NN10470 303
NN10470 303
NN10470 303
Administration
NN10470-303
Document status: Standard
Document issue: 01.03
Document date: May 2007
Product release: 16.2
Job function: Administration and Security
Type: NTP
Language type: U.S. English
NORTEL, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
Contents
New in this release 11
Features 11
Other changes 11
New chapters 11
New procedures 11
Updated chapters 11
Updated procedures 12
Updated task flows 12
Deleted procedures 12
Introduction 14
Routine administration 16
Shared memory configuration 17
Using the config_sys_script to configure shared memory 18
Specifying the shared memory required by a network model 19
Specifying the shared memory required by FDTM 20
Specifying the shared memory required by PCMS 21
Configuring the maximum heap size for MDM toolset 22
Software licensing 41
Setting user privileges for Java Sun Access Manager license files 42
Generating a temporary license key 43
Adding a new license key 44
Listing the options enabled by a license 45
Verifying the customer name in the license key and customer identifier files 46
Displaying all license keys, their validity, and deleting invalid licenses 47
Listing the packages that your licenses allow you to run 49
Setting up the primary time server to provide the time to DPN 108
Setting up the backup and secondary backup time servers to provide the time to
DPN 110
Defining a DPN OA as a time source on all time servers 112
Configuring servers for network access, surveillance access, and provisioning access
to MPE nodes 234
Configuring MPE 9500 hosts and groups with the mpe.config script in no-prompt
mode 237
Configuring MPE 9500 hosts and groups with the mpe.config script in prompt
mode 241
Deleting an MPE node 245
Modifying an MPE node 247
Configuring the SNMP proxy agent (SPA) 249
Reloading the SPA configuration files 251
Redefining the selected log levels for SPA 252
Generating statistical log messages for SPA 253
Compatibility of DPN software with the automatic DBNL disabling feature 366
Log files produced by the automatic DBNL disabling feature 366
Setting up the automatic DBNL disabling feature 369
Configuring automatic DBNL disabling and starting DBNLWatch 369
Obtaining a list of the DBNLs that are currently being watched 370
Cleaning up accumulated log files 371
Cleaning up log files manually 371
Cleaning up log files with a cron job 371
Features
There are no feature-related changes in this release.
Other changes
References to Nortel Multiservice Data Manager technical publications were
updated with new document numbers.
See the following sections for information about changes that are not releated
to a feature.
New chapters (page 11)
New procedures (page 11)
Updated task flows (page 12)
Updated procedures (page 12)
Deleted procedures (page 12)
New chapters
MDM files backup and restore utility (page 306)
Time-of-day updates for seasonal time changes (page 373)
New procedures
Java Sun Access Manager system recovery (page 73)
Updated chapters
Updated command syntax in Security service backup and restore utility
(page 303)
Updated procedures
Backing up the MDM desktop (page 61)
Backing up the MDM restore utility (page 63)
Backing up the security service (page 64)
Restoring security services on an Operator Client (page 65)
Restoring security services on a standalone security server (page 68)
Restoring security services on a replicated pair of security servers
(page 70)
Restoring the MDM desktop (page 74)
Backing up MDM (page 76)
Restoring MDM (page 78)
Removing MDM software (page 82)
Removing MDM software (page 82)
Cleaning up log files using mdmlogclean (page 165)
Changing the sendmail server default port (page 116)
Changing the Apache server default SSL port (page 117)
Changing the Tomcat http client port (page 125)
Changing the Tomcat server default port (page 126)
Changing the Apache web server default port (page 127)
Changing the RADIUS server default port (page 129)
Changing the Java Sun Access Manager default port (page 131)
Changing the Java Sun Access Manager admin default port (page 134)
Deleted procedures
Restoring the MDM desktop after a downgrade
Configuring the server port in the java system DS console
Configuring the client process
Prerequisites
For conceptual information relating to the procedures in these tasks, see
Nortel Multiservice Data Manager AdministrationFundamentals
(NN10470-305). For a description of the tools references in any of the tasks
described in this document, see Nortel Multiservice Data Manager
AdministrationTools (NN10470-300).
Navigation
Routine administration (page 16). Use these tasks to perform routine
MDM administrative functions.
Shared memory configuration (page 17)
UNIX account configuration for MDM (page 23)
Software licensing (page 41)
MDM software management (page 50)
Operating system and server infrastructure security (page 84)
Network time synchronization (page 103)
Operator Client default port settings modification (page 114)
Server process administration overview (page 137). Use the tasks in this
section to manage Multiservice Data Manager servers and to set
parameters for the workstations support server processes.
MDM workstation threshold configuration (page 138)
Multi-nodal naming service configuration (page 141)
Log and alarm management (page 149)
MDM Toolset customization (page 148). Use the tasks in this section to
change the default settings for administrative functions that were
established when Multiservice Data Manager software was installed.
Prerequisites
Default values for many administrative functions were established
automatically when Multiservice Data Manager software was installed. To
alter these settings and applications to meet the specific needs of your
network, see MDM Toolset customization (page 148).
Before performing any of the procedures in this section, you must be
familiar with the description of shared memory configuration in Nortel
Multiservice Data Manager AdministrationFundamentals
(NN10470-305).
If you are unfamiliar with any of the concepts relating to the tasks listed
here, see Nortel Multiservice Data Manager Administration
Fundamentals (NN10470-305).
Navigation
Shared memory configuration (page 17)
UNIX account configuration for MDM (page 23)
Software licensing (page 41)
MDM software management (page 50)
Operating system and server infrastructure security (page 84)
Network time synchronization (page 103)
Operator Client default port settings modification (page 114)
Prerequisites
Before performing any of the procedures in this section, you must be familiar
with the description of shared memory configuration in Nortel Multiservice
Data Manager AdministrationFundamentals (NN10470-305).
Navigation
Using the config_sys_script to configure shared memory (page 18)
Specifying the shared memory required by a network model (page 19)
Specifying the shared memory required by FDTM (page 20)
Specifying the shared memory required by PCMS (page 21)
Configuring the maximum heap size for MDM toolset (page 22)
Do not use this script to decrease the amount of shared memory. To decrease
the shared memory, use a UNIX editor to edit the system kernel file /etc/
system.
Procedure steps
Step Action
1 Log in as root.
2 In a UNIX access window, enter the following commands:
/opt/MagellanNMS/system/config/\
config_sys_shmem <size>
/opt/MagellanNMS/system/config/config_sys_semaphores
3 Reboot the workstation, and make the new shared memory available.
init 6
--End--
Variable definitions
Variable Value
size The maximum amount of shared memory, in megabytes, to be allocated per
segment. The suggested size is 256 Mbyte. This amount of shared memory
is sufficient for both surveillance and configuration tools.
Procedure steps
Step Action
1 Specify the amount of shared memory that the server uses for network
models by starting the server with the following command:
/opt/MagellanNMS/bin/dnmnmc [-s <shm size in MB>]
Attention: If this option is not specified, the DNMNMC server reserves the largest
possible shared memory segment allowed by the kernel. Therefore, it is important to
specify a specific amount of shared memory for the DNMNMC server.
Attention: For the shared memory to take effect, you must also set it in the startup
command for Network Model Coordinator (DNMNMC). See Nortel Multiservice Data
Manager AdministrationServer Management (NN10470-310).
--End--
Variable definitions
Variable Value
sh size in MB The maximum amount of shared memory to reserve. This number must be
less than or equal to the maximum shared memory segment size configured
in the workstations kernel. The default is 24 Mbyte.
#PM, #EM, and #other The number of DPN modules, the number of Multiservice Switch modules,
and the number of all other components (such as links) in the network.
Currently, the models for all Multiservice Switch releases supported by Nortel
Multiservice Data Manager are all smaller than the default size of 20 Mbyte
used by FDTM. It is not necessary to provide a different value.
Procedure steps
Step Action
1 Specify a value other than the default value for FDTM shared memory.
/opt/MagellanNMS/bin/fdtm [-segSize <size>] (other
options...)
--End--
Variable definitions
Variable Value
size The size, in Mbyte, of each segment of shared memory segment. The default
value is 20 Mbyte.
When the server starts, it allocates the shared memory up front using the
following formula:
Procedure steps
Step Action
1 Specify a value other than the default value for PCMS shared memory.
/opt/MagellanNMS/bin/pcms [-numOfModels <n>] [-
modelSize <size>] (other options...)
--End--
Variable definitions
Variable Value
n The number of different Multiservice Switch software releases active in the
network. The default for PCMS is 2.
size The size, in Mbyte, of one Multiservice Switch model. The default is 25 Mbyte.
Prerequisites
You must be familiar with the material on maximum heap size
configuration in Nortel Multiservice Data Manager Administration
Fundamentals (NN10470-305).
Change the heap size only after carefully analyzing total workstation RAM,
swap space, and user session requirements. For more information, refer
to Nortel Multiservice Data Manager Planning (NN10470-102).
You must be logged in as root.
Procedure steps
Step Action
1 Stop all the Nortel Multiservice Data Manager tools (for example, Data
Viewer, Shelf View, and Nodal Provisioning) running in the shared JVM
environment.
2 Copy the default configuration file from the default directory
/opt/MagellanNMS/lib/cfg/SharedJVM.cfg.
cp /opt/MagellanNMS/lib/cfg/SharedJVM.cfg /opt/
MagellanNMS/cfg/SharedJVM.cfg
3 Edit the new file.
vi /opt/MagellanNMS/cfg/SharedJVM.cfg
4 Set MAXHEAPSIZE to a new value.
Attention: The maximum heap size cannot be less than 20M (the hard-coded
minimum).
--End--
If you want to establish secured access for MDM users, see Nortel
Multiservice Data Manager SecurityFundamentals (NN10470-605), Nortel
Multiservice Data Manager Network SecurityUser Access (NN10470-606),
and Nortel Multiservice Data Manager Network SecuritySecure
Communications (NN10470-607).
Prerequisites
Before performing the procedures in this section, you must be familiar with
the information on setting up and maintaining UNIX accounts for MDM in
Nortel Multiservice Data Manager AdministrationFundamentals
(NN10470-305).
Navigation
Creating a group using the groupadd command (page 24)
Creating a group using Solaris Management Console (page 25)
Creating a UNIX account with the default MDM user environment by using
the useradd command (page 27)
Creating a new user account with Solaris Management Console (page 29)
Setting up the root account temporarily (page 31)
Setting up the root account permanently (page 32)
Updating an existing UNIX user account by adding the skeleton files
(page 33)
Updating an existing UNIX user account by modifying the accounts set-up
files (page 34)
Creating an RNCS user account using the useradd command (page 35)
Creating an RNCS user account using Solaris Management Console
(page 36)
Ensuring that MDM dialog boxes are visible (page 38)
Prerequisites
You must be able to log in as root.
Procedure steps
Step Action
1 Log in as root.
2 Create the group.
/usr/sbin/groupadd -g <group ID> <group name>
3 Display the return code to determine if the group was added successfully:
If the root account is running C-shell, enter:
echo $status
If the root account is running Korn shell or Bourne shell, enter:
echo $?
A return code of 0 indicates that the command was successful.
--End--
Variable definitions
Variable Value
group ID A unique numerical identifier for the UNIX group that is greater than
99. Numbers 0 to 99 are reserved for special Sun applications. Use
group ID 101 as a starting point.
group name The name of the group. This identifier must be unique and can
consist of two to eight letters or numbers. The group name nmsop is
recommended.
Prerequisites
You must be able to log in as root.
Procedure steps
Step Action
1 Log in as root.
2 Using the Common Desktop Environment (CDE) window manager, open a
UNIX window.
3 Start the Solaris Management Console (SMC).
/usr/sbin/smc &
The SMC main window opens.
4 Navigate to Management Tools > This Computer > System Configuration >
Users.
The Log In: User Name screen appears.
5 Log in as root and click OK.
6 Click the Groups icon.
7 On the General tab, in the Group Name field, type the name for this group.
8 In the Group ID field, type a unique number to identify this group.
9 Click OK.
10 Select Console > Exit.
The SMC window closes.
--End--
Variable definitions
Variable Value
group ID A unique numerical identifier for the UNIX group that is greater than
99. Numbers 0 to 99 are reserved for special Sun applications. Use
group ID 101 as a starting point.
group name The name of the group. This identifier must be unique and can consist
of two to eight letters or numbers. The group name nmsop is
recommended.
Prerequisites
You must be able to log in as root.
Procedure steps
Step Action
1 Log in as root.
2 Set up the user account and copy the skeleton files into the home directory
of the new user account.
/usr/sbin/useradd \
-u <user ID> \
-g <primary group> \
-s <login shell> \
-d <path> \
-m \
-k <skeleton path> \
<user name>
3 Set the password.
passwd <user name>
You are prompted for a new password twice.
4 Enter the new password twice.
The new user account is set up to run the default MDM user environment
and provides the user with access to the default English language toolset,
called Full.tsets. This toolset provides access to the full set of MDM tools,
except those for administration.
If you wish to use this toolset, continue at step 5.
If you wish to use a different toolset, including a toolset for languages
other than English, change the default toolset definition file (see
Changing the default toolset definition file (page 173)).
5 Provide the new user with the password you set up in step 3, and ask the
user to log in. When the user logs in, an MDM session starts and the main
window opens on the desktop.
--End--
Variable definitions
Variable Value
login shell The full pathname of the program used as the user account shell when
you log in. Values are /bin/csh for C-shell, /bin/sh for Bourne shell, and
/bin/ksh for Korn shell. C-shell is preferred.
path The full path name for the home directory of the new user account. For
example, /localdisk/<user name>. Solaris configures /home as an
auto-mounted partition. Refer to the Sun Solaris Administrator Guide
for information about the correct way to use /home.
primary group The group ID set up for UNIX user accounts that are dedicated to
running MDM software. This is the number or name you entered when
you set up the group in Creating a group using the groupadd
command (page 24) or Creating a group using Solaris Management
Console (page 25).
skeleton path The full path name of the directory that contains skeleton information
that can be copied into the user accounts home directory to get the
MDM user environment. The path name is /opt/MagellanNMS/system/
skel.
user ID A numerical unique identifier greater than 99 for the new user account.
Numbers 0 to 99 are reserved for special Sun applications.
user name A unique name for the new user account consisting of from two to
eight numbers or letters.
The skeleton files are included with the MDM software and are used to set up
the UNIX user account environment to start an MDM session and to open the
MDM main window when the user logs in.
Follow this procedure to create a new MDM user account, and to allow a user
at an ASCII terminal to manage the network from a Remote Network
Communication System (RNCS).
Prerequisites
You must be able to log in as root.
Procedure steps
Step Action
--End--
Variable definitions
Variable Value
user name A unique name for the new user account consisting of from two to
eight numbers or letters.
user ID A numerical unique identifier greater than 99 for the new user
account. Numbers 0 to 99 are reserved for special Sun applications.
password is a field to select a method for setting the password for the new user
account. Set the password by moving to the Password field, clicking
the mouse, and selecting Normal Password. Enter the new password
and click OK.
path Sets the home path for the user account. See Service parameters to
create a UNIX account with the default MDM user environment in
Nortel Multiservice Data Manager AdministrationFundamentals
(NN10470-305).
Procedure steps
Step Action
1 Enter one of the following commands to source the Nortel Multiservice Data
Manager (MDM) user environment according to the login shell that the root
account is running:
If the root account is running Bourne shell or Korn shell:
. /opt/MagellanNMS/bin/nmssh
If the root account is running C-shell:
source /opt/MagellanNMS/bin/nmscsh
2 Enter commands to start an MDM session.
--End--
Procedure steps
Step Action
1 Log in as root.
2 Add the skeleton files to the existing user account.
/opt/MagellanNMS/bin/nmsuser root
The skeleton files are copied into the existing user account. Any existing set-
up files that have the same names as the skeleton files are saved with the
extension .old before the skeleton files are copied into the account.
3 The root account can now run the default MDM user environment and
provides the user access to the default MDM toolset, called Full.tsets. This
toolset provides access to the full set of tools, except those for
administration.
To use this toolset, go to step 4.
To use a different toolset, change the default toolset definition file (see
Changing the default toolset definition file (page 173)).
--End--
Procedure steps
Step Action
1 Log in as root.
2 Add the skeleton files to the existing user account.
/opt/MagellanNMS/bin/nmsuser <User Name>
The skeleton files are copied into the existing user account. Any existing set-
up files that have the same names as the skeleton files are saved with the
extension .old before the skeleton files are copied into the account.
The new user account is set up with the default Nortel Multiservice Data
Manager (MDM) user environment. When the user logs in, an MDM session
starts automatically and the main window opens.
--End--
Use the MDM skeleton set-up files (.login, .cshrc, and so on) in directory /opt/
MagellanNMS/system/skel as a model when modifying the set-up files for the
existing account.
When you have updated the existing account to source the MDM user
environment, you must provide a means to start an MDM session. The
recommended approach is to modify the .dtprofile file (for CDE) so that it
automatically starts a session and opens the main window when the user logs
in. Use the skeleton files for making these modifications.
Procedure steps
Step Action
1 The MDM software contains two scripts that you can source in the user
accounts setup files to supply the user accounts environment with the
symbols and values needed to run MDM. The script you choose depends
on the shell that the user account runs on.
If the account runs Korn or Bourne shell, add a statement to set-up file
.profile that includes the source command:
. /opt/MagellanNMS/bin/nmssh
If the account runs C-shell, add a statement to set-up file .cshrc that includes
the source command:
/opt/MagellanNMS/bin/nmscsh
Because these scripts augment the user environment with the symbols and
values for MDM, add the statements to source the symbols and values after
all other statements that set up the user account environment. For a
description of the values and symbols for MDM, see Nortel Multiservice
Data Manager AdministrationFundamentals (NN10470-305).
2 When you have updated the existing account to source the MDM user
environment, you must provide a means to start an MDM session. The
recommended approach is to modify the .dtprofile file (for CDE) so that it
automatically starts a session and opens the main window when the user
logs in. Use the skeleton files for making these modifications.
--End--
Prerequisites
See Nortel Multiservice Data Manager Fault ManagementRemote
Network Communication System (NN10470-013) for the instructions to
establish an RNCS session once the account is set up.
Procedure steps
Step Action
1 If you have not done so, create a UNIX group for Nortel Multiservice Data
Manager (MDM) users, as described in Creating a group using the
groupadd command (page 24).
2 Perform the procedure Creating a UNIX account with the default MDM user
environment by using the useradd command (page 27). Specify /opt/
MagellanNMS/bin/rncs for parameter -s <login shell>.
--End--
Prerequisites
See Nortel Multiservice Data Manager Fault ManagementRemote
Network Communication System (NN10470-013)for the instructions to
establish an RNCS session after the account is set up.
You must log in with userID root.
Procedure steps
Step Action
--End--
Variable definitions
Variable Definitions
CID The customer network management identifier (CNMID) associated
with the RNCS account. The range of values is 0 to 8191.
T Indicates a timeout value. RNCS automatically
terminates if no command input occurs during the
specified number of minutes.
unix access Specifies whether the RNCS user account is to
have UNIX access. The values are Y or N.
Procedure steps
Step Action
--End--
Prerequisites
For conceptual information about software licensing, see Nortel Multiservice
Data Manager AdministrationFundamentals (NN10470-305). For
information about planning requirements for software licensing, see Nortel
Multiservice Data Manager Planning (NN10470-102).
Navigation
Setting user privileges for Java Sun Access Manager license files
(page 42)
Generating a temporary license key (page 43)
Adding a new license key (page 44)
Listing the options enabled by a license (page 45)
Verifying the customer name in the license key and customer identifier
files (page 46)
Displaying all license keys, their validity, and deleting invalid licenses
(page 47)
Listing the packages that your licenses allow you to run (page 49)
Setting user privileges for Java Sun Access Manager license files
The adm user must have read privileges for the LIClicense.cfg and the
LICcustName.cfg files for the Java Sun Access Manager server to function
properly. You can either allow all users read privileges for these files or you
can change the group permissions so that only adm group members have
permission to view the license files.
Procedure steps
Step Action
--End--
Procedure steps
Step Action
1 Log in as root.
2 Start the c-shell.
csh
3 Enter the following command:
/opt/MagellanNMS/system/config/nmsTmpInstall
--End--
Procedure steps
Step Action
1 Log in as root.
2 Start the c-shell.
csh
3 Access the license directory.
cd /etc/opt/Magellan
4 Open the LIClicenses.cfg file with a UNIX editor such as vi.
5 Add the license key to the file.
6 Check what you have entered twice.
7 Save the file and exit from the file.
8 Have all users end their Multiservice Data Manager sessions and restart
them.
--End--
Procedure steps
Step Action
--End--
Procedure steps
Step Action
1 Display the customer name entered in the license key file and in the
customer identifier file.
/opt/MagellanNMS/system/config/nms_list_cust_names
This command produces a response similar to
Customer name written in the MDM customer name file:
MDMDEV
Customer names occurring in the license file for product
MDM:
MDMDEV
--End--
Displaying all license keys, their validity, and deleting invalid licenses
Determine which license keys are valid and which can be deleted.
Prerequisites
You must be logged in as root.
Procedure steps
Step Action
1 Display a report of the license keys and determine if the licenses are valid.
/opt/MagellanNMS/system/config/nms_file_report [-c]
--End--
Variable definitions
Variable Definitions
-c Prompts you for permission to delete expired licenses.
Entering the command without the -c option may produce a response similar
to the following example:
LICENSES:
________
NMS R12 NMSDEV ANY 19991124 20300101 FFFFFFFF
C77G6102052
License for non-MDM product
NMS R13 NMSDEV ANY 20001204 20300101 FFFFFFFF
076A76F515G
License for non-MDM product
MDM R13 NMSDEV ANY 20010119 20300101 FFFFFFFF
F893H7352257
License currently valid
Entering the command with the -c option while logged in as root displays each
non-valid license, one at a time, followed by the prompt:
Do you want to delete this entry? (y on n [n])
Enter y to delete the license or n to keep it.
When the command has run through all of the non-valid licenses in the file,
the following response appears:
You have made some changes to the licenses file
The modified file has been written in /etc/opt/Magellan/
LIClicenses.new
Please execute the following steps to activate it:
1- type: cd /etc/opt/Magellan
2- type: cat LIClicenses.new
3- if the contents are satisfactory, type:
cp LIClicenses.cfg LIClicenses.old
mv LIClicenses.new LIClicenses.cfg
Log in as root and follow the prompts.
Prerequisites
For more information about MDM software sets, refer to Nortel
Multiservice Data Manager Planning (NN10470-102).
Procedure steps
Step Action
1 Display a list of the packages (options) that the license key entitles you to
run.
/opt/MagellanNMS/system/config/nms_list_activ_opt
--End--
Backing up MDM
Backing up
MDM
Disabling access to
Is an MDM Disabling access to
the MDM
Administration Yes the MDM
Administration
Database installed? Administration
Database
Database
(page(page
60) 59)
No
Backing
Backing up up the
the
Stopping
Stopping MDM
MDM Backing
Backing up
up MDM
MDM MDM
MDM restore
restore
(page 59)
(page 58) (page
(page 76)
75) utility (page 61)
utility (page 63)
No
Enabling access to
Backing up the
Backing up the Is an MDM
Starting MDM
Starting MDM the MDM
Enabling the MDM
MDM
MDM desktop
desktop Yes
(page 75)
(page 74) Administration Administration
Administration
(page 61)
(page xx) Database installed? Database
Database (page 80)
(page 81)
No
End
MDM-5100-006-AA
Restoring MDM (1 of 2)
Restoring MDM
Disabling access
to the MDM
Is an MDM Administration
Administration Yes Database
Database installed? (page 60)
No
Stopping MDM
(page 59)
Is this
Restoring MDM A
workstation a No
(page 78)
security server?
Yes
If this workstation includes
the security service, ensure
that you restore the security Select the type of
service -after- you restore security service
the MDM software. to restore
Restoring MDM (2 of 2)
Restoring the
MDM desktop
(page 74)
Starting MDM
(page 75)
Enabling access to
the MDM
Is an MDM Administration
Administration Yes Database
Database installed? (page 81)
No
End
MDM software
downgrade procedures
Is an MDM Disabling
Disabling access
access to
Administration tothe
theMDM
MDM
Yes
Database Administration
Administration
installed? Database
Database (page 59)
(page 60)
No
Stopping MDM
Stopping MDM
(page 59)
(page 58)
Backing
Backing up
up MDM
MDM (page
(page xx) 76)
Backing
Backing up upthe
the
MDM
MDM restore
restore utility
utility (page
(page xx) 63)
Backing up the
Backing up the
Is this workstation security service
Yes security server
a security server? (page 64)
(page xx)
Is this
workstation a No B
security server?
Yes
Restore the backup
Select the type of files created by the
security service MDM Installer
to restore during the MDM
software upgrade.
Restoring the
MDM desktop Starting MDM
B (page 74) (page 75)
Enabling access
to the MDM
Is an MDM Administration
Administration Yes Database
Database installed? (page 81)
No
End
Disaster recovery (1 of 2)
Is this
workstation a No A
security server?
Yes
Restore the
backup files
created before the
disaster
A
MDM 5100 010 AA
Disaster recovery (2 of 2)
Restoring the
MDM desktop
(page 74)
Starting MDM
(page 75)
Enabling access to
the MDM
Is an MDM Administration
Administration Yes Database
Database installed? (page 81)
No
End
Navigation
Stopping MDM (page 59)
Disabling access to the MDM Administration Database (page 60)
Backing up the MDM desktop (page 61)
Backing up the MDM restore utility (page 63)
Backing up the security service (page 64)
Restoring security services on an Operator Client (page 65)
Restoring security services on a standalone security server (page 68)
Restoring security services on a replicated pair of security servers
(page 70)
Java Sun Access Manager system recovery (page 73)
Restoring the MDM desktop (page 74)
Starting MDM (page 75)
Backing up MDM (page 76)
Restoring MDM (page 78)
Enabling access to the MDM Administration Database (page 81)
Removing MDM software (page 82)
Stopping MDM
Record the current state of the Nortel Multiservice Data Manager (MDM)
servers and stop the servers.
