTP Server application on the FTP Server is running. Step 2 Ensure that the user name, password, and home directory on the FTP Server are consistent with those queried through LST SYS. If not, correct the FTP user details on the FTP Server. Step 3 Modify the verification flags in the office configuration files as ;FFFFFFFF FFFFFFFF 00000001. Step 4 Run DLD CFG on the LMT to load the office configuration files to the active UOMU board. Step 5 Run SYN SOFTWARE on the LMT to update mml.txt on the standby UOMU board. The other configuration files can be automatically updated on the standby UOMU board. Step 6 Run RST BRD: OT=SYS on the LMT to restart the system. ----End
Issue 01 (2008-01-15)
9-7
10 Log Management
10
About This Chapter
10.1 Overview of Log Management Describes the concepts related to the log files.
Log Management
The SGSN9810 can generate the following log files: operation log file, alarm log file, security log file, system log file.
10.2 Querying a Log You can download all logs to the maintenance terminal through the FTP Client for browse and query. 10.3 Setting and Querying Parameters of a Log File The parameters of a log file consist of log quantity and log capacity. 10.4 Backing Up a Log File The hard disk of the UFSU, backboard of the UOMU, stores only a certain number of log files. You need to back up them regularly. A log file can be backed up in the following modes: automatic backup and manual backup.
Issue 01 (2008-01-15)
10-1
10 Log Management
Operation log file *.olg: records all operations for external commands. Alarm log file *.hlm: records history alarms. Security log file *.seg: records all security events. System log file *.slg: records system logs.
All logs are stored in the hard disk of the UFSU that is the backboard of the UOMU. The path is: /hda0/bam/data/.
User name User ID IP address of the LMT Commands executed Command execution date/time Execution result
The LMT enables you to query the operation log. A maximum of 64 operation records can be queried at a time. If there are more than 64 records, specify the time limit or set other query conditions. To query an operation log, run LST OPTLOG on the MML client.
10-2 Huawei Technologies Proprietary Issue 01 (2008-01-15)
10 Log Management
Automatic backup: The system automatically backs up a log file at the set time. Manual backup: A user backs up a log file.
10 Log Management
You can automatically back up an operation log file or a security log file to the FTP Server in MML mode. 10.4.2 Backup Log Files Manually You can manually back up the log files in the hard disk of the UFSU, backboard of the UOMU, to the FTP Server in MML mode.
10-4
Issue 01 (2008-01-15)
11 Information Collection
11
Context
l l
Information Collection
The SGSN9810 requires periodically collecting its operation information. To enhance the maintenance efficiency of the SGSN, the LMT uses the information collector to collect the maintenance information.
The information collector can reduce workload and enhance accuracy and efficiency of information. The information collected by the information collector is: Files stored in the hard disk of the UFSU, backboard of the UOMU. Information that can be obtained through MML commands.
The information collector obtains information in FTP mode. The information collector logs in to the SGSN9810 through port 6000 and runs MML commands through this port. After the FTP function of the UOMU is enabled, the information collector invokes the FTP commands carried by Windows itself and downloads the files in the hard disk of the UOMU. The information collector obtains information through interacting with the SGSN9810.
Procedure
Step 1 In the Maintenance tab of LMT, double-click Service > Information Collection node. The SGSN9810 information collector window is displayed, as shown in Figure 11-1.
Issue 01 (2008-01-15)
11-1
11 Information Collection
NOTE
The blank area on the right of the SGSN9810 information collector window shows the progress of information collection.
Step 2 Click Login, and enter the correct UserName, Password, and IP, as shown in Figure 11-2 Figure 11-2 LoginWindow
NOTE
The IP address for login of the information collection can be inconsistent with that for login of the LMT.
Step 3 In the SGSN9810 information collector window, set File Selection and Real Information.
NOTE
l l
If a great amount of information is collected, the system may be faulty. Therefore, it is recommended to control the amount of the information to be collected for one collection command. You can save File Selection and Real Information to their default configurations through the Save default button. Click the Load default button to complete setting of the default configuration options.
