1353nm73 Ag Ed01 1
1353nm73 Ag Ed01 1
1353nm73 Ag Ed01 1
Management Suite
1353NM
Rel. 7.3
7.3.6P9
Element manager for Alcatel optical & radio networks
Administration Guide
PREFACE......................................................................................................................................... 11
Preliminary Information.............................................................................................................. 11
Applicability................................................................................................................................. 12
Scope ........................................................................................................................................... 12
History.......................................................................................................................................... 13
Related Documents .................................................................................................................... 13
Handbook Structure ................................................................................................................... 15
General on Customer Documentation ...................................................................................... 16
1 GENERALITIES ........................................................................................................................... 21
1.1 1353NM 7.3 news Overview ................................................................................................ 21
1.2 1353NM activation................................................................................................................ 22
1.3 Role of the Administrator.................................................................................................... 23
1.4 Document Conventions....................................................................................................... 24
3 CONFIGURATION........................................................................................................................ 29
3.1 Preparing 1353NM Configuration ....................................................................................... 29
3.2 Configure the Patch STYL on 1353NM............................................................................... 30
3.2.1 Patch STYL Procedure ................................................................................................... 30
3.2.2 System Configuration ..................................................................................................... 31
3.3 Change the IP configuration ............................................................................................... 32
3.4 1353NM IP Configuration .................................................................................................... 33
3.4.1 Routing Configuration ..................................................................................................... 33
3.4.2 Multi-Lan configuration ................................................................................................... 42
3.5 1353NM Configuration......................................................................................................... 44
3.5.1 System Tuning ................................................................................................................ 45
3.5.2 Configure specific NMAs ................................................................................................ 49
3.5.3 Configuring 1353NM Element Manager Layers of type SGM and MELOSNMP ............ 53
3.5.4 Configuring OSI GATEWAY ............................................................................................ 54
3.5.5 Execute the configuration ............................................................................................... 57
3.5.6 WA after System Configuration for MDR 8000 Rel.2.0 NEs Management ..................... 59
3.5.7 Removing a previously configured process from the Subsystem configuration ............. 59
3.6 1353NM Master and Client Integration............................................................................... 60
3.7 Process Monitoring ............................................................................................................. 61
3.7.1 Groups of Processes ...................................................................................................... 62
3.7.2 Run Levels...................................................................................................................... 65
4 USER MANAGEMENT................................................................................................................. 67
4.1 User Profiles Description .................................................................................................... 67
4.1.1 The Access control model .............................................................................................. 67
4.1.2 OADs and FADs ............................................................................................................. 71
4.1.3 Administrator, Operator, Viewer profiles configuration.................................................... 72
4.1.4 Constructor profile configuration ..................................................................................... 73
4.1.5 Default User Profiles ....................................................................................................... 74
4.1.6 Customizing User Profiles .............................................................................................. 75
4.1.7 An example of management of OAD, FAD, and OAD-FAD ............................................ 81
4.1.8 Creating new Profiles...................................................................................................... 89
4.2 Macro functionalities related to user profiles ................................................................... 91
11 MAINTENANCE.......................................................................................................................... 203
11.1 Generalities......................................................................................................................... 204
11.2 Preventive Maintenance .................................................................................................... 205
11.3 Corrective Maintenance..................................................................................................... 209
11.4 Maintenance operations .................................................................................................... 216
12 TROUBLESHOOTING................................................................................................................ 225
13 PROCEDURES........................................................................................................................... 241
13.1 Failure management .......................................................................................................... 241
13.2 Upload failure ..................................................................................................................... 243
13.3 Advanced network management...................................................................................... 247
Preliminary Information
WARNING
ALCATEL makes no warranty of any kind with regards to this manual, and specifically disclaims the
implied warranties of merchantability and fitness for a particular purpose. ALCATEL will not be liable
for errors contained herein or for damages, whether direct, indirect, consequential, incidental, or spe-
cial, in connection with the furnishing, performance, or use of this material.
NOTICE
The product specification and/or performance levels contained in this document are for information
purposes only and are subject to change without notice. They do not represent any obligation on the
part of ALCATEL.
COPYRIGHT NOTIFICATION
The technical information of this manual is the property of ALCATEL and must not be copied, repro-
duced or disclosed to a third party without written consent.
TECHNICAL SUPPORT
Please contact your Local Alcatel Technical Assistance Center for questions reffered to the infor-
mation contained in this document.
To send your comments about this handbook please follow the indication on Customer Documentatio
Feedback on page 269.
Scope
This document aims to describe all tools and procedures the System Administrator is provided with in
order to manage the resources of the 1353NM system itself.
The documents that should be read before starting this document is:
01 September 2006 First validated and officially released issue of this Handbook
Related Documents
The list of handbooks given here below is valid on the issue date of this
Handbook and can be changed without any obligation for ALCATEL to
update it in this Handbook.
Some of the handbooks listed here below may not be available on the
issue date of this Handbook.
The standard Customer Documentation in the English language for the equipment whose product–
release–version is stated in “Applicability” on page 12 consists of the following handbooks:
In particular refer to such handbooks to obtain the following information (where applicable):
This handbook is divided into the main topics described in the table of contents:
The technical contents of the document is mainly divided into two parts.
A "product" is defined by the network hierarchical level where it can be inserted and by the whole of per-
formance and services for which it is meant.
A "product" evolves through successive "product–releases" which are the real products marketed for
their delivery at a certain "product–release" availability date.
So, a "product-release" defines a set of hardware components and a software package which, as a whole,
identify the possible network applications and the equipment performance which the specific "product–
release" has been designed, engineered and marketed for.
In some cases a "product–release" has further development steps, named "versions", that are born to
improve or add some performance (mainly software) with respect to the previous version, or for bug fixing
purposes.
A "product–release" has its own standard Customer Documentation, composed by one or more hand-
books.
A new "version" of a "product–release" may or may not produce a change in the status of the Customer
Documentation set, as described in “Handbook Updating” following part.
Handbooks are not automatically delivered together with the equipment they refer to.
The number of handbooks per type to be supplied must be decided at contract level.
Standard hardware and software documentation is meant to give the Customer personnel the possibility
and the information necessary for installing, commissioning, operating and maintaining the equipment
according to Alcatel Laboratory design choices.
In particular: the contents of the handbooks associated to the software applications focus on the expla-
nation of the man–machine interface and of the operating procedures allowed by it; maintenance is
described down to faulty PCB location and replacement.
Consequently, no supply to the Customers of design documentation (like PCB hardware design and pro-
duction documents and files, software source programs, programming tools, etc.) is envisaged.
The handbooks concerning hardware (usually the "Technical Handbook") and software (usually the
"Operator's Handbook") are kept separate in that any product changes do not necessarily concern their
contents.
For example, only the Technical Handbook might be revised because of hardware configuration
changes (e.g., replacing a unit with one having different P/N but the same function).
On the other hand, the Operator's Handbook is updated because of a new software version but which
does not concern the Technical Handbook as long as it does not imply hardware modifications.
However, both types of handbooks can be updated to improve contents, correct mistakes, etc..
The handbooks associated to the "product-release" are listed in “Related Documents” on page 13.
The edition and date of issue might change on future handbook versions for the following reasons:
– only the date changes (pointed out in the Table of Contents) when modifications are made to the edi-
torial system not changing the technical contents of the handbook.
– the edition, hence the date, is changed because modifications made concern technical contents. In
this case:
• the changes with respect to the previous edition are listed in History on page 13.;
• in affected chapters, revision bars on the left of the page indicate modifications in text and draw-
ings.
Changes concerning the technical contents of the handbook cause the edition number increase (e.g. from
Ed.01 to Ed.02). Slight changes (e.g. for corrections) maintain the same edition but with the addition of
a version character (e.g. from Ed.02 to Ed.02A). Version character can be used for draft or proposal edi-
tions.
Moreover, should the screen prints included in the handbook contain the product–release's
"version" marking, they are not replaced in the handbooks related to a subsequent version, if
the screen contents are unchanged.
Supplying updated handbooks to Customers who have already received previous issues is submitted to
commercial criteria.
By updated handbook delivery it is meant the supply of a complete copy of the handbook new issue (sup-
plying errata-corrige sheets is not envisaged).
A new product version changes the handbook P/N and the edition starts from 01.
In this case the modified parts of the handbook are not listed.
In most cases, a CD-ROM contains in read-only eletronic format the documentation of one product-
release(-version) and for a certain language.
In some other cases, the same CD-ROM can contain the documentation of different product-release(-ver-
sion)s for a certain language.
As a general rule:
• the documentation of system optional features that Customers could not buy from Alcatel
together with the main applicative SW.
• the documentation of system optional features (e.g. System Installation Handbooks related to
racks that Customers could not buy from Alcatel together with the main equipment).
A CD-ROM is obtained collecting various handbooks and documents in .pdf format. Bookmarks and
hyperlinks make the navigation easier. No additional information is added to each handbook, so that the
documentation present in the CD-ROMs is exactly the same the Customer would receive on paper.
The files processed in this way are added to files/images for managing purpose and a master CD-ROM
is recorded.
After a complete functional check, the CD-ROM image is electronically transferred to the archive of the
Production Department, so that the CD-ROM can be produced and delivered to Customers.
The CD-ROM starts automatically with autorun and hyperlinks from the opened “Index" document permit
to visualize the .pdf handbooks
Other hyperlinks permit to get, from the Technical handbooks, the specific .pdf setting documents.
In order to open the .pdf documents Adobe Acrobat Reader Version 4.0 (minimum) must have been
installed on the platform.
The CD-ROM doesn't contain the Adobe Acrobat Reader program. The Customer is in charge of getting
and installing it.
ReadMe info is present on the CD-ROM to this purpose.
Then the Customer is allowed to read the handbooks on the PC/WS screen, using the navigation and
zooming tools included in the tool, and to print selected parts of the documentation through a local printer.
2) and, internally, by the list of the source handbooks and documents (P/Ns and editions) by
whose collection and processing the CD-ROM itself has been created.
CD-ROM updating
The list of source handbook/document P/Ns-editions indicated in previous para. point 2) , in association
with the CD-ROM's own P/N-edition, is also loaded in the Alcatel-Information-System as a structured list.
Whenever a new edition of any of such handbooks/documents is released in the Alcatel archive system,
a check in the Alcatel-Information-System is made to identify the list of CD-ROMs that must be updated
to include the new editions of these handbooks/documents.
This causes the planning and creation of a new edition of the CD-ROM.
Updating of CD-ROMs always follows, with a certain delay, the updating of the single handbooks com-
posing the collection.
Another incentive to the development of the OS-Kernel comes from observing the growing size of the serv-
ers and workstations. The machines become very big and consequently expensive, so it is necessary to
optimize their utilization in order to obtain a good ratio between the hardware bought and the systems
installed.
The aim of the OS-Kernel is to provide a common building block of the Network Management architecture.
On the other side the NM Products (1353SH, 1354RM, 1353SN, ...) will be split in components and appli-
cations, so the final result is that a product is a collection of components and applications. On this common
block the NM Products will be assembled fitting the applications and components needed on the OS-Ker-
nel platform.
Up till now difficulties must be faced when installing different product instances (typically NM OS) on the
same workstation (co-hosting).
Common resources used by OS applications are duplicated , conflicts may rise due to different require-
ments for the application customization, etc.
The modularity offered by OS-Kernel permits to install on a hardware platform a single product or several
different products, as well as different instances of the same product.
• Process Management
• Subsystem Configuration
TMN OS application is the box containing and managing all the NM Subsystems customized on a single
physical machine.
TMN OS Icon
Select TMN OS icon as shown in the previous figure to start TMN OS application. The TMN-OS Man-
agement Window will be shown in a few seconds, you have to select the 1353NM instance you want to
manage.
• logs management,
• trace management,
• backup/restore operations,
• to minimize the failures consequences and to be able to start up the system as quickly as pos-
sible in case of power supply failure for example,
> date ↵
The system responses in general will be displayed as a window hardcopy as shown in the following figure.
The commands provided to the SDH Manager administrator are available into the Administration toolbox
available in the desktop. Most of them can also be accessed through a shell command (for users of sysad-
min group).
selecting from TMN-OS menu OS | --> System Information or pressing the icon on the menu bar.
The following window will be displayed with all information about the selected Subsystem Instance.
Following paragraphs describe how to configure the Master instance of 1353NM Subsystem.
The alias name of the interface MUST BE different from the hostname. The sug-
gested name is: osilan<lan number>, where <lan numer> should be substituted
with the lan logical number. This method allows also to easy identify the lan card with
Retix Stack configured.
When the lan interfaces have been configured by SAM application, you have to remove the unnecessary
reference to hostname added by SAM into the /etc/hosts (excluding the lan0) for new IP Address definition
line.
For example, if you configure the lan1 of hosta to address 192.200.200.21 with alias osilan1, SAM will
add the following new line in /etc/hosts:
192.200.200.21hosta osilan1
Important : If the patch STYL should be configured you have to apply the Workaround
described in following paragraph before customizing 1353NM Subsystem (paragraph
3.5.2.7 on document “1350NM Management Suite NR7.1 Installation Guide” Ref.[3]).
Refer to ”Patch styl procedure” section.
The so–called Patch STYL is present in order to manage some QB3* equipment (1651,1661). Normally
this is the case of previously migrated (from NR3.1B, for example) networks containing QB3* equipment.
This patch is associated with emlimadmnr31. Otherwise emlimadmnr5qb3 is present to manage QB3*
1651 and 1661 equipment and, eventually the emlimadmnr31 for the others QB3* equipment.