Prerequisites
Ensure that an alternate Nortel Multiservice Data Manager server
workstation is performing the tasks of this workstation, if this workstation
is part of one of the following network management architectures:
redundant fault management
redundant fault management with aggregation
client-server configuration
Procedure steps
Step Action
--End--
Procedure steps
Step Action
--End--
You can perform this task independently of other MDM software backups.
Prerequisites
This task is necessary only if
the MDM release running is version 15.3 or later
you have customized the MDM desktop settings
If you are backing up the MDM software, ensure that you perform Backing
up MDM (page 76) before you back up the MDM desktop configuration.
A safe location to store the backup files.
Procedure steps
Step Action
Attention: The desktop applications are not interrupted during this backup.
--End--
Variable definitions
Variable Value
log_file The absolute pathname of the backup log file (for example, /opt/
desktop_backup.log).
release The current MDM software release (for example, 15.3).
safe_location Any location or device that can be accessed during a disaster
recovery or downgrade of the software.
tar_file_name The absolute pathname of the backup tar file.
/opt/nortel/data/applications/desktop
/opt/nortel/logs/applications/desktop
/opt/nortel/config/applications/desktop
Prerequisites
This task is necessary only if the Multiservice Data Manager release running
is version 15.3 or later.
Procedure steps
Step Action
--End--
You can perform this backup independently of other MDM software backups.
Prerequisites
If you are backing up the MDM software, ensure that you perform Backing
up MDM (page 76) before you backup the security service.
Procedure steps
Step Action
Attention: The security services are not interrupted during this backup.
--End--
Variable definitions
Variable Value
tar_file_name The absolute pathname of the backup tar file
Prerequisites
If you are not performing this task as part of a downgrade of the MDM
software, perform Backing up the security service (page 64).
If you are performing this task as part of a downgrade of the MDM
software, perform Backing up the MDM restore utility (page 63) before you
begin the downgrade.
If you are restoring the MDM software, ensure that you perform Restoring
MDM (page 78) before you restore the security service.
You can automate the restored client configuration using the response file
/opt/nortel/applications/security/current_isclient/swmgmt/resources/
isclient.isclient.rsp.
The isclient.isclient.rsp file name is hard-coded within the brr_security.sh
script. You cannot use any other response file.
If you use the common port number (58080 or 58081), you can use the
default responses in the file /opt/nortel/applications/security/
current_isclient/swmgmt/resources/isclient.isclient.rsp.
Procedure steps
Step Action
Attention: If you change the configuration of the restored client to point to a different
security server, you may also need to change the configuration of applications that
use the security client (for example, the Desktop application).
/opt/nortel/applications/security/current_isclient/
swmgmt/bin/brr_security.sh -restore <tar_file_name>
-r /opt/nortel/applications/security/current_isclient/
swmgmt/resources/isclient.isclient.rsp
Attention: If you change the configuration of the restored client to point to a different
security server, you may also need to change the configuration of applications that
use the security client (for example, the Desktop application).
Attention: If you change the configuration of the restored client to point to a different
security server, you may also need to change the configuration of applications that
use the security client (for example, the Desktop application).
/opt/nortel/applications/security/current_nsssaml/
swmgmt/bin/configure_nsssaml.sh -subcomponent password
11 At the prompt, type the corresponding server password.
--End--
Variable definitions
Variable Value
Installer_tar_file_name The absolute pathname of the backup tar file created by the MDM
Installer during the last MDM software upgrade. Use the file
/opt/user_administration_backup.tar or, if multiple versions of this file
exist, select the latest version as identified by
/opt/<increment>user_administration_backup.tar.
log_file The absolute pathname of the restore log file (for example,
/opt/user_administration_restore.log).
release The release being restored (for example, 15.3).
tar_file_name The absolute pathname of the backup tar file.
Prerequisites
If you are not performing this task as part of a downgrade of the MDM
software, perform Backing up the security service (page 64).
If you are performing this task as part of a downgrade of the MDM
software, perform Backing up the MDM restore utility (page 63) before you
begin the downgrade.
If you are restoring the MDM software, ensure that you perform Restoring
MDM (page 78) before you restore the security service.
Procedure steps
Step Action
2 If you are performing this task as part of a downgrade of the MDM software
and if the utility restore_mft_files.sh is not in the directory
/opt/MagellanNMS/bin, in a UNIX xterm type
cd /opt
cp restore_mft_files.sh /opt/MagellanNMS/bin
3 Restore the backup file on the standalone security server.
If you are not performing this task as part of a downgrade of the MDM
software, in a UNIX xterm, type
/opt/nortel/applications/security/current_isclient/
swmgmt/bin/brr_security.sh -restore <tar_file_name>
For more information about the brr_security.sh command, see Security
service backup and restore utility (page 303).
If you are performing this task as part of a downgrade of the MDM software,
in a UNIX xterm, type
/opt/MagellanNMS/bin/restore_mft_files.sh -release
<release> -user_admin -file <Installer_tar_file_name>
-log <log_file>
4 If you obtained the security information backup from a replicated security
server, you must deactivate the replication. To determine if this security
server is part of a replicated pair, in a UNIX xterm, type
--End--
Variable definitions
Variable Value
Installer_tar_file_name The absolute pathname of the backup tar file created by the MDM
Installer during the last MDM software upgrade. Use the file
/opt/user_administration_backup.tar or, if multiple versions of this file
exist, select the latest version as identified by
/opt/<increment>user_administration_backup.tar.
log_file The absolute pathname of the restore log file (for example,
/opt/user_administration_restore.log)
release The release being restored (for example, 15.3).
tar_file_name The absolute pathname of the backup tar file.
Prerequisites
If you are not performing this task as part of a downgrade of the MDM
software, Backing up the security service (page 64).
If are performing this task as part of a downgrade of the MDM software,
perform Backing up the MDM restore utility (page 63) before you begin the
downgrade.
If you are restoring the MDM software, ensure that you perform Restoring
MDM (page 78) before you restore the security service.
Procedure steps
Step Action
cp restore_mft_files.sh /opt/MagellanNMS/bin
4 Restore the backup file on each of the security servers in the replicated pair.
If you are not performing this task as part of a downgrade of the MDM
software, in a UNIX xterm on each of the security servers, type
/opt/nortel/applications/security/current_isclient/
swmgmt/bin/brr_security.sh -restore <tar_file_name>
For more information about the brr_security.sh command, see Security
service backup and restore utility (page 303).
If you are performing this task as part of a downgrade of the MDM software,
in a UNIX xterm on each of the security servers, type
/opt/MagellanNMS/bin/restore_mft_files.sh -release
<release> -user_admin -file <Installer_tar_file_name>
-log <log_file>
5 If you obtained the security information backup from a replicated security
server, you must deactivate the replication. In a UNIX xterm on each of the
security servers, type
grep nsDS5ReplicaHost /opt/nortel/3rd_party/netscape/
current_nds/slapd-*/config/dse.ldif
If there is no response from this command, the backup file was not from a
replicated server and you can proceed to the next security server.
If both of the replicated security servers have been checked and neither
displayed a response, proceed to the next step.
If there is a response to this command, deactivate the replication on the
security server. In a UNIX xterm on the security server, type
/opt/nortel/applications/security/current_core/bin/
config_s1is_replica.sh -nds_passwd
To the first prompt, reply delete.
To the second prompt, reply y.
If the security configuration is not part of a replicated pair or if the security
configuration is corrupt, the following error messages are displayed. Ignore
the messages and proceed to the next security server or if you have
deactivated both of the servers in the replicated pair, proceed to the next
step.
ERROR: Could not get fully qualified hostname of remote
LDAP server from replication agreement.
ERROR: Therefore, cannot completely remove S1IS
replication configuration.
ERROR: Operation failed
6 Reactivate replication on the first security server. In a UNIX xterm on one of
the security servers in the replicated pair, type
/opt/nortel/applications/security/current_core/bin/
config_s1is_replica.sh -nds_passwd
To the first prompt, reply setup.
To the second prompt, reply <host_name>.
To the third prompt, reply y.
7 Reactivate replication on the next security server. In a UNIX xterm on the
next security server in the replicated pair (that is, not the security server
configured in the step above), type
/opt/nortel/applications/security/current_core/bin/
config_s1is_replica.sh -nds_passwd
--End--
Variable definitions
Variable Value
host_name The redundant fully qualified host name of this server.
Installer_tar_file_name The absolute pathname of the backup tar file created by the MDM
Installer during the last MDM software upgrade. Use the file
/opt/user_administration_backup.tar or, if multiple versions of this file
exist, select the latest version as identified by
/opt/<increment>user_administration_backup.tar.
log_file The absolute pathname of the restore log file
(for example,
/opt/user_administration_restore.log).
release The release being restored (for example, 15.3).
tar_file_name The absolute pathname of the backup tar file.
Procedure steps
Step Action
1 Log on to the security server as the root user and open a console window.
2 Change directories, type:
cd /opt/nortel/applications/security/current_isclient/
swmgmt/bin
3 To execute the recovery, type:
./brr_security.sh -recover
--End--
Perform this task if you have customized the Multiservice Data Manager
desktop settings and you have previously created a backup of these settings.
Prerequisites
This taks is necessary only if the Multiservice Data Manager release
running is 15.3 or later.
You have performed Backing up the MDM restore utility (page 63).
If you are restoring the MDM software, ensure that you perform Restoring
MDM (page 78) before you restore the Multiservice Data Manager
desktop.
Procedure steps
Step Action
--End--
Variable definitions
Variable Value
log_file The absolute pathname of the restore log file (for example,
/opt/desktop_restore.log).
release The release being restored (for example, 15.3).
tar_file_name The absolute pathname of the backup tar file.
Starting MDM
Restart the Nortel Multiservice Data Manager (MDM) workstation.
Procedure steps
Step Action
--End--
Backing up MDM
Back up all of the critical Nortel Multiservice Data Manager (MDM) software
configuration and data files.
Prerequisites
You have prepared a safe location to store the backup files.
If you are backing up the security service and/or MDM desktop
configuration, ensure that you perform this task first.
Procedure steps
Step Action
If Then
If this workstation is running MDM go to step 2.
release 16.2 or later
If this workstation is running an go to step 3 and complete this procedure.
MDM release prior to 16.2
mv mdpdata_<release>.tar <safe_location>
7 If this workstation is running release 15.1 or later, type this command to back
up additional MDM software configuration files:
cd /opt/nortel/config
tar cvfp nortelconfig_<release>.tar ./*
mv nortelconfig_<release>.tar <safe_location>
8 If this workstation is running release 15.1 or later, type this command to back
up additional MDM software data files.
cd /opt/nortel/data
tar cvfp norteldata_<release>.tar ./*
mv norteldata_<release>.tar <safe_location>
9 If this workstation is running release 15.1 or later, type this command to back
up the MDM log files.
cd /opt/nortel/logs
tar cvfp nortellogs_<release>.tar ./*
mv nortellogs<release>.tar <safe_location>
10 If this workstation is running release 15.1 or later, type this command to back
up the MDM EPIC configuration files:
cd /opt/nortel/EPIC/cfg
tar cvfp nortelEPICcfg_<release>.tar ./*
mv nortelEPICcfg<release>.tar <safe_location>
--End--
Variable definitions
Variable Value
tar_file_name The absolute pathname of the backup tar file, for example
/opt/nortel/data/mdm/mdm_backup.tar.
log_file The absolute pathname of the log file, for example
/opt/mdm_backup.log.
release The MDM software release, for example, 161.
safe_location Any location or device that can be accessed during a disaster
recovery or downgrade of the software.
Restoring MDM
Restore all of the critical Nortel Multiservice Data Manager (MDM) software
configuration and data files.
Prerequisites
You have performed Stopping MDM (page 59).
Ensure that you have the MDM software configuration and data file
backups.
If this workstation includes the security service, ensure that you restore
the security service after you restore the software.
If you have a backup of the MDM desktop configuration, ensure that you
restore the MDM desktop configuration after you restore the MDM
software.
Procedure steps
Step Action
If Then
If this workstation is running MDM go to step 2.
release 16.2 or later
If this workstation is running an go to step 3 and complete this procedure.
MDM release prior to 16.2
2 Perform this step is this workstation is running MDM release 16.2 or later.
Type this command to restore the MDM software configuration files:
/opt/MagellanNMS/bin/restore_mdm_files -mdm -file
<tar_file_name> -log <log_file>
This procedure is complete.
3 Type this command to restore the MDM configuration files:
cp <safe_location>/mdmcfg_<release>.tar
/opt/MagellanNMS/cfg cd /opt/MagellanNMS/cfg
tar xvfp mdmcfg_<release>.tar
4 Type this command to restore the MDM software data files:
cp <safe_location>/mdmdata_<release>.tar
/opt/MagellanNMS/data
cd /opt/MagellanNMS/data
tar xvfp mdmdata_<release>.tar
5 If this workstation includes Management Data Provider (MDP) software,
type this command to restore the MDP software configuration files:
cp <safe_location>/mdpcfg_<release>.tar
/opt/MagellanMDP/cfg
cd /opt/MagellanMDP/cfg
tar xvfp mdpcfg_<release>.tar
6 If this workstation includes Management Data Provider (MDP) software,
type this command to restore the MDP software data files:
cp <safe_location>/mdpdata_<release>.tar
/opt/MagellanMDP/data
cd /opt/MagellanMDP/data
tar xvfp mdpdata_<release>.tar
7 If this workstation is running release 15.1 or later, type this command to
restore additional MDM software configuration files:
cp <safe_location>/nortelconfig_<release>.tar
/opt/nortel/config
cd /opt/nortel/config
tar xvfp nortelconfig_<release>.tar
8 If this workstation is running release 15.1 or later, type this command to
restore additional MDM software data files:
cp <safe_location>/norteldata_<release>.tar
/opt/nortel/data
cd /opt/nortel/data
tar xvfp norteldata_<release>.tar
9 If this workstation is running release 15.1 or later, type this command to
restore the MDM log files:
cp <safe_location>/nortellogs_<release>.tar
/opt/nortel/logs
cd /opt/nortel/logs
tar xvfp nortellogs_<release>.tar
10 If this workstation is running release 15.1 or later, type this command to
restore the MDM EPIC configuration files:
cp <safe_location>/nortelEPICcfg_<release>.tar
/opt/nortel/EPIC/cfg
cd /opt/nortel/EPIC/cfg
tar xvfp nortelEPICcfg_<release>.tar
--End--
Variable definitions
Variable Value
tar_file_name The absolute pathname of the compressed or uncompressed backup
tar file, for example
/opt/nortel/data/mdm/mdm_backup.tar.Z
log_file The absolute pathname of the log file, for example
/opt/mdm_restore.log.
release The MDM software release, for example, 151.
safe directory Any location or device that can be accessed during a disaster
recovery or downgrade of the software.
Procedure steps
Step Action
--End--
Procedure steps
Step Action
1 On the MDM workstation, log on as userID root and open a UNIX xterm.
2 If Secure Shell (SSH) software is installed on this workstation, remove the
SSHinit software package.
/usr/sbin/pkgrm SSHinit
3 If Secure Shell (SSH) software is installed on this workstation and this
workstation uses the Solaris 8 operating system, remove the MagOSSH
software package.
/usr/sbin/pkgrm MagOSSH
4 Change directories to the directory that contains the uninstall tool for the
software release to be removed.
cd /opt/MDM<release>_INST
5 Start the software removal tool InstallAnywhere Uninstaller.
./uninstall_mdm
If you are running Multiservice Data Manager release 16.1 or late, you
are prompted to confirm the DISPLAY environment variable, for
example:
Enter the environment DISPLAY to launch the MDM installer
GUI [:0.0]
The InstallAnywhere Uninstaller window opens.
6 Select Uninstall.
A window opens that indicates the MDM packages available for removal.
7 Select the MDM packages to remove and click Uninstall Selected
Packages.
--End--
Variable definitions
Variable Value
release The MDM software release number (for example, 152).
Prerequisites
If you workstation is already running Solaris 10 with SST v4.2, you must
unharden the system before installing Multiservice Data Manager.
Navigation
Procedures for Solaris 10
Unhardening the Solaris 10 OS with SST prior to an MDM installation
or upgrade (page 85)
Unhardening the Solaris 10 operating system (page 86)
Hardening the Solaris 10 operating system (page 87)
Creating customized OS hardening scripts (page 89)
Auditing the OS hardening status of the Solaris 10 operating system
(page 92)
Installing SST v4.2.0 (page 93)
Procedures for Solaris 9
Unhardening the Solaris 9 operating systems (page 94)
Hardening the Solaris 9 operating systems (page 95)
Viewing the status of the Solaris operating system (page 98)
Procedures that apply to all versions of Solaris
Generating secure passwords for MDM servers (page 99)
Setting encrypted passwords on MDMservers (page 100)
Changing encrypted passwords for MDM servers (page 101)
Disabling SNMP agents (page 102)
Prerequisites
You are already running Solaris 10 OS with SST, on the workstation where you
plan to installNortel Multiservice Data Manager.
Procedure steps
Step Action
1 Log in as root.
2 Enter the root password.
3 Run the OS unhardening script.
# ${JASS_HOME}/bin/jass-execute -u
For more information, see the Solaris Security Toolkit Administration Guide.
4 Backup all the customized SST scripts located in /opt/SUNWjass/ to prevent
these custom scripts from being accidentally overwritten.
Attention: Customer specific scripts for SST do not operate properly with MDM OS
hardening scripts unless the customers scripts are developed strictly following the
steps described in Creating customized OS hardening scripts (page 89).
5 Uninstall SST on the target workstation if the SST version is not 4.2. If the
version is 4.2, this step is optional.
--End--
Variable definitions
Variable Definition
{JASS_HOME} "/opt/SUNWjass", is ordinarily the location of the unharden script for a
system that has not yet been installed with MDM.
Procedure steps
Step Action
1 Log in as root.
2 Enter the root password.
3 Run the OS unhardening script.
# /opt/MagellanNMS/bin/Solaris_OsUnHarden
A dialog listing of OS hardening activities done previously on the workstation
opens.
4 From the list of OS hardening activities, select the hardening activity or
activities to reverse.
The unhardening scripts are executed. Pressing Ctrl-C or entering TERM
will end the unhardening activity
5 Select yes when the script prompts you to reboot the workstation.
--End--
Attention: If you are running software other than Multiservice Data Manager
on the workstation, hardening activities may affect their operation.
Prerequisites
If you are upgrading Nortel Multiservice Data Manager on a Solaris
operating system that was hardened prior to release 16.1, you must
perform the following tasks:
unharden the operating system using the existing Multiservice Data
Manager release and the scripts provided
upgrade Multiservice Data Manager to the new release. See Nortel
Multiservice Data Manager Upgrades and Patches (NN10470-123) for
information on upgrading MDM software.
You are running Solaris10 system.
The Solaris Security Toolkit v4.2 or higher is installed.
The scripts indicated by -d and invoked by driver scripts are valid.
Procedure steps
Step Action
3 If you had saved custom SST scripts, restore the saved scripts to /opt/
MagellanNMS/cfg/osh/jass.
Attention: Ensure that you have created your custom scripts using Creating
customized OS hardening scripts (page 89).
--End--
Variable definitions
Variable Definition
driver_name the name of the custom script
Prerequisites
Solaris 10 must be installed.
SST v4.2 must be installed.
Procedure steps
Step Action
--End--
Example
1 Copy the following driver scripts from /opt/MagellanNMS/lib/cfg/
osh/jass/Drivers to /opt/MagellanNMS/cfg/osh/jass/Drivers.
2 Change the names of the following files:
from nortel-mdm-secure.driver to my-secure.driver
from nortel-mdm-config.driver to my-config.driver
from nortel-mdm-hardening.driver to my-hardening.driver
from copy_list to copy_list
3 Change the script names in my-secure.driver from nortel-mdm-* to my-*.
4 Edit the file my-hardening.driver, and comment out the following line
disable-apache2.fin.
5 Edit /opt/MagellanNMS/cfg/osh/jass/copy_list.
6 Change the script names in copy_list from nortel-mdm-* to my-*.
7 Save the change files.
8 Launch OS Hardening script:
/opt/MagellanNMS/bin/Solaris_OsHarden -d my-
secure.driver
Files Description
/opt/MagellanNMS/lib/cfg/osh/jass/ The source and destination for files copy.
copy_list
Before hardening/auditing/unhardening the system, the OS
Hardening scripts copy the necessary scripts or files for MDM
directory to the SST directory using copy_list. After the process
is finished, the copied files are not be removed.
If the target file has existed already, the harden/unharden/audit
scripts compare the source file with the target one. If the two files
are identical, the scripts continue to the next file. If they are not
the same, the script renames the target file in current directory by
adding a suffix to the filename then copies the source file.
/opt/MagellanNMS/lib/cfg/osh/jass/ A wrapper for calling the configuration and hardening drivers
Drivers/mdm_solaris10.driver
/opt/MagellanNMS/lib/cfg/osh/jass/ The default configuration driver. The purpose of this script is to
Drivers/ perform basic system configuration.
mdm_solaris10_config.driver
(1 of 2)
Files Description
/opt/MagellanNMS/lib/cfg/osh/jass/ The default hardening driver. The purpose of this script is to
Drivers/ implement the Solaris Operating System hardening
mdm_solaris10_hardening.driver
/opt/MagellanNMS/lib/cfg/osh/ This file is to be used to override or specify user variables that
jass/Drivers/user.init will be used by the scripts in SST. It is one of the driver scripts.
(2 of 2)
Prerequisites
The Audit driver scripts must be the same as those being used for OS
hardening.
Solaris 10 must be installed.
SST v4.2 must be installed.
Procedure steps
Step Action
Attention: Ensure that you have created your custom scripts using Creating
customized OS hardening scripts (page 89)before using this option.
--End--
Prerequisites
Solaris 10 must be installed.
SST is not already installed.
Procedure steps
Step Action
--End--
Procedure steps
Step Action
1 Log in as root.
2 Boot to single user mode.
init s
3 Enter the root password to regain access to the workstation.
4 Run the OS hardening script.
# /opt/MagellanNMS/bin/Solaris_OsUnHarden
The OS Security UnHardening Menu opens.
5 Begin the OS unhardening procedure. Select menu option 1:
1) Default UnHardening Configuration
The unhardening scripts are executed. Any attempt to interrupt the
execution of the unhardening scripts is ignored until the unhardening is
complete.
6 Select yes when the script asks you if you want to disable the Base Security
Module (BSM).
7 Select yes when the script asks you want to restore your previous BSM
configuration files.
8 Select yes when the script asks you if you wish to reboot the workstation.
--End--
Prerequisites
The operating system hardening procedures are for Solaris 9 operating
systems only.
If you are running software other than Multiservice Data Manager on the
workstation, these activities could affect them.
The OS hardening scripts are installed on the target workstation.
When you run the Solaris hardening script, unused services are disabled
and the files /var/adm/emerlog and /var/adm/loginlog will increase in size.
You will need to clean up and check the partitions that contain these files
routinely.
Procedure steps
Step Action
7 Select yes when the script asks you if you want to update existing BSM
configuration files with the ones that are delivered with Multiservice Data
Manager software.
8 Select yes when the script asks you if you want to reboot the workstation.
--End--
Procedure steps
Step Action
--End--
File Description
account_removal_list Lists well known accounts that will be removed by the OS hardening
scripts.
cron_disable_list Lists users that are restricted from using cron.
ftp_disable_list Lists users that are restricted from using ftp.
inetd_disable_list Lists services or ports that will be disabled by the inet daemon.
kernel_modification_list Describes two kernel modifications that can be made to /etc/systems.
netrc_lock_list Lists accounts whose .netrc file will be touched and locked in each
respective home directory
nfs_disable_list Lists the tokens that can be used to disable parts of the Solaris NFS.
rauth_disable_list Lists the tokens that disable r-services and locks the /etc/hosts.equiv file.
service_removal_list Lists the run control files that will be removed from /etc/rc2.d and rc3.d.
File Description
new_audit_class, Replaces audit_class, audit_event, audit_control, and audit_user in /etc/
new_audit_event, security to control BSM logging.
new_audit_control,
new_audit_user
new_default_ftpd Replaces /etc/default/ftpd and installs a new ftp banner.
new_default_telnetd Replaces /etc/default/telnetd and installs a new telnet banner.
new_issue Replaces /etc/issue and installs an identification to be printed as a log in
prompt.
new_inetinit Replaces /etc/default/inetinit and improves the TCP initial sequence number
generation.
new_inetsvc Replaces /etc/rc2.d/S72inetsvc and /etc/init.d/inetsvc and disables the NIS,
DHCP and multicast network services.
new_kbd Replaces /etc/default/kbd and disable keyboard or serial device abort
sequences (e.g., Stop A).
new_login Replaces /etc/default/login and restricts the remote login of the root user.
new_nddconfig Installs /etc/rc2.d/S70nddconfig and /etc/init.d/nddconfig and makes changes
to the default system and network drivers.
new_nscd.conf Replaces /etc/nscd.conf and changes the Name Service Cache daemon to
hold only the host information. Password, group and RBAC are not cached.
new_passwd Replaces /etc/default/passwd and increases password strength.
new_syslog.conf Replaces /etc/syslog.conf and increases the logging done by the syslog
daemon.
Procedure steps
Step Action
1 Log in as root.
2 Run the OS show status script.
# /opt/MagellanNMS/bin/Solaris_OsHardenStatus
--End--
Procedure steps
Step Action
1 Log in as root.
2 Start the MDM Toolset.
3 From the System menu, click Security->Password Encryption.
The Password Encryption Tool opens.
4 Type a password in the Enter Password text field.
5 Type the same password again in the Confirm Password text field.
6 Type a name for the file in which you want the encrypted password to be
stored.
The new file, containing the encrypted password, is stored in the directory /
opt/MagellanNMS/cfg/private.
