ANM2000 ManualOperacao
ANM2000 ManualOperacao
ANM2000 ManualOperacao
+86-27-87691549
Fax:
+86-27-87691755
Website: http://www.fiberhomegroup.com
Trademarks
TM
TM
TM
Preface
This manual describes the ANM2000 common operations and maintenance
methods for the purpose of helping users know the ANM2000 further and operate it
well. Therefore prior to any installation and operation of the ANM2000, users are
required to read through this manual.
Relevant Manuals
Manual
Description
The ANM2000 is an integrated broadband access
management platform developed by FiberHome,
Network
System
Management
Instruction
Modifying the networking mode and the connecting mode, the ANM2000
GUI operation, layered management, and views.
Adding the networking and the connection, replacing all network
Each type of equipment has its own characteristics in the ANM2000 operations,
covered in the ANM2000 network management system operation manual of this
type of equipment. Users can read both manuals for reference.
Intended Readers
This manual is intended for the following readers:
Planning and designing engineers
Commissioning engineers
Operation and maintenance engineers
To utilize this manual, these prerequisite skills are necessary:
Data communication technology
Access network technology
II
Conventions
Terminology conventions
Table 1 Terminology conventions
Terminology
ANM2000
Meaning
FiberHome e-Fim ANM2000 Broadband Access Network Management
System
Symbol conventions
Table 2 Symbol conventions
Symbol
Refer to
Meaning
Note
Caution
Warning
Meaning
Click
Press the left button of the mouse rapidly and then release it.
Right-click
Press the right button of the mouse rapidly and then release
it.
Double-click
Drag
Select
III
WS/OS
No access to Internet !
Figure 1
No access to Internet
VI
No modification !
Figure 2
VII
No modification !
Figure 3
No modification !
Figure 4
VIII
No modification !
Figure 5
IX
Contents
Preface .................................................................................................................... I
Relevant Manuals .............................................................................. I
Version and Usage ............................................................................ II
Intended Readers ............................................................................. II
Conventions ..................................................................................... III
Operation Safety Rules .......................................................................................... V
Part 1 Technologies
1
1.2
1.3
1.4
2.2
2.3
3
2.2.1
2.2.2
3.1.2
3.2
3.3
3.4
Part 2 Operations
4
4.2
4.3
4.3.2
4.4
4.5
4.5.2
4.5.3
4.6
4.7
4.7.2
4.7.3
4.7.4
4.7.5
4.7.6
4.7.7
4.7.8
4.7.9
4.7.10
4.7.11
4.7.12
4.7.13
4.8
4.9
4.9.2
4.9.3
5
5.2
5.3
5.4
5.4.2
5.4.3
5.5
5.6
5.7
5.8
5.9
5.10
5.11
5.12
5.13
5.14
5.15
5.16
6.1.2
6.1.3
6.2
6.3
6.4
6.3.1
6.3.2
6.3.3
6.5
6.6
6.7
6.8
6.9
6.8.1
6.8.2
6.9.2
7.2
7.2.2
7.3
7.4
8.2
8.3
8.2.1
8.2.2
8.2.3
8.3.2
8.3.3
8.3.4
8.3.5
8.4
9
9.1.1
9.1.2
9.1.3
9.1.4
9.2
9.3
9.4
9.5
9.4.1
Division
................................................................................... 9-13
9.4.2
9.4.3
9.5.2
10.1.2
10.2
10.3
10.4
10.5
Part 3 Maintenance
11 Routine Maintenance ................................................................................. 11-1
11.1
11.2
11.3
11.1.2
11.2.2
11.3.1
11.4
11.5
11.6
11.3.2
11.3.3
11.3.4
11.3.5
11.3.6
11.3.7
11.4.2
11.4.3
11.4.4
11.4.5
11.5.2
11.5.3
11.5.4
11.5.5
11.6.2
11.6.3
11.6.4
12.1.2
12.2
12.3
13.1
13.2
13.3
13.4
13.1.2
13.1.3
13.2.2
13.3.2
13.3.3
13.3.4
13.3.5
13.3.6
13.4.2
13.4.3
13.4.4
14.2
14.3
14.4
14.1.2
14.1.3
14.2.2
14.2.3
14.2.4
14.3.2
14.5
14.6
14.7
14.4.1
14.4.2
14.5.2
14.6.2
14.7.2
14.7.3
14.7.4
14.7.5
14.7.6
14.7.7
Part 4 Appendixes
Appendix A Dual NIC Settings ..........................................................................A-1
A.1
A.2
Appendix B
B.1
B.2
Appendix C
Abbreviations................................................................................ C-1
Figures
Figure 1-1
Figure 2-1
Figure 2-2
Figure 2-3
Figure 2-4
Figure 2-5
Figure 4-1
Figure 4-2
Figure 4-3
Figure 4-4
Figure 4-5
Figure 4-6
Figure 4-7
Figure 4-8
Figure 4-9
Figure 4-10
Figure 4-11
Figure 4-12
Figure 4-13
Figure 4-14
Figure 4-15
Figure 4-16
Figure 4-17
Figure 4-18
Figure 4-19
Figure 4-20
Figure 4-21
Figure 4-22
Figure 4-23
Figure 4-24
Figure 4-25
Figure 5-1
Figure 5-2
Figure 5-3
Figure 5-4
The New Add User target system S1 dialog box ......................... 5-6
Figure 5-5
Figure 5-6
Figure 5-7
Figure 5-8
Figure 5-9
Figure 5-10
Figure 5-11
Figure 5-12
Figure 5-13
Figure 5-14
Figure 5-15
Figure 5-16
Figure 5-17
Figure 5-18
The POTSport in out line test dialog box (1) ............................. 5-15
Figure 5-19
The POTSport in out line test dialog box (2) ............................. 5-16
Figure 5-20
Figure 5-21
Figure 5-22
Figure 5-23
Figure 5-24
Figure 5-25
Figure 5-26
Figure 5-27
Figure 5-28
Figure 5-29
Figure 5-30
Figure 5-31
Figure 5-32
The MSAN line card Software Batch Upgrade tab .................... 5-31
Figure 5-33
Figure 5-34
Figure 5-35
Figure 5-36
Figure 6-1
Figure 6-2
Figure 6-3
Figure 6-4
Figure 6-5
Figure 6-6
Figure 6-7
Figure 6-8
Figure 6-9
Figure 6-10
Figure 6-11
Figure 6-12
Figure 6-13
Figure 6-14
Figure 6-15
Figure 6-16
Figure 6-17
Figure 6-18
Figure 6-19
Figure 6-20
Figure 6-21
Figure 6-22
Figure 6-23
Figure 7-1
Figure 7-2
The Options For Performance Collection And Storage dialog box (1)
.................................................................................................... 7-3
Figure 7-3
The Options For Performance Collection And Storage dialog box (2)
.................................................................................................... 7-4
Figure 7-4
Figure 7-5
Figure 7-6
Figure 7-7
The Set History Performance Query Condition dialog box .......... 7-8
Figure 7-8
Figure 7-9
Figure 7-10
The Set History Performance Query Condition dialog box (1) .. 7-11
Figure 7-11
Figure 7-12
Figure 7-13
The Set History Performance Query Condition dialog box (2) .. 7-13
Figure 7-14
Figure 8-1
Figure 8-2
Figure 8-3
Figure 8-4
Figure 8-5
Figure 8-6
Figure 8-7
Figure 8-8
Figure 8-9
Figure 8-10
Figure 8-11
Figure 8-12
Figure 9-1
Figure 9-2
Figure 9-3
Figure 9-4
Figure 9-5
Figure 9-6
Figure 9-7
Figure 9-8
Figure 9-9
Figure 9-10
Figure 9-11
Figure 9-12
Figure 9-13
Figure 9-14
Figure 9-15
Figure 9-16
Figure 9-17
The filtering results of the View The Command Log tab ............ 9-22
Figure 9-18
Figure 9-19
Figure 9-20
The filtering results of the View The User Login Log tab ........... 9-24
Figure 10-1
Figure 10-2
Figure 10-3
Figure 10-4
Figure 10-5
Figure 10-6
Figure 10-7
Figure 11-1
Figure 11-2
Figure 11-3
Figure 11-4
Figure 11-5
Figure 11-6
Figure 11-7
Figure 11-8
Figure 11-9
Figure 11-10
Figure 11-11
Figure 11-12
Figure 11-13
Figure 11-14
Figure 11-15
Figure 11-16
Figure 11-17
Figure 11-18
Figure 11-19
Figure 11-20
Figure 11-21
Figure 11-22
Figure 11-23
Figure 11-24
Figure 11-25
Figure 11-26
Figure 11-27
Figure 11-28
Figure 11-29
Figure 11-30
Figure 11-31
Figure 11-32
Figure 11-33
Figure 11-34
Figure 11-35
Figure 11-36
Figure 11-37
Figure 11-38
Figure 11-39
Figure 11-40
Figure 11-41
Figure 11-42
Figure 12-1
Figure 13-1
Figure 13-2
Figure 13-3
Figure 13-4
Figure 13-5
Figure 13-6
Figure 13-7
Figure 13-8
Figure 13-9
Figure 13-10
Figure 14-1
Figure 14-2
Figure 14-3
Figure 14-4
Figure 14-5
Figure A-1
Figure A-2
Figure A-3
Figure A-4
Figure A-5
Figure B-1
Figure B-2
Figure B-3
Figure B-4
Figure B-5
Figure B-6
Figure B-7
Figure B-8
Importing files..............................................................................B-5
Figure B-9
Figure B-10
Figure B-11
Figure B-12
Tables
Table 1-1
Table 1-2
Table 4-1
Table 4-2
The operation entry path of saving the configuration data .......... 4-2
Table 4-3
Table 4-4
The operation entry path of setting the audio function ................ 4-7
Table 4-5
Table 4-6
Table 4-7
Table 4-8
Table 4-9
Table 4-10
Table 4-11
Table 4-12
Table 5-1
Table 5-2
The operation entry path of managing the EPON subscriber ...... 5-5
Table 5-3
Table 5-4
Table 5-5
Table 5-6
The operation entry path of upgrading the ONUs in batches .... 5-29
Table 5-7
The operation entry path of upgrading the MSAN line card software
in batches ................................................................................. 5-30
Table 5-8
Table 5-9
Table 5-10
Table 5-11
Table 6-1
The operation entry path of setting the filtering status of all alarms .
.................................................................................................... 6-3
Table 6-2
Table 6-3
Table 6-4
The operation entry path of viewing the filtering status of alarms 6-9
Table 6-5
The operation entry path of defining global alarm levels ........... 6-11
Table 6-6
The operation entry path of defining object alarm levels ........... 6-12
Table 6-7
The operation entry path of defining card / port alarm levels .... 6-13
Table 6-8
The operation entry path of viewing custom alarm levels ......... 6-14
Table 6-9
Table 6-10
Table 6-11
Table 6-12
Table 6-13
Table 7-1
Table 7-2
The operation entry path of viewing instant performance data .... 7-5
Table 7-3
Table 7-4
Table 7-5
Table 8-1
Table 8-2
The operation entry path of the system resource statistics ......... 8-3
Table 8-3
The operation entry path of the system card statistics ................ 8-4
Table 8-4
The operation entry path of the system port statistics ................. 8-5
Table 8-5
The operation entry path of the ONU port information statistics .. 8-6
Table 8-6
Table 8-7
The operation entry path of the ONU equipment statistics .......... 8-8
Table 8-8
The operation entry path of viewing the ONU resource detailed list
.................................................................................................... 8-9
Table 8-9
Table 8-10
The operation entry path of the MGC resource statistics .......... 8-11
Table 9-1
Table 9-2
The configuration items in the Add New User dialog box ...... 9-3
Table 9-3
Table 9-4
Table 9-5
Table 9-6
Table 9-7
Table 9-8
Table 9-9
Table 9-10
Table 9-11
Table 11-1
Table 11-2
Table 11-3
Table 11-4
Table 12-1
Table 13-1
Table 13-2
Table 13-3
Table B-1
e-Fim ANM2000
Broadband Access Network
Management System
Operation Manual (Based on
Windows)
Version: F
Code: MN000000050
Part 1 Technologies
Overview
This chapter gives an overview of the ANM2000. It includes the following contents:
Brief introduction
Managed equipment types
Hardware configuration
Software architecture
Version: F
1-1
Part 1 Technologies
1.1
1 Overview
Brief Introduction
The ANM2000 is an integrated broadband access management platform
developed by FiberHome. It can provide effective centralized management for
various broadband access equipment types of FiberHome.
1.2
Equipment Type
Equipment Name
OLT
ONU
1-2
MSAN
Service product
NP5500
Version: F
Part 1 Technologies
1.3
1 Overview
Hardware Configuration
Table 1-2
Network Scale
200 to 500 OLTs,
connected
with
the
full-configuration
ONUs
100 to 200 OLTs,
connected
with
the
full-configuration
ONUs
Less than 100
OLTs, connected
with
the
full-configuration
ONUs
Version: F
CPU
Hardware configuration
Clock
Rate
CPU
Number
Intel Xeon
processor
X7460,
16G
4
Intel Xeon
X7350,
3 GHz
DDR3
(UDIMM),
1333MHZ
Intel Xeon
E5506,
(UDIMM),
8G
2.93 GHz
processor
DDR3
1333MHZ
2.66 GHz
processor
Memory
4G
2
DDR3
(UDIMM),
1333MHZ
Hard Disk
Monitor
NIC
Embedded
2*300GB, SAS
hot-swappable
19-inch
NC326i
PCI
hard disk,
flat colour
Express
bi-port
15000 rpm
GE server adaptor
2*146GB, SAS
Embedded
hot-swappable
19-inch
NC326i
PCI
hard
flat colour
Express
bi-port
disk,
GE server adaptor
15000 rpm
Embedded
2*146GB, SAS
hot-swappable
17-inch
hard
flat colour
disk,
15000 rpm
HP
NC107i
PCI-Express
bi-port GE server
adaptor
1-3
Part 1 Technologies
1.4
1 Overview
Software Architecture
The ANM2000 is based on the Windows XP professional SP2 or the Windows
2003 SP1 operating system and the Informix database. The software architecture
of the ANM2000 is illustrated as Figure 1-1.
Client end
Database
Background
processing service
Collection service
ANM2000
The managed
equipment
Figure 1-1
1-4
Version: F
Version: F
2-1
Part 1 Technologies
2.1
Working Mode
At present, the ANM2000 uses the Client end-Server end working mode.
When the network maintenance engineers are far from both the access equipment
and the network management system server, this Client end-Server end working
mode can be used to access the server via the Client end for achieving the
purpose of managing the equipment. In this case, the ANM2000s Client end and
Sever end can be installed on one computer, as shown in Figure 2-1, or
respectively on two computers. When both the Client end and server end are
installed on a computer, this is also called a stand-alone mode.
Figure 2-1
2-2
Version: F
Part 1 Technologies
Version: F
2-3
Part 1 Technologies
2.2
Connection Methods
2.2.1
Connection Model
The network management server is connected to the managed system via the
Ethernet interface, and the network management client is connected to the network
management server via the TCP / IP, as illustrated in Figure 2-2.
The ANM2000 (WS / OS)
server
The managed
system
TCP / IP
Ethernet
TCP / IP
The ANM2000 GUI
The background
processing service
Database
The collection
service
The ANM2000 GUI
Client
Figure 2-2
2.2.2
Connection Methods
In the network, the access equipment is provided with the inband / outband
connection modes by the ANM2000, described as follows.
Outband connection mode
The outband connection mode means to transmit the management data and
service data in two paths respectively; for example, on the AN5116-02, the
network cable is connected to the equipments FE port on the GUP7 / GUPE7
card.
Figure 2-3
2-4
Part 1 Technologies
Note:
Generally you only need to perform the connection in the previous figure
via a twisted pair network cable; if you need to debug the equipment
using a PC, you can connect the PC with the equipment via a serial port
cable.
Inband connection mode
The inband connection mode means to transmit the management data and the
service data in one path; for example, on the AN5116-02, the network cable is
connected to the equipments GE port on the GUP7 card.
Figure 2-4
Note:
The ANM2000 can visit and manage the equipment via the TCP / IP
protocol and the ATM channel.
Version: F
2-5
Part 1 Technologies
2.3
ANM2000 server
Private protocol,
SNMP
TCP / IP
Equipment
ANM2000 client
Figure 2-5
2-6
Upper-layer network
management system
Version: F
Management Functions
This chapter describes the management functions of the ANM2000, including the
following contents:
Configuration management
Fault management
Performance management
Security management
Version: F
3-1
Part 1 Technologies
3.1
3 Management Functions
Configuration Management
The powerful and flexible configuration function is one of the characteristics of the
ANM2000. The ANM2000 supports the networks jointly consisting of various
access equipment types and the networks with complex topological architectures.