11-2
Issue 01 (2008-01-15)
11 Information Collection
Step 4 Click the Browse button in Function Zone and select a path to save the result of collected information. The collected information is saved in a file whose format is year, month, and day, for instance, 20061013. Collected information is saved in different types of files, as listed in Table 11-1. Table 11-1 Relation between file types and paths File Type Operation System log FAULT File Alarm Data Measurement DFT log Local File Name OLG SLG FAULT HLM PERF DFT Path in BAM /hda0/bam/data/olg /hda0/bam/data/slg /hda0/fault /hda0/bam/data/hlm /hda0/bam/data/prf cnt, common, emerg, obs, and tran folders in /hda0/ bam/data /hda0/bam/data/mmg /hda0/bam/data/smg /hda0/log /hda0/SGSN/CONFIG
CAUTION
The path that saves collected information cannot contain spaces and Chinese characters. For instance, the information cannot be saved in D:\HW LMT. Step 5 Click Execute to collect information. When information collection is complete, the following information is displayed in the black area on the right of the SGSN9810 information collector window: Collect Finished!!! Step 6 Click Quit. ----End
Issue 01 (2008-01-15)
11-3
12 System Management
12
About This Chapter
System Management
Describes the system management operations you can execute in the LMT. 12.1 Setting the System Output Setting the system output involves the following operations: setting line count in the output window and saving the output. 12.2 Setting Command Timeout Duration The timeout duration starts when the command is submitted to the system, and ends when the command execution result is displayed. When the timeout duration expires, the LMT sends a message prompting that the command has expired. 12.3 Saving the Input or End Command You can save the input commands or end the saving of them. 12.4 Immediately or Regularly Executing a Batch File The batch file is a txt file that stores the frequently used commands or commands for a special task. You can perform a task by executing the batch file instead of manually entering the commands. 12.5 Searching Commands You can search command in the MML command search window by keywords. 12.6 Right-click Menu in the MML Result Output Area Describes the operation items in the right-click menu in the MML result output area.
Issue 01 (2008-01-15)
12-1
12 System Management
Procedure
Step 1 Choose System > System Setting, or right-click the output window of the Common or Maintenance tab and then select Parameter Setting. The System Setting dialog box is displayed, as shown in Figure 12-1. Figure 12-1 System Setting window
Step 2 Set the number of lines that can be displayed in the maintenance or common output window depending on the actual requirement.
12-2 Huawei Technologies Proprietary Issue 01 (2008-01-15)
12 System Management
The value range is from 30 to 3000. The default value is 500. ----End
Procedure
Step 1 Choose System > Output Window Setting. The Output Window Setting dialog box is displayed, as shown in Figure 12-2. Figure 12-2 Output Window Setting window
Step 2 Enter the file name in the Export To File box, such as abc.txt. The output is saved in \output under the software installation directory.
NOTE
l l l l
The default file name is Maintenance_current time.txt. For example, if the current time is 2005-11-08-15:57:32, the file name is Maintenance_2005-11-08-15-57-32.txt. Auto Save: Click this button to save the output in real time. Timed Save: Click this button to set the time for saving the output.
Step 3 Select Max Amount and set the number of commands to be saved in the file.
Issue 01 (2008-01-15) Huawei Technologies Proprietary 12-3
12 System Management
Procedure
Step 1 Choose System > Command Timeout Setting. The Command Timeout Setting dialog box is displayed. Step 2 Set the duration in MML Command Timeout(s). The value range is from 20 to 600. ----End
Procedure
Step 1 Choose System > Save Input Commands, or press Ctrl+S. The Save Input Commands dialog box is displayed, as shown in Figure 12-3.
12-4
Issue 01 (2008-01-15)
12 System Management
The default file name is saveCmd_year-month-date-hour-minute-second.txt, for example, saveCmd_2005-12-05-09-53-06.txt. The commands are saved in \output under the LMT software installation directory.