For example:
/opt/MagellanNMS/cfg.private/FMDR_GROUP1.passwd
7 Click Save.
8 Click Close.
--End--
Procedure steps
Step Action
1 Log in as root.
2 Start the MDM Toolset.
3 From the System menu, click Administration->Server Administration.
The Server Administration tool opens.
4 From the Security menu, click Authorize ...
The SVM Enter Authorization Password dialog box opens.
5 Enter the edit password.
6 From the Server name list area, right-click on the name of the server for
which you want to set secure password.
The server name is highlighted and the Server Functions pop-up menu
opens.
7 From the Server Functions pop-up menu, click Edit.
The Server Administration edit server dialog box opens.
8 In the Startup command text field, replace the current password text with
the full path name of the file that contains the secure password.
If we used the example password file from the previous procedure, the new
command line would look as follows:
/opt/MagellanNMS/bin/fmdr -g GROUP1 -u mdmfault -p /opt/
MagellanNMS/cfg/private/FMDR_GROUP1.passwd -l AL
9 Click Save and Restart to save your changes.
10 Click Cancel to return to the Server Administration tool main window.
--End--
Prerequisites
If you change a password that is used to access a Nortel Multiservice
Switch node, the existing secure password file is no longer valid.
Procedure steps
Step Action
1 Log in as root.
2 Start the MDM Toolset.
3 From the System menu, click Security->Password Encryption.
The Password Encryption Tool opens.
4 Type a new password in the Enter Password text field.
5 Type the same password again in the Confirm Password text field.
6 Type the name of the file that contained the old secure password.
7 Click Save.
8 At the prompt, enter the old secure password.
9 Click Close.
--End--
Procedure steps
Step Action
1 Log in as root.
2 Change to directory /etc/rc2.d.
3 Locate the file that starts with the letter S and contains the series of letters
dmi.
4 Change the name of the file by adding .No to the beginning of the name.
For example, a file named S77dmi would become .NoS77dmi.
5 Locate the file that starts with the letter S and contains the series of letters
snmpdx.
6 Change the name of the file by adding .No to the beginning of the name.
For example, a file named S78snmpdx would become .NoS78snmpdx.
7 Change to directory /etc/rc3.d.
8 Repeat step 3 and step 4.
--End--
For most situations, you can find information about synchronizing network
time for Multiservice Data Manager workstations by consulting the man page
for xntpd (man xntpd).
Navigation
Determining the XNTP version (page 104)
Synchronizing the time between Multiservice Switch and the workstation
(page 105)
Setting up the primary time server to provide the time to DPN (page 108)
Setting up the backup and secondary backup time servers to provide the
time to DPN (page 110)
Defining a DPN OA as a time source on all time servers (page 112)
Procedure steps
Step Action
--End--
The Solaris XNTP daemon and the Multiservice Switch XNTP client are used
for time synchronization. The Solaris XNTP daemon is the Solaris-provided
software on the workstation.
Procedure steps
Step Action
Attention: Do not keep the time server out of service for too long to avoid impacting
the network, especially if there is no redundant time server configured in the
network. The length of time the server should not be out of service varies because
it depends on the time drift of the clocks. The average time drift depends on the
hardware involved.
Attention: Root permission is required to change the workstation time. Use the
date -u command.
Attention: If more workstations are used as a time source to the node, they must
all be synchronized to a common time server.
Attention: Nortel recommends that your networks be operated with the time offset
of 0 (on UTC). If you use local time by setting the offset attribute to a non-zero value,
then the offsets on all the nodes in the network must be the same. Failure to do so
may result in difficulties when correlating time between multiple nodes.
--End--
Variable definitions
Variable Value
n The instance of the server component.
offset value The value for the offset according to your time zone.
Prerequisites
Setting up the primary time server workstations requires you to set up a
cron job on the workstations to run the syncDPNtime program. For
information, see the section on cron jobs in Configuring automatic DBNL
disabling (page 361).
Procedure steps
Step Action
1 Log on as root user on the MDM workstation you chose as the primary time
server for your network.
2 Enter the following command:
crontab -e
A crontab file is opened using a UNIX editor (default vi).
3 Add a line in the following format to run the syncDPNtime program:
<run_time> /opt/MagellanNMS/bin/syncDPNtime \
<destination> <userid> <passwd> <gmt_offset>
4 Exit the file and save it by pressing Esc, then typing:
:wq!
--End--
Variable definitions
Variable Value
destination The destination mnemonic of the OA configured as the DPN clock
master, which is the DPN OA local MDI ID. The destination mnemonic
is often referred to as DEST MNEM.
gmt_offset The time difference in minutes between Greenwich Mean Time (GMT)
and the time on the MDM workstation. Specify the offset as though
you are travelling around the globe in an easterly direction starting at
Greenwich. For example:
A workstation is located in Ottawa, Canada. As you travel in an
easterly direction, starting at Greenwich, the time difference between
Greenwich and Ottawa is 19 hours. The offset for the workstation is,
therefore, (19 x 60) = 1140.
A workstation is located in Auckland, New Zealand. As you travel in
an easterly direction, starting at Greenwich, the time difference
between Greenwich and Auckland is 8 hours. The offset for the
workstation is, therefore, (8 x 60) = 480.
passwd A valid password for the user ID.
run_time The time at which the program is to be run, in the form:
<minute> <hour> <day_of_month> <month> <day_of_week>
Entering an asterisk (*) for any of these values means that the
program will be run for all possible values.
user_id A valid user identifier with the correct system privilege (nams, network
service, etc.).
Prerequisites
Setting up the backup and secondary backup time server workstations
requires you to set up a cron job on both workstations to run the
syncDPNtime.backup program. For information, see the section on cron
jobs in Configuring automatic DBNL disabling (page 361).
Procedure steps
Step Action
1 Log on as root user on the MDM workstation you chose as the backup time
server for your network.
2 Enter the following command:
crontab -e
A crontab file is opened using a UNIX editor (default vi).
3 Add a line in the following format to run the syncDPNtime.backup program:
<run_time> /opt/MagellanNMS/bin/syncDPNtime.backup \
<destination> <userid> <passwd> <gmt_offset> \
<IP_primary> <IP_backup> ...
4 Exit the file and save it by pressing Esc, then typing:
:wq!
5 Repeat this procedure on the workstation you chose as the secondary
backup time server.
--End--
Variable definitions
Variable Value
destination The destination mnemonic of the OA configured as the DPN clock
master, which is the DPN OA local MDI ID. The destination mnemonic
is often referred to as DEST MNEM.
gmt_offset The time difference in minutes between Greenwich Mean Time (GMT)
and the time on the MDM workstation. Specify the offset as though
you are travelling around the globe in an easterly direction starting at
Greenwich. For example:
A workstation is located in Ottawa, Canada. As you travel in an
easterly direction, starting at Greenwich, the time difference between
Greenwich and Ottawa is 19 hours. The offset for the workstation is,
therefore, (19 x 60) = 1140.
A workstation is located in Auckland, New Zealand. As you travel in
an easterly direction, starting at Greenwich, the time difference
between Greenwich and Auckland is 8 hours. The offset for the
workstation is, therefore, (8 x 60) = 480.
IP_backup ... The IP addresses of the backup MDM time servers (there can be
more than one).
IP_primary The IP address of the primary MDM time server.
passwd A valid password for the user ID.
run_time The time at which the program is to be run, in the form:
<minute> <hour> <day_of_month> <month> <day_of_week>
Entering an asterisk (*) for any of these values means that the
program will be run for all possible values.
user_id A valid user identifier with the correct system privilege (nams, network
service, etc.).
Prerequisites
Setting up a time server workstation to synchronize its time with a DPN OA
requires you to set up a cron job to run the syncToDPNtime program. For
information, see the section on cron jobs in Configuring automatic DBNL
disabling (page 361).
Procedure steps
Step Action
1 Log on as root user on the MDM workstation you chose as the primary time
server for your network.
2 Enter the following command:
crontab -e
A crontab file is opened using a UNIX editor (default vi).
3 Add a line in the following format to run the syncToDPNtime program:
<run_time> /opt/MagellanNMS/bin/syncToDPNtime \
<destination> <userid> <passwd> <gmt_offset>
4 Exit the file and save it by pressing Esc, then typing:
:wq!
5 Repeat this procedure on the workstation you chose as the backup time
server.
6 Repeat this procedure on the workstation you chose as the secondary
backup time server.
--End--
Variable definitions
Variable Value
destination The destination mnemonic of the OA configured as the DPN clock
master, which is the DPN OA local MDI ID. The destination mnemonic
is often referred to as DEST MNEM.
gmt_offset The time difference in minutes between Greenwich Mean Time (GMT)
and the time on the MDM workstation. Specify the offset as though
you are travelling around the globe in an easterly direction starting at
Greenwich. For example:
A workstation is located in Ottawa, Canada. As you travel in an
easterly direction, starting at Greenwich, the time difference between
Greenwich and Ottawa is 19 hours. The offset for the workstation is,
therefore, (19 x 60) = 1140.
A workstation is located in Auckland, New Zealand. As you travel in an
easterly direction, starting at Greenwich, the time difference between
Greenwich and Auckland is 8 hours. The offset for the workstation is,
therefore, (8 x 60) = 480.
passwd A valid password for the user ID.
run_time The time at which the program is to be run, in the form:
<minute> <hour> <day_of_month> <month> <day_of_week>
Entering an asterisk (*) for any of these values means that the
program will be run for all possible values.
user_id A valid user identifier with the correct system privilege (nams, network
service, etc.).
In addition, if you want to put Operator Client behind a firewall, you must fix a
number of dynamic port settings. For more information, refer to Operator
Client ports (page 135).
Prerequisites
Verify that you are using the correct procedure using the table Default port
settings procedures (page 114).
Procedure steps
Step Action
--End--
Procedure steps
Step Action
--End--
Variable definitions
Variable Value
new_port The default SSL port number.
Prerequisites
You must know the DS console user ID and password.
Procedure steps
Step Action
13 Click Yes.
14 Click OK.
15 Select the Directory tab.
16 Click the NetscapeRoot folder icon.
17 Click the oamplatform folder icon.
18 Click Global Preferences.
19 In the right frame, double-click User Directory.
20 Change the port in the nsdirectoryurl, if it has not already been changed.
21 Click OK.
22 To change the port number in configuration files, type this command to
change directories:
cd /var/opt/SUNWdssvr/servers
23 Change the port number in these files:
shared/config/dbswitch.conf
shared/config/ldap.conf
userdb/dbswitch.conf
admin-serv/config/adm.conf
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapsearch -B \
-b
"ou=1.0,ou=iPlanetAMAuthLDAPService,ou=services,o=oampl
atform" \
-D "cn=Directory Manager" -w directory -h `hostname` -p
$newport "(objectclass=*)"
sunserviceschema > /etc/opt/SUNWam/config/xml/
amAuthLDAP.xml.tmp
cat /etc/opt/SUNWam/config/xml/amAuthLDAP.xml.tmp | sed
-n '/<ServicesConfiguration>/,/
<\/ServicesConfiguration>/p' \
| sed -e 's/sunservicesschema=//' > /etc/opt/SUNWam/
config/xml/amAuthLDAP.xml
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapsearch -B \
-b
"ou=1.0,ou=iPlanetAMAuthMembershipService,ou=services,o
=oamplatform" \
-D "cn=Directory Manager" -w directory -h `hostname` -p
$newport "(objectclass=*)"
sunserviceschema > \
/etc/opt/SUNWam/config/xml/amAuthMembership.xml.tmp
cat /etc/opt/SUNWam/config/xml/amAuthMembership.xml.tmp
| sed -n '/
<ServicesConfiguration>/,/<\/ServicesConfiguration>/p'
\
| sed -e 's/sunserviceschema=//' > /etc/opt/SUNWam/
config/xml/amAuthMembership.xml
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapsearch -B \
-b
"ou=1.0,ou=iPlanetAMPolicyConfigService,ou=services,o=o
amplatform" \
-D "cn=Directory Manager" -w directory -h `hostname` -p
$newport "(objectclass=*)"
sunserviceschema > \
/etc/opt/SUNWam/config/xml/amAuthMembership.xml.tmp
cat /etc/opt/SUNWam/config/xml/amAuthMembership.xml.tmp
| sed -n '/
<ServicesConfiguration>/,/<\/ServicesConfiguration>/p'
\
| sed -e 's/sunserviceschema=//' > /etc/opt/SUNWam/
config/xml/amAuthMembership.xml
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapsearch -B \
-b
"ou=1.0,ou=iPlanetAMPolicyConfigService,ou=services,o=o
amplatform" \
-D "cn=Directory Manager" -w directory -h `hostname` -p
$newport "(objectclass=*)"
sunserviceschema > \
/etc/opt/SUNWam/config/xml/amAuthPolicyConfig.xml.tmp
cat /etc/opt/SUNWam/config/xml/
amAuthPolicyConfig.xml.tmp | sed -n '/
<ServicesConfiguration>/,/<\/ServicesConfiguration>/p'
\
| sed -e 's/sunserviceschema=//' > /etc/opt/SUNWam/
config/xml/amAuthPolicyConfig.xml
27 Run the script, type:
/bin/sh /tmp/389.1.sh <port>
where
<port> is the new port number.
28 Change the port number in these files:
/opt/nortel/config/applications/security/core/auth/
AMConfig.auth.cpp.properties
/opt/nortel/config/applications/security/core/auth/
AMConfig.auth.java.properties
/etc/opt/SUNWam/config/serverconfig.xml
/etc/opt/SUNWam/config/AMConfig.properties
/etc/opt/SUNWam/config/xml/amAuthCert.xml
/etc/opt/SUNWam/config/xml/amAuthLDAP.xml
/etc/opt/SUNWam/config/xml/amAuthMembership.xml
/etc/opt/SUNWam/config/xml/amPolicyConfig.xml
29 Create a file called /tmp/389.2.sh, and copy and paste this text into that file:
#!/bin/sh
passwd=$1
host=$2
newport=$3
LD_LIBRARY_PATH=/opt/SUNWam/6.3_2005Q1/SUNWam/ldaplib/
ldapsdk:/opt/SUNWcomm/lib/; export LD_LIBRARY_PATH
( printf "dn: "; \
cat /etc/opt/SUNWam/config/xml/amAuthCert.xml.tmp | sed
-n 1p; \
echo "changetype: modify"; echo "replace:
sunserviceschema"; \
/var/opt/SUNWdssvr/servers/bin/slapd/server/ldif -b
sunserviceschema \
< /etc/opt/SUNWam/config/xml/amAuthCert.xml; ) | \
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapmodify \
-D "cn=Directory Manager" -w $passwd -h $host -p $newport
( printf "dn: "; \
cat /etc/opt/SUNWam/config/xml/amAuthLDAP.xml.tmp | sed
-n 1p; \
echo "changetype: modify"; echo "replace:
sunserviceschema"; \
/var/opt/SUNWdssvr/servers/bin/slapd/server/ldif -b
sunserviceschema \
< /etc/opt/SUNWam/config/xml/amAuthLDAP.xml; ) | \
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapmodify \
-D "cn=Directory Manager" -w $passwd -h $host -p $newport
( printf "dn: "; \
cat /etc/opt/SUNWam/config/xml/amAuthMembership.xml.tmp
| sed -n 1p; \
echo "changetype: modify"; echo "replace:
sunserviceschema"; \
/var/opt/SUNWdssvr/servers/bin/slapd/server/ldif -b
sunserviceschema \
< /etc/opt/SUNWam/config/xml/amAuthMembership.xml; ) | \
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapmodify \
-D "cn=Directory Manager" -w $passwd -h $host -p $newport
( printf "dn: "; \
cat /etc/opt/SUNWam/config/xml/
amAuthPolicyConfig.xml.tmp | sed -n 1p; \
echo "changetype: modify"; echo "replace:
sunserviceschema"; \
/var/opt/SUNWdssvr/servers/bin/slapd/server/ldif -b
sunserviceschema \
< /etc/opt/SUNWam/config/xml/amPolicyConfig.xml; ) | \
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapmodify \
-D "cn=Directory Manager" -w $passwd -h $host -p $newport
30 Start the DS server, type:
/opt/nortel/3rd_party/netscape/current_nds/swmgmt/bin/
pctrl_nds.sh start nsdm
31 Run the script, type:
/bin/sh/tmp/389.2.sh <directory_mng_pwd> <host> <port>
where
<directory_mng_pwd> is the password for the cn=Directory Manager
user in the DS database
<host> is the host name where the DS database is running
<port> is the new port number
38 Change other client process references to the port, select the Directory tab.
39 Click the <org> folder icon.
40 Click the services folder icon.
41 Click the iPlanetAMAuthLDAPService folder icon.
42 Click the 1.0 folder icon.
43 Click OrganizationConfig.
44 In the right frame, double-click default.
45 Change the port value in the sunkeyvalue field.
46 Click OK.
47 Click the iPlanetAMPolicyConfigService folder icon.
48 Click the 1.0 folder icon.
49 Click OrganizationConfig.
50 In the right frame, double-click default.
51 Change the port value in the sunkeyvalue field.
52 Click OK.
53 Restart the servers, exit the DS console.
54 To restart the directory server, type;
/opt/nortel/3rd_party/netscape/current_nds/swmgmt/bin/
pctrl_nds.sh restart
55 Stop the DS administration server, type:
/opt/nortel/3rd_party/netscape/current_nds/swmgmt/bin/
pctrl_nds.sh stop nsdm
56 Restart the AM web server, type:
/opt/nortel/3rd_party/security/current_s1is/swmgmt/bin/
pctrl_s1is.sh restart
--End--
Procedure steps
Step Action
1 To configure the server port in the DS console, type this command to start
the DS admin server:
/opt/nortel/3rd_party/netscape/current_nds/swmgmt/bin/
pctrl_nds.sh start nsdm
2 Open the DS console, type:
/var/opt/SUNWdssvr/servers/startconsole
3 In the login screen, type the DS user ID cn=Directory Manager and the
password.
If this is the first login, type the administration URL
http://<host_name>:24313.
4 In the DS console window, click the host name folder icon.
5 Click the Server Group folder icon.
6 Select Administration Server.
7 Click Open.
8 Select the Configuration tab.
9 In the Port field, change the port number.
10 Click Save.
11 Click OK.
12 Restart the Admin server, type:
/opt/nortel/3rd_party/netscape/current_nds/swmgmt/bin/
pctrl_nds.sh restart nsdm
13 To configure the client process, type this command to open the DS console:
/var/opt/SUNWdssvr/servers/startconsole
14 In the login screen, type the user ID and password.
15 Enter the new administration URL, http://<host_name>:<new_port>.
--End--
Procedure steps
Step Action
--End--
Procedure steps
Step Action
1 To change the default port on the Tomcat server, change the port number in
the file
/opt/nortel/3rd_party/apache/current_tomcat/conf/
server.xml
The port is defined by the following:
<Connector className=org.apache.coyote.tomcat4.CoyoteConnector
port=<port_number> minProcessors=5 maxProcessors=75
enableLookups=true redirectPort=8443 acceptCount=100
debug=0 connectionTimeout=20000 useURIValidationHack=false
disableUploadTimeout=true />
2 To stop the Tomcat server, type:
/opt/nortel/3rd_party/apache/current_tomcat/swmgmt/bin/
pctrl_tomcat.sh stop
3 To start the Tomcat server type:
/opt/nortel/3rd_party/apache/current_tomcat/swmgmt/bin/
pctrl_tomcat.sh start
4 To configure the client process, change the port number in the file
/opt/nortel/3rd_party/apache/current_apache/conf/workers.properties.
5 To stop the Apache server, type:
/opt/nortel/3rd_party/apache/current_apache/swmgmt/bin/
pctrl_apache.sh stop
6 To start the Apache server, type:
/opt/nortel/3rd_party/apache/current_apache/swmgmt/bin/
pctrl_apache.sh start
--End--
Attention: Changes made to this port are erased during Nortel Multiservice
Data Manager software upgrades. You must reset this port number after
each software upgrade.
Procedure steps
Step Action
Go to step 7.
6 Change the port number in this file,
/opt/nortel/config/applications/desktop/jws/mft/resources/desktop/
DesktopGUI.jnlp
7 Select the action:
--End--
Procedure steps
Step Action
cat pam_radius_auth.conf
--End--
Procedure steps
Step Action
2 Create a file called /tmp/58080.1.sh, and copy and paste the following text
into that file:
#!/bin/sh
newport=$1
LD_LIBRARY_PATH=/opt/SUNWam/6.3_2005Q1/SUNWam/ldaplib/
ldapsdk:/opt/
SUNWcomm/lib/; export LD_LIBRARY_PATH
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapsearch -B \
-b "ou=1.0,ou=iPlanetAMPlatformService,ou=services,
o=oamplatform" \
-D "cn=Directory Manager" -w directory -h `hostname` -p
$newport "(objectclass=*)"sunserviceschema > \
/etc/opt/SUNWam/config/xml/amPlatform.xml.tmp
cat /etc/opt/SUNWam/config/xml/amPlatform.xml.tmp |
sed -n '/<ServicesConfiguration>/,/<\/
ServicesConfiguration>/p'\
| sed -e 's/sunserviceschema=//' > /etc/opt/SUNWam/
config/xml/amPlatform.xml
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapsearch -B \
-b
"ou=1.0,ou=iPlanetAMSAMLService,ou=services,o=oamplatfo
rm" \
5 Create a file called /tmp/58080.2.sh, and copy and paste the following text
into that file:
#!/bin/sh
passwd=$1
host=$2
newport=$3
LD_LIBRARY_PATH=/opt/SUNWam/6.3_2005Q1/SUNWam/ldaplib/
ldapsdk:/opt/
SUNWcomm/lib/; export LD_LIBRARY_PATH
( printf "dn: "; \
cat /etc/opt/SUNWam/config/xml/amSAML.xml.tmp | sed -n
1p; \
echo "changetype: modify"; echo "replace:
sunserviceschema"; \
/var/opt/SUNWdssvr/servers/bin/slapd/server/ldif -b
sunserviceschema < /etc/opt/SUNWam/
config/xml/amSAML.xml; ) | \
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapmodify \
-D "cn=Directory Manager" -w $passwd -h $host -p $newport
( printf "dn: "; \
cat /etc/opt/SUNWam/config/xml/amPlatform.xml.tmp | sed
-n 1p; \
echo "changetype: modify"; echo "replace:
sunserviceschema"; \
/var/opt/SUNWdssvr/servers/bin/slapd/server/ldif -b
sunserviceschema \
< /etc/opt/SUNWam/config/xml/amPlatform.xml; ) | \
/opt/SUNWam/6.3_2005Q1/SUNWam/bin/ldapmodify \
-D "cn=Directory Manager" -w $passwd -h $host -p $newport
6 Run the script, type:
If IS_AUTH_CONFIG_URL Then
is configured go to step 9.
is not configured go to step 10.
--End--
Procedure steps
Step Action
--End--
Variable definitions
Variable Value
org The top-level organization in the NDS database. For example
o=ca.nortel.com.
port The NDS directory server port number.
Procedure steps
Step Action
1 If your system uses any of the services listed in Multiservice Data Manager
server ports (page 135), change the port numbers in the /opt/
MagellanNMS/cfg/private/IPCNameMap.cfg file. For information on how to
change these ports, refer to the procedure to configure named TCP/UDP
ports in the Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310).
2 If there is a conflict with your existing port settings, change the fixed ports.
For more information, refer to Services on fixed ports (page 136).
--End--
Navigation
Starting servers, monitoring servers, and changing server default
parameters
The Server Administration tool is described in Nortel Multiservice Data
Manager AdministrationTools (NN10470-300). Using the
procedures available with this tool, you can start, stop, and monitor
Multiservice Data Manager servers. For information about the specific
parameters of individual server, or for information about error and exit
codes, see Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310). Conceptual information about
Multiservice Data Manager server is listed in Nortel Multiservice Data
Manager AdministrationServer Management (NN10470-310) and in
Nortel Multiservice Data Manager AdministrationFundamentals
(NN10470-305).
MDM workstation threshold configuration (page 138)
Set thresholds at which workstation surveillance generates alarms
and set the time interval at which workstations poll managed
components.
Multi-nodal naming service configuration (page 141)
Set up a list of hosts that will appear in the Service Selection tool. The
Service Selection tool is described in Nortel Multiservice Data
Manager AdministrationTools (NN10470-300).
Log and alarm management (page 149)
Define how logs, alarms, and alarm clearing are managed.
Procedure steps
Step Action
Attention: For information on the logs generated by the Server Administration tool,
see Nortel Multiservice Data Manager AdministrationTools (NN10470-300). For
information on alarms generated by this tool, see Nortel Multiservice Data Manager
Alarms Reference (NN10470-501).
--End--
when defining numerical values, include only the number; do not add units
for any resource, the value for the minor alarm must be lower than the
value for the major alarm; the value for the major alarm must be lower than
the value for the critical alarm
always include at least one space between the parameter name and the
configurable value
For configurable parameters and the default values, see the table
Configurable workstation surveillance parameters (page 139).
Prerequisites
You must be familiar with the material on level 2 MNS domains in the Nortel
Multiservice Data Manager AdministrationFundamentals (NN10470-305).
Navigation
Ensuring that the file /etc/hosts contains the host names of the
workstations in a domain (page 142)
Setting up a level 2 MNSD process (page 143)
Configuring a range of TCP/UDP ports (page 144)
Configuring named-service TCP/UDP ports (page 146)
Ensuring that the file /etc/hosts contains the host names of the
workstations in a domain
Ensure that the file /etc/hosts on every workstation in a domain contains the
host names and IP addresses of all the other workstations in that domain.
Procedure steps
Step Action
--End--
Prerequisites
The Server Administration tool is described in Nortel Multiservice Data
Manager AdministrationTools (NN10470-300). Read this section before
proceeding.
Procedure steps
Step Action
1 Log on as root at one of the workstations you have chosen to run the level
2 MNSD process.
2 Use the Nortel Multiservice Data Manager Server Administration tool to add
and start the level 2 MNSD process.
You can use a descriptive name for the level 2 MNSD process. This name
must be unique among the list of servers running on that workstation (for
example, Level 2 Name Server).