It has a clear and direct network architecture which can be modified conveniently,
and the property of the network node is specifically described. Users can configure
the physical and logical properties of the network equipment flexibly and
conveniently in the ANM2000.
The configuration management deals with the operations done to the access
equipment, including: adding, deleting, modifying and testing the physical
configuration, configurations of various system functions.
3.1.1
System Configuration
The system configuration covers mainly the following functions:
System setting: through the system setting commands, the connection can be
established between the network management system and the equipment.
The system setting parameters include the system name, the management
program, the IP address, the subnet mask, the equipment manufacturer name,
the OLT system IP address, the username, the user password, etc.
Equipment configuration: delivers the equipment configuration parameters to
the system. The parameters include the configurations of the module and its
cards, number of ports on a card, port type, line type, line encoding, etc.
Time calibration: makes the managed equipment synchronous with the
network management system.
Note:
All the three commands mentioned previously are to initialize the
system.
Service setting: sets the data service, the voice service, the IPTV service, the
CATV service, etc.
3-2
Version: F
Part 1 Technologies
3.1.2
3 Management Functions
Card Configuration
The ANM2000 can manage the following types of equipment: the AN5006-20, the
AN3300, the AN5116-02, the AN5116-06, the AN5116-06A, the AN5116-06B, etc.
Here we take the AN5116-02 as an example to introduce the card configuration
functions of the ANM2000.
Cards of the AN5116-02 include the EC2 card, the GSWC card, the AC16 card, the
GUP7 card, etc.
The configurations of various functions are done to the cards, including the
following items:
Configuration of the EC2 card: the configuration parameters include the PON
port bandwidth, the PON port switch, etc.
Configuration of the GSWC card: the configuration parameters include the
office end VLAN information, the QinQ profile, the authentication mode, etc.
Configuration of the AC16 card: the configuration parameters include the voice
uplink information, the NGN uplink subscriber information, the V5 information,
etc.
Configuration of the GUP7 card: the configuration parameters include the
uplink port information, the port mirroring, the port trunk, etc.
Version: F
3-3
Part 1 Technologies
3.2
3 Management Functions
Fault Management
The fault management carries out the real time supervision on the abnormal
operating status of the telecommunication network equipment and the network
channels, including the following aspects:
Supervising, reporting and saving alarm signals
Diagnosing, locating and handling faults
Querying and filtering alarm information
Displaying alarms
The fault management enables users to make responses and decisions in a
possibly short time and take measures to isolate and correct the faults, so as to
resume the service influenced by the fault. Hereunder goes a brief introduction to
the alarm level definition and main functions of the fault management.
communication
Urgent alarm: refers to the alarm which causes the service interruption and
needs immediate troubleshooting.
Major alarm: refers to the alarm which influences services and needs
immediate troubleshooting.
Subordinate alarm: refers to the alarm which does not influence services but
needs troubleshooting to avoid deterioration.
3-4
Version: F
Part 1 Technologies
3 Management Functions
Prompt alarm: refers to the alarm which does not influence the current
services but has the possibility to influence services; users can decide
whether to handle it or not on demand.
In accordance with various alarm levels, the network management system lights
the alarm indicators of different colors and notifies users to handle faults in time.
Version: F
3-5
Part 1 Technologies
3 Management Functions
The ANM2000 displays the collected alarms in a visual form. The displayed
contents include the items as follows:
The name of the supervised object (the management domain / system / card /
module / port);
The alarm name;
The alarm type;
The beginning time and the ending time;
The confirming user and the confirmation information.
Capacity management
The ANM2000 provides the history alarm capacity management function. The
alarm capacity management function includes saving the history alarms and
displaying the current database operating status.
Saving the history alarm data: limits the history data from occupying the
network management system database resource, so as to increase the
operation efficiency of the network management system.
Users can set the saving threshold according to the number of records
supported by the database. When records in the database exceed the saving
threshold, the old data will be deleted from the database. The old data can be
processed in two modes: to be saved to the harddisk, or be deleted directly.
Users can also set the number of saved files.
Displaying the current database operating status: displays the use rate of the
current database visually by a pie chart. In addition, users can clear all records
in the database as required.
Report management
The ANM2000 supports the function to export alarms, and can export the data of
the current and history alarms in a *.html or *.excel file.
3-6
Version: F
Part 1 Technologies
3 Management Functions
Fault location
In case of the network fault, analyze various alarm signals to locate the fault source
exactly. This is the precondition to eliminate the fault.
In the ANM2000, a layer-by-layer filtering mechanism is set to filter and analyze the
alarms, so as to decrease the information redundancy, possibly narrow down the
scope of fault causes and finally locate the fault exactly.
The ANM2000 provides the accurate fault location function, capable of locating a
fault to a specific system, module, card, port, etc. and revealing the fault
information visually to users through the GUI.
3.3
Performance Management
In the ANM2000, the performance management is of great importance because the
access network is service- and user- oriented and has a high demand on the
equipment performance. With careful designs, the ANM2000 can ensure the real
time property of the instant performance collection, ensure the exhaustiveness and
correctness of the data record on the history performance, and provide convenient
and reliable interfaces for users to query performance data as well.
The main purpose of the performance management is to collect the quality data on
the actual running of the relevant equipment in the access network, form the
statistical data used to monitor or adjust the status or efficiency of the system or
equipment, and provide a basis of the assessment, analysis, forecast, and
planning for management personnel. The detailed functions are as follows:
Performance data collection and saving
Performance data query and display
Capacity management and report management
Version: F
3-7
Part 1 Technologies
3 Management Functions
The collection time: all time, the fixed time every day, and the given interval
can be selected.
The collection type: the 15-minute performance and the 24-hour performance
can be selected.
The performance code: a performance name can be selected.
3-8
Version: F
Part 1 Technologies
3 Management Functions
Capacity management
The ANM2000 provides the history performance capacity management function.
The history performance capacity management function includes setting the history
performance dump and displaying the current database operating status.
The history performance capacity management function is similar to the history
alarm capacity management function. Users can refer to Section 3.2 for the
detailed description, and we will not go further on this issue here.
Report management
The performance report management function is similar to the alarm report
management function. Users can refer to Section 3.2 for the detailed description,
and we will not go further on this issue here.
3.4
Security Management
The security management is in charge of the security check of the operators who
access to the network management system, so as to avoid the illegal access of
unauthorized operators to the network resources and equipment. The security
management relates to all management functions, and its main functions are as
follows:
Management of the user level and authority
Access control
Data security
Version: F
3-9
Part 1 Technologies
3 Management Functions
Has the highest level. In addition to all functions for the manager, the
administrator is provided with the function of modifying the administrator
configuration and creating, deleting and modifying users at all levels (including
the user No., the staff number, the password, etc).
Manager
Has the high-level authority only second to the administrator, with all
authorities of the power user. The dedicated operations of the manager
authorities are as follows:
Importing the system configuration, delivering the management
configuration, delivering the equipment configuration, and writing the
equipment data;
Defining the alarm level, the performance collection scheme, the alarm
filter, and the performance history filter;
Saving data into the database.
Power user
The power user has a level with certain limits, provided with the authorities for
the following operations:
Detecting the physical configuration;
Copying and pasting the object configuration;
Deleting nodes, and saving the system configuration into the database.
User
The user is provided with the operation authorities for limited functions, owning
the authorities for the following operations:
Querying the instant performance and the history performance, managing
the history performance report;
Querying the current alarm and the history alarm, managing the history
alarm report;
Viewing the command manager.
3-10
Version: F
Part 1 Technologies
3 Management Functions
Guest
The guest is the system monitoring user with the lowest level. Users of this
type can only monitor the properties such as the system alarm status and the
user port status, and their access to data is commonly restricted only to the
read operation. Their main authorities are as follows:
Viewing the alarm statistics, viewing the log, and viewing the alarm report
information;
Querying the user port status, modifying the history alarm dump threshold,
modifying the equipment attributes information;
Searching the system, restoring the card name, and the equipment
statistic function.
Access control
The access control relates to the user register and the login management, the
management domain partition, the user command authority assignment, the
access time limit, the remote access control, etc. It is for the purpose of restricting
the access of illegal users to the network resources (including the network
management system itself) or the cross-right access.
User register and login management: before entering the network
management system, an operator should log in the system, input the
username and password, and then enter after being confirmed by the system.
The purpose of this action is to ensure that only the authorized operators can
access the network management system.
Management domain partition: the managed equipment sets are classified into
different domains as required. Operators are empowered according to the
management domains, the management functions, etc. Only the authorized
operators can access the designated domains. Domains can be added,
modified, and deleted as required.
User command authority assignment: according to the assigned authority, a
user can only perform the allowed operations on the equipment within his / her
corresponding authorized management domain.
Access time limit: a users access time can also be set as required. For
example, only allows operators to access the network management system
within the designated time range.
Access point limit: the system can restrict the client IP addresses of the user
login to refuse the access of illegal clients.
Version: F
3-11
Part 1 Technologies
3 Management Functions
Data security
The security mechanism in the ANM2000 can meet the data security guarantee
requirements effectively, and offer data the completeness and confidentiality and
security management measures of the database.
Data completeness: ensures that the data reach and only reach the
destination and guarantees that the data are transmitted without distortion or
loss on one hand, and ensures that the corresponding data are saved and can
be restored when necessary on the other.
Data confidentiality: prevents unauthorized operators from getting the
transmission data of the communication and protects the transmission data
from leakage.
Database security management: provides the guarantee for the network
management system security. The data or files in the database can be backed
up totally or partially into the external storage device.
3-12
Version: F
e-Fim ANM2000
Broadband Access Network
Management System
Operation Manual (Based on
Windows)
Version: F
Code: MN000000050
Part 2 Operations
System Management
The system management means the operations relevant to the basic functions of
the ANM2000. The relationships between the system management functions,
sub-functions, and operations are shown in Figure 4-1.
Enter / exit edit
mode
Import
configuration
data
Import / export
configuration
data
Export
configuration
data
Save
configuration
data
Configure audio
function
System
managem
ent
Set audio
function
Disable audio
function
Figure 4-1
View system
and database
information
Lock / log out /
exit network
management
system
Lock network
management
system
Log out network
management
system
Exit network
management
system
Version: F
4-1
Part 2 Operations
4.1
4 System Management
Operation Item
Entering
mode
the
After entering the edit mode via the paths listed in Table 4-1, if you want to exit the
edit mode, you only need to click System Edit Mode in the main menu or
in the toolbar again.
4.2
Operation Item
Saving
configuration data
Note:
After saving the configuration data successfully, the ANM2000 will exit
the edit mode automatically.
4-2
Version: F
Part 2 Operations
4.3
4 System Management
Operation Item
Importing
configuration data
Exporting
the
configuration data
4.3.1
Purpose
This operation is used to import the configuration files in the network management
computer to the ANM2000.
Background information
After the configuration data are imported, the current configured data in the
ANM2000 will be overwritten.
Prerequisite
The system is in the edit mode.
The configuration files to be imported are saved in one same folder.
Version: F
4-3
Part 2 Operations
4 System Management
Operation steps
Step 1: Open the alert box of importing the configuration as shown in Figure 4-2 via
the paths listed in Table 4-3.
Figure 4-2
Step 2: Click Yes in this alert box to open the Choose Directory dialog box, as
shown in Figure 4-3.
Figure 4-3
4-4
Version: F
Part 2 Operations
4 System Management
Step 3: Click
in this dialog box to open the Browse For Folder dialog box, as
Figure 4-4
Step 4: Select the folder to be imported in this dialog box and click OK to exit the
Browse For Folder dialog box, and return to the Choose Directory dialog box.
Step 5: Click OK in the Choose Directory dialog box.
Version: F
4-5
Part 2 Operations
4.3.2
4 System Management
Purpose
This operation is used to export the current configuration data in the ANM2000 and
save them in the *.xml format in the dedicated position of the network management
computer.
Operation steps
Step 1: Open the Choose Directory dialog box as shown in Figure 4-3 via the
paths listed in Table 4-3.
Step 2: Click
4.4
4-6
Version: F
Part 2 Operations
4.5
4 System Management
Operation Item
Configuring
audio function
Disabling the audio
function
Enabling the audio
function
4.5.1
Purpose
The ANM2000 provides abundant audio functions, prompting you the occurring of a
corresponding operation event or to conduct the next operation. You can also
define your custom audio functions on demand.
Version: F
4-7
Part 2 Operations
4 System Management
Operation steps
Step 1: Open the Sound Config dialog box via the paths listed in Table 4-4, as
shown in Figure 4-5.
Figure 4-5
After you select a certain event, the system will display the path including its audio
file.
Step 2: Click Test at the right side of a certain event to listen to the current audio
function for test.
4-8
Version: F
Part 2 Operations
4 System Management
Step 3: To change the audio function file corresponding to the occurring of a certain
event, click this event and then Browse to open the Open dialog box as shown in
Figure 4-6; then select the object audio function file and click Open.
Figure 4-6
Version: F
4-9
Part 2 Operations
4.5.2
4 System Management
; at the same time, the submenu option Close Sound under System in the
main menu will change to Open sound.
4.5.3
; at the same time, the submenu option Open Sound under System in the main
menu will change to Close Sound.
4.6
Purpose
To make users view the information of the system and the database easily, the
ANM2000 provides the system and database viewing function; at the same time, it
adds the report and chart display function of the background server.
4-10
Version: F
Part 2 Operations
4 System Management
Operation steps
Table 4-5
The operation entry path of viewing the system and database information
Operation Item
Viewing
the
and
information
database
Step 1: Open the System And Database Information tab via the paths listed in
Table 4-5, and the System Information page will be displayed by default. In this
page, users can view the information of the current system, such as PC Name, IP
Address, OS Information, CPU Type, Memory and Process. See Figure 4-7.
Figure 4-7
You can right-click the blank and select Refresh in the shortcut menu to refresh the
procedure status.
Step 2: Click Server System Information Report to enter the Server System
Information Report tab. In this tab, right-click any position, and select Set Query
Condition to open the Server System Information Condition Set dialog box.
Version: F
4-11
Part 2 Operations
4 System Management
Step 3: Set the query condition on demand, and then click OK. In this case, you
can view the information of the current background server, such as Item Name,
CPU Percentage, and Memory Percentage. See Figure 4-8.
Figure 4-8
Step 4: Click Server System Information Chart to enter the Server System
Information Chart tab. In this tab, you can view the chart information of the current
background server. See Figure 4-9.
Figure 4-9
4-12
Version: F
Part 2 Operations
4 System Management
Step 5: Click Database Information to enter the Database Information tab. In this
tab, you can view the information of the current database, such as the capacity and
use percentage. See Figure 4-10.
Figure 4-10
4.7
Common Settings
Users can set the common parameters of the ANM2000 GUI and its background
based on the actual situation of the office end in which the ANM2000 locates, for
the effective network management.
4.7.1
System Setting
Purpose
You can use the system setting function to make the ANM2000 regularly refresh
the online user list and automatically lock the Client end after no operation within
the set time to ensure the network security.
Version: F
4-13
Part 2 Operations
4 System Management
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select GUI System in the object tree.
Step 3: Refer to the settings listed in Table 4-6 on demand.
Table 4-6
Parameter
Instruction
Auto refresh
Refresh
online
user
every:
Auto lock
Logout
locked
when
system
system locked
Configuration instance
Figure 4-11 gives a configuration instance of the Auto lock pane: if there is not any
operation on the current Client end within 10 minutes, the system will automatically
lock the Client end; if the Client end does not log in the ANM2000 again after being
locked within 4294967295 minutes, the system will log out automatically.
Figure 4-11
4-14
Part 2 Operations
4.7.2
4 System Management
Connection Setting
Purpose
You can use the connection setting function to set the RCF call and connection
timeout values, and the checking connection interval and the allowing interruption
time values of the connection between the Client and Server ends, to ensure the
high-effective RCF connection and GUI background connection.
Background information
If no special needs, we recommend that you do not modify the parameters of this
connection setting.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select GUI Connection in the object tree.
Step 3: Refer to the settings listed in Table 4-7 on demand.
Table 4-7
Parameter
Instruction
The timeout value of establishing the
RCF connection wait for:
RCF setting
RCF Call wait for:
for
Connection
between
and server
Client
the
interruption
time
of
the
Version: F
4-15
Part 2 Operations
4 System Management
Configuration instance 1
Figure 4-12 gives a configuration instance of the RCF setting pane: in the process
of establishing connection between the Client end and the background, if the
response time exceeds 10 seconds, it indicates that the connection establishment
fails; when users call the background functions via the Client end and the response
time from the background exceeds 360 seconds, it indicates that the connection
timed out.