----End
Procedure
Step 1 Choose System > Save Input Commands, or press Ctrl+S. The Save Input Commands dialog box is displayed, as shown in Figure 12-4. Figure 12-4 Save Input Commands dialog box
Step 2 Choose System > Save Input Commands and then deselect Save Successful Command and Save Failed Command. ----End
Issue 01 (2008-01-15) Huawei Technologies Proprietary 12-5
12 System Management
The size of a batch file may be up to 30M. If there are too many commands in a batch file, compiling the commands may affect the system performance. The system prompts in the following two situations:
l l
When opening a batch file containing more than 20000 commands. When copying commands to a batch file so that the total number of commands in the file is more than 20000.
CAUTION
l
The batch file is used to import the configuration data while setting up a new system. It is also used to create performance measurement tasks. While the system is running, execute a batch file containing the ADD, RMV, MOD, and SET commands with caution. Before executing a batch file, ensure that the commands in the file are correct and in correct order.
12.4.1 Regularly Executing a Batch File Regularly executing a batch file means the system automatically executes the batch file at the specified time. 12.4.2 Immediately Executing a Batch File Describes how to execute a batch file immediately.
12-6
Issue 01 (2008-01-15)
12 System Management
Context
CAUTION
l
The system does not analyze the execution results. When an MML command fails, the system moves to the next command. The specified time must be later than the current time.
Procedure
Step 1 Choose System > Batch Commands or press Ctrl+E. The MML Batch window is displayed, as shown in Figure 12-5. Figure 12-5 Timer Batch Command tab page
Step 2 Click Add. The Add Batch Task dialog box is displayed, as shown in Figure 12-6.
Issue 01 (2008-01-15)
12-7
12 System Management
next to the Batch File field, and then add the batch file to be executed. next to the Execute Time field, and then enter the time of execute batch file.
Step 5 Set the saving mode. Step 6 Click OK to add the task to the list. Step 7 To add more batch files, repeat step 2, step 3 and step 4. The system executes the files on the list regularly. Step 8 From the Time Batch Command list, select the patch file to be deleted. Click Delete to remove the file from the list. Step 9 Click Stop to stop executing the commands. ----End
Context
Compared with the regular execution, immediate execution has the following features:
l
Before executing a batch file, the system scans the file to check the syntax. The system sends a prompt message and provides suggestions if it finds an error. The system analyzes the execution results.
Huawei Technologies Proprietary Issue 01 (2008-01-15)
12-8
12 System Management
When a command fails, the system prompts you whether to continue or stop the execution. You can set up breakpoints for step debugging or specify the range of commands to be executed, for example, from Line 10 to Line 100.
Procedure
Step 1 Choose System > Batch commands or press Ctrl+E. The MML Batch window is displayed, as shown in Figure 12-7. Figure 12-7 Immediate Batch Command window
Step 2 Click the Immediate Batch Command tab. Step 3 Click Open. Step 4 In the Open dialog box, select a file and click Open. The file is open in the Immediate Batch Command page, as shown in Figure 12-8. You can stop and restart the procedure during the execution.
Issue 01 (2008-01-15)
12-9
12 System Management
Step 5 In the Immediate Batch Command tab, click Set. The Set dialog box is displayed, as shown in Figure 12-9. Figure 12-9 Set dialog box
Step 6 Set the command interval and saving mode. Step 7 Select an execution type in the Execution Type area. Table 12-1 describes the execution types.
12-10
Issue 01 (2008-01-15)
12 System Management
Table 12-1 Execution types To Execute All Action Select Execute All and then click Go to execute the commands. To stop the execution, click Stop. Execute Step by Step Select Execute Step by Step and then click Go. To stop the execution, click Stop. Execute with Breakpoint Select Execute with Breakpoint. Click a line to set it as a breakpoint where the execution is to be interrupted. To execute from the top of the file, click Go. To stop the execution, click Stop. Execute Range Select Execute Range, and then input the start line in From Line. Click Go. To stop the execution, click Stop. The system executes the commands only within the range. The system executes only one command at a time. The icon points to the current command. The system executes commands in sequence and stops at a breakpoint which is indicated by the red icon . The icon points to the current command. Function The system executes all the commands in the batch file in sequence.