Important! This configuration forces the old emlimadmnr31 to manage 1651SM and 1661SMC instead of
the new emlimadmnr5qb3–process, and thus it will not be possible to use the features supported by this
process.
In this section the patch STYL will be configured on 1353NM NR7.4 machine.
The patch STYL configuration will be completed by the correct setting in the System Configuration phase.
During System Configuration the Sh_Subsytem component should be selected in order to set the param-
eter PATCH_STYL to the value TRUE as shown in following figure
HP-UX default IP protocol configuration has to be changed to allow the correct communication between
1353NM and NE via SNMP, in the following of this paragraph is described how to change it permanently.
In order to change permanently the IP parameter “ip_pmtu_strategy" you have to login the HP-UX as root
user. The parameter “ip_pmtu_strategy" should be forced to value “0" (zero), you have to proceed as
described below:
b) Usually only “TRANSPORT_NAME[0]=tcp" is defined, in this case add the following three lines to
the file “/etc/rc.config.d/nddconf" , otherwise if there is no TRANSPORT_NAME defined replace
value 1 between square brackets with value 0, if there are more than one “TRANSPORT_NAME"
lines defined replace value 1 between square brackets with a value greater than the higher value
defined:
TRANSPORT_NAME[1]=ip
NDD_NAME[1]=ip_pmtu_strategy
NDD_VALUE[1]=0
Save and exit from the file typing :x! and press [Enter].
The new value will be assigned to the parameter after the next reboot. It is advisable to verify the
“ip_pmtu_strategy" value after the next reboot by entering the command:
The output of the command should be “0" (zero), if it is still “1" review the contents of “/etc/rc.config.d/
nddconf" file.
If the next reboot is not planned in a short time, and you have to change the “ip_pmtu_strategy" parameter
immediately, you can do it entering the following command:
Within the current network release there are two cases in which the IP routing is necessary to guarantee
the correct behavior of 1353NM:
N.B. If any system is MC/Service Guard protected via 1359HA_OSCluster, the routing configuration must
be done also on the spare node.
To be able to reach the ISA boards from both Element manager and USM the correct IP routing has to
be configured, in fact the ISA boards are always in a different subnetwork, that means it is necessary to
specify in a configuration file how to reach the destination.
The configuration file depends on the routing you have to use. There are two different type of routing:
1) Static routing
2) Dynamic routing
The static routing is easy to configure, and has no impact on the TCP/IP networking, but in case of failure
of the gateway the destinations will became unreachable. Vice versa, using the dynamic routing, with an
appropriate configuration it is possible to guarantee the service also in case of single failure.
FOR BOTH ROUTING METHOD IT IS MANDATORY THAT THE NETWORK MASK (NETMASK) IS
THE SAME FOR ALL INTERFACES BELONGING TO THE SAME SUB-NETWORK.
If different values of the netmask are set on the interfaces the communication are not guarantee
and the DYNAMIC ROUTING CANNOT BE ABLE TO OPERATE.
To allow the communication between 1353NM systems and the ISA boards with static routing you have
to declare with route command the gateway to get to the destination. The information that have to be
identified are: the network that has to be reached and the gateway.
The network is defined by an IP address ISA Board and a netmask. This information has to be defined
by the Network Addressing Plan. In our case we are interested to identify the network containing ISA
Boards that have to be managed by our Network Management system.
The gateway is a machine that allows getting to the destination ISA Board; it can depend on the network
topology.
For configuring the static routing the route command is used, it allows declaring the network where the
ISA boards are located and the relationship with the gateway. Following command drives the system to
choose the way to the destination:
Where:
<mask> is the mask where the bit set to 1 identifies the part of address related to the net-
work, and the bit set to 0 identifies the host in the address.
<gateway> is the IP address of the router or ADM GNE that allow to get to ISA Board.
When the right configuration is reached, in order to save it after system reboot, you have to add following
lines to the file "/etc/rc.config.d/netconf":
ROUTE_MASK[<x>]=<netmask>
ROUTE_GATEWAY[<x>]=<gateway>
ROUTE_COUNT[<x>]=1
ROUTE_ARGS[<x>]=""
Where:
<x> is the last defined "ROUTE_DESTINATION" number plus one, or 0 (zero) if the is no
route destination defined yet.
<mask> is the mask where the bit set to 1 identifies the part of address related to the network,
and the bit set to 0 identifies the host in the address.
<network> is the IP network address (Logical AND IP address of node and netmask)
<gateway> is the IP address of the router or ADM GNE that allow to get to ISA Board.
Save and exit from the file typing :x! and press [Enter].
Add a new routing destination to the routing table (editing the /etc/rc.config.d/netconf file) for
each new network defined for ISA Board.
The example in Figure 8. shows how to configure 1353NM machines with a typical configuration, where
you have the 1353NM Master and the NM Client Function that can be performed by 1353NM Client sys-
tems, but also by 1354RM Master and/or Presentation ones.
To configure the NM Master (lan0 IP 10.2.1.7 , lan1 IP 10.3.7.5) to be able to reach the ISA Board it is
necessary to define the gateway to reach the network where the ISA board is located. In the example the
ISA board is reached via a Gateway Network Element (GNE) , that means the IP address of the GNE will
be used as gateway (in other configuration the gateway can be a router).
The ISA board network can be identified by executing the logical AND between the IP address of the board
and its netmask:
IP address 10 61 4 33
logical AND
----------------------------------
network 10 61 0 0
Check the network connectivity by executing a ping command from NM Master to ISA Board:
You can use the command netstat -r to verify the routing table contents.
When the right configuration is reached, you have to add the configuration lines shown in the paragraph
1.2.1.1 at page 8 to the file "/etc/rc.config.d/netconf".
This configuration has a disadvantage, when the gateway GNE fails, the ISA board becomes unreach-
able. To recover the failure it is necessary to modify the routing table removing the route via failed GNE
(IP address 10.3.7.6) and set up a new one via the alternative GNE (IP address 10.3.7.7).
NM Client function comprises all the machines that run 1353NM USM, including 1354RM and 1354SY.
The NM Client Function (IP 10.2.1.7) should be able to reach the ISA board (IP 10.61.4.33) to correctly
perform its job. In the example this occurs via NM Master and GNE. In other configuration you can find
NM Client Function machine sharing the same LAN with the GNE or with a router, in any case it is nec-
essary to identify the gateway for the next LAN segment, it will have the task to send the packet forward
to the destination system.
In the example the configuration have to be done defining the lan0 of NM Master as gateway. To obtain
this behavior you have to enter following command on the NM Client Function system:
Check the network connectivity by executing a ping command from NM Client to ISA Board:
Be careful: The ping can fail because NM Master is not yet configured to forward the packages.
When the right configuration is reached, you have to add the following configuration lines to the file "/etc/
rc.config.d/netconf".
ROUTE_MASK[<x>]=<netmask>
ROUTE_GATEWAY[<x>]=<gateway>
ROUTE_COUNT[<x>]=1
ROUTE_ARGS[<x>]=""
Where:
<mask> is the mask where the bit set to 1 identifies the part of address related to the net-
work, and the bit set to 0 identifies the host in the address.
<network> is the IP network address (Logical AND IP address of node and netmask)
<gateway> is the IP address of the router or ADM GNE that allow to get to ISA Board.
Save and exit from the file typing :x! and press [Enter].
When the 1353NM is configured with OS-Cluster (MC/Service Guard) it is necessary to configure also the
spare server, in order to allow the correct routing when the switchover occurs. All the network added to
the routing table of the 1353NM main instance MUST be added also to the spare machine.
For example, if you have an OS-Cluster with two 1353NM and a spare system, and in the network con-
figuration file (/etc/rc.config.d/netconf) of the two 1353NM you have:
N.B. In the example the default gateway it is not mentioned, so the route descriptions are shown
starting from 1.
The first 1353NM have to manage Network Elements in the subnetworks 10.61.0.0 through the router
10.3.7.6 and 10.62.0.0 through the router 10.3.7.7.
ROUTE_DESTINATION[1]="net 10.61.0.0"
ROUTE_MASK[1]=255.255.0.0
ROUTE_GATEWAY[1]=10.3.7.6
ROUTE_COUNT[1]=1
ROUTE_ARGS[1]=
ROUTE_DESTINATION[2]="net 10.62.0.0"
ROUTE_MASK[2]=255.255.0.0
ROUTE_GATEWAY[2]=10.3.7.7
ROUTE_COUNT[2]=1
ROUTE_ARGS[2]=
The second 1353NM have to manage Network Elements in the subnetworks 10.63.0.0 through the router
10.3.7.6:
ROUTE_DESTINATION[1]="net 10.63.0.0"
ROUTE_MASK[1]=255.255.0.0
ROUTE_GATEWAY[1]=10.3.7.6
ROUTE_COUNT[1]=1
The spare system will have a description that have to include all of destinations:
ROUTE_DESTINATION[1]="net 10.61.0.0"
ROUTE_MASK[1]=255.255.0.0
ROUTE_GATEWAY[1]=10.3.7.6
ROUTE_COUNT[1]=1
ROUTE_ARGS[1]=
ROUTE_DESTINATION[2]="net 10.62.0.0"
ROUTE_MASK[2]=255.255.0.0
ROUTE_GATEWAY[2]=10.3.7.7
ROUTE_COUNT[2]=1
ROUTE_ARGS[2]=
ROUTE_DESTINATION[3]="net 10.63.0.0"
ROUTE_MASK[3]=255.255.0.0
ROUTE_GATEWAY[3]=10.3.7.6
ROUTE_COUNT[3]=1
ROUTE_ARGS[3]=
Using 1353NM with multistack option require some more configuration actions to allow the correct com-
munication between Client and Master applications. In fact they have to communicate each other within
an environment where the Retix Stacks can be installed on the 1353NM Master system, and they can be
instanced for each LAN card equipped on the system. The Client application can be installed on 1353NM
Master and Presentation and also on 1354RM IM and US. To allow the correct behavior of all the installed
applications in the configuration you have to configure the communication among all the LAN cards
involved.
For Retix Stacks instances on lan0 card no additional configuration action are required, because the con-
nectivity and/or the routing have to be guarantee to allow other communications.
For Retix Stacks instances on LAN different than lan0 the connectivity have to be created and verified.
The most common 1353NM configuration with multistack foresees two or more LAN cards each one con-
nected to a different LAN segment. This approach allows to share the traffic on different segments, and
some times is used to avoid mixing IP and OSI traffic.
When the Retix Stacks is configured on LAN board different than lan0, it is necessary to configure some
the routing table on 1353NM Client machine.
1) Systems in the same site partially sharing the same LAN segment
3.4.1.2.1 Systems in the same site partailly sharing the same LAN segment
This scenario is related to machine sharing the same LAN segment with lan0, but LAN different than lan0
are not connected with. In this scenario, using the internal routing of HP–UX system can set up the com-
munication that means the packets from lan0 of the NM Client will reach the lan1 of the NM Master passing
through lan0 of NM MAster itself.
To obtain this behavior you have to enter the following command on the NM Client system:
..,sys,root # route add <IP address lan1 SHM> <IP address lan0 SHM> 1 [Enter]
When the right configuration is reached, in order to save it after system reboot, you have to login the HP–
UX as root user, then you have to add the following three lines to the file "/etc/rc.config.d/netconf":
ROUTE_COUNT[<x>]=1
Save and exit from the file typing :x! and press [Enter].
Where:
IP address lanx NM Master is the IP address of the lan different than lan0 that have to reached
passing through lan0.
IP address lan0 NM Master is the IP address of lan0 of the 1353NM Master system
N.B. Before proceed with modifying the /etc/rc.config.d/netconf it is advisable to make a copy of the
original file, by entering (as root): cp /etc/rc.config.d/netconf /etc/rc.config.d/netconf.orig
In this configuration all the involved router have to be configured to route IP protocol and allow the com-
munication among all the lan cards.
The last scenario is related to machine connected to different LAN segments, where only the lan0 of these
segments are connected via IP routers. In this scenario it is necessary to use the internal routing of HP-
UX system to be able to set up the communication. Be careful that on the router connected with NM master
lan0 (Router 2 in the picture) you have to configure the NM Master system as next hop to reach the lan1.
When 1353NM Subsystem is installed with HP-UX 11.11 all the lan present in config-
uration MUST BE CONFIGURED with an IP address, also if they will not be used. This
rule applies to Master and Presentation systems.
Starting from 1353SH 6 it is possible to use Retix stack on more than one lan board, every lan board used
have to be configured with an appropriate TCP/IP address. Usually the lan0 is automatically configured
by HP-UX Operating System in the installation phases, but other lan have to be configured as well.
1) No other machine connected to the Local Area Network has the same IP address .
2) There is no board already configured on the same machine with an IP address belonging to the
same subnetwork.
3) The first and the last address of each subnetwork is reserved.
4) The network 127.0.0.0 is forbidden.
The first rule means that all the used IP address have to be defined in a specific addressing plan, usu-
allyprovided by the customer.
The second rule is due to the Unix routing mechanism, if there are two lan board belonging to the same
subnetwork on the same system, the routing process is not able to define which is the way to send out
the messages, and the communications will be stopped.
To identify the subnetwork of an IP address you have to perform the local AND between the IP address
and the netmask.
Example:
This example shows two addresses that look similar but belong to different networks.