Figure 4-12
Configuration instance 2
Figure 4-13 gives a configuration instance of the Setting for Connection between
Client and server pane: the system will check whether the connection between
the GUI and the background is normal every 20 seconds; when the interruption
time of the communication between the GUI and the background is 0 second, it
indicates that the communication between the GUI and the background is normal.
Figure 4-13
server pane
4-16
Version: F
Part 2 Operations
4.7.3
4 System Management
Service Setting
Purpose
You can use the service setting function to set the time interval of getting the MCU
cards status and the time interval of refreshing current alarms, to more timely
display the key information that you concern about.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select GUI Service in the object tree on the left of the pane, to open the
dialog box as shown in Figure 4-14.
Figure 4-14
Version: F
4-17
Part 2 Operations
4 System Management
Parameter
Get MCU board status every:
Instruction
Get the MCU cards status at intervals which is set in this
item.
Refresh the Current Alarm GUI at intervals which is set in
this item.
4.7.4
International Setting
Purpose
You can use the international setting function to switch the languages (i.e. Chinese
and English) displayed in the GUI, so as to meet your requirement on multiple
languages displayed in the GUI.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select GUI International setting in the object tree.
Step 3: Click the drop-down list of the Language: item to select your preferred
language.
Step 4: Click the OK button.
Step 5: Restart the Client end to make the configuration valid.
4-18
Version: F
Part 2 Operations
4.7.5
4 System Management
Purpose
After enabling the Telnet proxy service, you can access the equipment on the Client
end via the proxy server.
Background information
In the project application, a firewall is usually set between the ANM2000 Client
end and the equipment for the network security reasons, so the Client end
cannot access the equipment in the Telnet mode directly. In this case, you can
set up a secure third-party server as a proxy server to access the equipment
via the proxy server.
This setting pane is for you to enable the Telnet proxy Client end. To use the
Telnet proxy function, you also need to install the Telnet proxy Server end on
the third-party server and configure the related parameters, referring to Step 5:
Restart the Client end to make the configuration valid.
Set the Telnet proxy Sever.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select GUI Telnet Proxy Enable in the object tree.
Step 3: Select the Telnet Proxy Enable item and set the Telnet Proxy Program
Path: item.
Step 4: Click the OK button.
Step 5: Restart the Client end to make the configuration valid.
Version: F
4-19
Part 2 Operations
4.7.6
4 System Management
Purpose
You can set the ONU Device Statistic GUI by horizontal or vertical display based
on ONU types, so as to match your usage better.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select GUI Resources Statistics GUI Client in the object tree.
Step 3: Select Horizontal Display by ONU Type or Vertical Display by ONU
Type on demand.
Step 4: Click the OK button.
Step 5: Restart the Client end to make the configuration valid.
Note:
Click Statistic ONU Device Statistic in the main menu to open the
ONU Device Statistic tab. And then you can switch the ONU type
display mode, using the shortcut menu.
4.7.7
Client Setting
Purpose
You can set the related characteristics for the Client, including the time of
forbidding to login after the forced disconnection and the auto unlock time after the
login locked, to ensure the operation security of network.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
4-20
Version: F
Part 2 Operations
4 System Management
Step 2: Select Server Client in the object tree, to open the dialog box as shown
in Figure 4-15.
Figure 4-15
Parameter
Instruction
If an administrator forces other users offline, the forced
when login:
config menu
Pre-deploy
Version: F
N/A
4-21
Part 2 Operations
4 System Management
4.7.8
Database Setting
Purpose
You need to regularly update the database user name and password to guarantee
the security of the database. After finishing this modification on the database, you
also need to modify the related parameters of the ANM2000 at the same time, in
order to ensure that the ANM2000 can successfully access the database.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select Server Database in the object tree, to open the dialog box as
shown in Figure 4-16.
Figure 4-16
4-22
Version: F
Part 2 Operations
4 System Management
Note:
If you modify the setting of the EMS ANServer bind IP item or the Bind
to port item, then the Client end originally connected to this server IP will
be disconnected.
Step 4: Click the OK button.
Step 5: Restart the Client end to make the configuration valid.
4.7.9
Polling Setting
Purpose
You can use the polling setting function to set the period and time interval of alarm
polling and status lamp polling, to meet your special requirement on the polling
time.
Background information
If no special needs, we recommend that you do not modify the parameters of this
polling setting.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select Server Polling in the object tree.
Step 3: Set each item on demand. Among them:
The polling period: refers to the time interval between two polling operations.
The polling interval: refers to the time interval of polling different devices in one
polling operation.
Step 4: Click the OK button.
Step 5: Restart the Client end to make the configuration valid.
Version: F
4-23
Part 2 Operations
4.7.10
4 System Management
Purpose
You can use the alarm forward setting function to set the related parameters of
sending E-Mail in the alarm forward, such as E-Mail server and Send mail
address.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select Server Alarm Forward in the object tree.
Step 3: Select the Forward alarm check box on demand and set each item, as
shown in Figure 4-17.
Figure 4-17
4-24
Version: F
Part 2 Operations
4.7.11
4 System Management
Purpose
When using the CORBA interface to connect the third-party software, you need to
load the CORBA interface.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select Server Load Plug-in in the object tree.
Step 3: Select the Load CORBA-Interface check box on demand.
Step 4: Click the OK button.
Step 5: Restart the Client end to make the configuration valid.
4.7.12
Purpose
You can set the fixed time or the automatic confirmation mode for confirming the
ended alarms, to improve the efficiency of alarm confirmation.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
Step 2: Select Server Alarm sets in the object tree.
Version: F
4-25
Part 2 Operations
4 System Management
Step 3: Set each parameter related to the alarm automatic confirmation on demand,
referring to the settings listed in Table 4-10.
Table 4-10
Parameter
Instruction
When you select Fixed time and set the time, the
Fixed time
4.7.13
Purpose
After setting the parameters related to the Telnet proxy server, you can use the
proxy server to access the equipment.
Background information
This function should be used together with the Telnet Proxy Enable function.
Operation steps
Step 1: Select System Option in the main menu to open the Option dialog box.
4-26
Version: F
Part 2 Operations
4 System Management
Step 2: Select Server Telnet Proxy Server Setting in the object tree, as shown
in Figure 4-18.
Figure 4-18
Step 3: Set the parameters related to the proxy server according to the actual
situation.
Step 4: Click the OK button.
Step 5: Restart the Client end to make the configuration valid.
4.8
Printing
Purpose
The ANM2000 provides perfect print functions; you can select and print your own
concerned data information.
Version: F
4-27
Part 2 Operations
4 System Management
Operation steps
Table 4-11
Operation Item
Setting
the
the
options
Setting
preview
Printing
Step 1: Open the Page Setup dialog box via the path Print Option listed in Table
4-11, as shown in Figure 4-19.
Figure 4-19
Step 2: In the Page Setup dialog box, set the items such as Headers and Footers,
Paper, Orientation, Margins, and Printer on demand. Then click OK.
4-28
Version: F
Part 2 Operations
4 System Management
Step 3: Preview the print result in the view pane via the path Print Preview listed in
Table 4-11, as shown in Figure 4-20. If you are not satisfied with the print result,
click Close and conduct step 2 again; if you are satisfied with the print result, click
Close and conduct step 4.
Figure 4-20
Step 4: Open the Print dialog box via the path Print listed in Table 4-11, as
shown in Figure 4-21.
Figure 4-21
Step 5: In the Print dialog box, set the items such as Printer, Print range, and
Number of copies. Then click OK.
Version: F
4-29
Part 2 Operations
4 System Management
Step 6: In the Save As PDF File window that appears subsequently, you can save
the contents to be printed as a file in the pdf format to the designated path on
demand.
4.9
The operation entry path of locking / logging out / exiting the network management
system
Operation Item
out
the
network management
system
Exiting
the
network
management system
4.9.1
Purpose
Locking the network management system is one of the security management
measures. After this operation is executed, the current system operation GUI will
be locked, and no GUI operations can be performed.
Operation steps
After the network management system is locked via the path listed in Table 4-12,
the ANM2000 User Login dialog box will appear automatically, as shown in Figure
4-22. The locking status can be cancelled only after you input the correct password
at the right side of Password and click OK.
4-30
Version: F
Part 2 Operations
4 System Management
Figure 4-22
4.9.2
Purpose
When needing to modify the login user, you can first log out the network
management system and then log in it as a new user.
Operation steps
Step 1: Select the path listed in Table 4-12, and the exit alert box as shown in
Figure 4-23 will appear automatically.
Figure 4-23
Step 2: Click OK in this alert box to exit the ANM2000; then the ANM2000 User
Login dialog box as shown in Figure 4-24 will appear automatically.
Version: F
4-31
Part 2 Operations
4 System Management
Figure 4-24
Step 3: In the ANM2000 User Login dialog box, input the username and the
password in turn, and click OK to log in again.
4.9.3
Purpose
Under certain special conditions (for example, prior to the upgrade operation of the
network management system), you need to exit the network management system.
Operation steps
Step 1: Select the path listed in Table 4-12, and the exit alert box as shown in
Figure 4-25 will appear automatically.
Figure 4-25
4-32
Version: F
Configuration Management
The configuration management means the operations to configure the information
of the network and the system equipment, and is the most important core
management function of the ANM2000. The relationships between the
configuration management functions, sub-functions and operations are shown in
Figure 5-1.
Configure
manager
Manage capacity
of history
database
Manage EPON
subscriber
Add
configuration
comparing task
Add POTS port
test task
Manage timed
task
Add system
configuration
backup task
Figure 5-1
Configuration
management
function
Manage OLT
register
Trace signalling
Manage
configuration
Set home gateway in bulk
mode
5-1
Part 2 Operations
5 Configuration Management
5-2
Version: F
Part 2 Operations
5.1
5 Configuration Management
Manager Configuration
Background information
The AEMS-Manager service is mainly used to interexchange the data between the
equipment and the ANM2000. When there is relatively much equipment to be
managed (for example, there are more than 500 OLTs), users generally install
various services of the ANM2000 in the distributed mode, so as to increase the
data-processing capacity of the ANM2000; in this case, the AEMS-Manager
service may be installed on different computers.
Purpose
To communicate with all equipment sets normally, when installing the ANM2000 in
the distributed mode, you need to configure the server with the AEMS-Manager
service on it as the manager. For the non-distributed installation, this operation is
not needed.
Operation steps
Table 5-1
Operation Item
Configuring
manager
Version: F
5-3
Part 2 Operations
5 Configuration Management
Figure 5-2
5-4
Version: F
Part 2 Operations
5.2
5 Configuration Management
Purpose
Managing the EPON subscriber means to manage the service configurations of the
ONU of the AN5116-02 and the AN5116-06.
Note:
The subscriber mentioned in this section refers to the subscriber
connected with the ONU of the AN5116-02 and the AN5116-06, and
does not mean the user operating the ANM2000.
Prerequisite
Only the users with the levels not lower than the middle level have this
operation authorization.
Operation steps
Table 5-2
Operation Item
subscriber
Version: F
5-5
Part 2 Operations
5 Configuration Management
Step 1: Select a path listed in Table 5-2 to enter the EPON User Management
window as shown in Figure 5-3.
Figure 5-3
Step 2: Select the card object needing to add subscribers, and click User
Management Add User / Add FTTB User in the main menu or
in the
toolbar to open the New Add User target system S1 dialog box as shown in
Figure 5-4.
Figure 5-4
5-6
Version: F
Part 2 Operations
5 Configuration Management
Step 3: Input the values of various information items in turn according to the actual
demands, and then click OK or Apply to open the authorization dialog box as
shown in Figure 5-5.
Figure 5-5
Step 4: In the authorization dialog box, select the value of ONU Type and click Get
Auth No; finally click Save Database or Write Device to save the configuration in
the database or write it to the equipment. After the operation is successful, the
basic information of the newly-added subscriber will be displayed in the EPON
User Management window, as shown in Figure 5-6.
Figure 5-6
Version: F
5-7
Part 2 Operations
5 Configuration Management
Note:
Write Device includes two operationssaving the configuration in the
database and downloading the configuration to the equipment; Write DB
only saves the configuration in the database, and users usually use it on
demand when the configuration in the database is not consistent with
that of the actual equipment.
Step 5: For the versions lower than V1.3 (not including V1.3) of the 5116-02 and the
5116-06, when the configuration data of the network management system and the
equipment are different, you need to conduct this step.
1.
Select a path listed in Table 5-2 to enter the EPON User Management
window.
2.
Select the object ONU, and click User Data Check in the main menu or
in the toolbar; if the system displays the information as shown in Figure 5-7,
this indicates that the authorization status of the network management system
is different with that of the equipment.
Figure 5-7
The authorization status of the network management system being different with
Version: F
Part 2 Operations
5 Configuration Management
3.
Close the User Data Check window, and return to the EPON User
Management window.
4.
Right-click the object, and select Delete in the shortcut menu; then click Yes in
the alert box to delete the subscriber and deauthorize the ONU. See Figure
5-8.
Figure 5-8
5.
Figure 5-9
Version: F
5-9
Part 2 Operations
5 Configuration Management
6.
Click
Figure 5-10
After the ONU is authorized again, the authorization states of the ANM2000
and the equipment are the same, as shown in Figure 5-11.
Figure 5-11
The authorization status of the network management system being the same as
5-10
Version: F
Part 2 Operations
5.3
5 Configuration Management
Purpose
If you need to set the MAC address of the home gateway in batches, you can
enable this function.
Operation steps
Step 1: Click Config Manage Home Gateway Setting in the main menu to
open the Home Gateway Setting window as shown in Figure 5-12.
Figure 5-12
Figure 5-13
Version: F
5-11
Part 2 Operations
5 Configuration Management
Step 3: Click the added item, and input the values of Start MAC Address and End
MAC Address in turn, as shown in Figure 5-14.
Figure 5-14
, or
Figure 5-15
5-12
Version: F
Part 2 Operations
5.4
5 Configuration Management
5.4.1
Purpose
You can use this task to compare whether the configuration data of the selected
card are the same as those stored in the database.
Operation steps
Step 1: Click Config Manage Timed task Manage in the main menu to open
the Timed task manage window as shown in Figure 5-16.
Figure 5-16
Version: F
5-13
Part 2 Operations
5 Configuration Management
Step 2: Click Add Operation Add Config Compare Task in the main menu of
the Timed task manage window or the
button in the
toolbar to open the CFG Compare Timed task dialog box as shown in Figure 5-17.
Figure 5-17
Step 3: Select the equipment object, and then set the enabling state, the period,
and the start time of the task in turn.
Step 4: Click OK to save the setting, and the ANM2000 can compare whether the
configuration data of the card are the same as those stored in the database on a
fixed time; the comparison results will be displayed in the dialog box at the bottom
of the window.
5-14
Version: F
Part 2 Operations
5.4.2
5 Configuration Management
Purpose
You can use this function to test whether the POTS port of the ONU is normal.
Operation steps
Step 1: Click Config Manage Timed task Manage in the main menu to open
the Timed task manage window as shown in Figure 5-16.
Step 2: Click Add Operation Add POTSport Line Test Task in the main menu
of the Timed task manage window or the
button in the toolbar to open the POTSport in out line test dialog box as shown in
Figure 5-18.
Figure 5-18
Version: F
5-15
Part 2 Operations
5 Configuration Management
Step 3: In the Basic parameter setting tab, set the enabling state, the period and
the start time of the task.
Step 4: Click the POTSport in out line test tab and select the equipment object.
Figure 5-19
Step 5: Click OK, and the ANM2000 can perform the test on a fixed time; the test
results will be displayed in the dialog box at the bottom of the window.
5-16
Version: F
Part 2 Operations
5.4.3
5 Configuration Management
Purpose
You can use this function to back up the configuration data of the selected
equipment to the server with the appointed IP address.
Operation steps
Step 1: Click Config Manage Timed task Manage in the main menu to open
the Timed task manage window as shown in Figure 5-16.
Step 2: Click Add Operation Add System Config Backup Task in the main
menu of the Timed task manage window or the
button in the toolbar to open the System config backup task dialog box as shown
in Figure 5-20.
Figure 5-20
Version: F
5-17
Part 2 Operations
5 Configuration Management
Step 3: In the Basic parameter setting tab, set the enabling state, the period and
the start time of the task.
Step 4: Click the System config backup task setting tab, as shown in Figure 5-21.
Then select the equipment object and set the IP address, the login username, and
the password of the FTP server.