Specify the startup command for the level 2 MNSD process.
/opt/MagellanNMS/bin/mnsd -2 localhost <hostname1
hostname2 ...>
--End--
Variable definitions
Variable Definition
<hostname1 hostname2 ...> The names of all the workstations in the level 2 MNSD
domain, other than local host (this workstation).
The default values for all other parameters for this server are
acceptable.
Prerequisites
See Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310) for a list of port number used by Multiservice
Data Manager servers.
UDP port number 5502 and 5503 are reserved for the MNSD daemon.
Always allow communication to and from these ports through the firewall
if Multiservice Data Manager processes on either side need to
communicate.
Procedure steps
Step Action
1 To activate port range configuration for both TCP and UDP ports, create the
file /opt/MagellanNMS/cfg/private/IPCPortRange.cfg. Any lines in this file
that start with a # sign (comments) or are empty are ignored. The file must
contain a line with the following format:
<port range lower limit> <port range upper limit>
--End--
Variable definitions
Variable Value
port range lower limit The lower and upper range limits. These limits must be large enough
to allow all Multiservice Data Manager processes to allocate the ports
port range upper limit
they need. As a general rule, assume three ports per server and two
ports per client/utilities to be run at the same time on the workstation.
You can configure the firewall to allow communications with ports in
a specified range. This range must have values above 1024 as the 1
1024 port range is reserved for standard well-known IP services such
as FTP and Telnet (see man services for more information). For
example, the following contents for the port-mapping file restricts the
TCP/UDP service port numbers used by processes from 11200 to
11699 (500 ports):
# allowed TCP/UDP port range for MDM processes
11200 11700
Prerequisites
See Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310) for a list of port numbers used by
Multiservice Data Manager servers.
UDP port number 5502 and 5503 are reserved for the MNSD daemon.
Always allow communication to and from these ports through the firewall
if Multiservice Data Manager processes on either side need to
communicate.
Procedure steps
Step Action
--End--
Variable definitions
Variable Definition
<service name> The name of the service.
<port number> The number of the port.
You can configure the firewall to allow communications with ports mapped in
the file. The specified port numbers must have values above 1024 as the
11024 port range is reserved for standard well-known IP services such as
FTP and Telnet (see man services for more information). For example, the
following contents for the name-mapping file restricts the TCP/UDP service
port numbers used by the GMDR server (Surveillance server, Alarm&Status
API) to the value 11201:
# Surveillance/Alarm&Status API service
GMDR 11201
You can then configure the firewall to allow communications to and from this
port. Remember to allow communications with MNSD at UDP port numbers
5502 and 5503.
Prerequisites
Perform the tasks in this section after initial installation is complete. If you
are unfamiliar with the installation process, see Nortel Multiservice Data
Manager Installation and CommissioningSoftware (NN10470-100).
If you are unfamiliar with any of the concepts relating to the tasks listed
here, see Nortel Multiservice Data Manager Administration
Fundamentals (NN10470-305).
Navigation
Menu customization (page 168)
MDM tool resource customization (page 179)
Fault tools configuration (page 183)
Prerequisites
For local alarm clearing to work, the GMDR server must be configured and
running on the workstation. No additional configuration is required.
For the global alarm clearing tool to work on DPN, the NCSMGR and DMA
servers must be configured and running on the workstation.
For the global alarm clearing tool to work on Multiservice Switch (MSS),
the HGDS, FDTM, and DMA servers must be configured and running on
the workstation.
For the global alarm clearing tool to work on Multiservice Provider Edge
(MPE), the HGDS, NDTM, and DMA servers must be configured and
running on the workstation.
For information about troubleshooting alarms, see MDM workstation
troubleshooting (page 286).
Navigation
Setting up global alarm clearing for Multiservice Switch (page 150)
Setting up global alarm clearing for MPE (page 153)
Setting/Reloading alarm auto acknowledgement configuration through a
macro (page 156)
Reloading the alarm auto acknowledgement through the HUP signal
(page 158)
Setting up server alarm distribution through GMDR (page 160)
Setting up server alarm distribution through NCS and surveillance using
NCS status probing (page 162)
Cleaning up log files (page 164)
Cleaning up log files using mdmlogclean (page 165)
Prerequisites
Before setting up global alarm clearing, ensure that the Active Alarm List
feature is enabled on the nodes.
Procedure steps
Step Action
The following is an example of a file entry. For this example, there should
also be a group entry named ALL in file /opt/MagellanNMS/cfg/HGDS.cfg.
:ALL:user:password::
As soon as a syntax error is found in the file, it is displayed in the
Multiservice Data Manager System Log Display and DMA exits.
Once the file is read by the DMA server, each password is removed and an
encrypted one is added in the fourth field. The above example would
become:
:ALL:user::72eilRnWj7{s{A6hgg7:
3 Start the Server Administration tool from the application main window by
selecting System -> Administration -> Server Administration.
Attention: Your user account must be set up run the NMSAdmin toolset at login to
be able to see the Server Administration tool in the menus.
4 Using the Server Administration tool, stop the DMA server, if it is running.
5 Log in as the Server Administrator tool administrator by selecting Enable
Editing from the Security menu.
6 Edit the server information to ensure that the server starts automatically
when the workstation reboots and that the startup command contains the -
f option.
/opt/MagellanNMS/bin/dma -f
Optionally, you can add the command line option -t to configure the inactivity
timer.
7 Start the DMA server.
8 Start the GMDR Server Administration tool by from the application main
window by selecting System -> Administration ->GMDR Administration.
9 Log on to the GMDR Administration tool as the administrator by selecting
Log in as admin from the Security menu.
10 Click Add.
The Add Server dialog opens.
11 Enter the following information into fields in the Add Server dialog:
Server Name: DMASERVER
Host Name: localhost or the host name/IP address of the workstation on
which the DMA server is running
User Id and Password: not required
--End--
Variable definitions
Variable Value
GroupName The name of the group to which the node belongs. The group name
corresponds to the FGroup field definition of its included members, as
defined in file /opt/MagellanNMS/cfg/HGDS.cfg. The DMA server
connects to all groups indicated in this file to send global alarm
clearing request messages to the targeted node.
Maximum 12 characters.
Password A password that corresponds to the user ID.
Maximum 8 characters.
UserId The group user ID. At a minimum, the user ID must have
systemAdministration impact and scope of device or higher and a
customer ID of 0.
Maximum 8 characters.
Procedure steps
Step Action
or
:GroupName:UserID::EncryptedPassword:
or
:GroupName:UserID:Password file name::
The following is an example of a file entry. For this example, there should
also be a group entry named ALL in file /opt/MagellanNMS/cfg/HGDS.cfg.
:ALL:user:password::
As soon as a syntax error is found in the file, it is displayed in the
Multiservice Data Manager System Log Display and DMA exits.
Once the file is read by the DMA server, each password is removed and an
encrypted one is added in the fourth field. The above example would
become:
:ALL:user::72eilRnWj7{s{A6hgg7:
3 Start the Server Administration tool from the application main window by
selecting System -> Administration -> Server Administration.
Attention: Your user account must be set up run the NMSAdmin toolset at login to
be able to see the Server Administration tool in the menus.
4 Using the Server Administration tool, stop the DMA server, if it is running.
5 Log in as the Server Administrator tool administrator by selecting Enable
Editing from the Security menu.
6 Edit the server information to ensure that the server starts automatically
when the workstation reboots and that the startup command contains the
-s option, as follows:
/opt/MagellanNMS/bin/dma -s
Optionally, you can add the command line option -t to configure the inactivity
timer.
7 Start the DMA server.
8 Start the GMDR Server Administration tool by from the application main
window by selecting System -> Administration ->GMDR Administration.
9 Log on to the GMDR Administration tool as the administrator by selecting
Log in as admin from the Security menu.
10 Click Add.
The Add Server dialog opens.
11 Enter the following information into fields in the Add Server dialog:
Server Name: DMASERVER
Host Name: localhost or the host name/IP address of the workstation on
which the DMA server is running
User Id and Password: not required
--End--
Variable definitions
Variable Value
EncryptedPassword A password that was encrypted by the MDM encryption utility. It is
used if the Password field is empty.
GroupName The name of the group to which the node belongs. The group name
corresponds to the SRSGroup field definition of its included
members, as defined in file /opt/MagellanNMS/cfg/HGDS.cfg. The
DMA server connects to all groups indicated in this file to send global
alarm clearing request messages to the targeted node.
Maximum 12 characters.
(1 of 2)
Variable Value
Password A password that corresponds to the user ID.
Minimum 8 characters.
Maximum 20 characters.
Password file name A file name (includes the full path name) identifying a file containing
an encrypted password for this MPE group.
UserId The group user ID. At a minimum, the user ID must have clear
permissions.
Maximum 16 characters.
(2 of 2)
The GMDR server reloads the last used auto acknowledgement configuration
file. If you do not specify an auto acknowledgement configuration file, the
customized Auto-ack configuration file is located as /opt/MagellanNMS/cfg/
GMDRAutoAck.cfg for the server name "GMDR"; or /opt/MagellanNMS/cfg/
GMDRAutoAck_<name>.cfg for the server name "GMDR_<name>". You can
specify a different auto acknowledgement configuration file using the "-c"
command line option for the GMDR server, or using the "-f" command line
option for the loadautoacklist macro. The template for this file is in /opt/
MagellanNMS/lib/cfg/GMDRAutoAck.cfg.
Prerequisites
Ensure you have the correct permissions to edit the Auto-ack configuration
file and ensure you have GMDR Administrator privileges. This may require
super-user permissions.
Procedure steps
Step Action
1 Log on to the MDM workstation and locate the target GMDR server name.
2 Open the MDM Server Administration window from the top level MDM
toolset by selecting System -> Administration -> Server Administration
3 Check the MDM Server Administration GUI for the GMDR server name. For
example: GMDR.
4 Using a UNIX editor, open the file for editing. The customized Auto-ack
configuration file should be located here: /opt/MagellanNMS/cfg/
You can re-edit this file to contain a list of components to be set to auto-ack
ON. An example of the configuration file is:
EM PPNODE_1 LP 2 DS3 0
EM/PPNODE_2 LP/3 ENG AAL
EM/PPNODE_3 LP 3 ENG $ AAL $
--End--
Variable definitions
Variable Value
auto-ack cfg file The operator-provided Auto-ack configuration file name. If you do not
specify a new auto-ack configuration file, then the last loaded auto-ack
configuration file is reloaded.
GMDR name The GMDR server name. The default value is GMDR.
password The GMDR Admin password. The default value is empty.
The GMDR server reloads the last used auto acknowledgement configuration
file. If you did not specify an auto acknowledgement configuration file, the
customized Auto-ack configuration file is located as /opt/MagellanNMS/cfg/
GMDRAutoAck.cfg for the server name "GMDR"; or /opt/MagellanNMS/cfg/
GMDRAutoAck_<name>.cfg for the server name "GMDR_<name>". You can
specify a different auto acknowledgement configuration file using the "-c"
command line option for the GMDR server, or using the "-f" command line
option for the loadautoacklist macro. The template for this file is found in /opt/
MagellanNMS/lib/cfg/GMDRAutoAck.cfg.
Prerequisites
Ensure you have super-user root privileges.
Procedure steps
Step Action
1 Log on to the MDM workstation and locate the target GMDR server name.
2 Open the MDM Server Administration window from the top level MDM
toolset by selecting, System -> Administration -> Server Administration.
Check the MDM Server Administration GUI for the GMDR server name. For
example: GMDR_L.2
3 Using a UNIX editor, open the auto ack configuration file for editing. You can
re-edit this file to contain a list of components to be set to auto-ack ON. An
example of the configuration file is:
EM PPNODE_1 LP 2 DS3 0
EM/PPNODE_2 LP/3 ENG AAL
EM/PPNODE_3 LP 3 ENG $ AAL $
--End--
Variable definitions
Variable Value
GMDR_PID The UNIX process identifier of the target GMDR server process.
Prerequisites
If the OAMC server to which server alarms and status notifications are
being forwarded is located on another workstation, this Nortel Multiservice
Data Manager workstation and the workstation that is running the OAMC
server must both be located on the same LAN. When the OAMC server is
located on another workstation on the LAN, you must ensure that the
hostname and IP address of the workstation that runs the OAMC server is
defined in the file /etc/hosts on this workstation.
To have the server alarms and state change notifications propagated to
more workstations than just the one on which the GMDR server resides,
you must set up a hierarchy of GMDR servers once you have completed
this procedure.
Procedure steps
Step Action
1 Log on as root.
Attention: You must set up the root account to run the default Multiservice Data
Manager user environment.
3 Use the GMDR Administration tool to configure the GMDR server to access
the OAMC server (or servers) that you created to gather surveillance data.
For each OAMC server you need to provide:
Server Name the name of the OAMC server in the form OAMC
Host Name the host name or the IP address of the workstation on
which the OAMC server is running
User/CapabilityID and Password not required
--End--
Prerequisites
Before you start, ensure that the HGDS and NCS Communications
Manager (NCSMGR) servers are configured and running.
Procedure steps
Step Action
Attention: Your user account must be set up run the NMSAdmin toolset at login to
be able to see the Server Administration tool in the menus.
4 Using the Server Administration tool, stop the DMA server if it is already
running.
5 Edit the server information so that the DMA server starts up automatically
with the following command whenever the workstation is rebooted.
/opt/MagellanNMS/bin/dma \
-d [<filename] \
[-p <probing interval>]
6 Restart the DMA server.
--End--
Variable definitions
Variable Value
A The DNA of the Control Device Manager. Maximum 16 characters.
Attention: This is not the same as the DNA of the MDI access DNA.
C The CUG index of the Control Device Manager. Maximum two digits.
D The Destination mnemonic. Maximum 12 characters
filename The name of a file that contains the parameters needed to establish a
connection to an OA. The connection is to be used for server alarm
distribution through NCS and workstation surveillance using NCS
status probing. If you specify the -d option without a file name, the
default file /opt/MagellanNMS/cfg/DmaOA.cfg is used.
O The mnemonic of the NCS OA containing the destinations Control
Device Manager. Maximum 12 characters. This mnemonic must
match the OA name entered in the Name field of an OA Member in
file /opt/MagellanNMS/cfg/HGDS.cfg.
P The packet size on the VC. (Use 128, 256, or 512). Maximum three
digits.
probing interval Specifies that status probing is to be performed for workstation
surveillance. The <probing interval> is the interval in minutes at which
NCS probes the workstation and it must be an integer with a minimum
value of 1. If you do not specify the <probing interval>, the default
NCS status probe interval of five minutes is used.
R Specifies whether the calls are to be routed over the X.75 facilities of
a Remote Private Operating Agency (RPOA). Can be Y or N.
If N, the RPOA is ignored.
RPOA A code that identifies the RPOA. Four (BCD) digits.
X Specifies whether the call is to be routed over X.75. Can be Y or N.
If N, then R and RPOA are ignored.
Procedure steps
Step Action
1 The following is an example of the commands you enter to trim these files
down to 20 records (lines) each on a workstation.
cd /opt/MagellanNMS/data/svm
mv SVM.errors errors
tail -20 errors > SVM.errors
chmod +w SVM.errors
mv SVM.logs logs
tail -20 logs > SVM.logs
chmod +w SVM.logs
rm errors logs
--End--
Procedure steps
Step Action
Directory: /opt/MagellanNMS/data/log/svmdmn
RetentionDays: 30
--End--
Variable definitions
Variable Definition
-h Provides the usage information to the user.
-v Specifies the version number.
-file Specifies the configuration file that defines log directories from which
<mdmlogclean config> log files should be deleted after a given retention period. If an option
is not specified, the following files are searched in sequence as the
default:
1. /opt/MagellanNMS/cfg/MDMClean.cfg
2. /opt/MagellanNMS/lib/cfg/MDMClean.cfg
[-logFile <logLevels>] Optionally, writes logs of a given level to a log file. Levels are one or
more of the following, separated by commas: FATAL, ALERT, CRIT,
ERROR, WARN, INFO, NOTICE, DEBUG, TRACE.
Procedure steps
Step Action
Attention: If you do not specify the device, the model files are generated from /opt/
MagellanNMS/cfg/ANP/mpeComp/<version>/mpedml.co
--End--
Variable definitions
Variable Definition
-a Retrieves the alarm help file in addition to the model file.
-d Deletes the configuration model files for the version.
-da Deletes the alarm files for the version.
-f Forces the retrieval of the model file.
-fa Forces the retrieval of the alarm file
-u Specifies the MPE device name/ip address, userId and password.
-v Specifies the version of MPE software being run.
-xa Retrieves only the alarm help file.
Procedure steps
Step Action
The helpset files specified are removed from the directory located at:
/opt/nortel/MDMDocs/ALM/<MDM-release-name>/C/<MPE-
release-version>
--End--
Variable definitions
Variable Definition
version Specifies the version of the MPE alarm helpfile to remove.
Prerequisites
Before completing the procedures in this section, you must be familiar with the
material on menu customization in Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
Navigation
Customizing the toolsets menus:
When you customize the toolsets menus, it is important to reassess your
changes when a new release of Nortel Multiservice Data Manager (MDM)
is installed because the new release may impact your changes. For
example, the new release may have new tools that you want to add to your
customized files. Also, some tools may not exist. See the MDM Release
Supplement that accompanies the software release for details of such
changes.
You can access your changes by using the diff or sdiff utilities that come
with Solaris. For more information, refer to the man pages for diff and sdiff.
See the following sections for toolsets customization procedures:
Adding a new toolset entry (page 170)
Changing an existing toolset entry or submenu (page 171)
Changing the toolsets primary menu (page 172)
Changing the default toolset definition file (page 173)
Customizing the Start Tool menus
This section describes the procedures you follow when you want to
customize Start Tool menus. When you customize Start Tool menus, it is
important to reassess your changes when a new release of Nortel
Multiservice Data Manager (MDM) is installed because the new release
may impact your changes. For example, the new release may have new
tools that you want to add to your customized files. Also, some tools may
no longer exist. See the MDM Release Supplement that accompanies the
software release for details of such changes.
You can access your changes by using the diff or sdiff utilities that come
with Solaris. For more information, refer to the man pages for diff and sdiff.
See the following sections for Start Tools customization procedures:
Adding a new entry to a Start Tool menu (page 175)
Changing an existing Start Tool menu (page 176)
Creating a customized icon bar definition file (page 177)
Prerequisites
See the section describing find menu definitions files for the main window
menus in Nortel Multiservice Data Manager Administration
Fundamentals (NN10470-305) for information on resolving the values of
the variables in the pathnames.
Procedure steps
Step Action
1 Create a new menu definition file and place it in one of the following
directories:
$HOME/MagellanNMS/toolsets/<area>
Use this directory for a new toolset submenu for a single user.
/opt/MagellanNMS/cfg/tsets/$LANG/toolsets/<area>
Use this directory for a new toolset submenu for the workstation.
Make sure that the name of the new menu definition file begins with a
number that places the entry where you want in the toolsets primary menu.
For example, if you want to add an entry between Configuration
-> DPN Devices (whose menu definition file is 20dpn_config.tools), the
name of your new menu definition file must begin with a number between 30
and 35.
2 Add the menu definition records using the syntax described in the file syntax
for menu customization in Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
--End--
Prerequisites
See the section discussing menu definition files for main window menus in
Nortel Multiservice Data Manager AdministrationFundamentals
(NN10470-305) for information on resolving the values of the variables in
the pathnames.
Procedure steps
Step Action
1 Copy the menu definition file that you need to change to one of the following
directories:
$HOME/MagellanNMS/toolsets/<area>
Use this directory for a change that affects a single user.
/opt/MagellanNMS/cfg/tsets/$LANG/toolsets/<area>
Use this directory for a change that affects all users of the workstation.
2 Edit the menu definition records using the syntax described in the file syntax
for menu customization section in Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
--End--
Prerequisites
See the section describing menu definitions for the main window menus in
Nortel Multiservice Data Manager AdministrationFundamentals
(NN10470-305) for information on resolving the values of the variables in
the pathnames.
Procedure steps
Step Action
1 Copy an existing toolset definition file or create a new file in one of the
following directories:
$HOME/MagellanNMS/toolsets
Use this directory for a change that affects a single user.
/opt/MagellanNMS/cfg/tsets/$LANG
Use this directory for a change that affects all users of the workstation.
2 Edit the menu definition records using the syntax described in the file syntax
for menu customization section of Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305). If you are not longer using
Full.tsets, make sure you adjust the value of the tMMenuAppName entry to
match the name of the new file.
3 If you are no longer using Full.tsets, change the value of the environment
variable NMSTSETS to the name of the new toolset definition file. See
Changing the default toolset definition file (page 173).
--End--
Procedure steps
Step Action
1 Log in to the UNIX account that is set up with the default MDM environment.
2 Using a UNIX editor such as vi, open one of the following files for editing:
.cshrc for UNIX accounts that run C-Shell
.profile for accounts that run Bourne or Korn shell
3 Change the value for the NMSTSETS variable to the name of the toolset that
is to appear when the user logs in. See Procedure job aid (page 173).
4 Save the file and exit from the file.
5 Log out and log back in again. When logging in be sure to choose the
language C, ja, or zh from the Options menu button on the login panel.
The application main window opens.
6 Move to the main window.
7 Using the menu mouse button, pull down each of the primary menus and
submenus, and verify that the correct set of tools is displayed.
--End--
NMSTSETS=<tset name>
export NMSTSETS
Examples:
NMSTSETS=Admin.tsets
export NMSTSETS
NMSTSETS=<absolute pathname>
export NMSTSETS
Procedure steps
Step Action
1 Create a new menu definition file and place it in one of the following
directories:
$HOME/MagellanNMS/tools/<application area>
Use this directory for a new Start Tool entry for a single user.
/opt/MagellanNMS/cfg/tsets/$LANG/tools/<application area>
Use this directory for a new Start Tool entry for the workstation.
Make sure that the name of the new menu definition file begins with a
number that places the entry where you want in the Start Tool menu
2 Add the menu definition records using the syntax described in the file syntax
for menu customization section of Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
--End--
Procedure steps
Step Action
1 Copy the menu definition file that you need to change to one of the following
directories:
$HOME/MagellanNMS/tools/<application area>
Use this directory for change that affects a single user.
/opt/MagellanNMS/cfg/tsets/$LANG/tools/<application area>
Use this directory for a change that affects all users of the workstation.
2 Edit the menu definition records using the syntax described in the file syntax
for menu customization section of Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
--End--
Procedure steps
Step Action
1 If you are customizing a push-button in an icon bar definition file and you
need a new bitmap image for the push-button, go to step 2. If you are not
doing this, skip to step 5.
2 Create your own bitmap image or choose a bitmap image in file /opt/
MagellanNMS/lib/nvs/icons and modify it with a bitmap editor, such as
bitmap. The bitmap image must be in X11 bitmap format.
3 Save the customized bitmap image.
If your change is for a single user, save the image in $HOME, the users
home directory.
If the change is for all Nortel Multiservice Data Manager (MDM) users, save
the image in /opt/MagellanNMS/cfg/nvs/icons.
4 Change file permissions to allow read access by the group and others, and
read-write by the owner.
chmod 644 <new file>
5 Choose a file as the starting point for your new customized file. For a list of
file names see icon bar definitions files in Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
6 Copy the file into one of the following directories:
the MDM users home directory, if you are only going to make the new
file available to one user:
If you are customizing an icon bar definition file to add a new icon to a push-
button in the Network Viewer, be sure to specify the new bitmap image file
in the appropriate labelPixmap record.
10 Save the file and exit from the file.
11 Have users of the tool exit from the tool then restart it to obtain access to the
new customization.
--End--
Prerequisites
In addition to the procedures listed in this section, you should refer to Nortel
Multiservice Data Manager AdministrationFundamentals (NN10470-305)
for additional example procedures for customizing MDM tool resources.
Navigation
Distributing operators to different MDM servers (page 180)
Setting the color map from the Options menu (page 181)
Selecting the color map with the useMDMColormap resource (page 182)
Prerequisites
For information about the Service Selection tool, see Nortel Multiservice Data
Manager AdministrationTools (NN10470-300).
Procedure steps
Step Action
1 On the Admin host, launch the Service Selection, System Level for Operator
Client tool.
2 Set the system-level service selection for all operators.
3 To distribute an operator to different MDM hosts that are set by step 2, copy
the file:
/opt/nortel/data/applications/desktop/jws/mft/prefs/
system/com/nortel/mdm/serviceselection/data/prefs.xml
to
/opt/nortel/data/applications/desktop/jws/mft/prefs/
users/<operator's IS user name>/com/nortel/mdm/
serviceselection/data/prefs.xml.
4 Edit the new file with the new MDM hosts. Make sure the file is readable by
"other".
--End--
When you run out of color cells, some colors may be rendered as different
colors. This is not a problem, unless the color has a specific meaning; for
example, if the color red indicates an alarm, but is rendered as grey because
of a color cell shortage. When this occurs, private color maps must be used to
obtain accurate color rendition and meaning.
With private color maps, an application has its own private color map which
becomes active whenever you move the cursor into one of the applications
windows (changes the focus). Colors are rendered correctly with this method.
When moving the cursor from a window for one application into a window for
another application, the colors outside the new applications window flash to a
different set of colors.
Procedure steps
Step Action
--End--
When you run out of color cells, some colors may be rendered as different
colors. This is not a problem, unless the color has a specific meaning; for
example, if the color red indicates an alarm, but is rendered as grey because
of a color cell shortage. When this occurs, private color maps must be used to
obtain accurate color rendition and meaning.
With private color maps, an application has its own private color map which
becomes active whenever you move the cursor into one of the applications
windows (changes the focus). Colors are rendered correctly with this method.
When moving the cursor from a window for one application into a window for
another application, the colors outside the new applications window flash to a
different set of colors.