IP address 192.1.1.1 with netmask 255.255.255.0 -> Subnet 192.1.1.0
IP address 192.1.2.1 with netmask 255.255.255.0 -> Subnet 192.1.2.0
This example shows two addresses that look different but belog to the same network.
IP address 10.1.2.32 with netmask 255.0.0.0 -> Subnet 10.0.0.0
IP address 10.22.198.2 with netmask 255.0.0.0 -> Subnet 10.0.0.0
The best way to check the relationship between IP Address and netmask is to enter the command “ifcon-
fig" for each lan board and check the value of broadcast. The values have to be different.
Example:
<mask> the mask where the bit set to 1 identifies the part of address related to the network,
and the bit set to 0 identifies the host in the address.
Where:
<mask> the mask where the bit set to 1 identifies the part of address related to the
network, and the bit set to 0 identifies the host in the address.
<gateway> IP address of the router or ADM GNE that allows getting to ISA Board.
Save and exit from the file typing :x! and press [Enter].
A new routing destination have to be added to the routing table (editing the/etc/rc.config.d/netconf
file) for each new network defined for ISA Board.
It is strongly raccomended avoiding the use of “axadmin" user to startup 1353NM sessions.
The OS Default Administrator to be used is “alcatel", if needed, additional operators can
be defined by using SMF.
TMN OS Icon
The 1353NM “System Configuration" window will be built and shown on the screen. Clicking on all the right
column items to include them in the configuration:
Don't select QB3S_Simulator item (see paragraph 3.5.1.1 at page 48 for more informa-
tions):
System Configuration is the generic way to configure processes in a System instance. The processes are
configured into groups. A group of processes is called entity. This grouping is meant to configure in a single
step processes that have the same configuration properties. The group definition is a System (NMS) con-
figuration property. Each NMA has a specific configuration file to configure its processes; this configuration
file contains specific data and parameters.
• Define a static list of processes that can belong to the System Instance;
• Define a variable list of processes that can have multiple instances inside the System Instance;
The list of processes on the left contains the system processes that can have multiple instances. Pressing
the arrow button the process is put in the static list of processes on the right adding an instance number
to the process.
The static list on the right contains the processes that can't have multiple instances and the processes
chosen from the list on the left and instanced.
The selected processes listed in the static list of processes will be system instance processes.
Selecting “System_Tuning" item the following window will be shown, leave the default values (100 and
30) then pull down the “Action" menu and select “Apply & exit".
Selecting the “PMDS_DB_SubSystem" a communication window is open asking you to specify if you
want to create a new database or keep the old one. If you are installing for the first time choose “NEW".
You must execute this step only under Alcatel development supervision.
Selecting “QB3S_Simulator" item the following window will be shown, leave the default value (simulator)
then pull down the “Action" menu and select “Apply & exit".
The entity System_Mgt_Functions is listed in the component list and represents the well known SMF
(System Management Functions). Its selection is manadatory.
Each lan interface that is configured to be used as retix Retix Stack has to be configured following this
paragraph instruction. First of all you have to create the four new items for the stack instance in the Sub-
System List column.
b) Write the lan interface identification number in the “Identifier Input Field" (see Figure 15.at page 45).
c) Click on “Arrow Button" in the center of the window to create the new item.
Entering the data for the Retix you have to specify the LAN card identity in the “LAN_ID" selector menu,
by selecting the first LAN card you want to devote to Retix stack. NOTE: The specified lan MUST BE
CONFIGURED with an IP Address and described in the /etc/hosts file.
Then you have to specify the “SUPERVISION_AREA" by entering a symbolic name, this name will be
used as host alias that means it has to follow the host alias naming rules:
– No space and/or special character are allowed, except “_" .
– No more than eight character.
Enter in the “SYSTEM_ID", “AFI", “IDI", “ORGANIZATION_ID", “AREA", “SEL" in agreement with the
Customer Addressing Plan.
N.B. The window is shown in two parts because there is no way to show all its contents in one shot.
The stack should be configured on all defined lans, also in case only snmp emlin will be configured
on a specific lan. The configured stack identifies the supervision area where emlims are allocated.
This supervision area is used during creaztion of NEs in PNM application.
Configure the Equipment Time synchronization you have to add the “Antp_n" process. The following win-
dow will be shown to allow the “SUPERVISION_AREA" set-up for the Antp, IT MUST BE THE SAME
DEFINED FOR THE RELATED RETIX STACK.
Then pull down the “Action" menu and select “Apply & exit".
Configure the File Transfer by click on both item “FTserver_n" and“FTclient_n". Their configuration is like
the “Anpt" one, for each one of them, you have to enter the number of the related “Necom_SubSsystem"
by setting up the “SUPERVISION_AREA", IT MUST BE THE SAME DEFINED FOR THE RELATED
RETIX STACK.
Then pull down the “Action" menu and select “Apply & exit" from each one of them.
When all the foreseen Retix Stack instances have been predisposed for configuration, you can choose
which Network Element Managers (EM) you want to configure choosing one item shown in “System Con-
figuration" window left column (Figure 15. at page 45), select it by making a click with the mouse selection
button (the Item color will be changed from grey to blue in order to highlight it), then select the “Identifier
Input Field" and enter the EM identifier by keyboard.
The EM identifier value MUST be a value between <1354NM Instance Identifier>*100 and <1354NM
Instance Identifier>*100+99. If 1354NM Instance Identifier has been set to 2 the value must be
between 200 and 299. The 1354NM Instance Identifier is the value entered predisposing and cus-
tomizing the instance iduring installation phase.
Then click on the “Arrow Button". If you enter an out of range value one of the following window will be
displayed, and the request rejected.
If the request is accepted a new item will be shown in the right column, with the EM name followed by “_"
and identifier number. To include the created item in the configuration click on it, and the following window
will be shown:
The window allows to assign the Element Manager to a specific Retix Stack instance. Clicking on button
under label “SUPERVISION_AREA" the possible Retix Stack instance will be shown, select your choice
and apply it by pulling down the menu “Action" and selecting “Apply & exit".
For each Retix stack it is also possible to configure also same additional services, such as:
The emlims managing this type of NEs has a different configuration, not only the “SUPERVISION_AREA"
parameter should be configured, but also the parameter UDP_PORT as shown in the following figure :
The UDP_PORT number parameter should be a number greater than 1024 because the previous port
number are reserved for 'root' user, the only other rule to follow is to assign different port numbers to dif-
ferent emlims.
The configuration of the OSI Gateway inside 1353NM R7.x is described in this paragraph.
Selecting OSI_GATEWAY in the System_Sublist on the left of the System Configuration window, the win-
dow used to configure the OSI Gateway specific parameters will be displayed.
The external managers use these parameters to open the association with the OSI Gateway inside the
1353NM Subsystem. The definition of the above parameters is the following:
• SUPERVISION AREA: is necessary to associate the OSI Gateway to the right Lan.
• EMLENTITYNSAP: Network Address associated to the OSI Gateway: this parameter must be
inserted in RFC1006 format (the right mode to insert this format is shown in the Appendix).
• MGR_CONNECT_TYPE: this parameter defines the connection type of OSI Gateway Manager
and must be set = SOCKET.
• AGT_CONNECT_TYPE: this parameter defines the connection type of OSI Gateway Agent
and must be set = RETIX.
• STACK: this parameter defines the type of stack for OSI Gateway and must be set = RFC1006.
• MGR_AETITLE: this parameter defines the OSI Gateway AETITLE and must be set = "default
value" 2.9.3.2.7.5 .
When all parameters are inserted choose Apply from the Actions menu.
0x540072872203121002003023
where:
If the configuration of the device used by OSI Gateway is a Multistack Retix configuration, it is necessary
"to inform" the Manager that it will lock the OSI Gateway by a Retix instance waiting on a different port
from the standard one (102). Therefore, the RFC1006 address to utilise will be always that configured in
preceeding paragraph; however, the information on the port to be used must be added: with an IP address
= 121.2.3.23, the corresponding OSI RFC1006 address will be: 0x540072872203121002003023 with
Retix instance operating on 1033 port, the OSI address by which the Manager identifies the OSI Gateway
will be as follows:
0x540072872203121002003023010330001
where:
Entity PSAP, Entity SSAP, Entity TSAP selectors will not change and they will be however inserted, as
described in the previous paragraph.
When all the Element Managers and Services are assigned to the Retix Stack(s), the System Configu-
ration can be executed pulling down the “Main" menu and selecting “Update Config" item.
The configuration script start issuing a window with the execution traces. please ignore the warning and
error messages shown in following windows:
Reading /usr/Systems/1353NM_1/Kernel/data/ProcessList.cfg
Reading /usr/Systems/1353NM_1/PMC2/conf/pmc2im.cfg
Writing /usr/Systems/1353NM_1/tools/process/conf/processconfig.cfg
Using /alcatel/Kernel/lib/lib_perl5.6.1/blib
At the end of procedure, copy (by ftp) on each Client instance (if any) the following file:
3.5.6 WA after System Configuration for MDR 8000 Rel.2.0 NEs Management
If 1353NM Subsystem manages NEs of type MDR 8000 Rel.2.0 following operations should be done after
System Configuration, to be able to start NE Supervision.
A line must be changed in file param.cfg, the file corresponding to snmp emlim.
find in the file the parameter named CSNMP_CHECK_TYPE_AND_RELEASE and change the value
from TRUE to FALSE. Save and exit. Now the NM Subsystem can start.
The procedure described in this section is clearly an exception, but nevertheless we describe it to warn
from a different behavior. If a process correctly configured and running for the 1353NM Subsystem should
be for any reason removed from the configuration, this process must be previously stopped using PMC
application.
• PMC windows appear, select the process to remove and from PMC menu select Actions -->
Stop --> Selected Item
• when the process appeared as stopped, go back to TMN OS menu and select OS --> System
Config
• select the process to remove in the process list on the right (the process change the color from
blu to grey, now select from menu Main --> Update Config
When the Process Monitoring option is selected on TMN OS window, the following window appears:
PMC component divides the managed processes in functional groups and the user can start or stop the
functional groups independently. The sequence of start and stop operations is conditioned by a depen-
dence implemented by the PMC between the functional groups.
neadnmsrv_<lan_0>_0 NE AutoDiscovery
NMS Run Level is a Unix Run-Level similar concept, that lets consider the system to be in a run level at
any given time. A run level can be viewed as a software configuration of the subsystem, where each con-
figuration allows only a selected group of processes to exist.
SEC is the generic component integrated on OS-Kernel platform which implements access control in con-
juction with the applications for which access control is activated (EMLUSM, DNM, PNM, AS, SMF).
The access control is a set of methods and related data aiming at deciding, in quite general terms, whether
someone can do something.
• do something means performing a given operation, such as for example, invoking a specific
com- mand of the considered application.
An operator working at his/her station is called an initiator. The operation to be performed is called a tar-
get. The definition of the access control policy consists in declaring initiators and targets, and then asso-
ciating targets to initiators.
Clicking on TMN OS menu Actions --> 1353NMAdmin the System Management menu will be displayed
(see Figure 35.).
This action displays the System Management selection window as shown in the following figure :
This window allows to access SEC Administration. Selecting the corresponding row, SEC USM Browser
is displayed as shown in the follwing figure.
The access control model of SEC is based on the notions of object, function, and object-function com-
bination.
The list of functions and object families is determined at application design time. The set of objects may
vary along the use of the Network Management system. A set of predefined objects may be created at
configuration or installation time (e.g. the Unknown object). Creation of some other objects will result from
the direct operation of a SEC administrator, through the ACA tool (e.g. ACDs). Other ones will be created
by applications on the direct initiative of an operator (e.g. distributed maps, new operators). Anyway, the
creation of a new object in the Access Control Information database is always notified to a user of the ACA
tool.
Functions
A function may directly map to an atomic feature of an application, such as a specific command corre-
sponding to a menu item or a dialog box button. It may also correspond to a group of such basic features,
when it appears impossible or difficult to distinguish them from an access control point of view. Symmet-
rical features, for example, such as Start_supervision and Stop_supervision in a PNM menu, will generally
be grouped in the same function, as one of these features may hardly be granted, while the other is denied.
The definition of these functions is not under control of the SEC administrator. The list of functions of an
application is determined when designing this application. The SEC administrator will access this func-
tions list and, starting from it, will associate access rights to the initiators. Note also that some commands
or operations of an application may not be mapped to a function. The list of functions may represent only
a subset of the application features. For example, if a command is designed to be always available to any
operator, there will not be a corresponding function in the list.
Object-Functions Combinations
A combination is the association of an object and a list of functions applying to this object. Using combi-
nations can make the definition of policies easier where, for a given object, the list of operations that can
be performed on this object varies with the operator. Though they are actual components of the profiles
(see later), object-functions combinations are not visible, in the ACA context, at this elementary level.
Actually, they are implicitly defined by the combination of an OAD (which groups objects) with a FAD
(which groups functions). These notions are introduced in the following sections.
Introducing OS-Kernel common platform has changed also the users profile management.
Functional Access Domain and consequently the users profile management for OS-Kernel based sys-
tems is based on two level of configuration.
• First level : classification of each Generic Component function in one or more application FAD.
• Second level : Specific NMS association of these elementary application FADs to an Operator
Profile.
• constructor: can do everything on maps and NEs but he/she has disabled some administration
functions: for example he/she can't add or remove operators, he/she can't do backup and
restore;
• operator: he/she can create local maps and import saved maps; can manage NEs (Start/Stop
Supervision) but can't create NEs and can't manage the global inventory; he/she can't add or
remove operators, can't do backup and restore;
• viewer: can view the maps and create local maps , and has very few functions.