Figure 5-21
Step 5: Click OK to save the setting, and the ANM2000 can perform the test on a
fixed time to back up the configuration data of the selected equipment to the server
with the appointed IP address.
5-18
Version: F
Part 2 Operations
5.5
5 Configuration Management
Signal Trace
Background information
Currently only the AN5116-02, the AN5116-06, and the AN5116-06B support this
function.
Purpose
Tracing the signaling is used to trace the signalling frame of the communication
between the current IAD and the voice communication card, so as to find the
communication faults in time.
Operation steps
Please refer to the contents on the signalling tracing in the configuration guide of
each type of equipment.
5.6
Purpose
You can use this function to upload and download the configuration data of
5116-02 or the 5116-06, so as to keep the configuration data of the equipment
same as those in the database; or you can use this function to copy
configuration data of a certain object to another object, so as to configure
equipment rapidly.
the
the
the
the
Background information
In the operation of managing the 5116 configuration,
Packet Download: Means overwriting the equipment configuration with the
configuration data in the database.
Packet Upload: Means overwriting the configuration data in the database with
the equipment configuration.
Config Copy: Means copying the configuration data of the object A to the
object B.
Version: F
5-19
Part 2 Operations
5 Configuration Management
Operation steps
Step 1: Click Config Manage 5116 Config Manager in the main menu to open
the Manage Configuration window as shown in Figure 5-22.
Figure 5-22
Step 2: When you need to upload and download the configuration data, operate as
follows: Select the object module, perform the operations in Table 5-3 on demand,
and then click Yes in the alert box that appears.
Table 5-3
Functions of the main menu and toolbar icons in the Manage Configuration
window
Main Menu
Operation
5-20
Toolbar Icon
Description
Packet
Download
Packet
Upload
Exit
Version: F
Part 2 Operations
5 Configuration Management
Step 3: When you need to copy the configuration, operate as follows: Select the
source module, and click
dialog box.
Step 4: Select the destination object with the same type of the source object, as
shown in Figure 5-23. If you select a destination object with the different type of the
source object, the dialog box as shown in Figure 5-24 will appear.
Version: F
Figure 5-23
Figure 5-24
5-21
Part 2 Operations
5 Configuration Management
Step 5: Click OK, and the execution results will be displayed in the pane at the
right-bottom of the window, as shown in Figure 5-25.
Figure 5-25
5.7
Configuration Manager
Purpose
You can use this function to download and upload the configuration data of the
AN5116-06B, so as to configure the equipment rapidly.
Operation steps
Step 1: Click Config Manage Config Manager in the main menu to open the
Manage Configuration window as shown in Figure 5-26.
Figure 5-26
Step 2: Select the object module, perform the operations in Table 5-3 on demand,
and then click Yes in the alert box that appears.
5-22
Version: F
Part 2 Operations
5.8
5 Configuration Management
Purpose
Managing the capacity of the history database is used to set the thresholds of
history performance data and history alarms in the database. When the history data
in the database exceed the set threshold, the old data will be deleted or dumped to
increase the running efficiency of the network management system.
Operation steps
Step 1: Click Config Manage Historical Database Capacity Management in
the main menu to open the History Database Capacity Management window as
shown in Figure 5-27.
Figure 5-27
Version: F
Part 2 Operations
5 Configuration Management
Step 2: In each tab, set the thresholds according to the actual demands. The
meanings of various setting items are listed in Table 5-4.
Table 5-4
Setting Item
Threshold
setting
Dump Time
Dump
processing
Description
Item
Numbers
threshold
Time threshold
Dump To File
Delete
Step 3: After finishing the setting operation, click OK to save the settings and exit
the current window.
5-24
Version: F
Part 2 Operations
5.9
5 Configuration Management
Purpose
When you need to add a system and its module via the ANM2000, you can find out
the equipment in a certain network segment and add it rapidly.
Background information
Currently only the AN5006-20, the AN5116-02, and the AN5116-06B support
this function.
This function does not influence the existing objects and their configurations in
the ANM2000.
Prerequisite
The ANM2000 is in the edit mode.
Operation steps
Step 1: Click Configuration Device Auto Discover in the main menu to make
the Device Auto Discover tab appear.
Step 2: Input the values of the Start IP, End IP, and the Subnet Mask, click the
Start Discover button, and the searching results will be displayed in the lower
pane of the window, as shown in Figure 5-28.
Version: F
5-25
Part 2 Operations
5 Configuration Management
Figure 5-28
Description
System
Board
Type
The name of
system or card
Address
The IP address of a
system or the slot
No. of a card
Add
No Change
Status
Step 3: Select an object to be added to the ANM2000, and click the Sync Object
button to add the system whose Status is Add to the ANM2000.
5-26
Version: F
Part 2 Operations
5.10
5 Configuration Management
Purpose
You can view the events occurred in the appointed object during the appointed time
interval by using this function.
Operation steps
Step 1: Click Configuration History Event Query in the main menu to make
the History Event Query dialog box appear.
Step 2: Select the object to be queried, set the event starting time, and then select
the level of the event to be queried. See Figure 5-29.
Figure 5-29
Version: F
5-27
Part 2 Operations
5 Configuration Management
Step 3: Click OK. Then the event query results will be displayed in the History
Event Query tab, as shown in Figure 5-30.
Figure 5-30
Step 4: Right-click the History Event Query tab, and select Export to Html or
Export to Excel in the shortcut menu to export the query results.
5.11
Purpose
You can upgrade the CPU / IAD software and the ONU firmware of the ONUs in
batches to increase the upgrade efficiency.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
5-28
Version: F
Part 2 Operations
5 Configuration Management
Operation steps
Table 5-6
Operation Item
Upgrading the ONUs in
batches
Step 1: Open the Batches Upgrade ONU tab via the paths in Table 5-6.
Step 2: Set the download file type, the FTP server IP address, the username, the
user password, the file name, and the refresh time on demand.
Step 3: Select the ONUs to be upgraded in the left-bottom pane, and click the
Execute button; then the execution results will be displayed as shown in Figure
5-31.
Caution:
One operation can only upgrade the ONUs with the same type.
Figure 5-31
Version: F
5-29
Part 2 Operations
5.12
5 Configuration Management
Purpose
You can upgrade the MSAN line card software in batches to increase the upgrade
efficiency.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Operation steps
Table 5-7
The operation entry path of upgrading the MSAN line card software in batches
Operation Item
Upgrading the MSAN
line card software in
batches
Step 1: Open the MSAN line card Software Batch Upgrade tab via the paths in
Table 5-7.
Step 2: Set the File Type, Ftp Server IP, User Name, and Password items on
demand.
5-30
Version: F
Part 2 Operations
5 Configuration Management
Step 3: Select the system to be upgraded in the left-bottom pane and select the file
name of the software to be upgraded, and then click the Execute button to get the
execution result, as shown in Figure 5-32.
Figure 5-32
5.13
Purpose
During the daily maintenance, or before upgrading the equipment, you need to
back up the configuration data of the equipment. Backing up the system
configuration in batches can increase the backup efficiency.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Version: F
5-31
Part 2 Operations
5 Configuration Management
Operation steps
Table 5-8
Operation Item
configuration
batches
in
Step 1: Open the Batches Backup Config tab via the paths in Table 5-8.
Step 2: Set the download file type, the FTP server IP address, the username, and
the user password on demand.
Step 3: Select the system to be backed up in the left-bottom pane, and click the
Execute button after the name of the backup file is set; then the execution results
will be displayed as shown in Figure 5-33.
Figure 5-33
5-32
Version: F
Part 2 Operations
5.14
5 Configuration Management
Purpose
After upgrading the equipment, you need to restore the configuration data of the
equipment. In this case, you can restore the system configuration in batches to
increase the efficiency.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Operation steps
Table 5-9
Operation Item
configuration
batches
in
Step 1: Open the Batches Restore Config tab via the paths in Table 5-9.
Step 2: Set the download file type, the FTP server IP address, the username, and
the user password on demand.
Version: F
5-33
Part 2 Operations
5 Configuration Management
Step 3: Select the system and the file to be restored in the left-bottom pane, and
click the Execute button; then the execution results will be displayed as shown in
Figure 5-34.
Figure 5-34
5.15
Purpose
During the daily maintenance, or before upgrading the OLT, you need to back up
the configuration data of the OLT. Backing up the system software in batches can
increase the backup efficiency.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Operation steps
Table 5-10
Operation Item
menu
software in batches
5-34
Version: F
Part 2 Operations
5 Configuration Management
Step 1: Open the System Software Batches Backup tab via the paths in Table
5-10.
Step 2: Set the download file type, the FTP server IP address, the username, and
the user password on demand.
Step 3: Select the system to be backed up and the backup file name in the
left-bottom pane, and click the Execute button; then the execution results will be
displayed as shown in Figure 5-35.
Figure 5-35
5.16
Purpose
You can upgrade the OLT software or the ONU software in batches to increase the
upgrade efficiency by using this function.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Version: F
5-35
Part 2 Operations
5 Configuration Management
Operation steps
Table 5-11
Operation Item
main menu
software in batches
Step 1: Open the System Software Batches Upgrade tab via the paths in Table
5-11.
Step 2: Set the download file type, the FTP server IP address, the username, and
the user password on demand.
Step 3: Select the system to be backed up and the upgrade file name in the
left-bottom pane, and click the Execute button; then the execution results will be
displayed as shown in Figure 5-36.
Figure 5-36
5-36
Version: F
Alarm Management
The ANM2000 provides the alarm management functions, meaning the functions of
monitoring, displaying, storing, and counting the alarms. The main purposes of the
alarm management functions are to perform the daily maintenance, so as to help
users find, locate, and solve faults and resume the services influenced by faults.
The common alarm management operations used by users include setting alarms
and viewing alarms. As the base of the troubleshooting, the common operations
have the flow as follows:
Set the filtering
status of alarms
View current /
history alarms
View alarm
statistics
Locate faults
Figure 6-1
6-1
Part 2 Operations
6 Alarm Management
6-2
Version: F
Part 2 Operations
6.1
6 Alarm Management
6.1.1
Purpose
In this case, the set alarm filtering rules are valid to all systems on the ANM2000.
Background information
The alarm filtering settings are only valid to the alarms generated after the setting
operation, but invalid to the present alarms in the current alarm list and the report
window.
Operation steps
Table 6-1
The operation entry path of setting the filtering status of all alarms
Operation Item
Setting
the
filtering status of
all alarms
Step 1: Select a path listed in Table 6-1 to open the Alarm Shield Global Setting
tab.
Version: F
6-3
Part 2 Operations
6 Alarm Management
Step 2: Select the alarm level, alarm type, or alarm name to be filtered on demand,
as shown in Figure 6-2.
Figure 6-2
Step 3: Click
under Shield time to set the valid time of the filtering operation,
Figure 6-3
Version: F
Part 2 Operations
6.1.2
6 Alarm Management
Purpose
In this case, the set alarm filtering rules are valid to a specific port on the selected
ONU, and you can only set one port once.
Background information
The alarm filtering settings are only valid to the alarms generated after the setting
operation, but invalid to the present alarms in the current alarm list and the report
window.
Operation steps
Table 6-2
The operation entry path of setting the filtering status of alarms on an object
Operation Item
Setting
the
filtering status of
alarms
object
on
an
Step 1: Select a path listed in Table 6-2 to open the Alarm Shield Object Setting
tab.
Step 2: Select the valid port of the alarm filtering rules on demand.
Version: F
6-5
Part 2 Operations
6 Alarm Management
Step 3: Select the alarm level, alarm type, or alarm name to be filtered on demand,
as shown in Figure 6-4.
Figure 6-4
Step 4: Click
under Shield time to set the valid time of the filtering operation,
Figure 6-5
6-6
Version: F
Part 2 Operations
6.1.3
6 Alarm Management
Purpose
In this case, the set alarm filtering rules are valid to a specific type of card or port
selected, and you can set one type of port once.
Background information
The alarm filtering settings are only valid to the alarms generated after the setting
operation, but invalid to the present alarms in the current alarm list and the report
window.
Operation steps
Table 6-3
The operation entry path of setting the filtering status of alarms on a card or port
Operation Item
Setting
the
filtering status of
alarms on a card
or port
Step 1: Select a path listed in Table 6-3 to open the Alarm Shield Board/Port
Setting tab.
Step 2: Select the valid card or port type of the alarm filtering rules on demand.
Version: F
6-7
Part 2 Operations
6 Alarm Management
Step 3: Select the alarm level, alarm type, or alarm name to be filtered on demand,
as shown in Figure 6-6.
Figure 6-6
Step 4: Click
under Shield time to set the valid time of the filtering operation,
Figure 6-7
6-8
Version: F
Part 2 Operations
6.2
6 Alarm Management
Purpose
You can use this function to view the set alarm filtering rules.
Operation steps
Table 6-4
Operation Item
Viewing
the
Filtering Status of
Alarms
Step 1: Select a path listed in Table 6-4 to open the Current Alarm Shield View
tab as shown in Figure 6-8, and the global alarm filtering rules, the object alarm
filtering rules, and the card / port alarm filtering rules will be displayed in this tab.
Figure 6-8
Version: F
6-9
Part 2 Operations
6 Alarm Management
Step 2: When you want to view the alarm filtering status on a certain object, you
can select the object in the pane at the lower part of the Admin Tools tab, and then
click the Execute button at the medium part of the Admin Tools tab. Then the
alarm filtering rules of this object will be displayed in the Current Alarm Shield
View tab.
Note:
If you right-click any position and select Delete, the selected alarm items
can be deleted.
Step 3: When you want to view the global alarm filtering status, you can click the
Execute button without selecting any object and alarm type. Then the global alarm
filtering rules will be displayed in the Current Alarm Shield View tab.
6.3
6.3.1
Purpose
In this case, the set custom alarm levels are valid to all systems on the ANM2000.
Background information
The custom alarm level settings are only valid to the alarms generated after the
setting operation, but invalid to the present alarms in the current alarm list and the
report window.
Prerequisite
The ANM2000 is in the edit mode.
6-10
Version: F
Part 2 Operations
6 Alarm Management
Operation steps
Table 6-5
Operation Item
Defining
alarm levels
global
Step 1: Select a path listed in Table 6-5 to open the Global Alarm Level Definition
tab.
Step 2: Select the alarm to be modified and click its Current Alarm Level, and then
select the target alarm level in the drop-down list. See Figure 6-9.
Figure 6-9
Version: F
6-11
Part 2 Operations
6.3.2
6 Alarm Management
Purpose
In this case, the set custom alarm levels are valid to the specific object selected,
and you can only set the alarm levels on one object once.
Background information
The custom alarm level settings are only valid to the alarms generated after the
setting operation, but invalid to the present alarms in the current alarm list and the
report window.
Operation steps
Table 6-6
Operation Item
Defining
alarm levels
object
Step 1: Select a path listed in Table 6-6 to open the Object Alarm Level Definition
tab.
Step 2: Select the object to be set in the left-lower pane.
Step 3: Select the alarm to be modified and click its Current Alarm Level, and then
select the target alarm level in the drop-down list. See Figure 6-10.
Figure 6-10
Version: F
Part 2 Operations
6.3.3
6 Alarm Management
Purpose
In this case, the set custom alarm levels are valid to a specific type of card or port,
and you can set the alarms on one type of card or port once.
Background information
The custom alarm level settings are only valid to the alarms generated after the
setting operation, but invalid to the present alarms in the current alarm list and the
report window.
Operation steps
Table 6-7
Operation Item
Defining
card
Step 1: Select a path listed in Table 6-7 to open the Alarm Level Board or Port
Setting tab.
Step 2: Select the card or port type to be set in the left-lower pane.
Step 3: Select the alarm to be modified in the right pane and click its Current
Alarm Level, and then select the target alarm level in the drop-down list. See
Figure 6-11.
Figure 6-11
6-13
Part 2 Operations
6.4
6 Alarm Management
Purpose
You can view the set custom alarm levels in the appointed range by using this
function.
Operation steps
Table 6-8
Operation Item
Viewing
custom
alarm levels
Step 1: Select a path listed in Table 6-8 to open the Alarm Level Setting View tab.
Step 2: Select the range to be viewed, and click Execute. Then the system will
display the set custom alarm levels in this range, as shown in Figure 6-12.
Figure 6-12
6-14
Version: F
Part 2 Operations
6.5
6 Alarm Management
Forwarding Alarms
Purpose
When you need to send the alarm information to dedicated maintenance engineers
in the message or e-mail mode, you can use this function.
Prerequisite
This function needs the support of the message sender and the e-mail server.
Operation steps
Table 6-9
Operation Item
Forwarding
alarms
Step 1: Select a path listed in Table 6-9 to open the Alarm Forward window.