Step 8 You can modify commands in the window. Right-click and then select Find or Replace to edit the commands. To save the changes, click Save. Perform this step with caution. Step 9 Click Save. The contents in the command input area is saved. The command input area is cleared at the same time. ----End
Result
After the execution, the status bar under the MML Batch window shows:
l l l l
Number of successfully executed commands in Total Result. Execution result of the last command in Current Result. Position of the cursor in the batch file in Cursor Position. Saves the information of the failed commands to the file specified in Save Failed Commands.
Huawei Technologies Proprietary 12-11
Issue 01 (2008-01-15)
12 System Management
Procedure
Step 1 Click the Search tab in the navigation tree window on the LMT. Step 2 Enter the keywords in the Search field. For example, enter add. The system displays a list of commands with add in their names in the search result area. Step 3 Double-click a command. The command input window is displayed. The location of this command in the navigation tree is also displayed in the MML Command page. ----End
Copy Select All Clear Report Save As Redirection Auto Scroll Parameter Setting
12-12
Issue 01 (2008-01-15)
Index
Index
A
active alarm, 7-2 adding CPU usage monitoring task, 5-4 operator account, 3-10 alarm browsing, 7-5 clearing manually, 7-15 deleting cleared alarm, 7-15 event type, 7-3 handling, 7-14 modifying configuration, 7-18 printing, 7-11 querying, 7-7 querying configuration, 7-17 querying detail, 7-15 querying more information, 7-16 refreshing, 7-22 restoring configuration, 7-20 saving, 7-10 severity level, 7-3 alarm box, 7-4 appearance, 7-4 function, 7-4 indicator, 7-4 operating, 7-22 querying active alarm, 7-26 querying alarm lamp state, 7-29 querying location, 7-23, 7-25 querying shield severity, 7-26 querying version, 7-30 resetting, 7-26 resetting indicator, 7-28 setting shield severity, 7-25 stopping sound, 7-27 alarm configuration modifying, 7-18 querying, 7-17 restoring, 7-20 alarm indicator resetting, 7-28 alarm management, 7-1 alarm management concept, 7-2 alarm severity level, 7-3
Issue 01 (2008-01-15)
critical alarm, 7-3 major alarm, 7-3 minor alarm, 7-3 warning alarm, 7-3 alarm type event alarm, 7-2 fault alarm, 7-2 authority command group, 3-6 operator account, 3-5 authority management, 3-1 locking the system, 3-20 managing command group, 3-16 managing operator, 3-9 authority management basic concept, 3-3
B
backing up data automatically, 9-2 FTP client, 9-5 tool, 9-3 board operation, 4-5 displaying board version, 4-8 displaying power status in PSM subrack, 4-11 displaying temperature in PSM subrack, 4-11 listing board, 4-6 resetting board, 4-9 swapping board, 4-10 browsing alarm, 7-5 CPU usage monitored result offline, 5-7 measurement description file, 8-22 traced message online, 6-3
C
clearing alarm manually, 7-15 collection lock/unlock function querying, 3-15 collection lock/unlock function, 3-15 setting, 3-15 command group, 3-6 querying, 3-16
Huawei Technologies Proprietary i-1
Index
setting, 3-16 setting group description, 3-17 configuration FTP server function, 9-5 local measurement description file, 8-2 connection between alarm box and LMT, 7-23 connection between UOMU and LMT, 7-23 convert management system, 1-9 function, 7-23 CPU usage adding monitoring task, 5-4 browsing monitored result offline, 5-7 deleting monitoring task, 5-4 querying, 5-2 saving monitored data, 5-7 critical alarm, 7-3
L