On creating a new operator through the Create User function, you are required to select one of the pre-
defined profiles shown above; predefined names and predefined profiles cannot be reconfigured.
SEC introduces the notion of Object Access Domain (OAD) to group objects. An Elementary OAD groups
objects. A Top Level OAD can group Elementary OADs. The objects may belong to several Elementary
OADs. Elementary OADs may belong to several Top level OADs. Moreover, any Elementary OAD may
be included in any Top Level OAD.
• Admin
• Operator
• Constructor
• Viewer
• They are designed to include, for each Generic Component, all functions needed for a coherent
use of Generic Component itself.
• They are common to all Generic Component (i.e., although each NMC can define its own dif-
ferent application FAD, the defined FAD are currently used in each SEC.cfg of various
NMC_INT), so that operation crossing more GC functions, are already in the same application
FAD.
Whole functions
admin
operator
constructor viewer
The Application FAD relation, shown in Figure 39. , is designed in such way to permit, for the Adminis-
trator, Operator and Viewer Operator Profiles, an immediate configuration, according to the following sim-
ple correspondence in NMS Profile.cfg:
Administrator Admin
Regarding Constructor Operator Profile, it can be noted that the constructor application FAD is not con-
centric.
That means that constructor application FAD (specified only for meaningful component) is not suitable to
build, used alone, the correspondent profile (as for admin, operator, viewer). On the other hand, this con-
structor application FAD doesn't oblige NMS to permit the Constructor to execute all the Operator duties.
It is therefore up to NMS to properly configure, in its own Profiles.cfg, the Constructor profile in one of these
ways:
– A pure constructor Profile, having, for other components, only viewer permission
• a list of OADs. The union of these OADs results in a list of objects. The Elementary OAD created
on the declaration of a new operator (with the same name) is automatically inserted in this list.
• a list of FADs. The union of these FADs results in a list of authorized functions.
A generic OAD can be assigned to a resource. An example of resource is a Network Element (NE); when
a NE is created the Operator can decide which ACD is assigned to the NE itself.
The Access Control Domain feature is used to control the access to NEs, enabling or disabling some
management functions.
By default only ACD Unknown exists; each default group (i.e. admin, constructor, operator, viewer) has
in his own Included targets the EleOad Unknown and the corresponding OAD-FAD <groupname>-
Unknown. Each initiator can manage NEs having ACD Unknown according to the default OAD-FAD of
the group of ownership.
For each application the system gives a set of default FADs. For example:
• PnmUsmAdmininstrator
• PnmUsmOperator
• PnmUsmViewer
• Administrator, this user is influenced by the ACD but he/she can modify the profile to manage
all the functions.
• Operator, this user can manage the visible NE but he/she cannot manage the Manager List and
the Board Domain. This kind of user cannot modify the SEC profile.
• Viewer, this user cannot configure anything on the visible NE but only explore and navigate.
This kind of user cannot modify the SEC profile.
– To create a new ACD, select on the left side of the SEC Browser OAD -> Object -> Create Object.
( see Figure 42.).
To define a new Object it's necessary to specify mandatory information ( Name, Family and System
Id ). It is also possible to set optional information ( type and additional information ). The Name is
used by ACA to manage the object, the Family to set the type of the OAD ( i.e. only AccessCon-
trolDomainFamily can be used by EMLUSM ), the OAD information defines the Elementary OAD
which can see in any case the resource ( i.e. NE in the Network Map ) with the new OAD.
In the example of Figure 43.obtained selecting OAD->Elementary OAD select the tabbed panel Cre-
ate Elementary OAD, ACD test_acd has been created by the operator “alcatel".
The ACD Unknown is always in the Excluded Objects for each initiator, because it's in the Included
Object for each default group ( see 4.1.5 ).
The System Fad in the Included targets is fondamental for the PNM Menu. By default
an operator inherits the SysFad of the group to which he/she belongs, and so the PNM
Menu that is displayed corresponding to the functions enabled for this SysFad, but if
you want that an operator belonging to viewer group has the PNM Menu of an admin
you've to put the SysFad Administrator in the Included targets of the operator.
From the function tree on the left of the window select FAD -> Application FAD, selecting the tabbed
panel Create Application FAD it is possible to define the FAD ( Function Access Domain ); it describes
the functions available for each kind of application which SEC supports.
– It's possible to create a new set of FAD ( for example in the application list for ASCurrentUsm in Fig-
ure 44.) .
It is possible to customize each FAD selecting the functions to be supported by the specific FAD. In
the example the left box contains the functions that are not assigned to the profile . This means, for
example, that if an operator has in the Access Rights the Sys FAD “Viewer" he/she can export alarm
information but can't apply other functions like Acknowledge Alarm.
• AsCurrentUsm
• AsHistoricalUsm
• EmlUsmATM
• EmlUsmATMV2
• EmlUsmATMV3
• EmlUsmPREAV1
• EmlUsmPREAV2
• EmlUsmDXC
• EmlUsmSH5ADM
• EmlUsmSH5DXC
• EmlUsmSH5MW
• EmlUsmSH5MWV2
• EmlUsmSH5MWV3
• EmlUsmSH5WDM
• EmlusmVC
• dnmusm
• emlusmmelosnmp
• EmlUsmSH30 qb3s
• EmlUsmSH31 qb3s
• EmlUsmSH5 qb3s
• pnmusm
It is possible to create a new System FAD; for example in this case Supervisor that contains only one
Application FAD in the Included Application FADs that is PnmUsmSupervisor.
The next step is to manage the new FAD profile ( PnmUsmSupervisor ) that has been created. It is
necessary to refer to the OAD-FAD concept (see 4.1.1).
– Selecting OAD-FAD combination on the left side of the SEC Browser window it is possible to define
the OAD-FAD combination ( see Figure 46.), this information describes which kind of functions ( FAD
) is possible to perform on a specific object ( OAD )
Using this interface it is possible to associate a set of FADs to an Elementary OAD, i.e. to define
which FADs are enabled to which OAD. If an operator has in his/her Access Rights this OAD-FAD
he/she can apply allowed functions for “admin" in the Included Objects of the Elementary OAD
“viewet".
So it is possible to create a new user that can perform only specific actions (FAD) on specific objects
(OAD).
In order to activate changes, like adding new OAD-FADs or elementary FADs to an operator, it is not
enough restarting the application or re-login. It's necessary to kill the lss process on all NM workstations
(via kill Unix command), the lss process automatically restarts.
In this chapter it is shown how to manage OAD, FAD and OAD-FAD, and some examples are given of
what it is possible to do with this objects and their relations.
A very important feature of Sec is the management of ACD, it is used to enable some oper-
ators to see some NEs on some ADC and to disable other to see them.
The System Fad in the Included targets is fondamental for the PNM menu.
By default an operator inherited the SysFad of the group to which he/she belongs, and so the PNM
Menu that is displayed corresponding to the functions enabled for this SysFad, but if you want that
an operator belonging to viewer group has the PNM Menu of an admin you've to put the SysFad
Administrator in the Included targets of the operator.
On the other hand if you want that an operator belonging to admin group has the PNM menu of a
constructor you've to put the SysFad Constructor in the Included targets of the operator.
It is very important to note that it is necessary to remove the SysFad that includes the
greather number of functions, for example in the previous SysFad Administrator has to
be removed and then to put SysFad Constructor, because domains the SysFad with
more functions allowed.
First of all it is important to underline that there is a difference between see an ACD and manage it.
• See an ACD means that in the PNM it is possible to see the NEs created on this ACD; and
selecting “NE info.." it is possible to see in the Access Control Domain area the name of this
ACD. But it is not possible to do operations on this ACD.
• Manage an ACD means that on the NEs created on this ACD it is possible to do for example
“Start and Stop Supervision“, or to set “NE Address", etc....
In this case the operator axadmin can see on the PNM map all the NEs created with ACD adm_dom, and
he/she can modify its ACD value by selecting the NeInfo Menu from PNM( see Figure 48.).
• It is necessary to add the OAD-FAD test_oadfad in the Acces Rights of the operator test so that
the operator test is an administrator in the ACD test_acd. (see Figure 49.) (in this way the oper-
ator can have the Included Functions of the System Fad Administrator for the Included Object
of the EleOad axadmin ).
Figure 49. Access Rights Definition of test with the OAD-FAD test_oadfad
In this case test can manage the NEs on the ACD test_acd.
If the ACD is changed from unknown to test_acd every Action admitted for the System
Fad Administrator is enabled.
By default an operator belonging to a group has a FAD defined for the unknown domain.
For each new ACD it is necessary to define the set of functions allowed on the ACD.
• A new operator testadm belonging to admin group is created by smf tools “Add Operator".
• By default the operator testadm has defined a FAD for the Unknown ACD.
• To allow testadm to manage the new ACD test_dom (with the functions allowed for admin
group) it is necessary to define a set of function allowed on this ACD.
• It is necessary to define an OAD-FAD where OAD is the new EleOad and the FAD is a SysFad
(in a reverse order) ; so the new OAD-FAD is admin-testadm.
• Then this new OAD-FAD has to be put in the Included targets of testadm.
• The conditions are the same of the example 3 but now the combination OAD-FAD is different.
• It is necessary create a new ApplicationFAD (in which there is not the possibility of managing
stack retix) and a new SysFad.
• The new ApplicationFAD is added in the smf Application, it is smfSHSmallAdmin that has all
functions of Administrator minus “StackCfg" that manage the Stack Retix:
• In this way it has been created a new operator that belongs to the admin group but that cannot
manage the stack retix.
From SEC USM Browser is possible to create Operator profiles. A new profile can be composed using
OAD-FAD combinations, System FAD, Elementary OAD and Apllication FAD.
The defined profiles can be used from SMF when creating a new user.
The following window shows the SEC USM Browser for creating a new profile.
TMN-OS
Process Monitoring & Control (*) Allowed Allowed (*) Allowed (*) Allowed (*)
(*) Process Monitoring can be accessed from these profiles on the TMN-OS menu but the man-
agement is then denied for some functions. The functions are not disabled, but if a user with Oper-
ator, Constructor or Viewer profile tries to run them an error message is displayed.
Actions
Control Allowed
Synchronize Allowed
View
Configuration
Lock Allowed
Administration Allowed
View
Edit
Operations
Ping NE Allowed
Tools
Diagnose Allowed
(*)
SMF
user
Create Allowed
Update Allowed
Delete Allowed
Log file
Log record
processes
Trace file
Workstation
Os Snapshot
Options
plan
New allowed
Edit allowed
Validate allowed
Stop allowed
Delete allowed
Backup Management
job
New allowed
Edit allowed
Delete allowed
Run allowed
load
Backup
Restore allowed
Cleanup
5.1 Overview
The disks Full Backup and Full Restore facilities allow to keep a complete disk(s) copy (dump) for the sta-
tion where the operation is performed.
The convenience of this copy is that it allows to recover in a fast and safety way the exact image of data
and software configuration. The inconvenience is that making an OS backup requires to do a backup on
each station and to stop each machine for a long time. Such an operation is recommended before doing
a new installation starting from scratch to keep a copy of the 'running' System and after the new installation
to keep a copy of the 'starting' System without the final configuration.
5.1.2 General
The backup/restore feature allows to save the applicative data of the 1353NM. This feature is not to be
confused with the full backup disks 1353NM feature described in prevoius section.
The backup/restore unit is defined by a couple (workstation, functional domains), each functional domains
can include several subsets of data types.
– Alarms files,
– Operators (Users) (called Operator): home directory of the created and predefined 1353NM users.
– Logs (called Log),
– Performance Monitoring : the PM collection files,
– Software Download : Network Elements Software data files.
Some functional domains are only pertinent for the 1353NM master workstation.
The backup/restore feature copies tar files to or from the backup tree of the SMF master workstation.
Backup of one functional domain doesn't remove existent backup of other differents functional
domains.
This section will suggest the backup performing time, that is when backup should be scheduled to have
the less loss of date in case of problems. The backup operations can be scheduled to be run periodically,
as explained in next chapter.
– Alarms files and Performance Monitoring data backup should run every week:
– Operators (Users) backup should run every month or alternatively when modifications are made
on the defined users.
6.1 Overview
This functionality allows the administrator to manage periodic actions or run a script or procedure.
Selecting from the menu bar Actions |--> SMF |-->Scheduler Management the following window will be
displayed to manage the scheduling jobs. From the Scheduler window a new plan can be created or an
existing plan can be modified, validate or deleted.
Only the administrators (admin group) can access to these tools, from the Master station.
The Log files are written by administration scripts in order to archive meaningful operations in the history
of the SDH Manager system. They are not to be confused with trace files which are cyclic files written
by application programs for debug purposes.The SDH Manager administration log is based upon UNIX
syslog.
• For Command Logs management a Java interface is available too; it is described in chapter 7.4.
• Unix logs : other logs produced by Unix processes , ftp , mail ...
The System logs are centralized on the Master WS, while the other log files are located on the WS where
they have been generated.
The log file formats are defined in OSKernel platform configuration files. The log files formats that can be
used are : SYSTEM, COMMAND and EVENT.
– Error levels
The error levels used in the SDH Manager are the following:
N.B. The error level (err, warning,notice) is not reported in the log.