Step 2: In the User Info Setup tab, click Add Rule, and then input the number of
rows to be added in the Prompt dialog box that appears and click OK to add items.
Step 3: Click a newly-added item, and then input the values of Username, Mobile
number, and Email in turn. See Figure 6-13.
Figure 6-13
Version: F
6-15
Part 2 Operations
6 Alarm Management
Figure 6-14
Figure 6-15
6-16
Version: F
Part 2 Operations
6 Alarm Management
Step 8: Restart the AEMS-DBServer service, and make the modification of the
md.ini file valid.
6.6
Purpose
To obtain the physical environment information of the equipment, you can define
the environment-related alarms of the equipment, such as the fire alarm, the water
alarm, and the too high / too low temperature alarm.
Operation steps
Table 6-10
Operation Item
Managing
alarms
custom
Step 1: Open the Custom alarm manage window via the paths listed in Table
6-10.
Step 2: Select the ONU needing to set the custom alarms, and click the alarm
name to select your target custom alarms. See Figure 6-16.
Figure 6-16
Version: F
6-17
Part 2 Operations
6 Alarm Management
6.7
Purpose
You can use this function to open the Alarm Notice pane and understand the
alarm conditions of the equipment in the real time mode.
Operation steps
Step 1: Select Alarm Alarm Report in the main menu to open the Alarm Notice
pane as shown in Figure 6-17 for the viewing operation.
Figure 6-17
6-18
Version: F
Part 2 Operations
6.8
6 Alarm Management
Viewing Alarms
Alarms are classified into the current alarms and the history alarms.
Current alarms: mean the alarm events that are not ended and still exist in the
network, and they are not confirmed and cleared by the administrator.
History alarms: mean the alarm events that have ended in the network and
been confirmed by the administrator (or automatically confirmed by the system)
and recorded.
6.8.1
Purpose
You can view the occurring time, etc. of each current alarm on a certain object to
analyze the alarm information and perform the troubleshooting.
Operation steps
Table 6-11
Operation Item
Viewing
alarms
current
tab
Current Alarm under the shortcut menu of module in the Object Tree
tab
Current Alarm under the shortcut menu of card in the Object Tree
tab
in the toolbar
Version: F
6-19
Part 2 Operations
6 Alarm Management
Enter the Current alarm tab via the paths listed in Table 6-11. This tab displays the
current alarms of the selected object, as shown in Figure 6-18.
Figure 6-18
6.8.2
Purpose
You can view the history alarm information of a certain object to understand its
running status.
6-20
Version: F
Part 2 Operations
6 Alarm Management
Operation steps
Table 6-12
Operation Item
Viewing
alarms
history
Tree tab
Historical Alarm under the shortcut menu of module in the Object
Tree tab
Historical Alarm under the shortcut menu of card in the Object Tree
tab
in the toolbar
Enter the History alarm tab via the paths listed in Table 6-12. This tab displays the
history alarms of the selected object, as shown in Figure 6-19.
Figure 6-19
Version: F
6-21
Part 2 Operations
6.9
6 Alarm Management
Operation Item
Viewing the alarm
statistics brief list
Viewing
history
statistics
6.9.1
the
alarm
Purpose
You can use this function to view the current alarms number of the system, and
understand the current running status of the system.
Operation steps
Step 1: Select Alarm Alarm Statistic in the main menu to open the alarm
statistics brief list as shown in Figure 6-20. This list displays the real time
information of numbers of the occurred, confirmed, and ended alarms at various
levels.
Figure 6-20
Double-click a certain alarm level in this list to open the corresponding alarm list.
6-22
Version: F
Part 2 Operations
6.9.2
6 Alarm Management
Purpose
You can use this function to view the history alarm statistics, and understand the
running status in a certain past time interval of the equipment.
Operation steps
Step 1: Select the paths listed in Table 6-13 to open the Statistics parameter
setting dialog box as shown in Figure 6-21.
Figure 6-21
Step 2: Set the statistics time, the selected object, and the alarm code.
Version: F
6-23
Part 2 Operations
6 Alarm Management
Step 3: After completing the settings, click OK. In this case, the History Alarm
Statistics tab will appear; in this tab, there are Report View and Chart View for
users to query.
Figure 6-22
Figure 6-23
You can right-click the Report View tab, and select Statistics parameter setting
in the shortcut menu to set the query conditions again.
6-24
Version: F
Performance Management
The ANM2000 has strong performance management functions, able to store the
performance information of the equipment in the network. Performance data are
classified into the instant performance data and the history performance data.
Instant performance data: are the current 15-minute performance data read
from the equipment directly and displayed, meaning the performance data not
saved in the database within the latest 15-minute from the query time point
and the last 1st to 16th 15-minute intervals.
History performance data: are the performance data saved in the database
according to the performance collection settings, prior to the latest 15-minute
or 24-hour.
The common performance management operations include querying the instant
and history performance data, collecting the performance data, etc. As the base of
testing the equipment running quality, the common operations have the flow as
Figure 7-1.
Enable
performance
statistics function
Set performance
collection scheme
View instant
performance data
View history
performance data
Locate faults
Figure 7-1
7-1
Part 2 Operations
7.1
7 Performance Management
Purpose
If users want to view the history performance data of the equipment, they should
first set the performance collection scheme of the equipment. The network
management system only collects and processes the history performance data of
the equipment whose performance collection scheme has been set; for the
equipment whose performance collection scheme is not set, the network
management system will not record its history performance data.
Operation steps
Table 7-1
Operation Item
Setting
the
performance
collection
main menu
scheme
Step 1: Select the path in Table 7-1 to open the Options For Performance
Collection And Storage dialog box and the Command Manager window.
Step 2: Select the equipment and port to be set in the left tree.
7-2
Version: F
Part 2 Operations
7 Performance Management
Step 3: In the right Performance Collection tab, set the time and type of the
performance to be collected, as shown in Figure 7-2.
Figure 7-2
Version: F
The Options For Performance Collection And Storage dialog box (1)
7-3
Part 2 Operations
7 Performance Management
Step 4: In the Performance Storage tab, select the code of the performance to be
stored in the database, as shown in Figure 7-3.
Figure 7-3
The Options For Performance Collection And Storage dialog box (2)
Step 5: After completing the setting operation, click Save. Then the Command
Manager window as shown in Figure 7-4 will appear, and Command Succeed will
be displayed.
Figure 7-4
7-4
Part 2 Operations
7.2
7 Performance Management
7.2.1
Purpose
You can use this function to obtain the performance data of the equipment in the
last 1st to 16th 15-minute intervals, and understand the running status of the
equipment.
Prerequisite
The performance classification function of the equipment to be viewed is enabled.
Operation steps
Table 7-2
Operation Item
Viewing instant
Tree tab
performance
data
List tab
in the toolbar
Version: F
7-5
Part 2 Operations
7 Performance Management
Step 1: Select the path in Table 7-2 to open the Instant Performance tab as shown
in Figure 7-5; this tab displays the instant performance data of the selected system
object.
Figure 7-5
7.2.2
Purpose
You can use this function to view the history performance data of the management
domain, system, or card whose performance collection scheme has been set, and
understand the history running status of the network.
Background information
After the performance collection scheme has been set, the ANM2000 collects the
performance data according to the collection scheme and save the data in the
database. In this case, you can view the performance data from setting the
performance collection scheme to the current time point. So we recommend that
you set performance collection scheme for the concerned object to understand its
running status easily.
7-6
Version: F
Part 2 Operations
7 Performance Management
Prerequisite
The performance collection scheme has been set, and the system has waited
for one test period (15 minutes or 24 hours) at least.
Operation steps
Table 7-3
Operation Item
Viewing history
Tree tab
performance
data
Tree tab
History Performance under the shortcut menu of an ONU in the ONU List
tab
in the toolbar
Step 1: Select the path in Table 7-3 to open the History Performance tab as
shown in Figure 7-6; this tab displays the history performance data of the selected
system object.
Figure 7-6
Version: F
Part 2 Operations
7 Performance Management
Step 2: Right-click the object and select Set Query Condition to open the Set
History Performance Query Condition dialog box.
Step 3: Set the history performance query condition, as shown in Figure 7-7.
Figure 7-7
Step 4: After completing the settings, click OK; then the query results will be
displayed in the History Performance tab.
7.3
Purpose
You can use this function to compare the performance data in appointed periods of
the appointed object, and understand the running status of this object in different
periods.
Prerequisite
The system has waited for two test periods (15 minutes for each test period) at
least.
The performance statistic switch is enabled.
7-8
Version: F
Part 2 Operations
7 Performance Management
Operation steps
Table 7-4
Operation Item
Comparing
performance
data
Figure 7-8
Version: F
Part 2 Operations
7 Performance Management
Figure 7-9
7.4
Purpose
You can use this function to view the changing conditions of the performance data
of the appointed object, and understand the running status of the network.
Prerequisite
The object to be viewed has its history performance data.
Operation steps
Table 7-5
Operation Item
Viewing
history
performance
the
Performance History Performance Chart in the main menu
chart
7-10
Version: F
Part 2 Operations
7 Performance Management
Step 2: Select the path in Table 7-5 to open the Set History Performance Query
Condition dialog box as shown in Figure 7-10.
Figure 7-10
Step 2: Set the beginning time, period, performance type, and chart number to be
queried.
Note:
The performance type here should be the same as that set for the
performance collection scheme.
Step 3: Click the Policy Edit button to open the Policy Edit dialog box, as shown
in Figure 7-11.
Version: F
7-11
Part 2 Operations
7 Performance Management
Figure 7-11
Step 3: Click the Create button. After setting the policy name and the performance
code, click Insert; in this case, the newly-created policy will appear in the policy
pane, as shown in Figure 7-12.
Figure 7-12
7-12
Version: F
Part 2 Operations
7 Performance Management
Note:
You can select Draw threshold line and set the demanded threshold;
after the threshold is set, the set threshold curve will appear in the
performance chart.
Step 4: After confirming the correctness of the policy setting, click Exit to return to
the Set History Performance Query Condition dialog box.
Step 5: After selecting the query range, click Apply; then the query policy and the
query range will be displayed in the Select Curve pane, as shown in Figure 7-13.
Figure 7-13
Version: F
7-13
Part 2 Operations
7 Performance Management
Step 6: Click OK; the performance data chart meeting the query condition will be
displayed in the History Performance Chart tab (as shown in Figure 7-14), and
corresponding performance data value will be displayed in the Performance tab.
Figure 7-14
7-14
Version: F
Statistics Management
As for the statistics operation, the ANM2000 provides abundant resource statistics
functions. Users can perform the statistics operations of resources managed by the
current network management system on demand, and the resources include the
system, the card, the card port, the ONU subscriber information, the ONU port
information, the MGC resource, etc. The relationships between the statistics
management functions, sub-functions and operations are shown in Figure 8-1.
Equipment
statistics
ONU port
information
statistics
System
resource
statistics
ONU
equipment
statistics
System card
statistics
System-related
statistics
Statistics
management
ONUrelated
statistics
System port
statistics
Query subscriber port
status
Figure 8-1
MGC resource
statistics
View ONU
resource
detailed list
View ONU
equipment
statistics
detailed list
View ONU
port resource
statistics
detailed list
Version: F
8-1
Part 2 Operations
8.1
8 Statistics Management
Equipment Statistics
Purpose
The equipment statistics is used to count the equipment information of the current
system object, including the types and numbers of its subracks, cards, ONUs, and
ports. It enables you to grasp the equipment using status correctly.
Operation steps
Table 8-1
Operation Item
Equipment
statistics
Step 1: Select the path in Table 8-1 to open the Device Statistic tab.
Step 2: Select the object needing the statistics in the lower left pane, and click
Execute. In this case, the statistics results will be displayed in the Device Statistic
tab, as shown in Figure 8-2.
Figure 8-2
8-2
Version: F
Part 2 Operations
8.2
8 Statistics Management
System-Related Statistics
The system-related statistics is used to count the system information of the current
system object.
8.2.1
Purpose
You can use this function to perform the statistics of the system source globally,
such as the IP address, the electrification time, the port type, the card name, and
the slot No.
Operation steps
Table 8-2
Operation Item
System
statistics
resource
menu
The Admin Tools tab View Statistics Report System
Resource Statistics
Step 1: Select the path in Table 8-2 to open the System Resource Statistics tab.
Step 2: Select the system object needing the statistics under Admin Tool, and click
Execute. In this case, the statistics results will be displayed in the System
Resource Statistics tab, as shown in Figure 8-3.
Figure 8-3
Version: F
Part 2 Operations
8.2.2
8 Statistics Management
Purpose
You can use this function to perform the statistics of the information related to a
certain card, such as the card name and the card number.
Operation steps
Table 8-3
Operation Item
System
statistics
Step 1: Select the path in Table 8-3 to open the System Board Statistics tab.
Step 2: Select the system object needing the statistics under Admin Tool, and click
Execute. In this case, the statistics results will be displayed in the System Board
Statistics tab, as shown in Figure 8-4.
Figure 8-4
8-4
Version: F
Part 2 Operations
8.2.3
8 Statistics Management
Purpose
You can use this function to perform the statistics of the information related to the
system port, such as the number of the occupied PON ports, the total number of
the PON ports, the number of the occupied uplink ports, and the total number of the
uplink ports.
Operation steps
Table 8-4
Operation Item
Step 1: Select the path in Table 8-4 to open the System Port Statistics tab.
Step 2: Select the system object needing the statistics under Admin Tool, and click
Execute. In this case, the statistics results will be displayed in the System Port
Statistics tab, as shown in Figure 8-5.
Figure 8-5
Version: F
8-5
Part 2 Operations
8 Statistics Management
8.3
ONU-Related Statistics
8.3.1
Purpose
You can use this function to view the number of the used ONU ports and the total
number of the ONU ports.
Operation steps
Table 8-5
Operation Item
menu
statistics
Step 1: Select the path in Table 8-5 to open the ONU Port information statistic
dialog box.
Step 2: Select the corresponding system object and then click OK to exit this dialog
box. Then the statistics results will appear in the ONU Port information statistic
tab as shown in Figure 8-7.
Figure 8-6
8-6
Part 2 Operations
8 Statistics Management
Figure 8-7
8.3.2
Purpose
You can use this function to view the detailed information of the subscriber
connected with an ONU, such as its slot No., PON port No., and ONU authorization
No.
Operation steps
Table 8-6
The operation entry path of viewing the ONU subscriber statistics detailed list
Operation Item
Viewing
the
subscriber
detailed list
statistics
Step 1: Select the path in Table 8-6 to open the ONU User information statistic
tab.
Version: F
8-7
Part 2 Operations
8 Statistics Management
Step 2: Select the corresponding system object needing the statistics and then click
Execute under Admin Tool. Then the statistics results will appear in the ONU
User Detail Information tab, as shown in Figure 8-8.
Figure 8-8
8.3.3
Purpose
You can use this function to view the OLT system type, ONU type, and total number
of the object ONUs.
Operation steps
Table 8-7
Operation Item
ONU
statistics
equipment
Step 1: Select the path in Table 8-7 to open the ONU Device Statistic tab.
8-8
Version: F
Part 2 Operations
8 Statistics Management
Step 2: Select the corresponding system object needing the statistics under Admin
Tool and then click Execute. Then the statistics results will appear in the ONU
Device Statistic tab, as shown in Figure 8-9.
Figure 8-9
8.3.4
Purpose
You can use this function to view the relevant information of the ONU resource,
such as the CPU version, the firmware version, and the hardware version.
Operation steps
Table 8-8
The operation entry path of viewing the ONU resource detailed list
Operation Item
Viewing
the
ONU
main menu
The Admin Tools tab View Statistics Report ONU Resource
Detailed Information
Step 1: Select the path in Table 8-8 to open the ONU Resource Detailed
Information tab.
Version: F
8-9
Part 2 Operations
8 Statistics Management
Step 2: Select the corresponding system object needing the statistics under Admin
Tool and then click Execute. Then the statistics results will appear in the ONU
Resource Detailed Information tab, as shown in Figure 8-10.
Figure 8-10
8.3.5
Purpose
You can use this function to view the relevant detailed information of the ONU port,
such as the port status, the service type, the uplink rate, the downlink rate, the
inner VLAN ID, and the outer VLAN ID.
Operation steps
Table 8-9
The operation entry path of viewing the ONU port resource statistics detailed list
Operation Item
Viewing
port
the
resource
Step 1: Select the path in Table 8-9 to open the ONU Port Resource Detailed
Information tab.