Procedure steps
Step Action
1 To set a tool to use its own private color map, for a single user, add a line
similar to the following to the user accounts .Xdefaults file:
Msm*useNMSColormap: True
For an example of how to do this, see the example of setting resources for
a single user in the .Xdefaults file in Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
To set up the color map in the command line used to launch a tool, use the
-xrm start up command option to specify the color map resource, similar to
the following example:
/opt/MagellanNMS/bin/nd -xrm nd*useNMSColormap: True
--End--
Navigation
Network Viewer display customization (page 183)
Alarm Display Start Tool submenu customization (page 193)
Resource customization (page 195)
Toolset Alarm Acknowledgment Dialog customization (page 195)
Resources for customizing the Auto Acknowledgement On and Off
Dialogs (page 197)
Toolset Troubled Components pop-up menu customization (page 198)
Toolset Network Status Bar resource customization (page 198)
Toolset Component Information Viewer display customization (page 200)
The pixmap files used by Network Viewer are stored in the directory
/opt/MagellanNMS/lib/nds/pixmaps.
You can use the pixmaps stored in this directory as a starting point, and edit
them with a pixmap editor; or you can import your own pixmaps. Store any
pixmaps that you edit or create in the directory
/opt/MagellanNMS/cfg/nds/pixmaps. After your custom pixmaps are stored
there, they are available to the Network Organization Populator through the
Set organization map dialog. For more information, see Nortel Multiservice
Data Manager AdministrationNetwork Model (NN10470-015).
Keep the node pixmaps small to conserve screen real estate (20X20 is a
good average size).
If you create new node pixmaps (as opposed to editing existing
filenames), be sure to update the ND resource file appropriately.
For details on customizing the Start Tool menus and icon bars, see the section
on customizing the toolsets and start tools menu in Nortel Multiservice Data
Manager Administration (NN10470-303).
When you modify the Start Tools menu file, use one of the following
substitution variables on the command line:
$COMP: the selected component ID in API format (for example,
EM TORONTO LP 1 PO 1)
$COMP2: the second selected component ID in API format
$DCOMP: the selected component ID in display format (for example, EM/
TORONTO LP/1 PO/1)
$DCOMP2: the second selected component ID in display format
$NMHOST: the current host from the Server Selection tool
$DNAME: the module name only from the selected component ID in
display format
$DNAME2: the module name only from the second selected component
ID in display format
$SNAMES: the module names only from the selected component IDs in
API format
$SDNAMES: the module names only from the selected component IDs in
display format
The table Resources that you can customize in Network Viewer (page 186)
lists resources that you can customize.
When you modify the Start Tool menu file, use one of the following substitution
variables in the command line:
$COMP: the components internal representation
$DCOMP: the components display name
Example:
If you want to invoke the tool called Customer Tool Kit Script with the
component ID and the fault code contained in the alarm, add the following two
lines to the /opt/MagellanNMS/IADAlarm.menu file. The
CustomerToolKitScript script is called with this information when you use the
Start Tool submenu and select Customer Tool Kit Script:
labelString: Customer Tool Kit
Resource customization
You can customize the resources to control the colors of the alarm format by
severity. You can also customize the resources to control whether the problem
states are shown in the related components list, and to control whether the
bell rings upon error.
The table Resources for color control of common alarm formats by Alarm
Display (page 195) lists the resources you use to control the colors associated
with the common alarm format severity displayed by the Alarm Display
components.
Resource Files
The following files contain resources for the Acknowledge and
Unacknowledge Alarm(s) Dialogs:
/opt/MagellanNMS/lib/app-defaults/C/CIV contains resources for the
dialog when invoked from selected alarms in the Component Information
Viewer.
/opt/MagellanNMS/lib/app-defaults/C/IAD contains resources for the
dialog when invoked from selected alarms in Alarm Display.
/opt/MagellanNMS/lib/app-defaults/C/ACKALARM contains resources for
the dialog when invoked from selected components in Network Viewer,
Component Status Display, Component Information Viewer, and Network
Status Bar.
You can make resource changes to the Alarm Acknowledgment Dialogs that
affect a particular application or all applications that provide Alarm
Acknowledgment. For example, you can change the following resource:
IAD*AckAlarmDlog*UserIdFieldField.editable: True
This enables the user field to be editable when acknowledging or
unacknowledging alarms from the Alarm Display. If you omit the IAD prefix, all
applications are affected.
For more information on setting and overriding resources, see the section on
customizing resources used by Nortel Multiservice Data Manager tools in
Nortel Multiservice Data Manager Administration (NN10470-303).
AUTOACK*AutoAckDlog The title of the auto-ack ON Auto-Ack On Dialog Any text, but not
*autoAckDialogTitle dialog window. recommended
unless necessary.
AUTOACK*AutoAckDlog The title of the auto-ack OFF Auto-Ack Off Dialog Any text, but not
*unAutoAckDialogTitle dialog window. recommended
unless necessary.
AUTOACK*AutoAckDlog The text on the button to turn on Auto-Ack On Any text, but not
*autoAckAlarmsButtonLa Auto-ack. recommend unless
bel necessary.
AUTOACK*AutoAckDlog The text on the button to turn off Auto-Ack Off Any text, but not
*unAutoAckAlarms- Auto-ack. recommend unless
ButtonLabel necessary.
Resource Files
The following files contain resources for the Auto-Ack On Dialog and Auto-Ack
Off Dialog:
/opt/MagellanNMS/lib/app-defaults/C/CIV contains resources for the
dialogs when invoked from selected alarms in the Component Information
Viewer.
/opt/MagellanNMS/lib/app-defaults/C/IAD contains resources for the
dialogs when invoked from selected alarms in Alarm Display.
/opt/MagellanNMS/lib/app-defaults/C/AutoAck contains resources for the
dialogs when invoked from selected components in Network Viewer,
Component Status Display, Component Information Viewer, and Network
Status Bar.
You can make resource changes to the Alarm Acknowledgment Dialogs that
affect a particular application or all applications that provide Auto
Acknowledgment. For example, you can change the following resource:
IAD*AutoAckDlog*UserIdFieldField.editable: True
This enables the user field to be editable when enabling or disabling auto
acknowledgement from the Alarm Display. If you omit the IAD prefix, all
applications are affected.
For more information on setting and overriding resources, see the section on
customizing resources used by Nortel Multiservice Data Manager tools in
Nortel Multiservice Data Manager Administration (NN10470-303).
When you modify the menu, use one of the following substitution variables in
the command line:
$COMP: The internal component name of the target
$DCOMP: The display component name of the target
The table Resources in Network Status Bar that you may customize
(page 199) lists Network Status Bar resources that you may customize.
Alarm list
For procedures on customizing the Start Tool menu for the Alarm List, see the
section on customizing the toolsets and Start Tools menus in Nortel
Multiservice Data Manager Administration (NN10470-303).
When you modify the Start Tool menu file, use one of the following substitution
variables in the command line:
$SEVERITY: the Common format severity of the alarm, which can be
UNKNOWN, CRITICAL, MAJOR, MINOR, WARNING, or CLEARED
$DPNSEV: the DPN format severity of the alarm which can be
ncsUnknown, ncsDEGRADE, ncsOVERLOAD, ncsMINOR, ncsMAJOR,
or ncsWILDCARD
$EVENT: the type of the alarm which can be CLEAR, SET, or MESSAGE
$DPNMNEM: the DPN alarm mnemonic, which can be TRAPDATA,
ACTIVATE, INVALID, MISSING, DUPLICAT, MEMORY, CONJEST,
FAILED, REFUSED, TIME_OUT, CRITICAL, OOS, THRESHLD,
ENABLED, DISABLED, PROBE, CALL_BLK, or DISCARD. This variable
has a value for DPN alarms only.
$DPNACTION: the Network Control System (NCS) action value, which
can be ncsServiceData, ncsHardware, ncsSoftware, ncsSecurity,
ncsProtocol, ncsDebug, ncsNetwork, ncsEngineering, ncsOperations,
ncsUnclassified, or ncs Wildcard. This substitution value is for DPN
alarms only.
$FCODE: the alarm fault code. This eight-digit fault code is used to specify
the alarm. The first four digits are used to identify the source of the alarm,
and the last four digits are used to identify the alarm.
$DATE: the date of the alarm in the format:YY-MM-DD
$TIME: the time of the alarm in the format:HH:MM:SS
$COMP: the internal component name of the target
$DCOMP: the display component name of the target
$DTYPE: the DPN device type. This variable has a value for DPN alarms
only
$FORMAT: the present format of an alarm, which can be TERSE,
NORMAL, or FULL
$TYPE: the alarm type, which can be communications, qualityOfService,
processing, equipment, environment, security, operator, debug, or
unknown. This value gives a general explanation of the cause of the alarm.
$RAWSTATE: the corresponding components raw state
$CMT: the operator comment data text
$OPER: the operator data text
When you modify the file, you one of the following substitution variables on the
command line:
$COMP: the internal component name of the target
$DCOMP: the display component name of the target
Component Information Viewer searches for custom files in the order they are
listed in the preceding bulleted list. The first file found is used to populate the
list.
Other resources
You can customize the resources to control
the colors associated with propagated states, problem states, and severity
if the problem states are shown in the related components list
if a bell rings upon error
The table Resources for color control of propagated states (page 203) lists the
resources you use to control the colors associated with the propagated states
displayed by Component Information Viewer components. This table also lists
the resources you use to control the state color at the module level. If the value
of this resource is true, then the unknown state color at the module level is
different from the default unknown color.
The table Resources for color control of common alarms (page 203) lists the
resources you use to control the colors associated with the common alarm
format severity displayed by the Component Information Viewer components.
The table Resources to control the ringErrorBell (page 204) lists the
resources you use to control the ringErrorBell.
To customize the Components Panel List Start Tool menu, copy the file /opt/
MagellanNMS/lib/tsets/$LANG/tools/surv/ and save it in either $HOME/
MagellanN MS/tools/ for a single user customization or /opt/MagellanNMS/
cfg/tsets/$LANG/tools/ for all users of a workstation
When you modify the file, use one of the following substitution variables in the
command line:
$COMP: the internal component name of the target
$DCOMP: the display component name of the target
The table Resources for color control of problem states by Component Status
Display (page 206) lists the resources you use to control the colors associated
with the problem states displayed by Component Status Display components.
Prerequisites
Before performing the procedures in this section, you must be familiar with
the material in Nortel Multiservice Data Manager Administration
Fundamentals (NN10470-305).
Navigation
Configuring servers for Multiservice Switch network access, surveillance
access, and provisioning access (page 209)
Defining Nortel Multiservice Switch groups and network elements using
the Host Groups Administration tool as described in Nortel Multiservice
Data Manager AdministrationTools (NN10470-300) or by using the
following scripts: Defining Multiservice Switch 7400/15000/20000 hosts
and groups with the passport.frconfig script in no-prompt mode
(page 213), Defining Multiservice Switch 7400/15000/20000 hosts and
groups with the passport.frconfig script in prompt mode (page 218), or
Defining hosts and groups with the passport.atmconfig script (page 222)
Deleting a Multiservice Switch network element (page 230)
Configuring servers for network access, surveillance access, and
provisioning access to MPE nodes (page 234)
Defining Multiservice Provider Edge groups and network elements using
the Host Groups Administration tool as described in Nortel Multiservice
Data Manager AdministrationTools (NN10470-300); or by using one of
the following procedures: Configuring MPE 9500 hosts and groups with
the mpe.config script in no-prompt mode (page 237) or Configuring MPE
9500 hosts and groups with the mpe.config script in prompt mode
(page 241)
Deleting an MPE node (page 245)
Configuring the SNMP proxy agent (SPA) (page 249)
Reloading the SPA configuration files (page 251)
Prerequisites
You must be able to log on as root. The root account must be set up to run
Nortel Multiservice Data Manager software as described in UNIX account
configuration for MDM (page 23).
Procedure steps
Step Action
1 Plan your groups, user IDs and passwords. See the description of Nortel
Multiservice Switch groups in Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
2 Assign the user IDs and passwords on the network elements. Refer to the
chapter on security in Nortel Multiservice Data Manager Security
Fundamentals (NN10470-605) for instructions.
3 Install the latest Nortel Multiservice Switch-Multiservice Data Manager
Service Data Description (SDD) files as described in Nortel Multiservice
Data Manager AdministrationFundamentals (NN10470-305).
4 Use one of the following procedures to define the groups in the Host Group
Directory file (/opt/MagellanNMS/cfg/HGDS.cfg):
5 Using the Server Administration tool, create an HGDS server that starts
automatically when the workstation reboots, then start the server.
The basic startup command is as follows. For all possible parameters that
can be used with the startup command, see Nortel Multiservice Data
Manager AdministrationServer Management (NN10470-310).
/opt/MagellanNMS/bin/hgds
6 Use the Server Administration tool to create an FDTM server that starts
automatically when the workstation reboots, then start the server. For the
instructions to do this, see Nortel Multiservice Data Manager
AdministrationTools (NN10470-300).
The basic startup command follows. For all possible parameters that can be
used in the startup command, see Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
/opt/MagellanNMS/bin/fdtm
7 If you need to perform circuit monitoring, add the necessary entries to the
configuration file /opt/MagellanNMS/cfg/FMDR_pollingSurveillance.cfg. For
more information on configuring circuit monitoring and file
FMDR_pollingSurveillance.cfg, see Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
8 Create and start the FMDR servers required for the groups are you
establishing. You do not need to create an individual FMDR server for each
group. When creating these servers, ensure that you set them to start
automatically when the workstation reboots.
Attention: You do not need to create an FMDR for groups created for command
access or provisioning access.
Attention: Do not define groups for surveillance that contain more than 60 network
elements. Doing so may cause difficulty in connecting to all of the network elements
in the group to obtain surveillance information. You can create larger groups for other
purposes such as network access.
For each FMDR server, you must include the following parameters in its
startup command:
-g <group name> -u <userid> -p <password> -l AL
9 Use the Server Administration tool to create a GMDR server that starts
automatically whenever the workstation reboots, then start the server. For
instructions to do this, see Nortel Multiservice Data Manager
AdministrationTools (NN10470-300).
The basic startup command is as follows. For all possible parameters that
can be used in the startup command, see Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
/opt/MagellanNMS/bin/gmdr
10 Use the GMDR Administration tool to configure the GMDR server to access
the servers that you created to gather surveillance data.
For each FMDR server you must provide: Server Name (FMDR), Host
Name (FMDR), and User/CapabilityID and Password (FMDR).
For each OAMC server you must provide Server Name (OAMC) and
Host Name (OAMC):
--End--
Variable definitions
Variable Value
group name The name of the surveillance group the FMDR server monitors.
password The user ID and password for the common account that the FMDR
server uses to obtain surveillance information from the network
userid
elements in the surveillance group.
The password can also be the full path name of the file that contains
the encrypted password. Password files are stored in the directory:/
opt/MagellanNMS/cfg/private. See "Generating secure
passwords for Multiservice Data Manager Servers" in Nortel
Multiservice Data Manager SecurityFundamentals (NN10470-605).
The passport.frconfig script adds the group, host name, and IP address to the
/opt/MagellanNMS/cfg/HGDS.cfg file and the port and DLCI information to the
/etc/opt/SUNWconn/fr/fr.cf file.
In no-prompt mode, the passport.frconfig script lets you enter all of the
parameters on one line, but reminds you to run the passport.kick script only
after you have finished running the passport.frconfig script. It does not provide
you with the ability to start the passport.kick script.
Prerequisites
You must be logged in as root to run the passport.frconfig script.
The root account must be set up to run Nortel Multiservice Data Manager
(MDM) software as described in UNIX account configuration for MDM
(page 23).
Procedure steps
Step Action
1 Log on as root.
2 Run the passport.frconfig script in no-prompt mode.
--End--
Variable definitions
Variable Value
DLCI The data link connection identifier (DLCI) that identifies the Frame
Relay link and is provisioned in service data of the switch. Contact
your Multiservice Switch 7400/15000/20000 network Administrator
for the DLCI. Omit this parameter if you are adding an existing switch
to an existing group or to a new group.
group name The name of the group to which the switch belongs. The group names
consists of an uppercase string of from 1 to 12 characters.If the group
does not already exist, the script creates a new group for you.
The group name must be unique on the workstation. If the group
name consists of more than one word, join the words by underscore
characters; for example SURV_G1.
If you wish to gather alarms and surveillance information
automatically from your network, you should create at least one
special group called a surveillance group that is dedicated to
gathering surveillance information.
Examples:
name of a group used for provisioning and troubleshooting:
FMGROUP
name of a surveillance group: FG_1
Attention: Do not use the name of a module as the name of a
surveillance group. Doing so may cause confusion in identifying what
you are logged in to when using the Command Console.
host name The name of the switch. The host name is an uppercase character
string consisting of from 1 to 12 characters, as stored in the service
data of switch. Example: host1.
IP address The IP address of the switch. The IP address must be a valid address
consisting of four numbers from 1 to 3 digits, separated by periods.
Omit this parameter if you are adding an existing switch to an existing
group or to a new group. Example: 10.0.0.3
port The name of the port to which the Frame Relay link is connected. For
an HSI card this is one of ports hihp0, hihp1, hihp2, or hihp3. By
convention, the port labelled 1 on the workstation is hihp0, the port
labelled 2 is hihp1, and so on. Omit this parameter if you are adding
an existing switch to an existing group or to a new group.
PPGRP and to start the Frame Relay connection. The IP address of the
workstation is 47.28.2.19, the Frame Relay link connects to port hihp0 on
the workstation, and the Frame Relay link has a DLCI of 16.
Step Action
47.28.2.19 is alive
--End--
The passport.frconfig script adds the group, host name, and IP address to the
/opt/MagellanNMS/cfg/HGDS.cfg file and the port and DLCI information to the
/etc/opt/SUNWconn/fr/fr.cf file.
In prompt mode, the script prompts for the parameters that define a switch as
a member of a group, and for the parameters to define a Frame Relay
connection to the switch. It then prompts you for permission to run the
passport.kick script. The passport.kick script is used to update the HGDS,
FDTM, and FMDR servers with information about the new switch without the
need to restart the servers with the Server Administration tool.
Prerequisites
You must be logged in as root to run the passport.frconfig script.
The root account must be set up to run Nortel Multiservice Data Manager
(MDM) software as described in UNIX account configuration for MDM
(page 23).
Procedure steps
Step Action
1 Log on as root.
2 Run the passport.frconfig script in no-prompt mode.
/opt/MagellanNMS/bin/passport.frconfig
The passport.frconfig script displays the following prompt:
Please specify a group name for the new host:
3 Enter the name of the group to which the switch belongs.
Please specify a name for the new host:
4 Enter the host name for the switch.
Please specify an IP address for the new host
(or just return for none):
5 Do one of the following:
If you are adding a new switch to a new group or to an existing group,
enter the IP address.
Done
All appropriate files have been modified.
Go to step 10.
If you enter N, the script exits. Go back to step 2 to add the next to the
group.
10 Use the PING command to determine if the connection to the switch is up.
ping <passport IP address>
--End--
Step Action
--End--
Prerequisites
You must be logged in as root to run the passport.atmconfig script.
Procedure steps
Step Action
1 See the examples that follow this procedure for descriptions of the steps
used to run this script.
--End--
Examples
This section provides two examples of how to add a gateway and a remote
switch with the passport.atmconfig script.
Step Action
--End--
Step Action
--End--
Prerequisites
Ensure all references to MSS are removed from the GMDR configuration
files. For more information, see Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
Procedure steps
Step Action
/etc/init.d/fr.control update
an ATM connection, edit the file /etc/opt/SUNWconn/atm/atm.cf and
remove information about the obsolete ATM route, then update the ATM
connection information by entering:
3 Use the Server Administration tool to restart the following servers and allow
the workstation to use the updated host and group information:
the Host Group Directory Server (HGDS)
the Multiservice Switch Communications Manager (FDTM)
the Multiservice Switch Management Data Router (FMDR) servers for
any groups that have had network elements added to them or removed
from them.
4 From the MDM window, select System -> Administration -> GMDR
Administration.
5 From the Security menu, select Login as admin, enter your password and
click OK.
6 In the GMDR Subserver section, select the group name that network
elements were added to and click Show Components
The GMDR Components window opens.
7 In the Components section, select the component.
--End--
Prerequisites
Ensure all references to MSS are removed from the GMDR configuration
files. For more information, see Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
Procedure steps
Step Action
/etc/init.d/fr.control update
an ATM connection, edit the file /etc/opt/SUNWconn/atm/atm.cf and
remove information about the obsolete ATM route, then update the ATM
connection information by entering:
3 Use the Server Administration tool to restart the following servers and allow
the workstation to use the updated host and group information:
the Host Group Directory Server (HGDS)
the Multiservice Switch Communications Manager (FDTM)
the Multiservice Switch Management Data Router (FMDR) servers for
any groups that have had network elements added to them or removed
from them.
4 From the MDM window, select System -> Administration -> GMDR
Administration.
5 From the Security menu, select Login as admin, enter your password and
click OK.
6 In the GMDR Subserver section, select the group name that network
elements were added to and click Show Components
The GMDR Components window opens.
--End--
Prerequisites
You must be able to log on as root. The root account must be set up to run
as described in UNIX account configuration for MDM (page 23)
Procedure steps
Step Action
1 Plan your groups, user IDs and passwords. See the description of
Multiservice Provider Edge groups in Nortel Multiservice Data Manager
AdministrationFundamentals (NN10470-305).
2 Assign the user IDs and passwords on the network elements. Refer to the
chapter on security in 241-5701-605 Passport 7400, 15000, 2000 User
Access Guide for instructions to assign user IDs and passwords on MPE
9500 network elements.
3 Using the Server Administration tool, create an HGDS server that starts
automatically when the workstation reboots, then start the server.
The basic startup command is as follows. For all possible parameters that
can be used with the startup command, see Nortel Multiservice Data
Manager AdministrationServer Management (NN10470-310).
/opt/MagellanNMS/bin/hgds
4 Use the Server Administration tool to create an NDTM server that starts
automatically when the workstation reboots, then start the server. For the
instructions to do this, see Nortel Multiservice Data Manager
AdministrationTools (NN10470-300).
The basic startup command follows. For all possible parameters that can be
used in the startup command, see Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
/opt/MagellanNMS/bin/ndtm
5 Create and start one NMDR server for each surveillance group. When
creating these servers, ensure that you set them to start automatically when
the workstation reboots.
Attention: Do not define groups for surveillance that contain more than 60 network
elements. Doing so may cause difficulty in connecting to all of the network elements
in the group to obtain surveillance information. You can create larger groups for other
purposes such as network access
For each NMDR server, include the following parameters in its startup
command:
-g <group name> -u <userid> -p <password>
6 Use the Host Group administration tool or run the mpe.config script to add
a new or existing node, or a new or existing group, to the Host Group
Directory file (/opt/MagellanNMS/cfg/HGDS.cfg). For a description of this
tool or the script, see Nortel Multiservice Data Manager Administration
Tools (NN10470-300).
7 Use the Server Administration tool to create a GMDR server that starts
automatically whenever the workstation reboots, then start the server. For
instructions to do this, see Nortel Multiservice Data Manager
AdministrationTools (NN10470-300).
The basic startup command is as follows. For all possible parameters that
can be used in the startup command, see Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
/opt/MagellanNMS/bin/gmdr
8 Use the GMDR Administration tool to configure the GMDR server to access
the servers that you created to gather surveillance data.
For each NMDR server you must provide: Server Name (NMDR),
Host Name (NMDR), and User/CapabilityID and Password.
For each OAMC server you must provide Server Name (OAMC) and
Host Name (OAMC):
--End--
Variable definitions
Variable Value
group name The name of the surveillance group that the NMDR server monitors.
password The user ID and password for the common account that the NMDR
server uses to obtain surveillance information from the network
userid
elements in the surveillance group.
The password can also be the full path name of the file that contains
the encrypted password. Password files are stored in the directory:/
opt/MagellanNMS/cfg/private. See "Generating secure
passwords for Multiservice Data Manager Servers" in Nortel
Multiservice Data Manager SecurityFundamentals (NN10470-605).
Configuring MPE 9500 hosts and groups with the mpe.config script in
no-prompt mode
Use this procedure to add MPE 9500 switches to a new MPE 9500 group or
to an existing MPE 9500 group using the mpe.config script in no-prompt
mode.
In no-prompt mode, the mpe.config script lets you enter all of the parameters
on one line, but only reminds you to run the hdgs.kick script after you have
finished running the mpe.config script. It does not provide you with the ability
to start the hgds.kick script.
You can use the mpe.config script to
add a new MPE 9500 switch to an existing MPE 9500 group or to a
new MPE 9500 group
add an existing MPE 9500 switch to an existing MPE 9500 group or to
a new MPE 9500 group
You cannot use the mpe.config script to
delete a MPE 9500 switch from an existing group
move a MPE 9500 switch to another group
The mpe.config script adds the group, host name, and IP address to the /opt/
MagellanNMS/cfg/HGDS.cfg file.
Prerequisites
Root access and administrator privileges.
The root account must be set up to run Nortel Multiservice Data Manager
software as described in UNIX account configuration for MDM (page 23).
Read and understand the reasons for Nortel Multiservice Provider Edge
9500 groups and guidelines for setting them up in Nortel Multiservice Data
Manager AdministrationFundamentals (NN10470-305)
Read and understand the description of groups for Nortel Multiservice
Provider Edge 9500 for network access in Nortel Multiservice Data
Manager AdministrationFundamentals (NN10470-305)
Procedure steps
Step Action
1 Log on as root.
2 Run the mpe.config script in no-prompt mode:
/opt/MagellanNMS/bin/mpe.config <group name>\ <host
name> [<IP address>]
The script displays responses indicating the group has been created and
reminds you to run the hgds.kick script.
3 Repeat step 2 once for each MPE 9500 switch that you are adding to a new
group or to an existing group.
4 Restart to change the signal sent to fmdr, ndtm, or both from a SIGHUP to
a SIGTERM.
/opt/magellanNMS/bin/hgds.kick -restart <fmdr/ndtm/all>
Attention: These signals cause the two servers, and indirectly the fmdr and nmdr,
to shutdown gracefully so they may be restarted by the server administration
daemon. These options are used to force changes, such as the removal or renaming
of a switch from a group.