– Subsystems
• user • tnm
• log • configuration
• agent • start stop
• backup restore • maintenance
• operation • plugin
Several logs files exist, they can be in the 4 different states (see Figure 58.):
This file is automatically created by the log daemon (axSyslogd). When a log file exceeds a pre-
defined size, the log file is renamed with the .old extension.
axadmin is notified by mail when file is created. The message is "xxx.old log file created, please
archive log".
– Saved log (file name "name.gz"). There can be several saved log files saved at different dates. Saved
log files are compressed by gzip. The file name (name) is choosen by the user.
– Temporary log (file name "/tmp/axtmp.name.date"). It corresponds to saved log files decompressed
for visualization. They are removed after usage.
automatic
current log overflow log
automatic
manual or sched- manual or scheduled
uled
manual
– The IM and USM create current log files. Each log file has a predefined size.
– When a log file exceeds its predefined size, it is renamed with the .old extension. It is now an overflow
log file. The administrator is notified by mail when the overflow log file is created. The logging con-
tinues with the current log file.
– When the administrator is informed an overflow log file has been created, he/she has to move this
file in an area on the master workstation. The overflow log file becomes an archived log file. Archived
log files are compressed by using gzip.
The Log handler tool can be configured by the OS administrator. The configuration file is called axsys-
log.cfg and is located under $DIR1353NM_<Instance_number>/conf/. The format is of the form
tags:value:
Logs Management functions can be accessed through Actions |--> SMF |--> System Log Management
option.
Listed below are the tool names and a short description.
Command Description
View Current logs To list the current & overflow log records.
Mv log to save area To save the current & overflow log files.
View saved logs To list and view the content of the saved log files.
7.2.1 General
For some maintenance needs, analysis of possible corrections, the SDH Manager product is equipped
with an error detection software which enables to catch the error detected by the system and the context
in which the error has appeared. The backup of these errors is entirely automatic, it is used for errors of
medium and major (crash) severities. Quality is not only linked to detection and correction of this errors,
it is also the result of minor errors detection which don't cause the service to stop. This is in that case fre-
quently ergonomic type abnormalities or functional malfunctioning. For this kind of abnormality, the SDH
Manager gives the administrator the ability to edit system fault reports.
For each (automatic or manual) data capture, a header file is generated detailing information about the
captured data. The structure of the header file is as follows:
There are three failure sub-directories maintained under the maintenance/failure directory.
The delay between successive invocation of the failure capture process, manual or automatic, is 5 min-
utes.
When a process terminates abnormally, the Application Manager identifies the failed process and invokes
the capture failure script together with the identity of the failed process automatically.
The script will first determine the caller.
The name of the new directory will reflect the current date and time, so for example if the process failure
occurred on the 18th March 1997 at 11:05 then the name of the new directory will be 199718031105.
core file : is only captured when system management invokes the data capture process, it moves the file
from core/processname/core to the new directory
trace, dataflow, error and output files : are captured from the trace/ directory, each file is first copied
from the trace directory to the new directory.
log files : are captured from the log/ directory, each file is first copied from the log directory to the new
directory.
The script will then create a header file which contains information about the date and time the capture
process was invoked (i.e. time of failure), the caller , a headline indicating the rogue process if present,
the version of the NM as a result if executing axversion and a list of all the files captured.
Failure Management functions can be accessed through Action |--> SMF |--> Failure Management fea-
ture.
Listed below are the tool names and a brief description.
Capture Data Failure capture process - captures the core (only when acti-
vated by APMAN), trace and dataflow files.
Manage Failure Displays the current list of failures on the specified machines.
Directory
A snapshot is created on the master workstation, it contains a compressed tar file for the master work-
station and one for the client (if the command was run for both) that contains the following “.tar.gz" files.
/usr/Systems/1353nm_<Inst_numb>/maintenance/failure/local/
/usr/Systems/1353nm_<Inst_numb>/maintenance/failure/global/
– Os-Kernel_log.tar.gz : compressed tar file of the area /alcatel/Kernel/maintenace/log; log files con-
cerning Kernel operations are stored in this area (Customizatin procedure, Configuration, User Cre-
ation, also error are reported here);
Selecting the menu item Options |----> Set Maximum the following window will be displayed to set the
maximum number of snapshot saved on the server. The “OK" button confirms the changes
– Examine the MAX_FAILURE parameter in the failure_handler.cfg file. If this parameter is set to zero,
the script will terminate else if the parameter is greater than zero the script will continue.
– Get the current date and time and compare it with the most recent data capture. If the time difference
is greater than a specified delay, the script will continue. Otherwise the request is denied and the
script will terminate.
– Store the date and time information.
– Create a new directory under $DIR1353NM_<Instance_Number>/maintenance/failure/global/
yyyymmddhhmm.
– Copy into the yyyymmddhhmm directory all the necessary files.
– Create the header file.
– Write to the header file.
– If the number of present directories is greater than the maximum number specified , then a clean-
up script is initiated, removing directories in chronological order until the directories number equals
the maximum number specified.
Change Trace Level To set the trace level of each apman process
Reset Cyclic Traces This tool allows to empty all circular trace files
/usr/Systems/1353NM_<Inst_Numb>/maintenance/trace/.
Trace files have several extensions posssible : .data, .trace, .err, .out, .dataflow.
– emlims
– AMV
– Simcon
– FWK processes
– PMDS
– Software Download
– USM
– lss
– Retix
– Xcc
– SMF
Selecting a System Instance icon on the TMN-OSs menu and selecting the menu function Actions |-->
SMF Trace Management as shown in the following figure, the Trace File Management window will be dis-
played.
From the Trace File Management window it is possible to edit the trace files' levels selecting from the menu
Processes |--> Edit Trace Levels. For each trace file it is possible to select the appropriate trace level.
The following table gives the information traced according to the trace level specified:
Level Information
6 debugging
7 specific
TRACE_FILTERS
{
ALL
{
ALL 1 2 5
}
}
TRACE_FILTERS
{
ALL
{
ALL 1 2 3 4 5 6 7
}
}
When enabled, dataflow tracing (level 3), is issued, along with process events (level 2) in dedicated trace
files with extension .dataflow .
Generally, after CLV is started, following figure is shown (see Figure 65.). In Log Files Panel, all the avail-
able command log file(s) are listed.
CLV can parse command log file(s) on the master or client workstation. The location of the command log
files is masked by CLV. If the selected command log file locates in the same host with CLV, CLV opens
it directly. Otherwise, CLV opens it through a background process automatically.
After the operator selects the target file(s), the Parse button is active (see Figure 65.).
The operator can click the Parse button to parse the target log file. During the parsing period, the Parse
button is presented as a Stop button; operator can click it to cancel the parsing action.
When an operator needs help, he (or she) can click the Help button and start the Online Help to get how
to manipulate the relevant function.
Click the Refresh button; the log file list can be refreshed manually.
N.B. If an operator wants to select several log files at the same time, operator can do it in following
two ways:
a) Press the Ctrl key on the keyboard while use mouse click the target log files in the file list
(continuous items or discontinuous items).
b) Press the Shift key on the keyboard while use mouse click the target log files in the file
list (continuous items).
After the target log files are parsed, operator can extract log record in the target log file with filters. There
are two kinds of filters in CLV, the simple filter and the advanced filter.
If a filter is not saved, we call it a temporary filter, which is only applicable in the current CLV application
instance. If you save a temporary filter with a specific name, it becomes a persistent filter and you can
use it next time.
Simple filter is simple but more convenient and intuitive (see Figure 66.).
There are 5 filter items in simple filter : Operator, Machine, Entity, Date and Command. These entire filter
items are used as conditions to filter the output of the command log files. The logic operator among the
filter items is the AND operator.
User can click the checkbox to activate a filter Item, and assigns a specific value to it.
For example, user activates the Operator, Machine and Command, then selects operator is alcatel,
Machine is NM70 and Command is “Access State Cmd", at the same time, the filter has been con-
structed. (See Figure 55)
The operator clicks the Apply button to extract the target log with the selected filter items.
During this period, the Apply button is presented as a Stop button; operator can click it to cancel the
extraction action.
Operator can click the Help button to get the online help.
The operator clicks the Output to HTML button to output the extracted result to browser.
N.B.:
If operator needs to select an item in the filter item field, operator can click the item in the item field, e.g.
command item field.
If operator wants to select several items in the filter item field at the same time, operator can do it in fol-
lowing two ways:
b) Press the Shift key on the keyboard while use mouse click the target items in the item list
(continuous items).
When CLV user wants to create a very complex filter, he/she can use the advanced filter to construct the
filter (see Figure 67.).
Each row of the table represents a single logical condition made up by a subject (Variable), a relational
operator, and a value of comparison (Value). Several logical conditions can be set by Boolean operators
and grouped by round brackets.
7.4.1.4 Variable
By clicking on a 'Variable' cell, a combo-box is shown with all possible subjects (see Figure 68.):
By clicking on a 'Compare to' cell, a combo-box is shown with all possible relational operators (see Figure
58):
7.4.1.6 Value
By clicking on a 'Value' cell, the user is allowed to set the term of comparison; the inserted value has to
be consistent with the related subject (Variable)(see figure 59).
7.4.1.7 Brackets
By clicking on an 'Operator' cell, a combo-box is shown with AND/OR/Stop operators (see figure 60):
Selecting one of AND/OR on the last row of the table, a new row is added.
Selecting Stop operator stops constructing the filter or deletes the behind row.
N.B.: Only the CLV user with administrator or constructor permission can use the advanced filter.
Before the filter is saved manually, it's only a temporary filter (See Figure 61).
Operator can click the Save button to save the temporary filter. After the temporary filter is saved, the tem-
porary filter will be the persistent filter.
N.B. The persistent filter name should be a valid Java identifier. The filter name must start with a Uni-
code letter, underscore, or dollar sign ($). The other characters, if any, can be a Unicode letter,
underscore, dollar sign, or digit.
When the operator want to use the persistent filter to extract the target log file. Operator can click the filter
name list, and select the needed filter. The persistent filter will append the filter value to Filter field (see
Figure 62).
Operator can construct the temporary filter based on the persistent filter to extract the target log file(s).
The operation is the same as the temporary filter.
N.B. When the selected target log file is different from the log used to construct the persistent filter,
the persistent filter may be not applicable for the selected target log file. But CLV will not check
that.
The filter result can be displayed and output in two different ways : displayed with Browser or displayed
in a table.
If the user selects Output to HTML button, the extraction result will be displayed in the Browser (see
Figure 63).
There are the 4 parts in the Command Result List window (see Figure 64).
List Menu:
a. List->Print…
b. List->Print Preview
c. List->Export…
d. List->Close
Action Menu:
a Action->Select->All
b Action->Select->None
Display Menu:
a. Display->Detail Info
Clicking the menu item to display the selected record detail information window (see figure 65).
Help Menu:
The statistics information part includes the following main content (see Figure 65):
a. The number of the different type command record in the extraction result list.
b. The total number of the different type command record in the extraction result list.
The figure indicates the number of the Error type command record in the extraction result list is 2.
The figure indicates the number of the Cmd type command record in the extraction result list is 4.
The figure indicates the number of the Confirm type command record in the extraction result list is 2.
The figure indicates the number of the Unknown type command record in the extraction result list is 0.
The figure indicates the number of the all type command record in the extraction result list is 8.
User can see the detail information of the selected record when user double-click the selected record in
the extraction result list (see Figure 66).
Action Menu:
a. Action->Print…
c. Action ->Export…
d. Action ->Close
The Print and Print Preview function is provided in CLV1.4. User can use the print function to print and
Print Preview the selected record and its detail information.
When user clicks the print menu Item (e.g. List->Print … or Action->Print…). A printer print dialog will
appear (see figure 67).
N.B. User has to input the target printer name when user needs to print the file to printer.
When user clicks the Print Preview menu Item (e.g. List->Print Preview or Action->Print Preview), the
Print Preview window will appear (see Figure 68). The default display scale is 75%. User can select a dif-
ferent display scale from 10% to 400%.
To click the button, preview the first page of the previewed page(s).
To click the button, preview the previous page of the current page.
To click the button, preview the next page of the current page.
To click the button, preview the last page of the previewed page(s).
If user needs to export the display result to text file, he (she) can click the Export… menu item (List-
>Export…in Detail Info window or Action ->Export… in Command Result List window).
User clicks List->Export…in the Command Result List window, a Save window will appear (see Figure
69). The default export file is CLVTableOutput.txt.
Figure 80. Export the selected command result list to text file
User clicks Action->Export…in the Detail Info window, a Save window will appear (see Figure 70). The
default export file is CLVDetailOutput.txt.
Figure 81. Export of the selected command record detailed info to text
The CLV Online Help has the same format as 1353NM. When the user clicks the Menu item:
Help -> User Manual to start the CLV Online Help (see Figure 71).
Select File->Exit menu item, a confirmation dialog is displayed (see Figure 72). User can confirm whether
delete the extraction result folders automatically when user clicks the Ok button on the confirmation dialog
to exit the CLV application.
As default, the all extraction result output folder will be selected when user select File->Exit menu item
(see Figure 72).
Moreover periodic system actions (cron) may be also run to avoid excessive increase of data collected
by the system or the operators.
7.5.1 General
The safety of 1353NM system needs to limit the number and size of files created for management pur-
pose. The size of some current operating files is limited -such as logs and traces -, as well as their number
since it is associated to the number of processes. For some others, there is no control, for example the
core files.The OS administrator is also able to create some files or directories which size can not be con-
trolled easily. So the cleanup tool allows the administrator to look at these extra files and delete them from
time to time.
N.B. The cleanup task concerns also the databases for alarm, maps, perfs.