8-10
Version: F
Part 2 Operations
8 Statistics Management
Step 2: Select the corresponding system object needing the statistics under Admin
Tool (in this case you can only select one system) and then click Execute. Then
the statistics results will appear in the ONU Port Resource Detailed Information
tab, as shown in Figure 8-11.
Figure 8-11
8.4
Purpose
You can use this function to view the information of the MGC configured on the OLT,
such as the MGC protocol type, the MGC IP address or domain name address, and
the MGC port No.
Operation steps
Table 8-10
Operation Item
MGC
statistics
resource
Step 1: Select the path in Table 8-10 to open the MGC Resource Statistics tab.
Version: F
8-11
Part 2 Operations
8 Statistics Management
Step 2: Select the corresponding system object needing the statistics under Admin
Tool and then click Execute. Then the statistics results will appear in the MGC
Resource Statistics tab, as shown in Figure 8-12.
Figure 8-12
8-12
Version: F
Security Management
The ANM2000 not only provides new user management functions (such as the
online user management, the restriction of repeated login, the restriction of IP
section, and locking edit mode) for users, but also improves the authorization and
domain division management function; for this reason, the ANM2000 can configure
the EPON, GPON, and other services for multiple users. The relationships between
various security management functions are shown in Figure 9-1.
Manage online
users
View logs
Manage
operators
Manage users
Add new users
Modify password
of current user
Manage
command
Security
management
authorization
Manage
authorization
and domain
division
Send messages
Manage
messages and
upload files
Figure 9-1
Version: F
9-1
Part 2 Operations
9.1
9 Security Management
Managing Users
The user management function provided by the ANM2000 can define the legal
users and their authorizations and management domains, so as to prevent illegal
operations effectively.
9.1.1
Purpose
An Admin user can assign the corresponding authorizations for the users with
different roles (levels). Before assigning users, the Admin user needs to add new
users.
Prerequisite
Only the Admin user can add new users.
Operation steps
Table 9-1
Operation Item
Step 1: Select the paths listed in Table 9-1 to open the Add New User dialog
box.
9-2
Version: F
Part 2 Operations
9 Security Management
Step 2: Input the relevant information according to Table 9-2. See Figure 9-2.
Table 9-2
Configuration Item
Description
User Name
User Grade
Name
Staff ID.
Operation From
Operation To
Limited User
User Validation
with the username abc, other users cannot log in the network
management system with the username abc before user A exits the
network management system.
Input the descriptions of the new user.
Description
Password
Confirm
Password Setting
Password
Password
Overdue
Time (Day)
it. In this case, the new user can log in ANM2000 successfully only
when his / her IP address belongs to the network section.
Version: F
9-3
Part 2 Operations
9 Security Management
Figure 9-2
Step 3: After completing the setting operation, click OK to save the settings and
then exit the dialog box.
9.1.2
Managing Operators
Purpose
The system administrator can use this function to view the users in the system and
their properties, so as to find abnormal conditions in time and ensure the normal
running of the system and the equipment.
Prerequisite
Only the Admin user can manage operators.
9-4
Version: F
Part 2 Operations
9 Security Management
Operation steps
Table 9-3
Operation Item
Managing operators
Step 1: Select the paths listed in Table 9-3 to open the User Management tab as
shown in Figure 9-3.
Figure 9-3
Note:
When a user logs in with errors for more than three times, this user will
be locked.
Version: F
9-5
Part 2 Operations
9 Security Management
Step 2: Double-click a certain user, or select a certain user and click Property in
the shortcut menu to open the User Property dialog box as shown in Figure 9-4.
Figure 9-4
Step 3: You can modify the relevant information of the selected user, and then click
OK to save the settings and then exit the dialog box.
9.1.3
Purpose
You can use this function to view the current online users and their basic
information (an Admin user can force other non-Admin users to leave), so as to
ensure the normal running of the system and the equipment.
9-6
Version: F
Part 2 Operations
9 Security Management
Operation steps
Table 9-4
Operation Item
Managing
online
users
Step 1: Select the paths listed in Table 9-4 to open the Online User Management
tab as shown in Figure 9-5.
Figure 9-5
Step 2: The current user can perform the following operations of other online users.
Select other online users and click Refresh in the shortcut menu to refresh the
statuses information of the selected users.
Select other online users and click Send Message in the shortcut menu to
chat with them in instant mode.
Select other online users and click Enforce Outline in the shortcut menu to
force the lower-level online users to leave.
Note:
Under some special conditions (such as the system upgrade and
cutover), the system needs that other users leave. To meet this demand,
the ANM2000 provides the force-leave function. Only the online user
with the Admin level has the authorization to force other users to leave.
Version: F
9-7
Part 2 Operations
9.1.4
9 Security Management
Purpose
Under some special conditions (such as your first login of the ANM2000), you need
to modify the login password to ensure the security of the user.
Operation steps
Table 9-5
The operation entry path of Modifying the password of the current user
Operation Item
Modifying
password
current user
of
the
Step 1: Select the paths listed in Table 9-5 to open the Change Current Users
Password dialog box as shown in Figure 9-6.
Figure 9-6
Step 2: Input the old password, the new password, and the confirmed password in
turn, and then click OK.
9-8
Version: F
Part 2 Operations
9.2
9 Security Management
Sending Messages
Purpose
Sending messages is used to communicate between the network management
system users.
Operation steps
Table 9-6
Operation Item
Sending messages
Step 1: Select the path listed in Table 9-6 to open the Send Message window as
shown in Figure 9-7.
Figure 9-7
Step 2: In the right-bottom pane, select the target user and select Receiver or CC
in the shortcut menu.
Version: F
9-9
Part 2 Operations
9 Security Management
Step 3: Input the message subject and the message content, and then click the
Figure 9-8
9.3
Purpose
You can use this function to view the information on the messages that you send
and receive, and view the information of the uploaded files.
Prerequisite
Before users upload the files, the FTP server has been set.
Operation steps
Table 9-7
Operation Item
Managing messages
menu
Step 1: Select the paths listed in Table 9-7 to open the Message And Upload File
Manager tab as shown in Figure 9-9.This tab displays the information of the inbox
by default.
9-10
Version: F
Part 2 Operations
9 Security Management
Figure 9-9
Step 2: Select a letter in the inbox and right-click it, and users can select to reply to,
delete it, or send messages to its sender.
Step 3: Click Upload File Manager Upload File List below the Admin Tools
tab and you can see the list information of the uploaded files, as shown in Figure
9-10.
Figure 9-10
Step 4: Select and right-click a file, and users can select to download or delete this
file; at the same time, users can upload new files.
Version: F
9-11
Part 2 Operations
9 Security Management
Step 5: Right-click the blank, and select Upload File in the shortcut menu to open
the Select Upload File dialog box, as shown in Figure 9-11.
Figure 9-11
Step 6: Click
to select the file to be uploaded, and click OK. Then the file will
Note:
1. The uploading file address can be set in the FILEMANAGE field of
the md.ini file under the D:\aems\Server\ini path.
2. Only the user with the Admin level has the operation authorization to
upload / delete files.
9-12
Version: F
Part 2 Operations
9.4
9 Security Management
9.4.1
Figure 9-12
Version: F
9-13
Part 2 Operations
9 Security Management
When this networking mode is used, the network management computer in an area
can be a workstation or PC with a relatively lower level configuration, and can
connect to the central network management computer (server) to implement the
management functions if it is installed with the ANM2000 Client end.
This networking mode brings the following problem: Because of the sharing of the
database, a certain user in one area can manage the equipment in another area.
This obviously causes the hidden trouble.
To solve this problem, the ANM2000 adds options to assign a certain user to be or
not to be the area-limited user in the user management module. By using these
options, the ANM2000 can configure management objects (system, module, card)
for a user; in this case, when the user logs in the ANM2000 GUI in a certain client
area, the network management system only displays devices in the management
range of the user, and this user only can manage devices in his / her authorized
area within the assigned authorization. As soon as this user performs an operation
exceeding the assigned authorization, the Command Manager window will appear
to give the prompt Not Have the Authorization, and the corresponding operation
will be invalid.
Note:
1. The Admin user must be the global user, and only the Admin user
has the authorization to configure limited users.
2. A user with the authorization of the parent object is sure to have all
authorizations of the sub-objects, but the opposite conclusion is not
true.
The ANM2000 has the following domain authorization division functions
implemented in the object tree.
9-14
For an area management user, the systems and cards not in the management
range are not displayed at the GUI.
When displaying alarm indicators, the network management system filters the
nodes not in the management range and displays them with different icons;
commonly the network management system only filters the objects not lower
than modules, and for the card objects, the network management system only
filters the EC2 card and other similar cards with remote end modules.
Version: F
Part 2 Operations
9 Security Management
When generating the object trees, the network management system filters the
nodes not needed in these object trees, including the object trees at the main
GUI and other GUIs such as uploading / downloading in the packet mode,
detecting the physical configuration, and the performance collection.
Object menu: The area-limited user cannot import the management domain.
The user can add / delete lower level objects or re-configure the card types
only when he / she has the authorization of the upper level objects. The user
can check physical configurations only when he / she has the authorization of
the objects not lower than the module.
Main menu: The area-limited user cannot perform forced saving, importing,
and exporting operations, and cannot execute user management, domain
authorization division management, and command authorization management
operations (only the Admin user can execute these operations).
For the operation of viewing logs, the network management system needs to
distinguish the Admin users and other users. Non-Admin users only can view
their own logs.
Version: F
A user can set the performance collection scheme only when he / she has the
authorization of the system object.
9-15
Part 2 Operations
9.4.2
9 Security Management
Purpose
You can assign the domain division authorization for the domain-limited users via
an Admin user; this makes them only able to operate the management domain or
equipment in the given authorization, and can increase the security of the system.
Prerequisite
Only an Admin user can perform the domain division authorization management
operation of non-Admin users.
Operation steps
Table 9-8
The operation entry path of managing the authorization and domain division
Operation Item
Managing
the
authorization
and
domain division
Management
the edit mode. Select the paths listed in Table 9-8 to open the Zone Right Setting
window as shown in Figure 9-13.
9-16
Version: F
Part 2 Operations
9 Security Management
Figure 9-13
Step 4: Select the user needing to be assigned with the management area
authorization in the left pane of this window, and select the system objects that can
be managed by this user in the right pane.
Step 5: After completing the setting operation, click Access Operation Save to
DB in the main menu or the
this window.
Note:
You need to save the authorization and domain division setting of each
user in the database alone.
Version: F
9-17
Part 2 Operations
9.4.3
9 Security Management
Purpose
You can assign the management command authorization for the domain-limited
users via an Admin user; this makes them only able to perform the command
operations in the given authorization, and can increase the security of the system.
Prerequisite
Only an Admin user can perform the command authorization management
operation of non-Admin users.
Operation steps
Table 9-9
Operation Item
Managing
command
authorization
9-18
Version: F
Part 2 Operations
9 Security Management
the edit mode. Select the paths listed in Table 9-9 to open the Command Right
Setting window as shown in Figure 9-14.
Figure 9-14
Step 4: Select the user needing to be assigned with command authorization in the
left pane of this window, and select the commands that can be operated by this
user in the right pane.
Step 5: After completing the setting operation, click Access Operation Save to
DB in the main menu or the
this window.
Note:
You need to save the command authorization setting of each user in the
database alone.
Version: F
9-19
Part 2 Operations
9.5
9 Security Management
Viewing Logs
The ANM2000 provides command logs and login logs for users to query, so as to
make you understand the running conditions of the ANM2000 and judge the
network faults easily.
9.5.1
Purpose
An Admin user can use this function to understand the command operations of all
users logging in the server, and this can provide evidences for locating faults.
Prerequisite
Only an Admin user can view command logs.
Operation steps
Table 9-10
Operation Item
Viewing
logs
9-20
command
Version: F
Part 2 Operations
9 Security Management
Step 1: Enter the View The Command Log tab as shown in Figure 9-15 via the
paths listed in Table 9-10. The tab displays all command logs by default.
Figure 9-15
Step 2: Right-click the tab, and select Modify Query Condition to open the
Command Log Filter dialog box as shown in Figure 9-16.
Figure 9-16
Version: F
9-21
Part 2 Operations
9 Security Management
Step 3: Select various items and set the filter conditions in turn. After completing
the setting operation, click OK. In this case, the View The Command Log tab will
only display the items meeting the filter conditions. See Figure 9-17.
Figure 9-17
9.5.2
Purpose
An Admin user can use this function to understand the information of all users
logging in the server and discover abnormal logins in time, and this can increase
the security of the system.
Prerequisite
Only an Admin user can view login logs.
Operation steps
Table 9-11
Operation Item
The Admin Tools tab System Manager View The User Login
Log
9-22
Version: F
Part 2 Operations
9 Security Management
Step 1: Enter the View The User Login Log tab as shown in Figure 9-18 via the
paths listed in Table 9-11.
Note:
This tab displays all login logs of the current day by default.
Figure 9-18
Step 2: Right-click the tab, and select Modify Query Condition to open the Login
Filter dialog box as shown in Figure 9-19.
Version: F
9-23
Part 2 Operations
9 Security Management
Figure 9-19
Step 3: Select various items and set the filter conditions in turn. After completing
the setting operation, click OK. In this case, the View The User Login Log tab will
only display the items meeting the filter conditions. See Figure 9-20.
Figure 9-20
9-24
The filtering results of the View The User Login Log tab
Version: F
10
Version: F
10-1
Part 2 Operations
10.1
10.1.1
Purpose
The command manager is used to display all commands operated to the
equipment by the user, including the command start time, used time, and other
relevant information. You can use this function to understand the detailed
information of the command execution.
Operation steps
Note:
After users operate the ANM2000, the Command Manager window
usually appears automatically.
Step 1: Select View Command Manager in the main menu to open the
Command Manager window, as shown in Figure 10-1.
Figure 10-1
10-2
Version: F
Part 2 Operations
10.1.2
Purpose
You can use this function to understand the valid commands able to be executed
on the selected system or card, and also can double-click a command to enter the
corresponding GUI rapidly and perform settings.
Operation steps
Step 1: In the Object Tree tab, select the system or card to be viewed.
Step 2: Select View Command Bar in the main menu to open the Command
Bar pane, as shown in Figure 10-2.
Figure 10-2
Version: F
10-3
Part 2 Operations
10.2
Purpose
When the topology pane only displays partial contents of the view, you can use this
function to see the total view and locate the area displayed in the topology pane.
Operation steps
Step 1: Select View Show topo airscape in the main menu or click
in the
Figure 10-3
In the Air Scape pane, the area with deep color is the position of the view of the
current topology in the whole view.
Step 2: In the Air Scape pane, drag the area with deep color, and you can change
the view displayed in the topology view.
Note:
When you switch to another window, the Air Scape pane will be closed
automatically.
10-4
Version: F
Part 2 Operations
10.3
Searching Systems
Purpose
When the scale of a network is relatively large, you can find the objects meeting
your requirements in the Object Tree tab by searching the key information.
Background information
You can search systems via the system name or the IP address.
Operation steps
Step 1: Click View Search System in the main menu to open the Search
Object dialog box as shown in Figure 10-4.
Figure 10-4
Step 2: After setting the searching conditions, click Find Next to start searching the
systems meeting the conditions in the Object Tree tab.
Version: F
10-5
Part 2 Operations
10.4
Purpose
You can use this function to find a designated ONU rapidly in the current system.
Operation steps
Step 1: Click View ONU Query in the main menu to open the ONU Search
Setting: dialog box as shown in Figure10-5.
Figure 10-5
10-6
Version: F
Part 2 Operations
Step 2: Set the basic information, the service information, and the subscriber
information of the ONU in turn.
Step 3: After completing the setting operations, click OK. In this case, the Search
ONU tab will appear and display the ONUs meeting the query conditions.
10.5
Filtering Texts
Purpose
You can select key words in the current tab, so as to make the system only display
the items including these keywords.
Prerequisite
The current tab including the result information exists.
Operation steps
Step 1: Click View Text filter in the main menu to open the Filter Text dialog
box as shown in Figure 10-6.
Figure 10-6
Version: F
10-7
Part 2 Operations
Step 2: In the Filter Text dialog box, input the key words (if there are multiple key
words, separate them by spaces). Then the current tab will only display the related
items (items containing the key words), and the unrelated items (items not
containing the key words) will be filtered. See Figure 10-7.
Figure 10-7
Note:
After the operation is completed, users must delete the key words in the
Filter Text dialog box and then exit the dialog box. Otherwise the current
tab will always only display the related items.
10-8
Version: F
e-Fim ANM2000
Broadband Access Network
Management System
Operation Manual (Based on
Windows)
Version: F
Code: MN000000050
Part 3 Maintenance
11
Routine Maintenance
To ensure the long-period stable running of the ANM2000, users need to maintain
the ANM2000 regularly, so as to master the running state of the equipment and
network and find hidden troubles and handle them in time, for avoiding accidents.