--End--
Variable definitions
Variable Value
group name The name of the MPE 9500 group to which the MPE 9500 switch
belongs, consisting of an uppercase string of from 1 to 12 characters.
If the group does not already exist, the script creates a new group for
you.
The group name must be unique on the workstation. If the group
name consists of more than one word, join the words by underscore
characters; for example SURV_G1.
If you wish to gather alarms and surveillance information
automatically from your network, you should create at least one
special group called a surveillance group that is dedicated to
gathering surveillance information.
host name The name of the MPE 9500 switch. The host name is an uppercase
character string consisting of from 1 to 40 characters, as stored in the
service data of MPE 9500 switch.
IP address The IP address of the MPE 9500 switch. The IP address must be a
valid MPE 9500 address consisting of four numbers from 1 to 3 digits,
separated by periods. Omit this parameter if you are adding an
existing MPE 9500 switch to an existing group or to a new group.
Example of Configuring MPE 9500 hosts and groups with the mpe.config
script in no-prompt mode
The following example shows the use of the mpe.config script in no-
prompt mode to add a MPE 9500 switch called WEST3 to MPE 9500
group MPEGRP. The IP address of the workstation is 47.28.2.19.
Step Action
2 Update the HGDS, NDTM, and NMDR servers with the new information by
running the hdgs.kick script.
/opt/MagellanNMS/bin/hdgs.kick
The script displays messages indicating that the servers are being updated
with the modified group information and indicating that the frame relay
connection information is being updated.
3 Ensure that the connection is active.
ping 47.28.2.19
The following response indicates that the MPE 9500 is reachable:
47.28.2.19 is alive
--End--
Configuring MPE 9500 hosts and groups with the mpe.config script in
prompt mode
Use this procedure and the accompanying example to add a MPE 9500 switch
to a new MPE 9500 group or to an existing MPE 9500 group using the
mpe.config script in prompt mode.
In prompt mode, the script prompts for the parameters that define a MPE 9500
switch as a member of a MPE 9500 group, and for permission to run the
hdgs.kick script. The hdgs.kick script is used to update the HGDS, NDTM, and
NMDR servers with information about the new switch without the need to
restart the servers with the Server Administration tool.
You can use the mpe.config script to
add a new MPE 9500 switch to an existing MPE 9500 group or to a
new MPE 9500 group
add an existing MPE 9500 switch to an existing MPE 9500 group or to
a new MPE 9500 group
You cannot use the mpe.config script to
delete a MPE 9500 switch from an existing group
move a MPE 9500 switch to another group
The mpe.config script adds the group, host name, and IP address to the /opt/
MagellanNMS/cfg/HGDS.cfg file.
Prerequisites
Root access and administrator privileges.
The root account must be set up to run Nortel Multiservice Data Manager
software as described in UNIX account configuration for MDM (page 23).
Read and understand the reasons for Nortel Multiservice Provider Edge
9500 groups and guidelines for setting them up in Nortel Multiservice Data
Manager AdministrationFundamentals (NN10470-305)
Read and understand the description of groups for Nortel Multiservice
Provider Edge 9500 for network access in Nortel Multiservice Data
Manager AdministrationFundamentals (NN10470-305)
Procedure steps
Step Action
1 Log on as root.
2 Run the mpe.config script in prompt mode.
/opt/MagellanNMS/bin/mpe.config
an existing MPE 9500 to a new group Press the carriage return key to omit
or to an existing group the IP address.
When you select Y the script displays messages indicating that the servers
are being updated with the modified group information and information,
followed by the following message:
Done
All appropriate files have been modified.
--End--
Variable definitions
Variable Value
group name The group name is the name of the MPE 9500 group to which the
MPE 9500 switch belongs consisting of an uppercase string of from 1
to 12 characters.If the group does not already exist, the script creates
a new group.
The group name must be unique on the workstation. If the group name
consists of more than one word, join the words by underscore
characters; for example SURV_G1.
If you wish to gather alarms and surveillance information
automatically from your network, you should create at least one
special group called a surveillance group that is dedicated to
gathering surveillance information.
Attention: Do not use the name of a MPE 9500 module as the name
of a surveillance group. Doing so may cause confusion in identifying
what you are logged in.
host name The host name is an uppercase character string consisting of from 1
to 40 characters, as stored in the service data of MPE switch.
IP address If you enter the IP address for MPE switch. The IP address must be a
valid MPE 9500 address consisting of four numbers from 1 to 3 digits,
separated by periods.
Example of Configuring MPE 9500 hosts and groups with the mpe.config
script in prompt mode
The following example shows the use of the mpe.config script in prompt
mode to add a MPE 9500 switch called WEST4 to MPE 9500 group
MPEGRP1. The IP address of the workstation is 47.28.2.19.
Step Action
--End--
Prerequisites
Remove all references to MPE from the GMDR configuration files. For
more information, see Nortel Multiservice Data Manager Administration
Server Management (NN10470-310).
Procedure steps
Step Action
3 From the MDM window, select System -> Administration -> GMDR
Administration.
4 From the Security menu, select Login as admin, enter your password and
click OK.
5 In the GMDR Subserver section, select the group name that network
elements were removed from and click Show Components
The GMDR Components window opens.
6 In the Components section, select the component.
The subcomponents appear in the Subcomponents for <component name>
area.
7 Select the subcomponent name in the Subcomponents for <component
name> area, click Delete, and then Close.
The network element is removed from the subcomponent list in GMDR
Admin.
8 From the File menu, Select Save, then Exit.
9 From the MDM window, select Fault -> Network Viewer.
10 From the Network Model Edit menu, select Enable Network Model
Editing.
--End--
Prerequisites
Ensure all references to MPE are removed from the GMDR configuration
files. For more information, see Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
Procedure steps
Step Action
3 From the MDM window, select System -> Administration -> GMDR
Administration.
4 From the Security menu, select Login as admin, enter your password and
click OK.
5 In the GMDR Subserver section, select the group name that network
elements were removed from and click Show Components
The GMDR Components window opens.
6 In the Components section, select the component.
The subcomponents appear in the Subcomponents for <component name>
area.
7 Select the subcomponent name in the Subcomponents for <component
name> area, click Delete, and then Close.
The network element is removed from the subcomponent list in GMDR
Admin.
8 From the File menu, Select Save, then Exit.
9 From the MDM window, select Fault -> Network Viewer.
10 From the Network Model Edit menu, select Enable Network Model
Editing.
--End--
Prerequisites
Read and understand SNMP Proxy Agent (SPA) fundamentals in Nortel
Multiservice Data Manager AdministrationFundamentals
(NN10470-305)
Read and understand SNMP Proxy Agent (SPA) for Multiservice Provider
Edge nodes in Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310).
Decide which UDP port this SPA instance will use to receive requests from
the SNMP management system. The default port is UDP port 361.
If this SPA instance must use the UDP port 161 to receive SNMP requests
from SNMP managers, you must stop any process currently bound to this
port before SVM starts SPA. On an MDM workstation, this port is normally
used by the workstation SNMP manager. To stop this process:
As SuperUser, execute /etc/init.d/startsnmp stop from an XTERM
window; this will stop the workstation SNMP agent
As SuperUser, rename the file /etc/rc2.d/S898snmp to /etc/rc2.d/
_S898snmp to prevent the workstation SNMP agent from being
restarted when the workstation is rebooted.
Procedure steps
Step Action
--End--
Procedure steps
Step Action
--End--
Procedure steps
Step Action
Attention: If you need to select a different list of log levels than the two selections
available through the USR1 signal, you can modify the list as required in the
configuration file and the HUP signal used to reload this file.
--End--
Procedure steps
Step Action
--End--
Attention: If the Provider server is not running on the same machine as the
Controller server, or if you want to use more than one Provider server to
share the load, you must modify the remote mapping file. For more
information, see Modifying the remote mapping (controller.cfg) file
(page 283).
For information about the backup and restore procedures and ongoing
management of settings, see Nortel Multiservice Data Manager Network
Backup and Restore (NN10470-807).
Navigation
Use the Server Administration tool for the following setup procedures for
MSS and MPE backup and restore:
Adding a backup group (page 256)
Configuring the backup group (page 257)
Changing server startup options for backup and restore (page 260)
Enabling the Data Synchronization server (page 263)
Verifying the Default backup group configuration (page 265)
Use the Service Data Backup/Restore tool for the following setup
procedures for MSS and MPE backup and restore:
Changing the location of the Data Synchronization server (page 266)
Setting the Default User Authentication (page 267)
Setting the Software Distribution Site for network element recovery
(page 268)
Setup procedures for Passport/SNMP backup and restore:
Changing default information for Passport/SNMP backup (page 269)
Applies to:
Multiservice Switch
Passport 6400
Prerequisites
You must be logged in as the root user.
Attention: Backup groups are required only for the Current Configuration
Backup function, not for the regular backup function.
Procedure steps
Step Action
1 From the Server Administration window, in the Server list, select the
Backup Controller.
2 Right-click to select Configuration and then Launch Backup Server.
The Configuration Editor Backup Server dialog box opens.
3 In the left pane, select the BackupServer element.
4 Right-click and select Add Element.
The Add Element dialog box opens.
5 Verify that Group option is selected and click OK.
An new element called New Group is added to the left pane.
6 Select the New Group element.
7 In the Name field of the right pane, enter the name for the backup group
8 To accept the new group element with the same subelements as the Default
group, select Save from the File menu of the menu bar. Otherwise continue
to Configuring the backup group (page 257).
--End--
Applies to:
Multiservice Switch
Passport 6400
Prerequisites
You must be logged in as the root user.
Attention: Backup groups are required only for the Current Configuration
Backup function; they are not required for the regular backup function.
Procedure steps
Step Action
1 From the Server Administration window, in the Server list, select the
Backup Controller.
2 Right-click to select Configuration and then Launch Backup Server.
The Configuration Editor Backup Server dialog box opens.
3 In the left pane, expand the BackupServer element.
4 Select the backup group or expand the backup group and select the network
element that you want to modify.
5 Right-click to select Add Element.
6 In the Add Element dialog box, select either of the Authentication,
BackupOptions, or DBSynchOptions subelements.
7 Click OK.
8 To add another subelement, repeat step 4 to step 6. Otherwise, continue to
configure the subelements:
If the subelement is Authentication, go to step 9.
If the subelement is BackupOptions, go to step 11.
If the subelement is DBSynchOptions, go to step 13.
Attention: If you leave the server field blank, the default value is localhost. If the
name in the server field does not match the name specified in the /opt/
MagellanNMS/cfg/DataSync.cfg of the responsible DBSync controller, the Data
Sync servers will not synchronize that backup group or network element.
--End--
Applies to:
Multiservice Switch
Multiservice Provider Edge
Passport 6400
Prerequisites
If you are changing the startup command for a server that is already
running, you must stop the server before you make changes. Any changes
you make to the startup command will take effect only when the server is
restarted. See Nortel Multiservice Data Manager Administration
Database (NN10470-400) for information about starting the backup
server.
Attention: When you are changing the startup command for the backup
Controller, both the Controller and the Provider servers must be stopped.
After you have added the options, the backup Provider must be restarted
before the backup Controller.
Attention: The -notification and -nbofbck options are valid only for the
Backup Controller (nsctlbck).
Procedure steps
Step Action
The SVM Edit Server opens with the startup command displayed.
7 Edit the Startup command to add the option(s):
/opt/MagellanNMS/bin/<server_name> [-<option> <option
value>]
8 Optionally, disable the Automatic startup at reboot time option.
9 Click OK.
A confirmation dialog displays.
10 Click Yes to confirm.
11 Click Cancel to close the SVM Edit Server window
12 Restart the server as required.
--End--
Variable definitions
Variable Value
-c /opt/MagellanNMS/cfg/ The option to use a filename for the controller configuration file
<filename.cfg> other than the default name of Controller.cfg. You must show
the full path to the file.
-d The option to set debugging on. The default is off.
-DB_Synch_port <port> The option to use a specified port for communication with
DBSyncController. The default is 5050.
Attention: Use this option only if you are implementing
Multiservice Data Manager with the Administration Database.
-h The option to display command line usage.
-nbofbck <#> The option to change the maximum number of simultaneous
backups. This option is valid only for the Backup Controller
(nsctlbck) and can only be used with the -notification option.
Attention: Do not increase the maximum number of
simultaneous backups unless you have the required
engineering information to support this change. A large
number of simultaneous backups can result in congestion
problems for the Backup Controller.
-notification This option enables current configuration backups. This option
is valid only for the Backup Controller (nsctlbck).
(1 of 2)
Variable Value
-p <port_no> The option to specify the port to use.
Attention: If you use this option with the Backup Controller or
the Restore Controller, you will override the dynamic port
selection process.
server_name The command line value that represents the server:
Backup Controller = nsctlbck
Restore Controller = nsctlrst
MSS Backup Provider = pbckpp
MSS Restore Provider = prstpp
MPE Backup Provider = pbcksrs
MPE Restore Provider = prstsrs
(2 of 2)
Use this procedure if you have not enabled the Data Synchronization server
for the Administration database.
Attention: If the Data Synchronization server is not on the local host, you
must specify the location of the server. See Changing the location of the Data
Synchronization server (page 266).
Applies to:
Multiservice Switch
Multiservice Provider Edge
Passport 6400
Procedure steps
Step Action
Set the enabled field to true to enable the Data Synchronization server.
Do not change the value in the class field.
Optionally, use the arguments field to set the these options:
-help (to display command usage information),
-cfg <configFile> (to specify the configuration file to be used) and
-log <logFile> (to enable logging to be written to a specified file).
--End--
Applies to:
Multiservice Switch
Passport 6400
Procedure steps
Step Action
--End--
Applies to:
Multiservice Switch
Multiservice Provider Edge
Passport 6400
Procedure steps
Step Action
1 From the Backup and Restore window menu bar, select Options, then
select Edit Server Configuration.
The Server Configuration dialog box opens. The default value for the
Backup Server Host Name is localhost.
2 Change the value of localhost to the location of the Data Synchronization
server. For example:
wcars123
3 Click OK.
--End--
Applies to:
Multiservice Switch
Multiservice Provider Edge
Passport 6400
Procedure steps
Step Action
1 From the Backup and Restore window menu bar, select Options, Set
Default Authentication.
2 Enter the user ID and password in the appropriate fields.
3 Click OK.
The new user ID and password are used on the next network element
access.
--End--
Applies to:
Multiservice Switch
Procedure steps
Step Action
1 From the Backup and Restore window menu bar, select Options, Set
Software Distribution Site.
The Software Distribution Site dialog box opens.
2 In the appropriate fields, enter the IP host name, user ID and password of
the Software Distribution Site.
3 Click OK.
--End--
Procedure steps
Step Action
--End--
Procedure steps
Step Action
--End--
Procedure steps
Step Action
--End--
Procedure steps
Step Action
--End--
Procedure steps
Step Action
--End--
Variable definitions
Variable Value
x.x.x.x The IP address of the Passport 4400/4460.
y.y.y.y The network netmask.
z.z.z.z The broadcast address.
The device information file enables you to group network elements. This
option enables you to back up or restore all network elements within a
particular group.
Procedure steps
Step Action
--End--
Variable definitions
Variable Value
device Indicates information about a particular network element.
devtype The name of the network element type (PP4400, or PP4460).
devname The name of the network element.
IPaddress The IP address of the network element and has the format n.n.n.n.
port The port number of the network element.
id The user ID for a network element and the READ community string for
a Passport 4400/4460.
password user password for a network element and the WRITE community
string for a Passport 4400/4460
group indicates information about a group of network elements
groupname name of the group to which the network element belongs
member indicates information about a member of the group. You need to place
all members of a group directly after the group line
Attention: You must include devtype, devname, IP address, id, and password on the same line.
If the providers host machine has only one network interface (one IP
address), that IP address is used for the TFTP connection between the
network element and the provider.
The provider host machine can have multiple network interfaces. For example,
the system can have one interface to the LAN and other interfaces to the WAN
where the network elements reside. In this configuration the network elements
cannot see the IP address of the interface to the LAN. In this situation you
need to configure the provider to use the correct interface address for the
TFTP connection. You do this by creating an interface mapping file.
The network element providers can use the interface mapping file to
determine the IP address used as the TFTP server address. The network
element connects to the TFTP server address for TFTP file transfers. Each
line in the interface mapping file defines the mapping of the host address and
the network element address or addresses. The host address is the TFTP
server address.
Procedure steps
Step Action
--End--
Variable definitions
Variable Value
interface IP address The IP address of the interface to be used and has the format n.n.n.n.
network element IP The IP addresses of the network elements and has the format n.n.n.n.
address(es) You can match a group of network elements by using the wildcard
character (*).
131.147.0.1 131.147.*
131.148.0.1 131.148.*
32.123.1.1 *
Prerequisites
For information about naming the network element information file, see
Modifying the device information file for Passport 4400/4460 (page 274).
Procedure steps
Step Action
--End--
Prerequisites
If you are adding options to a server that is already running, you must stop
the server before you add the option.
Procedure steps
Step Action
--End--
Variable definitions
Option/Variable Values/Definitions
-c /opt/MagellanNMS/cfg/ The option to specify a filename for the controller config file if you are using
<filename.cfg> a filename other than Controller.cfg. You must show the full path to the file.
-d The option to set debugging on. The default is off.
-h The option to display command line usage.
-m Use this option to specify the interface mapping file.This optional file is
<interface_mapping_file> required when your system has multiple network interfaces. The default
interface mapping file is /opt/MagellanNMS/cfg/ifmap.cfg.
If the file ifmap.cfg exists in directory /opt/MagellanNMS/cfg and is
populated with valid mapping information, it is not necessary to specify the
-m option. This file is used by default.
For information about when to use this option, see Modifying the interface
mapping file for Passport 4400/4460 (page 277).
(1 of 2)
Option/Variable Values/Definitions
-p Use this option to specify the port to use for the Backup and Restore
<provider_server_port_n Provider servers. The default values are as follows:
o>
Passport 4400 Backup Provider = 5030
Passport 4400 Restore Provider = 5031
Passport 4460 Backup Provider = 5040
Passport 4460 Restore Provider = 5041
<provider_server_name> The value that represents the provider server name:
Passport 4400 Backup Provider = pbckpp4400
Passport 4400 Restore Provider = prstpp4400
Passport 4460 Backup Provider = pbckpp4460
Passport 4460 Restore Provider = prstpp4460
(2 of 2)
The controller uses the remote mapping file (controller.cfg) to determine the
provider to which a network element is connected. For backup and restore, the
default is one provider running on the same workstation as the controller. If
this is not the case, you must add an entry in the service mapping block for
each network element that you want accessed by a specific provider.
If you do not create an entry, the backup/restore tools assume the network
element is connected to the local provider. The backup/restore tools support
only one remote mapping file.
Applies to:
Multiservice Switch
Multiservice Provider Edge
Passport 6400
Passport 4400 and 4600
Procedure steps
Step Action
--End--
Variable definitions
Variable Value
service_type backup or restore
devtype The name of the network element type (MPE, PASSPORT, PP4400,
or PP4460).
devname The name of the network element. You can match a group of network
elements by using the wildcard character (*).
IPaddress The IP address of the network element and has the format n.n.n.n. You
can match a group of network elements by using the wildcard
character (*).
provider_host:provider_port The provider location; provider_host is the host name or IP address of
the Provider and provider_port is the port number registered to the
Provider. The port number for MSS network elements (not Passport
4400/4460) is dynamic by default. The default values for provider_port
are
dynamic Passport Backup Provider
dynamic Passport Restore Provider
dynamic MPE Backup Provider
dynamic MPE Restore Provider
5030 Passport 4400 Backup Provider
5031 Passport 4400 Restore Provider
5040 Passport 4460 Backup Provider
5041 Passport 4460 Restore Provider
Attention: You must include devtype, devname/IPaddress, and host on the same line.
service=backup
dev_type=PASSPORT dev_addr=42.208.*.111 host=23.257.32.12
dev_type=PP4400 dev_name=PP4400_20 host=bcarse80
dev_type=PP4460 dev_name=PP4460_64 host=winnipeg
service=restore
Navigation
Troubleshooting global alarm clearing on DPN (page 287)
Troubleshooting global alarm clearing on Multiservice Switch (page 291)
Troubleshooting global alarm clearing on Multiservice Provider Edge
(page 295)
Troubleshooting a global alarm clearing problem (Global Clear tool)
(page 299)
Troubleshooting server alarm distribution through NCS and workstation
surveillance using NCS status probing (page 300)
Prerequisites
Your user account must be set up run the NMSAdmin toolset at login to be
able to see the Server Administration tool in the menus.
Procedure steps
Step Action
1 Start the Server Administration tool from the application main window by
selecting System -> Administration -> Server Administration
2 Look for the DMA server in the servers list and double-click on it to view the
server information.
The server should be Running, should be set to start at reboot, and the
startup command should include the -c option.
If the server information is correct and the server is running, go to step 10.
If the server information is correct but the server is not running, select the
server, then go to step 5.
If the server is not defined or the server information is incorrect, go to step 6.
3 Using the Server Administration tool, stop the DMA server, if it is already
running.
See accessing view mode in Nortel Multiservice Data Manager
AdministrationTools (NN10470-300).
4 Log in to the Server Administration tool as the administrator by selecting
Enable Editing from the Security menu.
See editing a server in Nortel Multiservice Data Manager Administration
Tools (NN10470-300).
5 Edit the server information to ensure that the server starts automatically
when the workstation reboots and the startup command contains the -c
option, as follows:
/opt/MagellanNMS/bin/dma -c [<filename>]
6 Start the DMA server.
7 Start the GMDR Server Administration tool by selecting
System -> Administration ->GMDR Administration.
8 The DMA server should appear in the server list, be named DMASERVER,
and have a status of Connected.
If the DMA server appears, is named DMASERVER and is connected, go to
step 17.
If the DMA server appears, is named DMASERVER, but is not connected,
go to step 16.
If the DMA server does not appear, or is not named DMASERVER go to
step 12.
9 Log in to the GMDR Administrator tool by selecting Log in as admin from the
Security menu.
10 Click Add.
The Add Server dialog opens.
11 Enter the following information into fields in the Add Server dialog:
Server Name: DMASERVER
Host Name: localhost or the IP address of the workstation on which the
GMDR server is running
--End--
If global alarm clearing does not work after configuring it, the most likely
causes are configuration errors on the Nortel Multiservice Data Manager
workstation or in the DmaClrPP.cfg file.
Procedure steps
Step Action
1 Start the Server Administration tool from the application window by selecting
System -> Administration -> Server Administration.
2 Look for the Host Group Directory Services (HGDS) server in the servers
list and double click on it to view the server information.
The server should be Running and should be set to start at reboot.
3 Look for the Passport Comms Mgr server (FDTM) in the servers list and
double click on it to view the server information.
The server should be Running and should be set to start at reboot.
4 Look for the GMDR server in the servers list and double-click on it to view
the server information.
The server should be Running, and should be set to start at reboot.
5 Look for the DMA server in the servers list and double-click on it to view the
server information.
The server should be Running, should be set to start at reboot, and the
startup command should include the -f option.
Attention: Steps 1-5 and 18-27 need to be completed on the workstation where the
network access layer resides (FDTM and HGDS). The other steps need to be
completed where the implicated servers reside (possibly on a remote workstation.)
6 Using the Server Administration tool, stop the DMA server, if it is already
running.
7 Log in to the Server Administration tool as the administrator by selecting
Enable Editing from the Security menu.
8 Edit the server information to ensure that the server starts automatically
when the workstation reboots and the startup command contains the -f
option, as follows:
/opt/MagellanNMS/bin/dma -f
Attention: You can add the command line option -t to configure the inactivity timer.
--End--
If global alarm clearing does not work after configuring it, the most likely
causes are configuration errors on the Nortel Multiservice Data Manager
workstation or in the DmaClrSRS.cfg file.
Procedure steps
Step Action
1 Start the Server Administration tool from the application window by selecting
System -> Administration -> Server Administration.
2 Look for the Host Group Directory Services (HGDS) server in the servers
list and double click on it to view the server information.
The server should be Running and should be set to start at reboot.
3 Look for the MPE Comms Mgr server (NDTM) in the servers list and double
click on it to view the server information.
The server should be Running and should be set to start at reboot.
4 Look for the GMDR server in the servers list and double-click on it to view
the server information.
The server should be Running, and should be set to start at reboot.
5 Look for the DMA server in the servers list and double-click on it to view the
server information.
The server should be Running, should be set to start at reboot, and the
startup command should include the -s option.
Attention: Steps 1-5 and 18-27 need to be completed on the workstation where the
network access layer resides (NDTM and HGDS). The other steps need to be
completed where the implicated servers reside (possibly on a remote workstation.)
6 Using the Server Administration tool, stop the DMA server, if it is already
running.
7 Log in to the Server Administration tool as the administrator by selecting
Enable Editing from the Security menu.
8 Edit the server information to ensure that the server starts automatically
when the workstation reboots and the startup command contains the -s
option, as follows:
/opt/MagellanNMS/bin/dma -s
Attention: You can add the command line option -t to configure the inactivity timer.
--End--
Procedure steps
Step Action
1 Start the Command Console from the application main window by selecting
System -> Utilities -> Command Console.
The Connection Manager dialog opens.
2 Select Connection Management from the Security menu.
The Command Console Connection Management dialog opens.
3 Enter the group name, the user ID, and the password.
4 Click Connect.
The information you entered is authenticated. When authentication is
successful, the message Connected to <Passport group name> is
displayed.
Example:
Connected to ALL
If authentication is not successful, one or more of the following may be the
cause of the problem:
The user ID and password are invalid for that group.
The connection to this part of the network may be down.
5 Once authenticated, use the command line in Command console and type
<Passport_Name> me.
Ensure that the user ID you are using has a customer ID of 0, and has the
scope of network or device, and the systemAdministration privilege.
6 Select Connection Management from the Security menu.
The Command Console Connection Management dialog opens.