The files to clean are classified in domains. The operator gets an overview on the OS looking globally at
all the unwanted files and he can decide a cleanup action. Such an action is performed globally on all the
files of a domain for a station.
– Backup
Directories created for backup and restore operations, located on the master station only under /
usr/Systems/1353NM_<Instance_Number>/backup,
– Log files
Concerns the PM-logfile, the.old log files, and all the.log files under save, located in /usr/Systems/
1353NM_<Instance_Number>/maintenance/log on a station.
– Ossnapshot
Concerns all the files, except the axinstallGui, located in /usr/Systems/
1353NM_<Instance_Number>/maintenance/failure/global on a station.
– Trace
Concerns all the files.trace,.err and.dataflow in the 1353NM run time tree of a station.
– Other Trace
– Core
Concerns all the core files on a station : core of NM processes within /usr/Systems/
1353NM_<Instance_Number>/maintenance/core, and core resulting of panic unix error within /
var/adm/crash.
– EFD
Concerns all the files for EFD domain.
– Temp Files
Cleanup function is an SMF function and is reached from TMN OS menu following Actions --> SMF click-
ing on the Cleanup Management option, the following window is displayed:
Before starting a cleanup action, the operator can get more informations about the files to delete:
Select the domain(s), select eventually the station(s), and select from menu bar Cleanup --> Details or
N.B. To select workstations, use the All and Clear push-buttons to select or deselect all domains
(respectively).
To perform the cleanup action, select the domain(s), select one station, and select from menu bar
Cleanup --> Clean or select the icon.
N.B. If no domain and/or no station is selected, a dialogue box is displayed to remind the operator
what to select.
– removing of SEN performance files : files older than 3 days (for 15mn counter) and than 7 days (24h
counter) are removed
– removing of Failure directory older than 1 month.
– removing of Historical alarms older than 90 days.
Table 11. Local data management: access right for different User Profiles
8.2.1 Interface
In order to give an ergonomic access to the tools, for most of them a common user interface has been
developed : it allows the operator to choose a particular NE among all the QB3* ones (Figure 90.); only
the window title and the action button differ depending on the required function.
– Ne Family: set filter on the NE family: adm, sub, sgm, mw, ...
only the families of the created NEs are shown in the family list; dafault: all families.
– Ne Type button: set filter on the NE type
only the types of the created NEs are shown in the type list; default: all types.
– User Label text field: allows to define a string that has to be a substring of the User Label.
– Filter button: applies the filter criterium.
Once displayed the filtered list, you can select a particular NE clicking on it.
Click on the action button (or OK) to apply the required function.
8.2.2 Constraints
Some functions needs to stop and restart the whole system or the EMLIM process managing the con-
cerned NE.
The colors and fonts used by the user interface are defined in a specific file called preferences.wish
under 1353NM/conf.
After MIB Audit on one NE, this tool allows to show the differences between the MIB loaded in the OS and
the MIB in the equipment itself.
During a MIB Audit operation, the local tables are automatically uploaded.
The differences between the MIB of the NE and the MIB of the OS are written in a file.
There is no exchange between the tool and the equipment. This tool supposes that an
audit has been done. It only looks at the trace files to determinate where are the
differences.
Select the NE to diagnose the audit (see paragraph 8.3.1). Only one selection is possible.
Click on the Diagnosis push button to run the action on the selected NE.
If there are some differences between the MIBs, a window showing them is displayed. For each difference
detected, the displayed file gives the "Application", the "Table" and the "Element" . The value of all the
bytes of this element are displayed for the NE and for the OS, as shown in the following figure.
The following pull-down menus are available on the top left of the window.
File Search
Print Find...
Quit Clear
– Click on the Print option of the File pull-down menu to print the file.
– Click on the Quit option of the File pull-down menu to close the window.
– Click on the Find... option of the Search pull-down menu to search an occurence.
– Click on the Clear option of the Search pull-down menu to reset the search.
An error may occur when the tool is running. In this case, an error window is displayed to the operator
showing the cause of failure.
Main possible causes of failure are :
• File of traces not found: Impossible to find the trace file corresponding to the EMLIM process
managing this NE
• No audit was processed on this NE: the tool was unable to find the traces corresponding to
an audit for this NE. From EMLUSM, perform a Diagnosis/Compare operation to create the
file.
Restrictions : If several audits have been processed on one NE, only the later one will be taken into
account by the tool .
The SEN MIB contains the data (connections, ports, etc...) for each Qb3* NE managed by RM system.
The data are mapped from NM-IM MIB to SEN MIB when the NE becomes 'NML assigned'.
The tool allows to edit the SEN MIB of NE. Such a MIB exists only when the NE is NML assigned. The
action creates a file *.sen.mib under /usr/Systems/1353NM_<Instance_Number>/shared_data/mib.
This tool has to be used after a takeover also to diagnose misalignment.
The information displayed concern the MIB part of connections. Some domains may be 'skipped' if the
corresponding data don't exist for the NE type, or in case of incoherence. All domains are skipped if the
NE is not NML assigned .
The possible operations by using the pull-down menus on the top left of the window are the same as for
the previous paragraph.
This tool shows the incoherencies detected in Nectas data (e.g. connections using same TPs, connec-
tions using ports not existent, etc... ) while uploading the tables after a Start supervision . It uses an
*.invalid.cfg relative to the NE , under 1353NM_<Instance_Number>/eml/NE_type/data, which still
remains present after the incoherency has been fixed, so it is not representative of the current NE state.
The Radio Protection Switching applies to microwave NEs. It enables alarms related to RPS status in
alarm criterion tables of the NE.
This chapter is applicable to QB3* NEs only. For Q3 NES the feature is managed by the EML
USM process. See the 1353NM operators Handbook for details.
The overhead bytes are unused bytes in the SDH frame that can be used to transmit data for the operator.
This option allows the configuration of overhead bytes.
Select the NE as given in paragraph 8.6 to choose the NE on which the Overhead byte is to be configured
and click on Ok.
The following window is then displayed to configure the overhead bytes for the chosen NE.
– the "Termination Channels" part: for each V11 or G703 link, select the "Card" and the "OH Byte",
– this part allows to select, if necessary, the options EOX extention enable and MSOH Pass-Through
option.
– the Pass-Through Channel part: configuration of the SOH nine pass-through channels,
The phone number associated to the order-wire channels can also be configured by sliding the cursor.
The possible values are 1 to 99.
This chapter is applicable to QB3* NEs only. For Q3 NES the feature is managed by
the EML USM process. See the 1353NM operators Handbook for details.
This option allows the configuration of the Link Access Procedure (LAP) for a D Channel (LAPD).
Select the NE as given in paragraph 8.3.1 to choose the NE on which the LAPD is to be configured.
The following window is then displayed to configure the LAPD for the chosen NE.
– the LAPD interface: select Yes or No to use the DCC as communication channel to support the TMN,
– the LAPD role: select User or Network to design the link between two adjacent SDH NEs. NET-
WORK-NETWORK or USER-USER are not authorized.
Select the ethernet link between the OS and the NE. If the NE isn't the GNE (Gateway Network Element),
the ethernet interface should be set to NO. This means that the NE is accessible only through the DCC
via the GNE. The default value is NO.
The "L2 only parameter" option can be set to True or False. It shall be set when NM has to communicate
only to NEs pertaining to different areas with respect to the area of the NM itself.
– If True is selected, no other machines of the same area address of the OS shall exist in the network.
– False is the default.
This option allows the copy of the ASAP from one NE to another.
When clicking on the option Change ASAP, the following window is displayed:
– Select the Ne Family and NE Type then click on the Filter push-button.
– Click on the Ok push-button: the following window is displayed showing that the ASAP table of the
selected NE (source) is retrieved.
– Click on the Ok push-button: a window (see Figure 110.) is displayed showing that the Change ASAP
operation is running.
The EMLIM process associated to the selected NEs must be stopped, otherwise an error message
is displayed.
This tool allows to choose the synchronization source for an NE (only for ADMs and MWs).
The action can be applied on a particular NE only if its emlim has been previously stopped; after
restart, the changes are taken into account.
Click on the Filter push button to display the NEs in the right part of the window.
Click on the Equipment Type option button then select an option. If the selected option concerns the SSU
feature, the windows becomes as follows (SSU Quality option button enabled).
Click on the Ok push button to allow the change of the synchronization source.
Click on the Cancel push button to close the window without change.
The action can be applied on a particular NE only if its emlim has been previously
stopped; after restart, the changes are taken into account.
– Select the Ne Family and NE Type then click on the Filter push-button.
• IS level: L1 or L2,
• Auto Switch-over: Yes or No. It allows (if set to Yes) an automatic switching from the OS main
address to the OS spare address.
• Auto Switch-back: Yes or No. It allows (if set to Yes) an automatic switching from the OS spare
address to the OS main address.
This tool allows to change the assignment state of one or several NE.
All the assignment states will be updated (i.e. both for the PDH/SDH ports and for the NE itself).
The action can be applied on a particular NE only if its emlim has been previously
stopped; after restart, the changes are taken into account.
There is no change for all the modifications of the configuration which had made the assignment
state turn to "Assigned" (such as a modification of payload or a NAP upload).
The current description is done for a Assigned to observed change. The operations are the same
for the Free or observed to assigned change.
The complete list of NEs (shown above) is displayed only after clicking on "Filter".
If the relative process has not been stopped, a window may be displayed to warn the operator that the
operation can only be performed if the process is stopped.
During the Change state operation, information are displayed in the list box.
The NEs on which the change of assignment state has succeeded are followed by ".....OBSERVED".
An error may occur when the tool is running. In this case, the name of the NE concerned by the error is
followed by "Failure : <cause of the failure>".
– Master workstation not found : Impossible to find, in the APMAN configuration file, the hostname
of the MASTER workstation of the OS
– Bad User Label : Impossible to find the user label of the NE inside the file of persistency of PNM
– Hostname not found : Impossible to find, in the APMAN configuration file, the hostname where the
EMLIM is running
– Nectas File not found : Impossible to find the nectas file corresponding to this NE
If another message is displayed, it will contain the error found by the shell script itself.
This option allows the operator to change the name of the emlim persistency file during a migration phase.
The action can be applied on a particular NE only if its emlim has been previously stopped; after
restart, the changes are taken into account.
Select the NE as given in paragraph 8.3.1 to choose the NE on which the switch old/new practice operation
is to be done.
This chapter is applicable to QB3* NEs only. In Q3 NE management the EMLIM process
manage a persistency file of its local MIB which includes the list of current started TPs in
Perf in NE
Save in OS the list of current started TPs in Perf in NE. It creates a new file restart_NE_label_TP.dat in
the directory /usr/Systems/1353NM_<Instance_Number>/data (Instance_Number is the number of
the customization of 1353NM System). It should be used before any operation which may result in a loss
of started TPs, such as replacement of ESCT or SMEC2 board on ADM, or before stopping it to be able
to restart it at any time.
The tool allows to restart the Perf on NE. The list of TPs must have been saved previously using the Save
TP option.The Restart action is sent to EMLIM which forwards the request to the NE if the TP was
stopped.
This tool allows to manipulate the NECTAS file (i.e. the persistency file) loaded in the OS. It is possible
to see the value of all the tables (including application 255), to change these values and to replace the
old NECTAS file by the new edited one.
Caution : When replacing a NECTAS file (functionality "Encode"), take a great care of the
modifications performed, because, as there is no control on the coherence of the tables,
an inconsistency may occur when the EMLIM try to build the NE again and it may result in a
crash. This operation should be done only by Alcatel personnel.
The tool is run by typing the command in a command shell or with a double-click on its icon .The first win-
dow displayed allows the operator to select the user label of the NE. Only one selection is possible.
Show push-button: The correct result of this functionality is to display a window showing the decoded
NECTAS files
– The button GoTo Table allows to link directly to the wanted table.
– The button Quit closes the window.
Edit : The correct result of this functionality is to display a window showing the decoded NECTAS files
– The button Save re-writes the file even if no modification has been done.
This update does not affect the file used by the EMLIM process, but only the working file of the tool.
Encode: The correct result of this functionality is to apply the previously saved modifications of the
decoded NECTAS files on the file used by the EMLIM process.
An error may occur when the tool is running. In this case, an error window is displayed to the operator
showing the cause of failure.
– Master workstation not found: Impossible to find, in the APMAN configuration file, the hostname
of the MASTER workstation of the OS.
– Bad User Label: Impossible to find the user label of the NE inside the file of persistency of PNM.
– Hostname not found: Impossible to find, in the APMAN configuration file, the hostname where the
EMLIM is running.
– Decoded file does not exist : this means that the tool does not find any NECTAS file to encode,
in its working directory, for the selected NE.
– Another message giving an information from PersBrowser in case of failure during the encoding
operation.
• The button Save allows to save this file. A dialog box is displayed to get the name of the file
in which the result will be saved.This box is shown hereafter:
The operator has to enter the whole pathname of the file in which the result is saved.
An error may occur while the tool is running. In that case, an error window is displayed to the operator
showing the cause of failure.
Restrictions: The differences between the NECTAS tables are detected only for the
application 55..60. So some applications as 254 , 255 , also called demy tables and relative
to OS attributes , are not taken into account.
This option runs an offline tool which modifies the NE persistency file without involving the related emlim
process; the action can be applied on a particular NE only if its emlim has been previously stopped;
after restart, the changes are taken into account. This tool allows to substitute an aggregate board without
de-assign ports from 1354RM; it is applicable to:
This option runs an offline tool which modifies the NE persistency file without involving the related emlim
process; the action can be applied on a particular NE only if its emlim has been previously stopped;
after restart, the changes are taken into account. This function applies to 1664sm 2.1 only, allowing to
update a tributary board to its UP version.