The main contents of this chapter are as follows:
Maintenance requirements
Maintenance precautions
Daily routine maintenance
Weekly routine maintenance
Monthly routine maintenance
Quarterly routine maintenance
Version: F
11-1
Part 3 Maintenance
11.1
11 Routine Maintenance
Maintenance Requirements
Before conducting the routine maintenance to the ANM2000, the maintenance staff
should be aware of their responsibilities; to ensure that the ANM2000 works
normally, they also should be familiar with the relevant technology and other
knowledge, as presented in this section.
11.1.1
11.1.2
11-2
Version: F
Part 3 Maintenance
11.2
11 Routine Maintenance
Maintenance Precautions
To ensure the normal running of the ANM2000, maintenance staff should pay
attention to the following precautions and obey them.
11.2.1
11.2.2
Version: F
11-3
Part 3 Maintenance
11 Routine Maintenance
Perform check and test daily according to the related routine maintenance
items and keep a record. Post the contact information such as the telephone
and fax of FiberHomes local maintenance center in the machine room for
reference of maintenance personnel. Technical support hotline of FiberHome
is 0086-27-87691549.
If any problem is found, handle it in time. If the problem cannot be solved,
contact the local maintenance center of FiberHome.
11.3
Maintenance Item
Requirement
Ensure
that
services
AEMS-Manager,
Informix-IDS,
AEMS-CollectionServer,
and
11.3.2
11.3.3
the
11.3.1
AEMS-DBServer,
Refer To
11.3.4
11.3.5
11.3.6
window.
Backing up the real time
data
11-4
11.3.7
operation.
Version: F
Part 3 Maintenance
11.3.1
11 Routine Maintenance
Figure 11-1
Step 2: In the ANM2000 User Login dialog box, input the correct username and
password, and click OK.
Step 3: After the user logs in successfully, the ANM2000 main GUI will appear.
During the login operation, if the login GUI of the ANM2000 stops at a certain login
alert box, this indicates that faults occur in this step and users fail to log in the
system. In this case, users need to eliminate the faults and log in again; for the
detailed operation methods, refer to Section 13.2.
Version: F
11-5
Part 3 Maintenance
11.3.2
11 Routine Maintenance
Figure 11-2
11-6
Version: F
Part 3 Maintenance
11.3.3
11 Routine Maintenance
Figure 11-3
Note:
For AEMS-TL1Server and AEMS-WebServiceServer services, their start
states depend on the conditions at the operation site.
Step 3: If any service is not started, select this service and click the
toolbar to start it, till its state changes into Started.
button in the
Step 4: If the service still cannot be started, please contact FiberHomes local
maintenance center to solve the problem.
Version: F
11-7
Part 3 Maintenance
11.3.4
11 Routine Maintenance
Confirming an alarm
Confirm the ended alarms to transfer them to the history alarm database; that is,
remove them from the current alarm tab. Thus it gives an at-a-glance impression of
the current persistent alarms and eases the equipment fault analyzing.
Step 1: Click an ended alarm in the Current Alarm tab.
Step 2: Select the Alarm Confirm or Alarm Confirm-Add Confirm Information
option in the shortcut menu, to complete the alarm confirmation.
11-8
Version: F
Part 3 Maintenance
11.3.5
11 Routine Maintenance
11.3.6
Version: F
11-9
Part 3 Maintenance
Figure 11-4
11 Routine Maintenance
Select a certain log entry in the browse tree on the left part of the Event Viewer
window to display all information of the log on the right part of the window, including
Type, Date, Time, Source and so on.
Step 2: Double-click a certain log to be queried on the right part of the Event
Viewer window to get the Event Properties dialog box for displaying the detailed
information of the log, as shown in Figure 11-5.
11-10
Version: F
Part 3 Maintenance
Figure 11-5
11.3.7
11 Routine Maintenance
Version: F
11-11
Part 3 Maintenance
11.4
11 Routine Maintenance
Maintenance Item
Viewing the service
start state
AEMS-CollectionServer,
and
11.3.3
11.4.1
11.4.2
to this.
the
database space
11.4.3
Checking advanced
settings
Viewing
Refer To
Viewing
Requirement
11.4.4
management
configuration
correct.
11.4.5
program
11.4.1
11-12
Version: F
Part 3 Maintenance
Figure 11-6
11 Routine Maintenance
Step 2: Check the computer name according to the delivery configuration list.
If you need to modify the computer name, please click Change settings to modify
it and restart the computer after the modification.
Version: F
11-13
Part 3 Maintenance
Figure 11-7
11 Routine Maintenance
Figure 11-8
11-14
Version: F
Part 3 Maintenance
11 Routine Maintenance
Figure 11-9
Step 4: Double-click Internet Protocol Version 4 (TCP/IPv4) or just click this item
and then click the Properties button; then the Internet Protocol Version 4
(TCP/IPv4) Properties dialog box appears, as shown in Figure 11-10. Check the
IP address according to the delivery configuration list.
Version: F
11-15
Part 3 Maintenance
11 Routine Maintenance
Figure 11-10 The Internet Protocol Version 4 (TCP/IPv4) Properties dialog box
11.4.2
11-16
Version: F
Part 3 Maintenance
11 Routine Maintenance
Step 2: Press the Ctrl and F keys together to open the Search Results window, as
shown in Figure 11-11.
Version: F
11-17
Part 3 Maintenance
11 Routine Maintenance
conditions to search the files with their size larger than 30 M under the drive C
directory. See Figure 11-12.
Step 4: Observe the change conditions of log files, temporary files and .txt files. If
these files keep on growing, please contact technicians of FiberHome to handle the
problem as soon as possible.
You can use the same method to view the size of files under the D:\aems directory.
Note:
Some database files such as olsysdbs_dat.000, alarmdbs_dat.000,
alarmmonthdbs_dat.000, ol_***_dat.000 (*** represents the equipment
name), rootdbs_dat.000, faultdaydbs_dat.000, faultmonthdbs_dat.000,
pmdaydbs_dat.000, pmmonthdbs_dat.000, and oltempdbs_dat.000
have a large size indeed. Users may leave them alone.
11-18
Version: F
Part 3 Maintenance
11.4.3
11 Routine Maintenance
Step 2: In the ol_*** window, input the command Onstat d <CR> to check the
status of the data space, as shown in Figure 11-14.
Version: F
11-19
Part 3 Maintenance
11 Routine Maintenance
In this figure, size represents the size of the created space (unit: chunk; 1 chunk =
4k = 41024 byte) and free represents the size of the free space. If the free space
is smaller than 20%, please contact technicians of FiberHome to enlarge the
database space.
11.4.4
11-20
Version: F
Part 3 Maintenance
11 Routine Maintenance
Version: F
11-21
Part 3 Maintenance
11.4.5
11 Routine Maintenance
Step 2: In this dialog box, check whether the manager IP address is correct.
11-22
Version: F
Part 3 Maintenance
11.5
11 Routine Maintenance
Maintenance Item
Requirement
Ensure
that
Refer To
services
Informix-IDS,
AEMS-DBServer,
state
AEMS-Manager,
11.3.3
physical
the
11.5.1
11.5.1
11.5.2
11.5.3
11.5.4
11.5.5
Backing up Data
In the routine maintenance, users should back up data to avoid loss of important
data due to a misoperation.
For the operations of backing up data, users can refer to Section 5.13, and we will
not go further on this issue here.
11.5.2
Version: F
11-23
Part 3 Maintenance
11.5.3
11 Routine Maintenance
11.5.4
11.5.5
11-24
Version: F
Part 3 Maintenance
11.6
11 Routine Maintenance
Maintenance
Requirement
Item
Viewing
the
the
ANM2000 time
Changing
login
Ensure
that
Refer To
services
AEMS-Manager,
Informix-IDS,
AEMS-DBServer,
AEMS-CollectionServer,
and
11.3.3
11.6.1
the
password
11.6.2
periodically
Checking
the
remote login
Checking
11.6.1
the
11.6.3
ANM2000
functions
refreshed automatically.
11.6.4
Version: F
11-25
Part 3 Maintenance
11.6.2
11 Routine Maintenance
11-26
Version: F
Part 3 Maintenance
11 Routine Maintenance
Step 3: Set the new password, click OK to save the settings and then exit the
dialog box.
Version: F
11-27
Part 3 Maintenance
11.6.3
11 Routine Maintenance
the remote
the network
the following
respectively,
to open the Network and Dial-up Connections window as shown in Figure 11-19.
Version: F
Part 3 Maintenance
11 Routine Maintenance
Step 2: In the Network Task pane, select Make New Connection to open the New
Connection Wizard dialog box as shown in Figure 11-20. Then click Next>.
Version: F
11-29
Part 3 Maintenance
11 Routine Maintenance
Step 5: Select the equipment for the incoming connection, and then click Next>.
11-30
Version: F
Part 3 Maintenance
11 Routine Maintenance
Step 7: Select root (root), i.e. the administrator user of the network management
computer, for Users allowed to connect, and then click Next>.
Version: F
11-31
Part 3 Maintenance
11 Routine Maintenance
Step 9: Click Finish to create the incoming connection, as shown in Figure 11-27.
11-32
Version: F
Part 3 Maintenance
11 Routine Maintenance
menu to open the System Properties dialog box as shown in Figure 11-28.
Step 11: Click the Remote tab, and select Allow users to connect remotely to
this computer to enable the remote login function of this network management
computer.
Note:
If an incoming connection has been created on the network
management computer, users only need to conduct steps 10 and 11.
Version: F
11-33
Part 3 Maintenance
11 Routine Maintenance
Step 1: Right-click
to open the Network and Dial-up Connections dialog box as shown in Figure
11-19.
Step 2: In the Network Task pane, select Make New Connection to open the New
Connection Wizard dialog box as shown in Figure 11-29.
11-34
Version: F
Part 3 Maintenance
11 Routine Maintenance
Step 3: Select Connect to the Internet for Network Connection Type, and then
click Next>.
Version: F
11-35
Part 3 Maintenance
11 Routine Maintenance
Step 5: Input the connection name in the textbox under ISP Name, and then click
Next>.
Step 6: Input the telephone number (i.e. the number of the line connected with the
network management computer modem) to be dialed in the textbox under Phone
number, and then click Next>.
11-36
Version: F
Part 3 Maintenance
11 Routine Maintenance
Step 7: It is not necessary to set Completing the New Connection Wizard. Click
Next> directly.
Version: F
11-37
Part 3 Maintenance
11 Routine Maintenance
Step 9: Select Add a shortcut to this connection to my desktop, and then click
Finish to complete the creation. In this case, the Connect ** (** presents the
connection name inputted in step 5) dialog box will appear, as shown in Figure
11-37.
Version: F
Part 3 Maintenance
11 Routine Maintenance
Step 10: Click Connect to open the Connecting ** (** presents the connection
name input in step 5) alert box, as shown in Figure 11-37.
Step 11: Please wait a moment; if the Error Connecting ** (** presents the
connection name input in step 5) alert box appears, users should follow the method
in Section 13.4 to find out the cause and eliminate the fault, until the ** has
connected (** presents the connection name input in step 5) icon appears in
Dialup of the Network Connection dialog box, or until
bottom-right corner of the desktop, indicating that the dialup connection is created.
Step 12: Click Start (on the bottom-left corner of the desktop) Run and input
mstsc to open the Remote Desktop Connection window, as shown in Figure
11-40.
Version: F
11-39
Part 3 Maintenance
11 Routine Maintenance
Step 13: In the Remote Desktop Connection window, set the Computer, User
name and Password items in turn.
Computer: input the IP address of the network management computer which
needs to perform the remote login.
User name: input the username of the network management computer which
needs to perform the remote login.
Password: input the password of the network management computer which
needs to perform the remote login.
Step 14: When completing these settings, click Connect. When the bar box, as
shown in Figure 11-41, appears on the top part of the desktop, it means that the
remote login is successful.
Figure 11-41 The alert box indicating the successful remote login
11-40
Version: F
Part 3 Maintenance
11 Routine Maintenance
If the alert box, as shown in Figure 11-42, appears, it means that the login
operation fails. In this case, follow the methods mentioned in Section 13.4 to find
out the cause and eliminate the fault, until the remote login is successful.
Note:
1. When the remote login operation is completed, the logout operation
must be implemented on the remote computer; otherwise, the remote
user of the network management computer will always exist.
2. If a dialup connection has been created on the remote computer,
users only need to conduct steps 12 to 14.
Please contact technicians of FiberHome to conduct the functional test at the
remote end. If the maintenance staffs in the equipment room are familiar with this
operation, they can test the remote login function through another network
management computer by themselves.
11.6.4
Version: F
11-41
12
Version: F
12-1
Part 3 Maintenance
12.1
12.1.1
Troubleshooting Principles
Please keep the following troubleshooting principles to analyze, locate and
eliminate a fault:
Restore the system monitoring as soon as possible.
Before locating a fault, collect the fault data in time, and save the collected
data to a removable storage medium or another computer in the network.
When determining the troubleshooting scheme, evaluate the influence first, so
as to ensure the normal transmission of services.
If the fault point cannot be located or the fault cannot be eliminated, please
contact FiberHome (our service hot line: 0086-27-87691549) to obtain the
technical support. Cooperate with technicians from FiberHome for the
troubleshooting, so as to minimize the period of service interruption.
12.1.2
Troubleshooting Precautions
Analyze the fault symptom and locate the cause first, and then handle the fault.
Do not make blind attempts if the fault cause is unknown, to prevent the
problem from being enlarged. Notice that the repairing of faults on the
ANM2000 cannot influence the system running.
Before handling the fault, keep all onsite records concerning the fault and do
not delete any data or log randomly.
Before any modification, back up the data of the ANM2000.
After the system recovers, observe the running state to verify the fault is
eliminated; and complete the relevant handling report in time.
Caution:
To ensure the normal running of the ANM2000 and the equipment, users
should be familiar with the troubleshooting principles and precautions
before handling a fault, and then follow these principles and precautions
to locate and eliminate the fault.
12-2
Version: F
Part 3 Maintenance
12.2
Troubleshooting Flow
When the ANM2000 is abnormal because of such external cause as power failure,
misoperation, or software and hardware fault, the network may fail to be monitored.
In this case, users can locate the fault and repair the system by referring to the
troubleshooting flow and complying with the troubleshooting principles and
precautions. If the problem persists, contact the local office or the customer service
center of FiberHome.
Figure 12-1 shows the troubleshooting flow.
Figure 12-1
Version: F
12-3
Part 3 Maintenance
12.3
Collection Item
Time and place
Collect the information about the when and where of a fault; and the
time should be precise to minute.
Symptom
Describe the symptom when a fault occurs; and the fault can be
description
Measures taken
and result
Alarm information
Log information
Networking diagram
12-4
Description
Version: F
13
Version: F
13-1
Part 3 Maintenance
13.1
13.1.1
Fault Symptom
The ANM2000 GUI gives the Connection failure! alert box during the login
operation.
13.1.2
Cause
The last shutdown operation is abnormal, resulting in loss of the data in the
database.
Handling method
Step 1: Click Start (on the bottom-left corner of the desktop) Administrative
Tools Services to open the Services window, as shown in Figure 13-1.
Figure 13-1
13-2
Version: F
Part 3 Maintenance
Step 2: Check whether the Informix IDS_ol_*** (*** represents the database
instance name) database service is started. If not, start it. In this case, if the
problem persists, contact technicians of FiberHome for further instructions.
13.1.3
Cause
The ANM2000 is shut down illegally due to an abnormal power failure of the
network management computer, leading to the destruction of the database
environment variables; for example, the Informix password is changed.
Handling method
Reset the environment variables, following the steps below:
Step 1: Click Start Programs IBM Informix ClientSDK 3.50 Setnet32
to open the IBM Informix Setnet32 dialog box.
Step 2: Check whether each setting in the Server Information tab is correct,
according to Table 13-1.
Figure 13-2
Version: F
13-3
Part 3 Maintenance
Table 13-1
Configuration Item
Description
HostName
Protolname
Select olsoctcp.
Service Name
After completing the settings, click Make Default Server first; and then click Apply
to open the Define New Informix Server? alert box; finally click OK.
Step 3: Click the Host Information tab, as shown in Figure 13-3; and then check
each setting according to Table 13-2.
Figure 13-3
13-4
Version: F
Part 3 Maintenance
Table 13-2
Configuration Item
Description
Current Host
User Name
Password Option
Password
After completing the settings, click Apply to bring up the Define New Host? alert
box; and then, click OK in the alert box.
