huawei m2000
DESCRIPTION
HUAWEI M2000 EMSTRANSCRIPT
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
www.huawei.com
Security Level: Internal
Operation and Maintenance
of M2000 Client
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 2
Developed independently by Huawei
Technologies Co., Ltd, the iManager M2000
functions as EMS in the Huawei wireless
network solution. The M2000 can access a
whole series of products developed by Huawei
and perform centralized management on them.
This slide introduces the basic operations of on
the M2000 client.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 3
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 4
Logging In to the M2000 Client
Logging in to the
M2000 server
Logging out
Exiting
Upgrading the
software on the client
Automatically
Logging In to
the M2000
The diagram on the left lists
some basic operations involved
in M2000 client login.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 5
Logging In to the M2000 Server
To log in to the M2000 server, choose Start All programs iManager M2000 client M2000 client.
Type the user name and password
in the corresponding fields.
Type the IP address of the M2000
server.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 6
Logging In to the M2000 Server
|Main interface of the M2000 client|
Information
display
Menu bar
Status bar
Tool bar
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 7
Log Out Off the M2000 Client
To log out off the M2000 client, choose System > Logout.
Note: Logging out
off the M2000
client does not
mean the
applications
running on the
M2000 client are
terminated.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 8
Exiting
To exit the M2000 client, choose System Exit.
Note: Exiting the
M2000 client
means the
applications
running on the
M2000 client are
terminated.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 9
Upgrading the Software on the M2000 Client Automatically
To upgrade the software on the M2000 client automatically, perform the following steps:
Step 1: Start the M2000 client.
Step 2: Log in to the M2000 server.
After you log in to the M2000 server, the Confirmation dialog box is displayed, click Yes.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 10
Upgrading the Software on the M2000 Client Automatically
Step 3: In the displayed Update Wizard dialog box, click Continue.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 11
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 12
Overview of the M2000 Network Monitoring
The M2000 network monitoring monitors the operational status of
the M2000. For instance, the monitoring management monitors the
status of hard disk, database, session, or services. The M2000
monitoring management involves the following operations:
Setting the server threshold
Monitoring the performance status of the server
Monitoring the hard disk status of the server
Monitoring the database status of the server
Monitoring the database serving status
Monitoring the process status of the server
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 13
Setting the Server Threshold
Step 1: Set the hard disk threshold.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 14
Setting the Server Threshold
Step 2: Set the database threshold.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 15
Monitoring the Performance Status of the Server
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 16
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 17
Topology Management
The topology management is used for constructing and managing the
topology structure of the entire network. In this way, the networking
topology and the operational status of the entire network are
displayed clearly.
Creating physical subnets
Creating physical NEs
Monitoring NEs
Printing the topology view
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 18
Creating Physical Subnets
To create physical subnets, perform the following steps:
Step 1: Right-click the topology view and choose Create Physical Subnet from the
shortcut menu.
Set background
Create physical subnets
Create topological
objects
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 19
Creating Physical Subnets
Step 2: Set the physical subnet
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 20
Creating Physical NEs
Create a single physical NE.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 21
Monitoring NEs
Monitor the NE status.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 22
Printing the topology view
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 23
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 24
M2000 Security Management
The M2000 security management involves the following operations:
Configuring the security management
Monitors OM users Sessions
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 25
Interface of Security Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 26
Monitoring Users Sessions
Monitor the OM Users.
Monitor the operations of OM users who are
now in session status.
When the M2000 server restarts or the network
is disconnected and restored, click Refresh to
refresh the session monitor table.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 27
Monitoring Users Sessions
Force OM users to exit the M2000.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 28
Monitoring Users Sessions
Unlocking OM users.
If the times that a user
enters wrong password at
a time exceeds the
maximum attempts, the
OM user is locked for a
period. Right-click the
user and choose Unlock
User from the shortcut
menu to unlock the user.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 29
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 30
M2000 Log Management
Types of logs
Types of
logs Operation log
Security
log
System
log
NE operation
log
NE security
log
such as fault management,
performance management,
topology management, and
resource management
the user performs on the M2000,
including logout, login, log dumping, and
device log synchronization.
Such as the service start and
stop, and log exporting and
deletion
NE System
log
Such as fault running errors,
NE failures, etc NE
configurations activity
such as logging in to the
LMT, modifying the NE user
rights, and adding NE users
record the important
operations performed by the
NE users,
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 31
M2000 Log Management
Operations involved in the M2000 log management are as follows:
Querying logs
logs statistics
Managing log templates
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 32
Querying Logs
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 33
Logs Statistics
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 34
Managing Log Templates
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 35
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 36
M2000 Fault Management
Function
The M2000 reports, manages, and analyzes NE alarms in a centralized manner. The
M2000 collects NE alarms to the M2000. In addition, the M2000 notifies the
maintenance personnel of device alarms by short message or email at the time when the
alarm is generated.
Operations:
The following operations and analysis can be performed on NE alarms at the M2000 side.
Manual restore
Filtering
Severity redefinition
Alarm relevance
In this way, the M2000 can perform centralized analysis and processing on the device
alarms generated in the current network.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 37
M2000 Fault Management
Alarm
type
Fault
Management
Alarm
category
Alarm
severity
Critical Indicates that the device or the
resource cannot be used
completely and needs to be
restored immediately.
Major Indicates that the quality of the
device or the resource is severely
damaged. Corrective measures
should be taken immediately.