LMT service manager, 1-5 LMT system component, 1-2 Local Maintenance Terminal, 1-2 logging in, 3-8 logging out, 3-9 locking the system auto-locking, 3-20 manual-locking, 3-20 log file back up, 10-3 back up, automatic, 10-4 back up, manual, 10-4 parameter querying, 10-3 parameter setting, 10-3 log management, 10-1
D
deleting cleared alarm, 7-15 CPU usage monitoring task, 5-4 operator account, 3-13 disconnecting client, 3-14
M
major alarm, 7-3 manually clearing alarm, 7-15 saving traced message, 6-5 measurement result browsing, 8-9 browsing procedure, 8-2 downloading, 8-4 exporting, 8-18 filtering, 8-15 minor alarm, 7-3 modifying alarm configuration, 7-18 operator attribute, 3-12 password, 3-19 monitor management, 5-1 Monitor Viewer, 1-8
E
equipment maintenance, 4-1 equipment panel, 4-2 equipment panel operation display back PSM board panel, 4-4 hide fault bar, 4-3 hide lamp legend, 4-3 refreshing rack node, 4-5 show fault bar, 4-3 show lamp legend, 4-3 event alarm, 7-2 event type, 7-3 executing the batch file, 12-6 immediately, 12-8 regularly, 12-6
O
office information, 3-3 offline browsing traced message, 6-6 operating alarm box, 7-22 operation time limit, 3-6 operator modifying attribute, 3-12 modifying password, 3-19 querying, 3-11 querying password policy, 3-19 setting password policy, 3-18 operator account, 3-5 adding, 3-10 authority, 3-5 deleting, 3-13 operator password, 3-5 modifying, 3-19 operator time limit, 3-6
Issue 01 (2008-01-15)
F
fault alarm, 7-2 active alarm, 7-2 FTP client, 1-3 FTP server, 1-4
H
handling alarm, 7-14 help system, 1-10
I
information collection, 11-1
i-2
Index
P
password policy querying, 3-19 setting, 3-18 performance browse tool, 1-8 performance management, 8-1
Q
querying active alarm of alarm box, 7-26 alarm, 7-7 alarm box location, 7-25 alarm box shield severity, 7-26 alarm box version, 7-30 alarm configuration, 7-17 alarm detail, 7-15 alarm lamp state, 7-29 command group, 3-16 more alarm information, 7-16 operation log, 10-2 operator, 3-11 password policy, 3-19 security log, 10-3 user management function, 3-10
R
recovery alarm, 7-2 resetting alarm box, 7-26 alarm box indicator, 7-28 restoring alarm configuration, 7-20 office configuration file, 9-6 restoring data FTP client, 9-6 tool, 9-4
command timeout duration, 12-4 password policy, 3-18 system output, 12-2 information save, 12-3 setting line count, 12-2 user management function, 3-10 setting office information, 3-7 SSH add SSH user, 2-9 applying, 2-38 applying, interactive mode, 2-43 applying, MML session, 2-42 applying, script, 2-44 applying, session log file, 2-43 applying, session trace message, 2-43 applying, SFTP session, 2-38 configure general setting, 2-18 configure profile, 2-9 connect LMT to SGSN9810, 2-37 creating a session, 2-3 download client public key, 2-9 general private-public key pair, 2-4 manage server key, 2-29 start session, 2-31 SSH knowledge, 2-2 SSH operator flow, 2-1 stopping alarm box sound, 7-27 tracing task, 6-6
T
time limit, 3-6 Trace Viewer, 1-7 traced message browsing offline, 6-6 browsing online, 6-3 saving, 6-5 tracing management, 6-1 tracing task stopping, 6-6
S
saving alarm, 7-10 CPU usage monitored data, 5-7 system input command, 12-4 system output information, 12-3 traced message, 6-5 traced message automatically, 6-5 traced message manually, 6-5 searching command, 12-12 setting alarm box location, 7-23 alarm box shield severity, 7-25 collection lock/unlock function, 3-15 command group, 3-16 command group description, 3-17
Issue 01 (2008-01-15)
U
unlocking a user account, 3-15 user management function querying, 3-10 setting, 3-10
W
warning alarm, 7-3
i-3