Step 4: Click the Environment tab, as shown in Figure 13-4, to set the
environment variables.
Figure 13-4
Select the Use my settings check box and click Apply and OK.
Version: F
13-5
Part 3 Maintenance
13.2
13.2.1
Fault Symptom
Users cannot log in the ANM2000 GUI after repeating to input the username and
password.
13.2.2
Cause
The username or password has errors.
Handling method
Use the correct username and password to log in again.
Note:
If a user inputs an incorrect password for three times, this user will be
locked. An Admin level user can unlock a locked user.
13.3
13.3.1
Fault Symptom
When users run the ANM2000 on a client, the GUI gives the prompt: Can't open
database! Please check database configuration and network connection.
13-6
Version: F
Part 3 Maintenance
13.3.2
Cause
The priority of the servers dual NIC setting is incorrect.
Handling method
Check whether the priority of the servers database network card is higher than that
of the equipments network card; that is, ensure that the priority of servers
database network card is in the first place.
The method of setting the network cards priority is as follows:
Step 1: In the server, right-click Network and select Properties to open the
Network and Sharing Center window.
Step 2: Select Manage network connections to open the Network Connections
dialog box.
Step 3: Select Advanced Advanced Settings to open the Advanced
Settings dialog box.
Step 4: In the Adapters and Bindings tab of the Advanced Settings dialog box,
select tcpip and click the
Figure 13-5
Version: F
Part 3 Maintenance
Note:
If the server is installed with other network cards besides the database
network card and the equipment network card, the database network
cards priority must always be placed in the first place.
13.3.3
Cause
The IP address setting of the client database network card is wrong.
Handling method
Follow the method mentioned in Section 11.4.1 to check whether the IP address of
the client database network card is set as that of the server database network card.
13.3.4
Cause
The client cannot communicate with the server.
Handling method
Step 1: Follow the method mentioned in Section 11.3.2 to check whether the client
can ping the server.
Step 2: If the client cannot ping the server, users should check whether the
hardware connections of the network components are normal, and whether the
settings are correct.
13-8
Version: F
Part 3 Maintenance
13.3.5
Cause
The setting of the configuration file is wrong.
Handling method
Open the file D: \ aems \ Client \ ini \ aems.ini, and check whether the setting of
each item is correct, referring to the delivery configuration list. See Figure 13-6.
Figure 13-6
Version: F
13-9
Part 3 Maintenance
13.3.6
Cause
The setting of the environment variable is wrong.
Handling method
Step 1: Click Start (on the bottom-left corner of the desktop) Programs IBM
Informix ClientSDK 3.50 Setnet32 to open the IBM Informix Setnet32
dialog box, as shown in Figure 13-7.
Figure 13-7
Step 2: Check each environment variable setting against the configuration item in
Table 13-3.
13-10
Version: F
Part 3 Maintenance
Table 13-3
Tab
Configuration Item
Description
INFORMIXSERVER
Use my settings
Select it.
Server
HOSTName
Information
Protolname
Select olsotcp.
Service Name
Current Host
User Name
Environment
Host Information
Usually
Password Option
select
Password,
indicating
that
inputting
Password
13.4
13.4.1
Fault Symptom
When users log in on the remote computer, the alert box as shown in Figure 13-8
appears, indicating the login failure.
Figure 13-8
Version: F
13-11
Part 3 Maintenance
13.4.2
Cause
The hardware connection between the remote computer and the network
management computer fails.
Handling method
Step 1: Follow the method in Section 11.3.2 to check whether the remote computer
can ping the network management computer.
Step 2: If the remote computer cannot ping the network management computer,
users should check whether the hardware connection of the network components
is normal, and whether the settings are correct.
13.4.3
Cause
The remote login function of the network management computer is not enabled.
Handling method
Step 1: In the network management computer, right-click My Computer on the
desktop and select Properties in the shortcut menu to open the System window.
Step 2: Select Remote Settings to open the System Properties dialog box.
Step 3: Select Allow users to connect remotely to this computer to enable the
remote login function of this network management computer.
13-12
Version: F
Part 3 Maintenance
Figure 13-9
13.4.4
Cause
The remote login setting of the remote computer is incorrect.
Handling method
Step 1: In the remote computer, click Start (on the bottom-left corner of the desktop)
All programs Accessories Communications Remote Desktop
Connection to open the Remote Desktop Connection window, as shown in
Figure 13-10.
Version: F
13-13
Part 3 Maintenance
Step 2: In the Remote Desktop Connection window, check and modify the
incorrect settings; and ensure that the settings of Computer, User name and
Password are correct.
13-14
Version: F
14
Version: F
14-1
Part 3 Maintenance
14.1
14.1.1
Fault Symptom
When users click System Import Configuration in the main menu at the
ANM2000 GUI to import the configuration data, the system gives an error prompt.
14.1.2
Cause
The database service Informix IDS_ol_*** (*** indicating the database instance
name) is not started.
Handling method
Step 1: Click Start (on the bottom-left corner of the desktop) Administrative
Tools Services to enter the Service window.
Step 2: In the Service window, start the Informix IDS_ol_*** (*** indicating the
database instance name) service.
14.1.3
Cause
The configuration file is generated in a network management system with a higher
level version, but the current network management system is a lower level version.
Handling method
Upgrade the current network management system; for the detailed operation
methods, please contact technicians of FiberHome.
14-2
Version: F
Part 3 Maintenance
14.2
14.2.1
Fault Symptom 1
When users deliver commands, the system gives the following prompt:
Connection Error (1021), please close this dialog box!
14.2.2
Cause
The AEMS-DBServer service is not started.
The configuration of the aems.ini file is incorrect.
Handling method
Start the AEMS-DBServer service.
Open D: \ aems \ Client \ ini \ aems.ini, and ensure that the IP address in the
aems.ini file is set to the IP address of the network card that the background
AEMS-Dbserver service is bound with.
14.2.3
Fault Symptom 2
When users deliver commands, the system gives the following prompt: Manager
program is not started or is being started!
14.2.4
Cause
The AEMS-Manager service is not started.
The setting of the management configuration program is incorrect.
The configuration of the md.ini file is incorrect.
Version: F
14-3
Part 3 Maintenance
Handling method
Start the AEMS-Manager service.
Click Configuration Manager Configuration in the main menu to open
the Manager Configuration dialog box as shown in Figure 14-1, and confirm
that the setting of each item is correct according to Figure 14-1.
Figure 14-1
Open the md.ini file under the D:\aems\Server\ini directory and set the
UpServerSockAddr item to the IP address of the database.
14.3
14.3.1
Fault Symptom
After logging in the ANM2000 GUI, users cannot obtain the version information of
services such as ANSEVER by clicking Help About Anms in the main menu.
14-4
Version: F
Part 3 Maintenance
14.3.2
Cause
Services such as AEMS-DBserver are not started.
Handling method
Confirm that services such as AEMS-DBserver are started.
14.4
14.4.1
Fault Symptom
Some alarms cannot be read out by the current or history alarm query operation in
the ANM2000 GUI.
14.4.2
Cause
The query condition setting is incorrect.
Handling method
Step 1: In the ANM2000 GUI, right-click the blank in the Current Alarm tab (or the
History Alarm tab), and select Modify Query Condition in the shortcut menu to
open the Setting current alarm query condition (or Setting history alarm query
condition) dialog box.
Step 2: Check and ensure that the query conditions are set correctly. For instance,
in the query time settings, >= and <= under Begin Time indicate the time period
during which the alarm to be queried occurs; >= and <= under End Time indicate
the time period during which the alarm to be queried ends.
Version: F
14-5
Part 3 Maintenance
14.5
14.5.1
Fault Symptom
In a certain project, users can normally monitor all stations and query the current
performance data, but fail to query partial stations history performance data, or get
an incomplete query result of the history performance data (that is, the result does
not match the query conditions).
14.5.2
Cause
The performance collection scheme setting is incorrect.
Handling method
Follow the methods mentioned in Section 7.1 to set the performance collection
scheme again.
14.6
Interruption of Services
14.6.1
Fault Symptom
Service Interrupted is displayed at the lower-right corner of the status bar in the
ANM2000 GUI.
14.6.2
Cause
The AEMS-DBServer service is not started.
Handling method
Start the AEMS-DBServer service or restart the computer.
14-6
Version: F
Part 3 Maintenance
14.7
14.7.1
Fault Symptom
The network management server fails to connect the system equipment; the
system is always gray in the ANM2000 GUI.
14.7.2
Cause
The cable which connects the network management computer with the equipment
is improper or in bad connection.
Handling method
Check whether the network management computer is connected with the
equipment via a proper cable: a straight-through cable should be used if the
network card is connected with the GSWC cards FE port directly or is
connected through a HUB.
Ensure that the network management computer is in good connection with the
equipment.
Version: F
14-7
Part 3 Maintenance
14.7.3
Cause
The network card of the network management computer fails.
The network cards configuration is incorrect.
Handling method
Check whether the network card works normally. On the network management
computer, click Start Run at the lower left corner on the desktop to open
the Run dialog box. In the dialog box, enter PING *.*.*.* (*.*.*.* stands for the
local computers IP address) and click OK. This brings up the ping window
shown as Figure 14-2; the result Request timed out indicates a failure of the
network card. In this case, you should check whether the network card has
faults.
Figure 14-2
Against the delivery configuration list, check whether the network card
configuration is correct.
14.7.4
Cause
The AEMS-Manager service is not started.
Handling method
Start the AEMS-Manager service or restart the computer.
14-8
Version: F
Part 3 Maintenance
14.7.5
Cause
The systems network management configuration is incorrect. For example, the
systems management program is not set as the management program of the
current network management system, or the systems IP address setting is wrong.
Handling method
Step 1: Log in the ANM2000 GUI, and select Config Manage Manager
Configuration in the main menu to open the Manager Configuration dialog box
as shown in Figure 14-3.
Figure 14-3
Version: F
14-9
Part 3 Maintenance
Figure 14-4
14.7.6
Cause
A certain card of the system is configured incorrectly, the configuration of the card
is lost, or the card has faults.
Handling method
Please refer to the relevant manuals corresponding to the specific equipment. If the
fault still exists, please contact engineers of FiberHome.
14-10
Version: F
Part 3 Maintenance
14.7.7
Cause
The configuration of the aems.ini file is incorrect.
Handling method
Step 1: Open D: \ aems \ Client \ ini \ aems.ini.
Step 2: Check the settings and confirm that the settings of various items in the
aems.ini file are correct. See Figure 14-5.
Figure 14-5
Version: F
14-11
e-Fim ANM2000
Broadband Access Network
Management System
Operation Manual (Based on
Windows)
Version: F
Code: MN000000050
Part 4 Appendixes
Note:
VLAN means the virtual local area network; it sets various network
segments (or smaller LANs) logically for the LAN equipment, so as to
implement the data switch between virtual workgroups (units).
Hereinafter, we introduce the setting methods of the dual NIC mode.
Version: F
A-1
Part 4 Appendixes
A.1
Figure A-1
Step 2: Set the IP address in the Manager IP Address text box; then click the Add
button.
Step 3: Click System Save To Database in the main menu.
A-2
Version: F
Part 4 Appendixes
Step 4: Open the file D: \ AEMS \ Server \ ini \ md.ini, and confirm that
MONITOR_IP and BIND_TO_IP under ANSERVER are both the IP address of the
database network card; LocalUpSockAddr and UpServerSockAddr1 under
ADMAEMS are both the IP address of the database network card.
Version; F
Figure A-2
Figure A-3
A-3
Part 4 Appendixes
Step 5: Open the d: \ Client \ fhanms \ ini \ aems.ini file, and confirm that
DATABASE_SERVER and COMMAND_SERVER under BROWSER are both the
IP address of the database network card.
Figure A-4
Step 6: Click Start (on the bottom-left corner of the desktop) Settings
Control Panel Admin Tools Service to open the Service window, and then
restart the ANSERVER and admaems services.
A.2
Part 4 Appendixes
Step 2: Click Start (on the bottom-left corner of the desktop) Program
Informix Client--SDK 2.81 Setnet32, and set the items in the Server
Information tab of the IBM Informix Setnet32 dialog box that appears.
IBM Informix Server: Input the database name of the server.
HostName: Input the computer name of the server.
Protolname: Select olsoctcp.
Service Name: Usually input the port No. 6000, and turbo also can be input.
After completing the settings, first click Make Default Server, and then click Apply;
then select OK in the Define New Informix Serveralert box that appears.
Step 3: Click the Host Information tab to set the relevant items.
Current Host: Input the computer name of the server.
User Name: Always input Informix.
Password Option: There are three options in its drop-down menu -- Ask
Password At Runtime, No Password, and Password. Usually users should
select Password, indicating that the client needs to input the password when
accessing the server database.
Password: Input the Informix user password; here it is Anms2k.
After completing the settings, click Apply, and then select OK in the Define New
Hostalert box that appears.
Step 4: Click the Environment tab. Select Use my settings, and click Apply and
OK.
Version; F
A-5
Appendix B
Import
The system backup and import is implemented via the GHOST, namely the
clone-installation. It is to make mirror image files of the computer installed with the
operating system, the database, and the ANM2000 via the GHOST software, and
copy them to another computer to enhance the system security.
The following introduces how to back up the system and import mirror image files
with the GHOST in turn.
B.1
Version: F
B-1
Part 4 Appendixes
Figure B-1
In the dialog box of selecting the local harddisk drive, click OK.
Figure B-2
In the dialog box of selecting local partition(s), select the local partition and
click OK.
Figure B-3
B-2
Version: F
Part 4 Appendixes
Note:
Generally for the network management system backup, at least the
contents in disk c and d should be exported to acquire the image files.
Step 5: Enter the image storage directory (the default directory is the directory of
the GHOST). Commonly the network management system image files can be
stored in the partitions other than drivers C and D, or exported to a CD. Please note
that the image file size should be less than the CD capacity.
Figure B-4
Step 6: In the Compress Image dialog box that appears, click Fast. The meanings
of the three items are listed in Table B-1.
Figure B-5
Version: F
B-3
Part 4 Appendixes
Table B-1
Item
Meaning
No
Fast
High
Indicates that the image files are compressed highly. In this case, the
generated image files occupy the least disk space.
Step 7: In the Question: dialog box that appears, click Yes. Then the GHOST will
begin to make image files, as shown in Figure B-6.
Figure B-6
When the image files are made successfully, the alert box as shown in Figure B-7
will appear.
B-4
Version: F
Part 4 Appendixes
Figure B-7
B.2
Figure B-8
Version: F
Importing files
B-5
Part 4 Appendixes
Step 3: In the dialog box of selecting the directory, select the image file directory
and click Open.
Figure B-9
Step 4: In the dialog box of selecting the partition that appears, select the partition
to import the appointed image files, and click OK.
Figure B-10
B-6
Version: F
Part 4 Appendixes
Step 5: In the Question dialog box that appears, click Yes. Then the GHOST will
begin to import the image files.
Figure B-11
When the image files are imported successfully, the alert box as shown in Figure
B-12 will appear.
Figure B-12
Version: F
B-7
Appendix C
Version: F
Abbreviations
ADSL
AIS
ATM
BER
CATV
Cable Television
DSL
DSLAM
EPON
GPON
GUI
IP
Internet Protocol
IPTV
LCD
LOF
Loss Of Frame
LOS
Loss Of Signal
LVDS
MAC
MGC
MSAN
OLT
ONT
ONU
OS
Operating System
PC
Personal Computer
PM
Performance Monitor
PON
RDI
SNMP
UPS
VDSL
VLAN
VOIP
WS
Work Station
C-1
information requested is used for no other purposes than to respond to your feedback.
Name
Phone Number
Email Address
Company
To help us better understand your needs, please focus your answers on a single documentation or a
complete documentation set.
Documentation Name
Code and Version
Rarely
Never
in daily maintenance
in
troubleshooting
3. What is the percentage of the operations on the product for which you can get instruction from the
documentation?
100%
80%
50%
0%
4. Are you satisfied with the promptness with which we update the documentation?
Satisfied
Electronic edition
Somewhat
Normal
5. Are the product working principles and the relevant technologies covered in the documentation
sufficient for you to get known and use the product?
Yes
No (please specify)
6. Can you successfully implement a task following the operation steps given in the documentation?
Yes (please give an example)
No (please specify the reason)
Practical
11. Thinking of the documentations you have ever read offered by other companies, how would you
Thank you for your assistance. Please fax or send the completed survey to us at the contact information
included in the documentation. If you have any questions or concerns about this survey please email at
[email protected].
+86-27-87691549
Fax:
+86-27-87691755
Website: http://www.fiberhomegroup.com