Minor Indicates that the quality of the
device or the resource is slightly
affected.
Warning Indicates that the quality of the
device or the resource may
probably be affected.
Event alarm
Refers to the notification generated
when the system detects the events
occurred.
Fault alarm
Refers to the notification generated
when the system detects the faults
occurred.
Alarms can be related to the following items:
Power supply system
Environment system
Signaling system
Hardware system
Software system
Operating system
Service quality
Fault handling
Internal alarm
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 38
Operations Involved in the M2000
Fault Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 39
Subscriber Informations Monitoring
Monitor Signaling Trace Collection select subscriber information monitoring
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 40
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 41
Performance Management
Measurement is a process during which the value of an attribute for an NE
entity (including logical entity) in a period is acquired.
Category of performance measurement counters
System counters: a kind of a default counter defined in the NE. System
counters are categorized into common counters and extended counters.
- Common counters: By default, the common counters are in the
measurement state. The measurement can be cancelled.
- Extended counters: By default, the extended counters are in the non-
measurement state. Before performing any measurement on extended
counters, you need to activate them first. You can enable or disable the
measurement on extended counters.
Custom counters: refers to the counters that are defined on the M2000
client by users. The principle for customizing counters is to perform
arithmetic operations on the default counters, including common counters
and extended counters, in the system. In this way, custom counters are
self-defined.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 42
Performance Measurement Periods
The measurement periods vary according to the measurement objects. The following
measurement periods are available: 5 minutes, 15 minutes, 30 minutes, 60 minutes, or 24
hours. Note that the measurement whose periods are 5 minutes or 15 minutes are called
real-time measurement, or short-period measurement. Only some of the NEs support the
real-time measurement.
Caution:
The measurement periods for all the NEs of the same type must be same.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 43
Performance Measurement Results and Counter Threshold
Performance measurement results refer to the values of measurement counters of NE
measurement objects.
Performance counter threshold can be set in either of the following windows:
Threshold Management window
Performance Monitor window
If the value of a counter exceed this threshold, the threshold alarm is generated.
For the same counter, you can set alarm thresholds for various time phases, or set an alarm
threshold for all time periods in each measurement period. These thresholds can be set for all
objects of a measurement type, or for one or more objects.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 44
Results of Performance Measurement Statistics
The maximum saving days for the results whose measurement period is 5 minutes or 15 minutes are 7 and
represented by the parameter maxRTResultSavingDay.
The maximum saving days for the results whose measurement period is 30 minutes, 60 minutes, or 1 day are
30 and represented by the parameter maxResultSavingDay.
The M2000 checks the results whose period is 30 minutes, 60 minutes, or 1 day on a fixed time 03:25 a.m.
each day. This is represented by the parameter capacityControlTime. The M2000 deletes the data saved for
over 30 days.
The M2000 checks the results whose period is 5 minutes or 15 minutes on a fixed time 04:35 a.m. each day.
This is represented by the parameter capacityControlTime + 70 minutes. The M2000 deletes the data saved
for over 7 days.
The parameters described previously are described in the file /export/home/omc/var/etc/conf/pmsvc.xml.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 45
Measurement Settings
Open the
Measurement
Settings window.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 46
Setting Measurement
Select site
Active Counter
Refences Counter
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 47
Query Result Measurement
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 48
Query Result Measurement
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 49
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 50
Software Management
The software management involves the following operations:
Upload software
Upgrading NE software
Querying Version Information on Software Installed on the Server
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 51
Upload Software
Software software browser Transfer from Client to NM Select software folder in computer/notebook client
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 52
Upgrading NE software
Software software browser Select software in M2000 List client Transfer from NM to NE
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 53
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 54
Overview of Data Management: Backing Up NM Data
You can back up the NM data in two ways: periodic backup and manual backup.
You can back up the NM data through the full backup and the incremental backup. The
following gives the difference between the full backup and the incremental backup:
Each time when a full backup is performed, the M2000 removes all the previous files
related to full backup and incremental backup on the server and saves one and only the
latest compressed full backup file. The file of full backup is named in the following way:
all-current time, such as, all-20060106103055.tar.gz.
Each time when an incremental backup is performed, a new backup file is generated. The
incremental backup is on the basis of previous backup data that can be a full backup or an
incremental backup. The file of an incremental backup is named in the following way: inc-
current time, such as, inc-20060106103055.tar.gz.
The NM data to be backed up refers to the data contained the following files:
/export/home/omc/var/
/export/home/sysm/
The backup files of the NM data are saved in the directory of /export/home/backup/omc/ on the
M2000 server.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 55
Overview of Data Management: Backing Up NE Data
NE data backup: The data management provided by the M2000 enables you to back up
the configuration files of all NEs managed by the M2000 and the files that change
dynamically during the operation.
You can back up the NE data in two ways: the periodic backup and the manual backup.
The system can generate one backup file after you perform the backup task once.
The maximum number of NE backup files stored on the server is determined by the
M2000 configuration file. At present, the M2000 server can store up to seven
backup files for each NE. When more than seven backup files are generated for an
NE, the M2000 server stores only the latest seven backup files for this NE.
Meanwhile, the M2000 server refreshes the backup file list.
The backup files of NE data are saved to the path: M2000
server/export/home/sysm/ftproot/NE type. Take the RNC for example, /data type/NE
FDN.
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 56
Data Management ( Backup )
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 57
Data Management (restore)
-
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 58
Thank You
www.huawei.com