7 Select the connected group and click on Disconnect.
8 Reselect the group and enter new values in the User Id and Password fields.
9 Click Connect.
10 Click Close.
The Command Console Connection Management dialog closes.
--End--
Prerequisites
Before beginning this procedure you will need an NCS Capability ID (logon
ID) and password that allows you to log into the OA through which
workstation server alarms are to be distributed.
Procedure steps
Step Action
3 Using the Server Administration tool, stop the DMA server, if it is already
running.
4 Log in to the Server Administration tool as the administrator by selecting
Enable Editing from the Security menu.
5 Edit the server information to ensure that the server starts automatically
when the workstation reboots and that the startup command contains the -
d option.
If you need to have workstation surveillance through NCS status probing,
ensure that the startup command also contains the -p option. The command
syntax is as follows:
/opt/MagellanNMS/bin/dma -d [<filename>] \
[-p [<probing interval>]]
6 Start the DMA server.
7 Using a UNIX editor, open file /opt/MagellanNMS/cfg/DmaOA.cfg and write
down the mnemonic of the NCS OA (OA name), and the DNA of the Device
Control Manager. You will need this information later.
Example:
Mnemonic of the destination OA (OA name) = CORENCS
DNA of the Device Control Manager = 2862015009
8 Using the Host Group Administration tool, look for an OA Member whose
Name field matches the mnemonic of the destination OA. If you are using a
UNIX editor, open file /opt/MagellanNMS/cfg/HGDS.cfg and look for an OA
Member whose Name field matches the mnemonic of the destination OA
from file /opt/MagellanNMS/cfg/DmaOA.cfg (CORENCS in the example).
If there isnt one, use the Host Group Administration tool to define an OA
Member that corresponds to the OA and restart the HGDS server using the
Server Administration tool. If you are using a UNIX editor, define an OA
Member in file /opt/MagellanNMS/cfg/HGDS that corresponds to the OA in
file /opt/MagellanNMS/cfg/DmaOA.cfg, then restart the HGDS server using
the Server Administration tool.
9 Start the Command Console by selecting System -> Utilities -> Command
Console.
The Connection Manager Dialog opens.
10 Select Connection Management from the Security menu.
The Command Console Connection Management dialog opens.
11 In the dialog, enter the destination user ID, and password needed to log into
the OA through which server alarms are to be distributed.
12 Click Connect.
The information you entered is authenticated. When authentication is
successful, the message Connected to <OA Destination mnemonic> is
displayed.
Example:
Connected to CORENCS
13 Click Close.
The Command Console Connection Management Dialog closes.
14 Enter the following command in the Command Console:
OA l
Information similar to the following is displayed:
OK TABLE SIZE = 150 UNDEFINED = 144
PE 1 HOST R70 TYPE = OA
NAME TYPE AP NUMBER / ROUTE
IWSIFC COORDINATOR 0
CONTROL DEVICE MGR 1 DEFAULT ROUTE
IWSIF MDI 2
15 Write down the host name, the PE number, the name of the Control Device
Manager, and the AP/Route number of the Device Manager (R70, PE1,
CONTROL, and 1 in the example).
16 Enter the following command to display the DNA of the Control Device
Manager
<host> NCS <PE_number> <Device Manager Number> Q DNA
Example:
R70 NCS 14 1 Q DNA
A response containing the DNA of the Device Control Manager appears on
the screen.
17 The DNA of the Device Control Manager should match the DNA field in file
/opt/MagellanNMS/cfg/DmaOA.cfg (2862015009 in the example).
If the DNAs do not match, modify the entry in file /opt/MagellanNMS/cfg/
DmaOA.cfg then restart the DMA server using the Server Administration
tool.
--End--
Variable definitions
Variable Value
host The name of the module on which the OA is running (for example,
R70).
PE_number The number of the PE on which the OA is running (1).
You can use it as a command line utility to schedule backups of the security
service using the UNIX crontab facility.
For more information about using this utility to perform security service backup
and restores, see
Backing up the security service (page 64)
Restoring security services on an Operator Client (page 65)
Restoring security services on a standalone security server (page 68)
Restoring security services on a replicated pair of security servers
(page 70)
Java Sun Access Manager system recovery (page 73)
Command syntax
The security service backup and restore utility has the following syntax:
/opt/nortel/applications/security/current_isclient/
swmgmt/bin/brr_security.sh
[-h][-backup <tar-file>|-restore [certs] <tar-file>|
-recover]
[-r] <directory>
[-log <log file>]
Options Definition
-h Provides the syntax of the command.
-backup Backs up all security configuration settings, data, and logs into the
specified tar file. The file name does not require a .tar extension and
can include an absolute path.
Security Services functions are not interrupted by the backup
operation.
-restore Restores all security configuration settings, data, and logs from the
specified tar file. The file name does not require a .tar extension and
can include an absolute path.
Certificates are backed up with the backup image. Use -restore
certs to restore only the certificates from a backup file.
-recover Attempts to recover the security service (server or client) from a
corrupted situation or from an host name change.
-r Optional
Use with the -restore option to specify that a response file named
isclient.isclient.rsp must be used if found.
If no directory is specified, the script looks for the file in the directory
/opt/nortel/applications/security/current_isclient/swmgmt/resources/.
The response file is needed with client restore only. Look at your
specific product restore instructions for details.
-log Redirects the logs to the specified log file. By default the log is stored
in /opt/nortel/logs/applications/management/swmgmt/brr.log.
Example
To back up the security service including all user, role, policy, IS configuration,
NDS configuration, security settings information/configurations that are stored
in LDAP and on the file system, enter the following command:
/opt/nortel/applications/security/current_isclient/
swmgmt/bin/brr_security.sh -backup <tar_file_name>
Exit codes
The exit codes produced by the security service backup and restore utility are:
Command syntax
The MDM files backup utility has the following syntax:
/opt/MagellanNMS/bin/backup_mdm_files
-mdm [-file <tar_file>]
-desktop [-file <tar_file>]
-user_admin [-file <tar file>]
[-log <log_filename>]
[-h]
Options Definition
-mdm [-file <tar_file>] Back up all of the Multiservice Data Manager configuration and data files
to the specified tar file <tar_file>. If you do not specify the -file <tar_file>,
the default file name is used. The default is
/opt/nortel/data/mdm/mdm_backup_<date_time_suffix>, where the
<date_time_suffix> is in this time format YYYYMMDDhhmmss. For
example:
/opt/nortel/data/mdm/mdm_backup_20061023165922.tar.
All the backup files are compressed during the backup. After the back up
is complete, a .Z suffix is added to the file name. For example, if you
specify this file name,
/opt/nortel/data/mdm/my_mdm_backup.tar,
the output file is named
/opt/nortel/data/mdm/my_mdm_backup.tar.Z.
-desktop [-file <tar_file>] Back up all of the desktop configuration and data files to the specified tar
file <tar_file>. If you do not specify the -file <tar_file>, the default file
name is used. The default is
/opt/nortel/data/desktop/desktop_backup_<date_time_suffix>,
where the <date_time_suffix> is in this time format,
YYYYMMDDhhmmss. For example:
/opt/nortel/data/desktop/desktop_backup_20061023165922.tar.
All the backup files are compressed during the backup. After the back up
is complete, a .Z is added to the file name. For example, if you specify
this file name,
/opt/nortel/data/desktop/my_desktop_backup.tar
the output file is named
/opt/nortel/data/desktop/my_desktop_backup.tar.Z.
-user_admin [-file <tar_file>] Back up all of the security configuration and data files to the specified tar
file <tar_file>.If you do not specify the -file <tar_file>, the default file
name is used. The default is
/opt/nortel/data/user_admin/user_admin_backup_<date_time_suffix>,
where the <date_time_suffix> is in this time format,
YYYYMMDDhhmmss. For example,
/opt/nortel/data/user_admin/user_admin_backup_20061023165922.tar.
All the backup files are compressed during the backup. After the back up
is complete, a .Z is added to the file name. For example, if you specify
this file name,
/opt/nortel/data/user_admin/my_user_admin_backup.tar
the output file is named
/opt/nortel/data/user_admin/my_user_admin_backup.tar.Z.
[-log <log_filename>] Use this option to redirect the logs to the specified log file. If you do not
specify the -log <log_filename>, the log file is not created.
[-h] Displays the command line usage.
Requirements
You must specify at least one of these parameters in the commnd. Otherwise
the backup_mdm_files.script exits with an error (exitcode > 0).
-mdm
-desktop
-user_admin
[-h]
Stop MDM before your run this script to back up files. See Stopping MDM
(page 59).
Example
To back up all the MDM, desktop, and security files and record the logs to this
location, /opt/mdm_backup_20061023.log, type this command:
/opt/MagellanNMS/bin/backup_mdm_files -mdm -file
/opt/nortel/data/mdm/my_mdm_backup.tar -desktop
-user_admin -log /opt/mdm_backup_20061023.log
The MDM files are backed up to the compressed file /opt/nortel/data/mdm/
my_mdm_backup.tar.Z. The desktop and security files are backed up with the
default tar name.
Exit codes
The exit codes produced by the backup utility are:
Command syntax
The Multiservice Data Manager restore utility has the following syntax
/opt/MagellanNMS/bin/restore_mdm_files
-mdm [-file <tar_file>}
-desktop [-file <tar_file>]
[-log <log_filename>]
-user_admin [-file <tar file>]
[-h]
Options Definition
-mdm [-file <tar_file>] Restore the MDM configuration and data files from the specified tar file
<tar_file>. For example:
/opt/nortel/data/mdm/mdm_backup_20061023165922.tar.
Or, if the file is compressed:
/opt/nortel/data/mdm/mdm_backup_20061023165922.tar.Z
If -file <tar_file> is not specified, the last MDM backup file is used.
-desktop [-file <tar_file>] Restore the desktop configuration and data files from the specified tar
file <tar_file>. For example:
/opt/nortel/data/desktop/desktop_backup_20061023165922.tar.
Or, it the file is compressed:
/opt/nortel/data/desktop/desktop_backup_20061023165922.tar.Z
If -file <tar_file> is not specified, the last desktop backup file is used.
-user_admin [-file <tar_file>] Restore the security configuration and data files from the specified tar file
<tar_file>. For example,
/opt/nortel/data/user_admin/user_admin_backup_20061023165922.tar.
Or if the tar file is compressed:
/opt/nortel/data/user_admin/
user_admin_backup_20061023165922.tar.Z
If -file <tar_file> is not specified, the last security backup file is used.
[-log <log_filename>] Use this option to redirect the logs to the specified log file. If you do not
specify the -log <log_filename>, the log file is not created.
[-h] Displays the command line usage.
Requirements
You must specify at least one of these parameters in the commnd. Otherwise
the restore_mdm_files.script exits with an error (exitcode > 0).
-mdm
-desktop
-user_admin
[-h]
Stop MDM before your run this script to restore files. See Stopping MDM
(page 59).
Example
To restore all the MDM, desktop, and security files from back up files but
without creating log records, type this command:
/opt/MagellanNMS/bin/restore_mdm_files
-mdm -file /opt/nortel/data/mdm/my_mdm_backup.tar.Z
-desktop -file /opt/nortel/data/desktop/
uncompressed_desktop_backup.tar -user_admin
The MDM files are restored from the compressed tar file
/opt/nortel/data/mdm/my_mdm_backup.tar.Z.
The desktop files are restored from the uncompressed tar file
/opt/nortel/data/desktop/uncompressed_desktop_backup.tar.
The security files are restored from the last security backup file (created by
/opt/MagellanNMS/bin/backup_mdm_files or /opt/MagellanNMS/bin/
backup_mft_files.sh).
Exit codes
The exit codes produced by the restore utility are:
Command syntax
The default output is standard output, but you can redirect the output to a file
using the following command:
/opt/MagellanNMS/bin/exportautoacklist [<GMDR
hostname>] [<GMDR name>]
Options Definition
<GMDR hostname> is optional, but must be the first option when present. Its default
value is localhost. It can be any MDM workstation hostname where
a GMDR server is running.
<GMDR name> is optional, but must be the second option when present. Its default
value is GMDR. It is the full name of a GMDR server.
Example: Exporting the Auto-ack node list from the GMDR_L3 server
To export the Auto-acked node list from the GMDR_L3 server on the
wcary123 remote host, and save the output to the /tmp/aanode.list file, enter
the following command:
/opt/MagellanNMS/bin/exportautoacklist wcary123 GMDR_L3
> /temp/aanode.list
Example: Exporting the Auto-ack node list from the GMDR server
To export the Auto-ack node list from the GMDR server on the localhost into
standard output, enter the following command:
/opt/MagellanNMS/bin/exportautoacklist
You need to logon to the destination MDM workstation named deshost in both
of the following examples:
Attention: Some empty lines are acceptable and can be ignored properly
by the GMDR server.
The administrator can now make any changes by editing this file.
Then, copy over the temporary Auto-acked node list file as the Auto-ack
configuration file. In this example, the destination GMDR is GMDR_des, and
its Auto-ack configuration file is as follows:
/opt/MagellanNMS/cfg/GMDRAutoAck_des.cfg
To back up the existing configuration file and copy over the new file, enter the
following command:
cd /opt/MagellanNMS/cfg
/bin/mv GMDRAutoAck_des.cfg GMDRAutoAck_des.cfg.bak
/bin/cp /tmp/aanodelist.tmp GMDRAutoAck_des.cfg
To reload the auto-ack configuration file, run the following script:
/opt/MagellanNMS/bin/loadautoacklist adminips GMDR_des
Example with more automation
To perform an example with more automation, enter the following commands
on MDM workstation deshost:
/bin/mv /opt/MagellanNMS/cfg/GMDRAutoAck_des.cfg /opt/
MagellanNMS/cfg/GMDRAutoAck_des.cfg.bak
Navigation
Configuring servers for DPN (page 316)
Configuring DPN alarm clearing (page 342)
Configuring server alarm distribution and workstation status probing for
DPN network elements (page 349)
Configuring the Disruptive Command Safeguard (page 357)
Configuring automatic DBNL disabling (page 361)
Navigation
Servers required to support network access, surveillance access, and
provisioning access (page 317)
Planning OA groups (page 317)
Grouping OAs for network access (page 318)
Guidelines for grouping OAs for surveillance access (page 321)
Adding DMDR server redundancy for surveillance access (page 324)
Distributing servers among workstations on a LAN (page 326)
Task list for configuring servers (page 326)
Configuring the NCS hierarchy for surveillance (page 327)
Configuring the NCS hierarchy for surveillance (page 327)
Configuring and starting the servers (page 335)
Setting up special processing of alarms (page 338)
Planning OA groups
This section explains the reasons for setting up (OA) groups and provides
guidelines to plan OA groups.
GMDR IMDR
DMDR DMA
HGDS
NSCMGR PFAS
CCIF
DPN network
OA
Data
Control
Servers that you must configure manually
Servers that are configured automatically
network access servers
There is no advantage in creating more than one group of OAs for network
access because the Command Console only displays the names of individual
OAs you can log in to. Define only one OA group for network access, called
for example ALLOAS, that has all OAs in the network as its members.
Client application
(GMDR server) DMDR server OA
Setup begins
DMDR server
is started 1
NCS Capability ID
and password from
DMDR servers Authentication
startup command
2
GMDR server CNMID of 0
is started
GMDR admin
tool is used to
associate
DMDR server 3
with GMDR 4
server Registration
request NCS Capability ID
(NCS Capability ID, and password
password) Authentication
5
CNMID of 0 for
all devices or
other CNMID
for a VPN
Alarm or status
record is
generated
Filtered alarm
or status record
The guidelines for NCS capability IDs and passwords are as follows:
At least one common NCS capability ID and password must be defined on
all OAs in a surveillance group. This common NCS capability ID and
password must authenticate in the same way on all OAs. On all OAs it
must be defined with the same scope and impact, and return the same
CNMID.
For security reasons, the minimum impact let the DMDR server obtain
alarms and status records is passive.
For the DMDR server to receive alarms and status records from all
components monitored by the OAs in its surveillance group, the CNMID
returned in response to the common NCS capability ID and password in a
DMDR servers startup command must be CNMID 0.
For a client application to receive alarms and status records from all
components monitored by the OAs in a surveillance group, the CNMID
returned in response to the client applications NCS capability ID and
password must also be CNMID 0.
For a client application which monitors components in a virtual private
network to only obtains alarms and status records from the components
that belong to the customers VPN, the CNMID returned in response to the
client applications NCS capability ID must be a CNMID other than 0. The
CNMID must also be unique to the customers VPN.
When the DMDR server and the client application (GMDR) need to
receive the information from the components monitored by all OAs in a
surveillance group, you can use the same NCS capability ID and password
for the DMDR servers startup command and for the surveillance access
by the client application (GMDR). The CNMID returned by the NCS
capability ID and password must be CNMID 0.
When the client application obtains surveillance information for a VPN,
and only needs to receive this information from the components in that
VPN, the NCS capability ID and password provided by the client
application cannot be the same as the NCS capability ID and password in
the DMDR servers startup command. The NCS capability ID and
password provided by the client application must be different, and must
authenticate in the same way on all OAs on which it is defined The CMNID
it returns must also be a CNMID other than 0.
Simple examples of OA groups that are closed and open under backup
DMDR DMDR
1 2
main path
path under backup
device
The GMDR server receives alarms from the DMDR servers on both
workstations, and displays the alarms once. The GMDR server discards
duplicate alarm notifications. If one of the DMDR servers fail, the GMDR
The GMDR server on workstation A discards duplicate data from the DMDR
servers. If server DMDR_G1 fail on workstation A, the GMDR server on
workstation A still gets the same surveillance data from the redundant DMDR
server through its LAN connection to workstation B. Similar but opposite
redundancy applies to the GMDR server on workstation B.
LAN
Workstation A Workstation B
GMDR GMDR
DMDR_G1 DMDR_G1
OA group G1 Duplicate
OA OA OA OA group G1
The following guidelines apply to deploying the servers for DPN network
access, surveillance, and provisioning access over multiple workstations:
The following servers must run on a workstation that provides network
access (a workstation that has an X25 link to the network): HGDS,
NCSMGR, and PFAS.
The DMDR server must run on the workstation that provides network
access by default. You can run it on another workstation, provided that you
specify the hostname of the workstation that runs the network access
server, as part of the DMDR servers startup command. However doing so
is not recommended because of the increase in network traffic (X.25 and
IP) traffic that is entailed by this arrangement.
The GMDR server can run on any workstation on the LAN, provided the
workstation can handle traffic to the server. To ensure that the GMDR
server receives surveillance information, you must use the GMDR
Administration tool to specify the DMDR server (or servers) from which the
GMDR server is to obtain the surveillance information.
The DMA server can perform server surveillance, workstation
surveillance, or global alarm clearing. For information on the DMA server,
see Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310).
If the DMA server performs workstation surveillance or global alarm
clearing, it must reside on a workstation that provides network access.
Before you begin this procedure, you must have installed and configured
SunLink X.25 software on the workstation.
1 Plan the OA groups for DPN network access and DPN surveillance. See
Planning OA groups (page 317).
2 Configure the NCS hierarchy to support DPN surveillance. See
Configuring the NCS hierarchy for surveillance (page 327).
3 Create the OA groups. See Defining the OA groups and OA members
(page 328).
4 Configure and start the NCSMGR, HGDS, DMDR, GMDR, DMA, and
PFAS servers. See Configuring and starting the servers (page 335).
You are now ready to create OA groups. See Defining the OA groups and OA
members (page 328).
Attention: The Host Group Administration tool does not allow simultaneous
administration sessions.
1 From the MDM main window, select System -> Administration -> Host
Group Administration.
The Host Group Administration window opens.
If the file /opt/MagellanNMS/cfg/HGDS.cfg exists, the contents are
displayed.
Adding a DPN OA
Steps
1 Select the DPN tab.
2 Click Add below the panel DPN OA Table
(or select Options -> DPN OA Table Options -> Add DPN OA).
The Add New DPN OA dialog opens.
3 Type the OA member name in the data entry box OAMember.
4 Type the Workstation Management Data Interface (WS_MDI) in the data
entry box NAME.
5 Type the Data Network Address (DNA) used to access the WS_MDI in the
data entry box DNA.
6 Type the Closed User Group (CUG) to which the WS-MDI belongs in the
data entry box CUG.
7 Type the default size of data packets transmitted between the Multiservice
Data Manager host and the WS-MDI.in the data entry box PktSz.
The packet size is one of: 128, 256, or 512. The default is 256.
8 X.75 links are used to interconnect two packet network, either public or
private.
If the connection between the host and the OA passes through an X.75
link type Y in the data entry box X75.
If the connection between the host and the OA does not pass through an
X.75 link type N in the data entry box X75.
9 Type the Recognized Private Operating Agency (RPOA) that owns the
X.75 link to the WS-MDI in the data entry box RPOA.
This data entry box can only be updated if an X75 link was specified in
step 8.
10 Click OK.
The Add New DPN OA dialog closes.
The new DPN OA is added to the DPN OA Table.
Removing a DPN OA
Steps
1 Select the DPN tab.
2 Select the DPN OA in the DPN OA Table.
3 Click Delete below the panel DPN OA Table
(or select Options -> DPN OA Table Options -> Delete DPN OA).
The Delete DPN OA dialog opens.
4 Click OK.
The Delete DPN OA dialog closes.
Attention: The DPN OA is removed from the DPN OA Table and from all of
the DPN OA groups of which it is a member.
OA member name
Workstation Management Data Interface (WS_MDI)
Data Network Address (DNA)
Closed User Group (CUG)
the default size of data packets
the X75 setting
the Recognized Private Operating Agency (RPOA)
DPN OA groups that include this DPN OA as a member
3 Type the DPN OA group name in the data entry box DPN OA Group
Name.
4 Click OK.
The Add New DPN OA Group dialog closes.
The new DPN OA group is added to the DPN OA Groups panel.
Attention: Removing a DPN OA from a group does not remove the DPN OA
from other groups and does not remove the DPN OA from the DPN OA Table.
Attention: Removing a group does not remove the group members from
other groups and does not remove the group members from the DPN OA
Table.
5 Click OK.
The Save Host Group File dialog closes.
The current version of the file /opt/MagellanNMS/cfg/HGDS.cfg is saved
with a time-stamped suffix.
The contents of the Host Group Administration window are written to the
file /opt/MagellanNMS/cfg/HGDS.cfg on the local Multiservice Data
Manager host and the file is saved.
The HGDS.cfg data is loaded with the HGDS the next time the HGDS is
started.
Attention: The Host Group Administration tool will not allow the file
HGDS.cfg to be updated if mandatory data is missing or is incorrect.
For initial installations, use this procedure, or you can use Nortel Multiservice
Data Manager Software Configuration tool, as described in Nortel
Multiservice Data Manager Installation and CommissioningSoftware
(NN10470-100).
Steps
1 If you have several workstations running Multiservice Data Manager that
are connected to the same LAN, read the following sections before you
begin:Adding DMDR server redundancy for surveillance access
(page 324) and Distributing servers among workstations on a LAN
(page 326).
2 Log in as root.
The DMDR server provides a method to use the information stored in an alarm
exceptions file to perform special processing on incoming alarms. By default,
the DMDR server uses the information stored in alarm exceptions file
/opt/MagellanNMS/cfg/DMDRAlarmExcep.cfg. For the DMDR server to use
an alarm exceptions file other than the default, start the DMDR server with the
argument -e <exceptions file name>, where <exceptions file name> is the
absolute path name for the alarm exceptions file.
For information about the structure of the entries in the alarm exceptions file,
see the section on configuring the file /opt/MagellanNMS/cfg/
DMDRAlarmExcep.cfg in Nortel Multiservice Data Manager Administration
Server Management (NN10470-310).
Steps
1 Log in as root.
2 Using a UNIX editor such as vi, edit the contents of the alarm exceptions
file so that it performs the special alarm treatment you require.To configure
the file /opt/MagellanNMS/cfg/DMDRAlarmExcep.cfg, see Nortel
Multiservice Data Manager AdministrationServer Management
(NN10470-310).
3 Using the Server Administration tool, stop the DMDR server.
To stop a server using the Server Administration tool, see access view
mode in Nortel Multiservice Data Manager Administration
Fundamentals (NN10470-305).
4 To use an alarm exceptions file other than the default, edit the startup
command for the DMDR server with the Server Administration tool so that
the startup command includes the absolute path name of your alarm
exceptions file. To use the default alarm exceptions file
(/opt/MagellanNMS/cfg/AlarmExcepts.cfg), skip this step.
To edit a server with the Server Administration tool, see Editing a server in
Nortel Multiservice Data Manager AdministrationTools (NN10470-300).
5 Using the Server Administration tool, restart the DMDR server.
Once DMDR has the CNMID, it begins filtering surveillance information based
on that CNMID. There are two types of surveillance information: status
records and alarms. Alarms received from the OAs in the group include a
CNMID as part of the alarm message, but status records do not.
If an alarm arrives from a component before a status record arrives from that
same component, the DMDR server extracts the CNMID and the component
identifier from the alarm message and stores them. When a subsequent
status record arrives from the same component, the DMDR server uses the
component identifier contained in the status record to look up the
corresponding CNMID and uses that CNMID to filter the status record and
provide it to the correct client application.
If a status record arrives from a component before an alarm arrives from that
same component, the DMDR server cannot determine what CNMID to use for
filtering because the status record does not contain a CNMID. By default,
DMDR server assumes that the CNMID is 0 and passes the status record on
to client applications. For client applications that surveil all components in the
network (their NCS capability ID and password returns a CNMID of 0) this
produces a slight delay. However, for client applications whose CNMID is not
0, which is the case for components in a VPN, this presents a difficulty. In a
network that contains two or more VPNs all client applications receive the
status record, whether or not the component belongs to the VPN.
To overcome any delays and the possibility of a status record being distributed
to all client applications, in all VPNs, the DMDR server uses information
contained in a CNMID file. You can preload this file with information that maps
CNMIDs to their corresponding component identifiers.
For information about the structure of the entries in the CNMID file, see Nortel
Multiservice Data Manager AdministrationServer Management
(NN10470-310). Refer to the section to configure the file
/opt/MagellanNMS/cfg/DMDRCnmid.cfg.