This option runs an offline tool which modifies the NE persistency file without involving the related emlim
process; the action can be applied on a particular NE only if its emlim has been previously stopped;
after restart, the changes are taken into account. This function applies to:
• 1641sm/smop 2.7
• 1651sm/smop 2.5
• 1661smc/smcop 1.5
8.7.2 FT Scheduler
Please refer to the chapter ‘File Transfer Scheduler’ in the document [1]
This tool allows to select a valid SDH NE software package and to merge it with a Specific-Service pack-
age (ATM, IP, PREA, ...) obtaining a compound software package (SDH+Specific-Services) called OMSN
package.
The software package built by this tool can be used by the Software Download procedure to load a OMSN
NE. The data are saved on the master workstation in the directory :
• /usr/Systems/1353NM_<IN>/swdl/swdlserv/data
After the installation, the software package is ready to be downloaded on the NE (from NE USM or from
the scheduler) : in case of Add on, the package to be selected ends with an E (extended).
To install the NE SW package in 1353NM the CD containing the SW should be inserted in the CDROM
drive.
The SDH panel lists all the SDH packages installed on NM by the SRVADMIN tool:
The SERV. SPEC. panel lists all available Specific-Service packages installed by SRVADMIN tool:
In order to build a new OMSN package the following steps have to be done.
In the SDH panel (Figure 141.), select one SDH package and then press "Create OMSN". A full copy of
the SDH package is prepared. When the copy operation is over, a question dialog pops up:
Clicking on “YES" button the OMSN panel appears. Otherwise pressing “NO" button you will be left in the
SDH panel, and you will have to switch to OMSN panel manually. Opening OMSN panel the cloned OMSN
package is displayed on the left. Selecting the OMSN package the compatible add-ons are shown on the
right.
If a compatible add-on is declared ‘NOT installed’, the “Add" button is enabled. Press the “Add" button to
plug the selected Service-Specific software package into the OMSN package. After the operation is com-
pleted, the Service-Specific package is reported as "Installed" (in the OMSN package) in the right-side list.
If an installed software package is selected in the right-side list, the “Remove" button is enabled, making
it possible to unplug it from the OMSN package.
Note that all packages (SDH, Specific-Service and OMSN) can be discarded by entering the appropriate
panel, selecting the desired item, and pressing on "Discard" button. A confirm request is always displayed
before proceeding.
This tool allows the administrator to make a note of which NEs are working as gateways inside a DCN
structure.
This function is managed by OS-Kernel application, the platform on which 1353NM 7.3 is built. To have
an exhaustive description of the function see document “1350 System Rel. 7.3 Administration Guide".
This option is used to test the reachability of NEs. This function is managed by OS-Kernel application, the
platform on which 1353NM 7.3 is built.
Selecting Ping NE from the NE Administration menu, the following window will be displayed:
The area shown in the figure lists the created NEs and the relevant NSAP address. New NEs can be add
manually specifying User label and NE address. Select the NEs to ping in the list and the command button
<Ping Selected>. The following window will appear displaying the ping result :
8.7.6 AC Viewer
Please refer to the relevant chapter ‘AC Viewer’ in the document [1]
8.7.7.1 Introduction
An IP tunnel for OSi traffic is a point-to-point IP channel used to carry OSI data.
OSI-over-IP tunnels are used to allow the communication between NM and NEs using an IP network,
despite the fact that an OSI networking would be normally required to manage Alcatel equipment.
The concept of OSI-over-IP tunnels is specular with respect to IP-over-OSI tunnels by which, for example,
the ISA boards, SNMP/UPD/IP protocol based and hosted by OMSNs, can be managed through the OSI
network.
In OSI-over-IP tunnels, OSI packets are encapsulated into IP packets in order to be able to be carried and
routed to destination through a pure IP network. An OSI-over-IP tunnel provides a point-to-point link
between two OSI stations using a virtual IP pipe.
– interconnect the NM to a Gateway NE through an IP network. In this case the connectivity is provided
also with all the NEs reachable from this GNE (using OSI protocol)
– interconnect two NEs each other, e.g one of them being located at customer premises and not being
reachable via DCCs
– interconnect the NM to a Router through an IP network. In this case NM will be able to manage all
the NEs reachable via that router using OSI protocol
– interconnect the GNE to a Router through an IP network. In this case taht router will have networking
visibility of all the NEs reachable via that GNE using OSI protocol.
The IP Tunnel Configuration tool, available on the master workstation from TMN OS menu Actions |--
>1353NMAdmin interface, allows the system administrator to define IP tunnels between 1353NM and
several tunnel endpoints on the network.
Selecting System Management -> NE Administration -> IP tunneling , the IP Tunnel Configuration Appli-
cation window is opened:
– the Status section contains a sequence of 32 buttons per Supervision Area (i.e. 32 buttons for each
Ethernet interface); each button represents an IP channel; the colour of a channel button is
• grey if the relative IP channel is not allocated
• orange if the channel endpoint is being connected
• green if the channel endpoint is successfully connected
Clicking on a channel button the relevant 'IP Tunnel Detail' window (described in 8.7.7.6 ) is dis-
played.
Pressing the Create button in the main window, the Create IP Tunnel window is displayed:
– in the From section you select the channel startpoint among the Ethernet cards configured on the
NM (i.e. the relevant Supervision Area);
– in the To section you have to define the channel endpoint; two choices are given:
Press the Create button to start the creation procedure of the channel; the colour of the channel button
in the main window changes as the state of the communication evolves; if the endpoint is reached, the
following message is displayed:
Pressing the Show List button in the main window, the IP Tunnel List window is displayed:
Pressing a channel button in the main window or in the IP Tunnel List window, the IP Tunnel Detail window
is opened:
or
– press the Delete button in the main window to open the Delete IP Tunnel window
The IP Tunneling application may exports data for off-line management. Data are exported by means of
a file in CSV (Comma Separated Values) format.
This function allows the operator to know which On Board Simulator (OBS) processes are currently run-
ning on the master workstations.
By default, only one OBS process can be launched at a time; if you want to increase the number of OBS
processes running simultaneously, you have to:
– modify the MAX_NUMBER_OF_INSTANCIABLE_SIMULATORS parameter in /usr/Systems/
1353NM_x/simulator/simcon/data/param.cfg; the parameter value must be suitably set according to
the system resources;
– stop/start simcon process.
Selecting On Board Simulator Monitoring on the System Management menu, the following window will
appear:
The figure above shows that OBS process is currently running on the master WS.
If one or more OBS processes are started when the OBS Monitoring window is already displayed, the win-
dow is not automatically updated; it is necessary to click on the Refresh button shown on the figure above.
If there are OBS processes active (green arrow), for each simulated NE the following information is dis-
played :
– NE name, type & release
– emlim name
– NE group & Id
Click on the Exit button to exit from the On Board Simulator monitoring window.
Please refer to the relevant chapter ‘IP over OSI Tunneling’ in the document [1]
SMF functions for OMSG can be accessed starting from TMN OS menu Actions |--> 1353NMAdmin :
10.1 Overview
This section provides a brief explanation of ANTP (Alcatel Network Time Protocol) that is a protocol used
to synchronize time-keeping among a set of distributed time servers and clients.
ANTP is an Alcatel proprietary protocol which allows to have a very precise real time clock alignment
between the NEs and a reference source (ANTP server). It is bases on the algorithm implemented by NTP
(see [11]) used in the Unix environment.
The difference with respect to NTP is related to the fact than NTP works in TCP/IP environment while
ANTP protocol is based on OSI layer 3 (CLNP) communication services. As a consequence, modifications
have been performed in the interface and packet format of standard NTP product in order to be plugged
on top of CLNP.
The protocol ANTP is based on a client-server paradigm. The NE plays the role of the client while the
server is normally located on NM. The behavior is very simple and is based on a periodic enquiry by the
client (NE) in order to discover the current time and date on the server (NM). This mechanism allows to
calculate round trips delays and average statistical values to obtain the best real time alignment between
client and server.
The unique goal of ANTP is to keep synchronized the NEs with the reference clock servers, independently
of the accuracy of the reference source. This mechanism guarantees the alignment of the OS and NE
clocks.
Nevertheless the proposed global solution is to have a network synchronized not only internally but also
with external time reference systems (e.g. GPS). In this scenario, ANTP protocol is in charge of distrib-
uting the clock to the Network Elements, getting this clock from a UNIX based Workstation. It's then up
to native NTP protocol to distribute the clock within the Operation Systems, getting the RTC from a GPS
external device (see Figure 155.). In conclusion, the clock is distributed by one WS (likely the OS itself)
to the NEs using ANTP protocol. In the OS world, RTC can be distributed using native NTP protocol by
a GPS device.
In order to be resilient against DCN or WS failures, two ANTP servers are present in the management
network, one of them having higher priority. In case one of them fails, the NE shall automatically refer to
the other one. Only a double ANTP servers' failure, or a failure in the related DCN, will let the NEs to work
in RTC free-running. In general, the two ANTP servers do not have to be located in the same station, even
if they can. The following pictures depict the system architecture with co-located ANTP servers (Figure
155.) and with not co-located ANTP servers (Figure 156.). The latter solution allows higher resilience
against any failure.
Refer to ANTP Functional Specification for protocol details: protocol architecture and ANTP
message format.
GP
clock source
NTP protocol
ANTP protocol
GP
clock source
NTP protocol
ANTP protocol
OS
GP
clock source
ANTP protocol
NTP protocol
Figure 156. ANTP system architecture with not co-located ANTP servers
• Preventive maintenance
• Corrective maintenance
• Failure management
• Maintenance operations
• Upload failure
• Troubleshooting
../1353NM_<Inst_Numb>
backup maintenance
backup on the slave workstation this directory will be empty. On the Master workstation,
this directory will contain the failure backup data which is tared and com-
pressed.
maintenance/core the UNIX core files are saved in this sub directory.
maintenance/trace current instance trace and dataflow files.
maintenance/log log files.
maintenance/failure saving (of traces, of core...) when a process fails .The name of the files(direc-
tories) located in this sub-directory are conform to the format date_time (eg.
199802101455), for the date and time of the anomaly.
maintenance/stat global statistics on the system quality.
For each rubric , except stat ,the management tools provided by SMF allow visualizing , saving , deleting
the corresponding files or directories.
• Hardware failures
Prevention operations
– Have a full backup tape (refer to Full Backup Disks and Full Restore Disks in the 'Installation
Guide').
The full backup tape has to be created once installation has been checked and can be done anytime
for safety.
Prevention operations
– The main actions that can be performed depending on the system configuration are the following:
• Use of the Cleanup tool (refer to SYSTEM LOG MANAGEMENT chapter, section
Cleanup).
Prevention operations
– Against SCSI errors, especially for an external disk, never unplug a SCSI cable while NM is running.
Failure consequences
Recovering operations
– If the problem persists, the system will require a fsck (File System Check) operation.
N.B. It means that data may be corrupted and/or are not recoverable.
Failure consequences
Recovering operations
• Select the worstations and the domain for which the cleanup is necessary.
Recovering operations
Recovering operations
Failure consequences
Recovering operations
Failure consequences
Recovering operations
– Save it on a tape.
N.B. The compressed tar may be also transferred by ftp to Alcatel support.
Operations
Operations
– Change the network area of the worstation (see paragraph System Configuration /Retixt Stack Con-
figuration).
– Select the Update Config option in the Main pull down menu.
• or with the Address Configuration option of Actions --> 1353NMAdmin --> Data Manage-
ment --> Configuration menu in TMN OS.
The OS address main and the OS address spare must not be changed in the same time.
All the operations on the PM database are now possible using a graphic tool. This tool is activated starting
from TMN OS menu follwing Actions --> SMF --> PMDS DB Administration
Prerequisites
Manual purge
The manual purge operation on PM data can be performed activating the PMDS DB Administration win-
dow. The following window will be displayed :
The following figure shows a more detailed selection for this command:
This command will show statistics data about the selected databases. The statistics includes: Allocate
Space; Used Space; Ratio and rows of records in important tables. The window displayed reports the sta-
tistic data. The selection 'All sites' display statistics about all PM databases (ATM, ETH, SDH), while the
selection of a single database displays the data for the selection.
The Optimize operation on PM data can be performed also activating the PMDS DB Administration win-
dow. The window below will be displayed. Selecting the optimize option a defragmentation is carried out
on the selected database.
This command can be used to set the threshold of the DBSizeAlarm function for all PM databases.
The low value threshold is the value of threshold to show WARNING. The unit is KByte
The exhaust valuethreshold is the exhaust value to show ALARM. The unit is KByte
– NE can't be managed
– OS isolation
– Reporting an NM problem
– RM/NM cohosted, create neGroup object first on RM and then on NM; create Tfep and then emlim.
• Restart EMLUSM:
N.B. WARNING: all NE managed by this EMLIM are not managed during this time.
– If the resynchronization does not display the alarm, the NE did not send it.
– If PNMUSM does not display a new alarm, it is an event routing problem (the resynchronization
updates the views but not the new alarms).
• Restart ASUSM:
– If the message occurs after some time (time out has occured). There is probably a DCN problem:
• Check the reachability of the NE with the Ping NE option of the Topology Manager |--> Oper-
ations | Ping NE .