2 Using a UNIX editor such as vi, edit the contents of the CNMID file to allow
it to map components to CNMIDs.
For a description of the structure of the alarm exceptions file, and the fields
in the file, see Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310). Refer to the section to configure the file
/opt/MagellanNMS/cfg/DMDRCnmid.cfg.
3 Using the Server Administration tool, stop the DMDR server.
To stop a server using the Server Administration tool, see accessing view
mode in Nortel Multiservice Data Manager AdministrationTools
(NN10470-300).
For a first time installation you can use the information in this section to set up
alarm clearing, or you can use Nortel Multiservice Data Manager Software
Configuration tool, as described in Nortel Multiservice Data Manager
Installation and CommissioningSoftware (NN10470-100).
Navigation
About alarm clearing (page 342)
How a Multiservice Data Manager operator uses alarm clearing
(page 343)
Setting up local alarm clearing (page 344)
Setting up global alarm clearing for DPN (page 345)
Local alarm clearing lets an operator clear alarms locally from the GMDR
database on a Nortel Multiservice Data Manager workstation.
Global alarm clearing lets an operator clear SET alarms from the workstation
and from the active alarm lists (AALs) on all Operations Agents throughout
Network Control System (NCS) of the DPN network. The main reason for
removing SET alarms from the AALs is to clean up the lists so that only alarms
of interest to the network operator remain. This makes monitoring easier.
For information about the Alarm Display and the Component Information
Viewer, see Nortel Multiservice Data Manager Fault ManagementTools
(NN10470-011):
For information about the Command Console, see Nortel Multiservice Data
Manager Routine MaintenanceUtilities (NN10470-804)
Lists of active alarms are collected and maintained in the following places:
locally on the workstation in a database associated with the DPN
Management Data Router (DMDR) server and in the GMDR database
in the AALs stored in the Processing Elements (PEs) in the NCS
Alarms stored in the DMDR and GMDR databases can be cleared with local
alarm clearing [local to the workstation] or with global alarm clearing.
However, alarms stored in the AALs in the NCS can only be cleared by means
of global alarm clearing.
Both local and global alarm clearing call the manclr process and pass it the
component ID, fault code, the alarm ID, the local/global clear flag, and the
display name associated with alarm to clear.
Clearing alarms using Global Clear of Alarm from the Start Tool ->Fault menu
allows only one alarm to be cleared at a time. Using this method, the user
needs an up-front authentication with a node group before globally clearing an
alarm.
OA/Device None
Application/Line None
Device None
Line None
The Host Group Directory Server (HGDS) and the NCS Communications
Manager (NCSMGR) server are running on the workstation.
where:
D
is the OA Destination mnemonic. The OA Destination mnemonic
corresponds to the OA Member field for the top level OA in the managed
region as defined in file /opt/MagellanNMS/cfg/HGDS.cfg. In file
HGDS.cfg, the OA Member field contains the name of the Management
Data Interface (MDI) on the OA. Nortel Multiservice Data Manager
workstation connects to this OA to send global alarm clearing request
messages to NCS. This mnemonic must match the OA Member for the top
level OA entered in file /opt/MagellanNMS/cfg/HGDS.cfg.
Maximum 12 characters.
See the section on OA definitions in Nortel Multiservice Data Manager
AdministrationServer Management (NN10470-310).
I
is the NCS capability id (NCS login ID). The id must have the following
minimum capability, level, and impact:
NAMS Network Service
OA/Device None
Application/Line None
Switching Network None
Device None
Line None
Maximum 12 characters.
P
is a password that has the NCS capability ID. Maximum 12 characters.
The following is an example of a file entry. For this example, there should
also be an OA Member called CORENCSIF in file /opt/MagellanNMS/cfg/
HGDS.cfg.
:CORENCSIF:CORENCS:axylt:
3 Start the Server Administration tool from the application main window by
selecting System -> Administration -> Server Administration.
Attention: Your user account must be set up run the NMSAdmin toolset at
login to be able to see the Server Administration tool in the menus.
4 Using the Server Administration tool, stop the DMA server, if it is running.
See the Server Administration tool in Nortel Multiservice Data Manager
AdministrationTools (NN10470-300).
You are now ready to initiate global alarm clearing requests from the
Component Information Viewer or the Alarm Display.
For a first time installation, you can use the information in this section to set
up server alarm distribution and workstation status probing, or you can use the
Nortel Multiservice Data Manager Software Configuration tool, as described
in Nortel Multiservice Data Manager Installation and Commissioning
Software (NN10470-100).
Navigation
About server alarm distribution and workstation status probing (page 349)
Setting up server alarm distribution through NCS and workstation
surveillance using NCS status probing (page 350)
Troubleshooting server alarm distribution through NCS and workstation
surveillance using NCS status probing (page 353)
You can configure the workstation to distribute them to a GMDR server that
runs on the workstation, or that runs on another workstation. By setting up a
hierarchy of GMDR servers on the workstations in your network, it is possible
to forward the workstations alarms and status changes to some, or to all of
the Multiservice Data Manager workstations in your network. For a detailed
description of how server alarms and status changes are propagated through
GMDR, see Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310). Also, see the procedure Setting up server
alarm distribution through GMDR in Nortel Multiservice Data Manager
Administration (NN10470-303).
You can also configure the workstation to distribute server alarms and status
changes to the NCS that runs on the DPN nodes in your network by
forwarding them to an OA in the NCS over an X.25 link. The X.25 link connects
to a Control Device Manager on the OA. The NCS propagates these alarms
and status changes throughout the OAs on all DPN modules in the network.
Any workstation that is configured to obtain surveillance information from the
NCS receives these alarms and status changes and can display them. For a
detailed description of how server alarms and status changes are propagated
through NCS, see Nortel Multiservice Data Manager AdministrationServer
Management (NN10470-310). This method of alarm distribution only applies
to networks that contain DPN.
starting the DMA server with arguments in its startup command to perform
server alarm distribution and optionally, to have the NCS probe the
workstation
Attention: This is not the same as the DNA of the MDI access DNA.
C
is the CUG index of the Control Device Manager. Maximum 2 digits.
P
is the packet size on the VC. (Use 128, 256, or 512). Maximum 3 digits.
X
specifies whether the call is to be routed over X.75. Can be Y or N.
If N, then R and RPOA are ignored.
R
specifies whether the calls are to be routed over the X.75 facilities of a
Remote Private Operating Agency (RPOA). Can be Y or N.
If N, the RPOA is ignored.
RPOA
is a code that identifies the RPOA. 4 (BCD) digits.
Example:
:CORENCSIF:CORENCS:3021015008:01:512:N:
3 Start the Server Administration tool by selecting System ->
Administration -> Server Administration.
Attention: Your user account must be set up run the NMSAdmin toolset at
login to be able to see the Server Administration tool in the menus.
4 Using the Server Administration tool, stop the DMA server if it is already
running.
See Nortel Multiservice Data Manager AdministrationTools
(NN10470-300).
5 Edit the server information so that the DMA server starts up automatically
with the following command whenever the workstation is rebooted.
/opt/MagellanNMS/bin/dma \
-d [<filename] \
[-p <probing interval>]
where:
-d [<filename]
is the name of a file that contains the parameters needed to establish a
connection to an OA. The connection is to be used for server alarm
distribution through NCS and workstation surveillance using NCS status
probing. If you specify the -d option without a file name, the default file /
opt/MagellanNMS/cfg/DmaOA.cfg is used.
[-p <probing interval>]
specifies that status probing is to be performed for workstation
surveillance. The <probing interval> is the interval in minutes at which
NCS probes the workstation and it must be an integer with a minimum
value of 1. If you do not specify the <probing interval>, the default NCS
status probe interval of five minutes is used.
6 Restart the DMA server.
See Nortel Multiservice Data Manager AdministrationTools
(NN10470-300).
Server alarm distribution through NCS with or without workstation NCS status
probing is now configured.
Before beginning this procedure you will need an NCS Capability ID (logon ID)
and password that allows you to log into the OA through which workstation
server alarms are to be distributed.
Attention: Your user account must be set up run the NMSAdmin toolset at
login to be able to see the Server Administration tool in the menus.
2 Look for the DMA server in the servers list and double-click on it to view
the server information.
The server must be Running, must be set to start at reboot, and the startup
command must include the -d option. If workstation surveillance through
NCS status probing is desired, the startup command must also include the
-p option.
If the server information is correct and the server is running, go to step 7.
If the server information is correct but the server is not running, click on the
DMA server in the server list, and select Start from the pop-up menu. Then
go to step 7.
If the server is not defined or the server information is incorrect, go to
step 3.
3 Using the Server Administration tool, stop the DMA server, if it is already
running.
See accessing view mode in Nortel Multiservice Data Manager
AdministrationTools (NN10470-300).
4 Log in to the Server Administration tool as the administrator by selecting
Enable Editing from the Security menu.
See editing a server in Nortel Multiservice Data Manager Administration
Tools (NN10470-300).
5 Edit the server information to ensure that the server starts automatically
when the workstation reboots and that the startup command contains the
-d option.
If you need to have workstation surveillance through NCS status probing,
ensure that the startup command also contains the -p option. The
command syntax is as follows:
/opt/MagellanNMS/bin/dma -d [<filename>] \
[-p [<probing interval]]
6 Start the DMA server.
15 Write down the host name, the PE number, the name of the Control Device
Manager, and the AP/Route number of the Device Manager (R70, PE1,
CONTROL, and 1 in the example).
16 Enter the following command to display the DNA of the Control Device
Manager
<host> NCS <PE_number> <Device Manager Number> Q DNA
where:
host is the name of the module on which the OA is running (R70 in this
example).
PE_number is the number of the PE on which the OA is running (1)
Example:
R70 NCS 14 1 Q DNA
A response containing the DNA of the Device Control Manager appears
on the screen.
17 The DNA of the DNA of the Device Control Manager should match the
DNA field in file /opt/MagellanNMS/cfg/DmaOA.cfg (2862015009 in the
example).
If the DNAs do not match, modify the entry in file /opt/MagellanNMS/cfg/
DmaOA.cfg then restart the DMA server using the Server Administration
tool.
For initial installation, you can use the information in this section to configure
the Disruptive Command Safeguard, or you can use the Nortel Multiservice
Data Manager Software Configuration tool, as described in Nortel
Multiservice Data Manager Installation and CommissioningSoftware
(NN10470-100).
Navigation
About the Disruptive Command Safeguard feature (page 357)
The /opt/MagellanNMS/cfg/DCS.cfg configuration file (page 358)
Checking, enabling, and disabling the Disruptive Command Safeguard
(page 359)
File format
The opt/MagellanNMS/cfg/DCS/.cfg configuration file consists of a series of
lines, each having the following syntax:
<KEYWORD> <min_length> <NCS_CAPABILITY> [<MESSAGE>]
where:
Example
Assume the /opt/MagellanNMS/cfg/DCS.cfg file contains the following line:
FORMAT 6 SWITCHING DEVICE PRIVILEGED Disk formatting
will cause instability
and the Nortel Multiservice Data Manager operator issues the following
command:
R72 2 DISK 0 FORMAT 2 1 R70 2 SEC 512 DIR 1000
If the operator has capability SWITCHING DEVICE PRIVILEGED, the
Disruptive Command Safeguard facility instructs the NCS access tool to issue
the prompt Disk formatting will cause instability, followed by confirm or cancel
instructions.
#
# Disruptive Command configuration file.
# Syntax:
# Command minimum-length NCS capability (TYPE LEVEL IMPACT) message
#
ACTIVATE 3 SWITCHING LINE CONFIGURATION
COMMIT 3 SWITCHING DEVICE CONFIGURATION
CONFIRM 4 SWITCHING DEVICE CONFIGURATION
DEREGISTER 3 NONE NONE NONE
DISABLE 7 SWITCHING DEVICE SERVICE
ERASE 5 SWITCHING DEVICE PRIVILEGED
FILTER 1 NAMS NETWORK CONFIGURATION
FORMAT 6 SWITCHING DEVICE PRIVILEGED
LOAD 4 SWITCHING DEVICE PRIVILEGED
REFUSE 6 SWITCHING LINE SERVICE
REGISTER 3 NONE NONE NONE
RELOAD 6 SWITCHING DEVICE PRIVILEGED
RESET 5 SWITCHING DEVICE CONFIGURATION
RESTART 7 SWITCHING DEVICE PRIVILEGED
STOP 4 SWITCHING LINE SERVICE
1 Log in as root.
2 From the application main window, select System -> Security -> Disruptive
Command Safeguard, and one of the following items from the cascading
menu:
Select Enable Safeguard to have Multiservice Data Manager intercept
disruptive commands as defined in the
/opt/MagellanNMS/cfg/DCS.cfg file.
Select Disable Safeguard so that Multiservice Data Manager does not
intercept disruptive commands as defined in the
/opt/MagellanNMS/cfg/DCS.cfg file.
Select Check Safeguard Status to check if the Disruptive Command
Safeguard is enabled or disabled.
Navigation
About the automatic DBNL disabling feature (page 361)
Setting up the automatic DBNL disabling feature (page 369)
Obtaining a list of the DBNLs that are currently being watched (page 370)
Cleaning up accumulated log files (page 371)
A Dial Backup Network Link is a backup link that the Network Control System
(NCS) activates automatically to establish a direct connection from an Access
Module (AM) to a Resource Module (RM) when one of the following happens:
the primary network link goes down and isolates the AM (or a cluster of
AMs) from the RM
the primary network link runs out of bandwidth to handle current traffic
conditions
RM RM
RM
AM
AM
AM
The automatic DBNL disabling feature monitors alarms from the DPN nodes
in the network. When it detects the presence of a DBNL activation alarm or a
DBNL heartbeat alarm indicating that a DBNL has been activated, it sets up
a watch on the DBNL and monitors that status of the primary link. Depending
on the Operator Data information contained in the alarms, the automatic
DBNL disabling feature has the following capabilities:
For DBNL alarms containing operator data which indicates that a DBNL
has been activated due to isolation of an AM (or a cluster of AMs), the
feature can be used to deactivate the DBNL when the primary link returns
to service and remains stable for a specified period, an optionally, to watch
the DBNL only.
For DBNL alarms containing operator data which indicates that a DBNL
has been activated due to any other cause, the feature can be used to
watch the DBNL only.
dbnlapi
DBNLWatch
Auto-disabling Daemon
1
2
GMDR
3 4 5 6
Committed
Network
Model
Session Servers
CMC/CMCfun
Network
Steps
1 When DBNLWatch is started, it does the following:
It connects to the GMDR server specified by the -host and -serv
parameters in its startup command to obtain alarms from the DPN
network.
It starts and maintains a connection to the OAs in the network specified by
parameters PrimaryOAAuth and BackupOAAuth in configuration file
/opt/MagellanNMS/cfg/DBNLWatch.cfg.
Operator codes, their meanings, and the ability to monitor and disable
Monitor
Operator and Monitor
Data Code Description disable only
00 DBNL activated manually N Y
01 DBNL activated due to the loss of a Resource Module (RM) N Y
02 DBNL activated due to an increase in RM distance N Y
04 DBNL activated due to fault isolation of a cluster of Access Y Y
Modules (AMs)
05 DBNL activated due to fault isolation of a single AM Y Y
08 DBNL activated to provide bandwidth on demand N Y
<n> is a number between 0 and 6 that indicates the day of the week at which
the log file was created. 0 is Sunday and 6 is the Saturday immediately after it.
At the beginning of each new day, the log file for the same day of the previous
week is overwritten with information about DBNLs that are currently being
watched, starting at the top of the file.
Nevertheless, the log files can grow and consume excessive amounts of disk
space, especially if the connection to the main and backup OAs is unstable.
Such files can be deleted manually by entering commands to remove the files,
or automatically by setting up a cron job to run these commands on a
scheduled basis. For the procedures to clear log files manually or with a cron
job, see Cleaning up accumulated log files (page 371).
CORENCS
CAPABILITY MATRIX CURRENT
NAMS NETWORK PRIVILEGED
OA/DEVICE PRIVILEGED
APP/LINE PRIVILEGED
SWITCHING NETWORK PRIVILEGED
DEVICE PRIVILEGED
LINE PRIVILEGED
DBNLWatch detects the arrival of a DBNL activation alarm or a DBNL
heartbeat alarm, and sets up a watch on the DBNL, for monitoring purposes
only. When the following log is produced, parameter MonitorOnly is set to Y in
the configuration file, or the DBNL is activated due to a cause other than AM
or AM cluster isolation.
Wed Jul 3 20:54:12 1996
Starting Monitoring Only Watch for:
Link: DBNL:PM AC2256 PE 1 PI 1 PO 3:PM R32 PE 7 PI 7 PO 3:
Time: 1996 07 03 20 54 12
SEQ: 1489 NTP: 10164022 OP: 2001
Watch phase: DBNL being monitored only.
DBNL has been activated due to RM loss (no auto-
disabling)
DBNLWatch detects a DBNL activation alarm or a DBNL heartbeat alarm, and
sets up a watch on the DBNL for monitoring and DBNL deactivation purposes.
When this log is produced, parameter MonitorOnly is set to N in the
configuration file and the DBNL is activated due to AM or AM cluster isolation.
Wed Jul 3 21:43:20 1996
Starting Watch for:
Link: DBNL:PM A6002 PE 13 PI 13 PO 6:PM R60 PE 6 PI 6
PO 6:
Time: 1996 07 03 21 47 05
SEQ: 14770 NTP: 10164021 OP: FF04
Watch phase: Initializing Watch.
activated due to isolation.
DBNLWatch runs dbnlfindam to determine the AM end of the DBNL:
Wed Jul 3 21:43:20 1996
Identifying the AM side (0) for:
Link:DBNL:PM A6002 PE 13 PI 13 PO 6:PM R60 PE 6 PI 6 PO
6:
Time: 1996 07 03 21 47 05
SEQ: 14770 NTP: 10164021 OP: FF04
Watch phase: Identifying AM side.
DBNLWatch runs dbnlcheck to verify whether the primary link is up:
Wed Jul 3 21:43:26 1996
Checking connectivity (0/0) for:
Link: DBNL:PM A6002 PE 13 PI 13 PO 6:PM R60 PE 6 PI 6
PO 6:
Time: 1996 07 03 21 47 05
SEQ: 14770 NTP: 10164021 OP: FF04
Watch phase: Waiting for main link to come back.
After running dbnlcheck the number of times specified by CheckTries in the
configuration file, and determining that the primary link is still up, DBNLWatch
produces a log similar to the following:
Wed Jul 3 21:47:08 1996
Disabling:
Link: DBNL:PM A6002 PE 13 PI 13 PO 6:PM R60 PE 6 PI 6
PO 6:
Time: 1996 07 03 21 47 05
SEQ: 14770 NTP: 10164021 OP: FF04
Watch phase: Waiting for main link to come back.
as the main link has been up for at least 150 seconds.
DBNLWatch runs dbnldisable to attempt to disable the DBNL:
Wed Jul 3 21:47:08 1996
Trying (0) to disable:
Link: DBNL:PM A6002 PE 13 PI 13 PO 6:PM R60 PE 6 PI 6 PO
6:
Time: 1996 07 03 21 47 05
SEQ: 14770 NTP: 10164021 OP: FF04
Watch phase: Trying to disable the DBNL.
DBNLWatch runs dbnlenable to re-enable the DBNL port:
Wed Jul 3 21:47:17 1996
Trying (0) to enable:
Link: DBNL:PM A6002 PE 13 PI 13 PO 6:PM R60 PE 6 PI 6
PO 6:
Time: 1996 07 03 21 47 05
SEQ: 14770 NTP: 10164021 OP: FF04
Watch phase: Trying to re-enable the DBNL port.
DBNLWatch successfully re-enables the DBNL port and drops the watch:
Wed Jul 3 21:47:20 1996
Watch for:
Link: DBNL:PM A6002 PE 13 PI 13 PO 6:PM R60 PE 6 PI 6
PO 6:
Time: 1996 07 03 21 47 05
SEQ: 14770 NTP: 10164021 OP: FF04
<n>
is a number from 0 to 6 which represents the day of the week on which the
log file is generated. 0 is Sunday and 6 is the following Saturday.
4 Exit from the file and save it.
Example
The following command runs every Friday at midnight to clean up a file
created back on Tuesday of the same week:
01 00 * * 5 /bin/cp /dev/null
/opt/MagellanNMS/data/DBNLWatchLog.2
Prerequisites
Nortel Multiservice Switch needs to use a supported version of the
Network Time Protocol (NTP) to synchronize the network time of day.
MDM workstations need to be configured with a valid time zone that has
an enabled seasonal time changeover capability. Such a configuration
ensures that the workstation's local time will handle the time change
automatically, using the standard Solaris-based mechanism.
All MDM servers and Multiservice Switch nodes within a region need to
belong to the same time zone.
During the execution of the script, no configuration or operational tasks
can run on the Multiservice Switch nodes or MDM workstations. For
example, there should not be a software migration nor disk cleanup
running while the script is executing.
This task flow shows the sequence of seasonal time change tasks to perform
to update the time-of-day on Nortel Multiservice Switch nodes.
Updating the
Multiservice Switch
time offset process
Determine the
seasonal time
change dates
No
End
MDM_5100_009_AA.INS
Navigation
Updating the Multiservice Switch time offset task flow (page 374)
Configuring the servers (page 376)
Implementing the time change (page 379)
Monitoring the script (page 381)
Perform step 2 annually. Nortel recommends that you program the time
change on January 1st each year, for both the spring and fall time change.
Nortel recommends that a System Administrator (log in with root ID) perform
this procedure.
Prerequisites
Perform these steps prior to running the script to ensure there are no system
surveillance outages:
Start the nmstool application and configure it to administer the session
servers. If the system administrator is remotely accessing the system the
correct settings for the display variables must be met.
Enable Log mode in the Alarm Display tool and make the alarms for all
nodes in the region viewable by removing all filters.
Verify that the seasonal time change has occurred in the region in
question. Typically in North America, seasonal time changes occur at
approximately 2:00 AM on a Sunday in the spring and fall.
Have the following information available before executing the script:
The new offset value for the todchangeover attribute. For example,
-300 is Eastern Standard Time (5 hours earlier than UTC) and -240 is
Eastern Daylight saving time (4 hours earlier than UTC).
The name of the HGDS group you will specify in the procedure. This
information is not needed if you are using the default HDGS group
name.
A valid Multiservice Switch user ID and password with an impact-level
of at least service is needed for Nortel Multiservice Data Manager
group authentication.
Procedure steps
Step Action
2 Run the crontab editor (crontab -e) to edit the crontab entry under your
administration user ID:
<minute hour day month day_of_the_week>
/opt/MagellanNMS/bin/todchangeover <new offset value>
-auth <MSS group> <MSS userid> <MSS password>
You must specify the entire executable path to the todchangeover script, for
example, /opt/MagellanNMS/bin/todchangeover. For an example of the
command used in this step complete with sample values that reset the time
offset for the spring and fall seasonal change, see Example procedure:
Editing the cron entry to change the time offset on a node (page 377).
3 Verify that the crontab updated by listing the contents of the cron file, type:
crontab -l
4 Log off from the Multiservice Data Manager server.
5 Repeat steps 1 through 4 on the redundant Multiservice Data Manager
server. Configuring both servers provides redundancy in case the primary
server is not available during the time changeover period specified in the
command in step 2.
Configuration is complete after you perform this procedure on the second
server.
--End--
Example procedure: Editing the cron entry to change the time offset on a
node
The following is an example of how to change the Nortel Multiservice Data
Manager server cron to change the time offset on a node.
These steps are only an example. The values you use in your configuration
might differ from the values shown here. Consult your network engineer to
ensure the values you are using are accurate for your configuration.
Steps
1 Set the values for making the time-of-day change occurring at 2:01 AM on
October 27th for the Eastern time zone, type:
1 2 27 10 * /opt/MagellanNMS/bin/todchangeover -300
-auth ACCESS fred samsam
2 Set the values for making the time-of-day change occurring at 3:01 AM on
April 6th for the Eastern time zone, type:
1 3 6 4 * /opt/MagellanNMS/bin/todchangeover -240 -auth
ACCESS fred samsam
The time specified for running the script should be one minute later for
each additional Multiservice Data Manager server.
New records are appended to the temporary file (/tmp/tod_output) every time the
script or executable is run. Records are overwritten following a server reboot. To save
the records prior to a reboot, store the records in a non-temporary file.
Procedure steps
Step Action
--End--
The script creates two types of output: one to a log file, /tmp/tod_output, and
the other to the Alarm Display tool. For important events occurring during the
execution of the script, both types of outputs are shown.
Prerequisites
Make sure that you meet the prerequisites to avoid a system surveillance
outage.
In addition to normal operations, open windows to display the alarms
generated by the script when it runs, prior to the 2:00 AM seasonal time
change.
Enable Log mode in the Alarm Display tool and set the filters for the 7015
0001 alarm and the 301007* series of alarms.
Procedure steps
Step Action
3 The todchangeover script displays the current time offset value for each
node in the group. If the script is successful, you will see the actual time
offset value for each node within the log. If the script is unable to display an
time offset value for a node, an alarm is sent to the alarm browser.
4 The todchangeover script changes the time offset value on each node. If the
script is unable to set the new time offset value, an alarm is sent to the alarm
browser.
Sample log output
5 The todchangeover script displays the results of the setting of the new time
offset value. If the time offset value has been successfully changed, you will
see the actual offset value of the node within the log. If the script is unable
to display an offset time value, an alarm is sent to the alarm browser.
6 The script terminates. Review the /tmp/tod_output log file to ensure that the
time offset value was changed on all the nodes. When the process is
complete, this message appears in the log.
Sample log output
--End--
Publication: NN10470-303
Document status: Standard
Document issue: 01.03
Document date: May 2007
Product release: 16.2
Job function: Administration and Security
Type: NTP
Language type: U.S. English
Nortel, the Nortel logo and the Globemark are trademarks of Nortel Networks.