– Use the Upload Failure Diagnosis option of the Local Data Management menu in SMF (see para-
graph Local Data Management / Upload Failure Diagnosis option).
In last resort:
– It may be:
In another cases:
• Perfstorage crash.
• No TP started.
• Database problem.
• NE bug...
Symptoms
Failure consequence
Probable causes:
– Rarely an OS problem.
OS polling:
The OS polling starts once OS isolation is detected. It runs every 2 mn in the first 20 mn, then every 30 mn.
– OS is not notified.
– The alarm is not cleared immediately and you may have to wait up to 30 mn to see the NE icon
change.
Operations:
– Reset cyclic traces (see paragraph System trace & log management / Trace management).
– Increase the trace level if needed (see paragraph System trace & log management / Trace man-
agement).
– Display the trace dynamically (see paragraph System trace & log management / Trace manage-
ment).
– Dump screens if significant (see paragraph System trace & log management / Dump Screen).
– Capture data (see paragraph System trace & log management / Failure management ):
• Add the screendumps on the tape, by using tar rvf /dev/rmt/0m <Name_of_screendump>
Probable causes:
Operations:
– OS configuration:
• Hardware.
• NM version.
– Network configuration:
• Layout.
– DCN layout.
– NM version:
– OS configuration:
• Output of axdbread.
– Screendumps.
A WorkAround is described hereafter to allow stack running on lan0 IP Address different from 127.0.0.1.
The following describes how to modify some script files to allow stack running on lan0 IP address (different
than 127.0.0.1)
– /alcatel/<OSK_version>/NMA/EMLIMADMQ3/<NMA_version>/templates/getRetixTag.pl (used to
start Q3 EMLIM)
– /alcatel/<OSK_version>/NMC/NECOM/<NMC_version>/script/retix_qb3s_lower_layer
– /alcatel/<OSK_version>/NMC/NECOM/<NMC_version>/script/retix_qb3s_upper_layer (used to
start Retix LL and Retix QB3* UL)
– /alcatel/<OSK_version>/NMC/NECOM/<NMC_version>/script/run_antpserver
– /alcatel/<OSK_version>/NMC/NECOM/<NMC_version>/script/run_ftclient
where :
---
$OSCOREDIR/necom/conf/config.txt
---
$OSCOREDIR/necom/conf/config.txt
---
---
---
---
A WorkAround is described hereafter to allow the correct behaviour of EMLIM Q3 for DXC (COMET
2.1.8.1) when NM System runs integrated with RM System.
In NR7 HP-OV has been substituted by EPIM. This application is in charge to send alarms from NM to
RM. When EMLIM starts on NM System, it creates EFD (object for managing events) to be managed by
EPIM.
EFD doesn`t distinguish if the notification sent is for Q3 or QB3* neGroup objects, therefore sends two
notifications. If on RM the object is not yet created, then RM doesn`t know the notification correspondance.
Having this restriction the following rule should be followed in case of integration of NM with RM :
This workaround is described to allow solving the problem that SWDL procedure doesn't work for NE
1692MSE 1.0.
The following workaround procedure was tested on 1353NM 7.0.x with a NE 1692MSE running SW ver-
sion 1.0.22, on which has been downloaded the SW package V. 1.2.5.
/usr/Systems/1353NM_xx/swdl/swdlserv/data/1692MS/
2) Create a new user named swd with password swd, using HP-UX SAM application (that
allows definition of a short password);
5) From 1692mse1.0 NE Equipment view access Menu item : Download Server Access Config-
uration
- insert port: 21
and confirm.
6) From 1692mse1.0 NE Equipment view access Menu item : Init Software Download
At this point the SoftWare download session starts and will proceed without errors. After the end of down-
load phase, the new Software version may be Activated from SoftWare status dialog box, as usual. Just
after the activation is suggested to close the current 1692mse1.0 NE Equipment view and wait the equip-
ment restart and realignment.
The EMLIM will automatically detect the updated version of the equipment (check this information into
NE Info dialog box).
This workaround should be already done before starting the Subsystem after System Configuration
phase. If for any reason the operation isn't carried out, follow this steps :
Operations
– SMF:
• In the Main Menu of the Failure Management window, select the Manage Failure Directory
option.
• Select the last snapshot in the list and click on menu OS-Snapshot --> Save on tape.
– UNIX:
– Minor inconsistencies
Symptoms
- NE is supervised.
- Warning message says "Updated Tables".
Operations
– Check NM updates.
– Align down.
Operations
– Preparation:
• Reset cyclic traces (see paragraph System trace & log management / Trace management).
• Use the Upload Failure Diagnosis option of Actions --> 1353NMAdmin --> Data Manage-
ment --> Configuration menu in TMN OS (see paragraph Local data management / Upload
Failure Diagnosis option).
– When it falls at the first inconsistency, find it by analysing EMLIM trace file.
Operations
– Use the Diagnostic of audit of the MIB option in SMF (see paragraph Local data management / Diag-
nostic of audit of the MIB option).
• Audit the MIB again and change the configuration until all differences are fixed.
– Testing reachability
– Miscellaneous configurations
– PM purge
Operations
– Link layer
– Network layer
• Perform /etc/ping IPaddress (or hostname) or select HPUX then IP ping from remote main-
tenance.
– Transport layer
– by UNIX:
– Advanced Diagnosis
Operations
• If the status remains "Aligned" and the DEF status is not cleared:
• If not OK, check the DIP switches on the ECT board of the NE.
Operations
– Perform the Change Assigned To Observed option of the Actions --> 1353NMAdmin --> Data
Management --> Configuration menu in TMN OS (see paragraph System data management /
Change Assigned to Observed option).
Operations
– From Actions --> 1353NMAdmin --> Data Management --> Configuration menu, the following
options are available:
• Enable RPS Switch option to enable RPS related alarms in radio NEs,
• Change ASAP option to change Alarm Severity Assignment Profile of one NE,
• Address Configuration option to configure OS main and spare addresses and switchover
bytes.
– From Unix:
• NE batch creation.
Starting from 1353NM Rel.7.0.14 P1 a check on NE Address unicity default is introduced in ’Set NE
Address’ operation with Topology Management application. To change this default setting, it is necessary
to perform following steps. The possibility is to force the check on NE Address at ’Start Supervision’ oper-
ation.
• Search the parameter ACTION_CONTROL, the default value is FALSE. To force the check on
’Start Supervision’ set this value to TRUE.
• Search the parameter ADDRESS_UNICITY, the default value is TRUE. If it is not TRUE, set
it to this value.
• Check in the file for the existence of following line, this line should be present for the correct
run of the check mechanism
• TYPERELEASE_FILE “/usr/Systems/1353NM_<Instance_Number>/PNM/conf/pnmusm/Typ-
eReleaseDefinition”
• This operation can be done before starting 1353NM Subsystem or if already started, start Pro-
cess Monitoring apllication and stop PNMIM process and restart it again.
Introduction
This section describes the actions to be executed when performing the Change NE name procedure for
the NE's managed by emlimadmnr31 application. A specific tool is required in order to successfully
change the NE name of the NE's managed by this process. The installation steps and usage of this tool
are explained below.
Pre-Condition
This section is describing how to change a NE-name for a QB3*-equipment but managed by an emlim-
process of NR3.1, running on SH5 in backward compatibility mode. Execute this procedure only if your
equipment and emlim-process correspond to this description.
Installation
Once the tool is downloaded, it must be installed only on NM. It is not necessary to install it on RM. Follow
the steps below.
3) Wait for the installation to finish successfully, after which you will return to the command line
prompt. This could take a few minutes.
Now it is necessary to create a file, which contains the old NE names, and the names by which they will
be replaced. Please note that you can change several names at a time. This file will be used as a reference
for creating the NE inventory later. Note that the name must be correctly entered in the document.
...,axadmin# vi /tmp/migr.map
OLD_NAME_ADM1 NEW_NAME_ADM1
OLD_NAME_ADM2 NEW_NAME_ADM2
N.B.: one blank character must separate the old NE name from the new one. This file will be used during
the migration.
Create NE Inventory
Before running the migration tool, we need to create an inventory file of all the NE's for which the names
will be changed.
1) Change directory:
or
...,axadmin# cd /alcatel/7.1/NMA/NAT/<version>/1353sh/tools/migration/script
Note: Starting from NR7.1 (1353NM rel. 7.0.10 P1 P2 P3) the directory is the second listed.
The next step illustrates how to backup the persistency files, where the emlim groupid number is the id
number of the process, which manages the NE. Accessing the NE Directory ? NE info menu item in the
NM map display this value will be seen.
Change NE Name
1) Stop all the related emlimadmnr31 processes created via Process Monitoring: OS ? Process
Monitoring
Update 1353NM
1) Start all emlimadmnr31 processes that where previously stopped, via Process Monitoring : OS
--> Process Monitoring
...,axadmin# rm /usr/Systems/1353NM_<Inst_number>/PNM/data/NE.db
6) Migrate the thirdfiles (these are files containing the NE names that were changed):
7) Open the maps on PNM and check that the NE names have changed.
Operations
In order to change the NE name of a QB3* NE in a NML assigned state the following steps must be per-
formed:
• stop related Qb3* Emlim process (see managed NEs section in delivery notes document )
• select the NE
– From PNM USM interface, in the NE directory menu, selecting the NE Info user dialog:
• select the NE
Operations
In order to change the NE name of a Q3 NE in a NML assigned state the following step must be performed:
– From PNM USM interface, in the Supervision menu, selecting the Stop Supervision user dialog:
• stop supervision of NE (that you want to change NE name); the NE must be in declared
state.
– From PNM USM interface, in the NE directory menu, selecting the NE Info user dialog:
– From PNM USM interface, in the Supervision menu, selecting the Start Supervision user dialog:
Operations
– Edit the X0screens file adding at the end the following row:
• ...,root# which X
– Log in again.
Q3 NE name has a default maximum length of 32 characters. If you need to increase this value, for any
reason, following procedure comes in handy:
Operations
On NM master :
– in /usr/Systems/1353NM_<Instance_number>/eml/adm/admq3nr5/conf/param.cfg
and in
– in /usr/Systems/1353NM_<Instance_number>/eml/dxc/dxcq3nr5/conf/param.cfg
modify as follows
– in /usr/Systems/1353NM_<Instance_number>/PNM/data/pnmusm/english/param.dbm modify
as follows
...
"&UserLabel_maxLength" 1
"english" "<new value>" <-- change
...
By default the First Login Password Change and Expiration mechanism are not active.
By default pwdExpiryAge file contains 0 (no first login change request and no expiration date).
If you want to enable the expiration mechanism, the following procedure has to be applied :
– login as root
– cd /usr/local/data/
– modify pwdExpiryAge replacing the value 0 by the value <n> (greather than zero)
Example:
the root modify the pwdExpiryAge file content with 30; the users, at first login or 30 days after latest
password change, are prompted with a message forcing password change:
The rules to follow to change passwords are described in Operator Handbook vol.1, chapter 6.2
Password Expiration
If the operator has made any error during the ISA board creation phase (wrong rack and/or subrack /and/
or slot position), by command line it is possible to rename manually the user label associated to the ISA
board.
This operation recovers from errors and, therefore, it shall not be used in the normal product life.
/usr/Systems/1353NM_<Instance_number>/tools/operation/script/
ABBREVIATION MEANING
AS Alarm Surveillance
CT Craft Terminal
DS Degraded Signal
IM Information Manager
NE Network Element
PI Physical Interface
RS Regenerator Section
SF Signal Failure
TN Telecommunications Network
VC Virtual Container
XC Cross-Connect
A N
ACD, 70 NECTAS Decoding, 172
ACD creation, 75
administator, 71
O
object, 69
C operator, 71
Change ASAP, 159 OS-Kernel, 61
constructor, 71
P
D patch STYL, 30
Diagnostic of audit of the MIB, 147 PM PURGE, 219
Display SEN MIB, 150 Process Monitoring, 61
profile, 71
E
Elementary OAD, 71 R
Enable RPS Switch, 152 Restart Perf Collect, 171
routing table, 36, 37
F
FAD definition, 77 S
function, 69 Save TP, 170
System FAD, 72
I
initiator, 67 T
IP routing, 33 target, 67
IP tunneling, 189
U
L users, 70
Local Data Management, 143
V
M viewer, 71
Maintenance
Corrective, 209, 247
Scope of this activity is the improvement and innovation of customer documentation through the under-
standing of customer needs.
You can send them to your Local Alcatel Technical Assistance Center.
The following form supplies an example only of useful info, as a guide of the type of expected feedback.
It is possible fill part of the form, add other data and so on.
• copying the example form, filling it and sending it to your Local Alcatel Technical Assistance
Center. In this case handbook data are already available at the page bottom.
• using the same form available as a file in the relevant documentation CD-ROM, saving, filling
and sending it by e-mail to your Local Alcatel Technical Assistance Center.
• creating a dedicated form on paper or file and sending it to your Local Alcatel Technical Assis-
tance Center.
We reserve to modify consequently the handbook according to the corretness and congruence of the sug-
gestion and requests.
How to deepen:
Other comments/suggestions
Errors Identified
Reader Info
Name:
Company:
Address:
E-mail:
Phone:
ASSEMBLY INSTRUCTIONS
Total Pages: 270 + 6
NOTES: ---
COVER LABELS
(according to Alcatel Italy binder format)
1353NM
Rel. 7.3
7.3.6P9
Administration Guide
1353NM
Rel. 7.3 7.3.6P9