Top Banner
HUAWEI TECHNOLOGIES Co., Ltd. www.huawei.co m HUAWEI Confidential Security Level: Basic Training on I2000V3 Network Management (Dh version) ISSUE 2.1 ISSUE 2.1
67
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd.

www.huawei.com

HUAWEI Confidential

Security Level:

Basic Training on I2000V3 Network Management (Dh version)

ISSUE 2.1ISSUE 2.1

Page 2: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 2HUAWEI Confidential

Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Client

Chapter 3 Maintenance Tools of I2000 V3

Page 3: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 3HUAWEI Confidential

Hierarchical Management

Environmental control

AMOS control solution

service management solution Application in IN, RBT and Mobile Data, etc.

Host, database and middleware, etc.

Equipment room, temperature, access

control and moisture, etc. RMU

AMOS

Service NM , i.e. I2000 IN

Based on complicated network integrating telecommunication and IT, Huawei iManager I2000 provides multilayer solutions to meet customers’ requirements.

Based on complicated network integrating telecommunication and IT, Huawei iManager I2000 provides multilayer solutions to meet customers’ requirements.

Telecom System

Overall Huawei Management Solutions

Page 4: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 4HUAWEI Confidential

Note: NML is network management system of Mobile company, for example, Yiyang NMS.

EML

Integrated Management PlatformIntegrated Management PlatformBillingService ProvisionCustom information mgt…

BillingService ProvisionCustom information mgt…

CC&CRMCC&CRM

Networking deviceNetworking device

Host/database/middlewareHost/database/middleware

Temperature, moisture, smoke, intrusion, etc

Temperature, moisture, smoke, intrusion, etc

I2000 service subsystemI2000 service subsystem I2000 AMOS subsystemI2000 AMOS subsystem I2000 RMU subsystemI2000 RMU subsystem

ININSMSCSMSC RBTRBT

ICDICD Data…Data…Configuration consoleMaintenance and Test console

LMT

RMS, comprehensive faults……RMS, comprehensive faults……NML

SML

Operation tool, product engineeringOperation tool, product engineering

NEL

I2000 NM LocationI2000 NM Location

Page 5: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 5HUAWEI Confidential

OM Solution

…Maintenance Tools

Page 6: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 6HUAWEI Confidential

IN NM Solutions

Database + alarm real-time forwarding interface

NM Center Upper-layer

comprehensive NM system

Local Maintenancecenter

Reference: support website: Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advanced Training> A&S public - Advanced Training on I2000 IN Uniform Monitor

MML MML MML

Page 7: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 7HUAWEI Confidential

OCS NM Solution

USAUUSAUServerServer

SCPSCP

I2000 system

ClientClient

Upper-layer NM

CBPCBP BMPBMP

SNMP

OAM Server

BAM

RBIRBI

SNMP

MML

MML MML

UOA UOA

Agent

MML

FEPFEP

MML

Agent

host, databasehost, database

SNMP

iMonitorOAMAgent

Page 8: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 8HUAWEI Confidential

SMC NM Solutions

ServerServer

I2000 system

ClientClient

Upper-layer NM

SMSC infoX

Local maintenance Local

maintenance

MMLMML MMLMML

MT Server

MMLMML

Reference: support website: Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advance

d Training > 《业软公共 提高培训 I2000 短消息集中监控培训胶片》

Page 9: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 9HUAWEI Confidential

Data Service NM Solutions

ServerServer

MMSC

I2000 systemClientClient

Upper-layer NM

WAPGW MDSP …

SNMP

Reference: support website: Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advanced Training> A&S public - Advanced Training on I2000 Data Service Uniform Monitor

SNMP SNMP

Page 10: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 10HUAWEI Confidential

RBT NM Solutions (old)

Reference : support website : Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advanced Trainin

g> A&S public - Advanced Training on I2000 RBT Uniform Monitor

CTI Server

UIScript Server

AIP

VP Portal WEB Server

FileServer

I2000 ClientI2000 Client

OMD OMD OMD OMD OMD OMD OMD OMD

FEP

OMD

icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm

VRS

OAS DB

I2000 DB

I2000 ServerI2000 Server

DBServer

icdcomm

MML

MML

OAS Server

MMLUpper-layer NM

Page 11: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 11HUAWEI Confidential

RBT NM Solutions (new)

Upper-layer NM

Page 12: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 12HUAWEI Confidential

CC&CRM NM Solutions (old)

CTI Server

UIScript Server

AIP

VP IVR WEB Server

DBServer

FileServer

I2000 ClientI2000 Client

I2000 Server

OAS Server

OMD OMD OMD OMD OMD OMD OMD OMD

CTI LINK

CCS, FP, APLOGIC

OMD

OAS DB

Reference : support website : Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advanced Training> A&S public - Advanced Training on I2000 CC&CRM Uniform Monitor

Note: The I2000 cannot monitor customer service system of earlier versions. Therefore, only the CTI platform and AIP NEs are shown in the figure above.

icdcomm

MML

MML

Upper-layer NM

Page 13: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 13HUAWEI Confidential

CC&CRM NM Solutions (new)

Upper-layer NM

Page 14: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 14HUAWEI Confidential

Monitoring of the RBT Customer Service System with Multiple Call Planes

Note: New versions of the CTI platform can also be accessed in the I2000 through the UOA, that is, an OASserver connects to a UOA, and the UOA connects to the I2000 through SNMP. Multiple OASservers can connect to only one UOA and one OASserver can connect to multiple UOAs.

I2000 ClientI2000 Client

I2000 ServerI2000 Server

… …

OAS Server OAS Server

Call Plane 1Call Plane 1 Management Management PlanePlane

OAS Server

Call Plane 2Call Plane 2 Call Plane n...Call Plane n...

Call plane 1 AIP Call plane 2 AIP Management plane AIP

MML MML

Upper-layer NM

Page 15: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 15HUAWEI Confidential

Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Client

Chapter 3 Maintenance Tools of I2000 V3

Page 16: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 16HUAWEI Confidential

Chapter 2 I2000 Functions

Section 1Section 1 Fault ManagementFault Management

Section 2 Performance Management

Section 3 Topology Management

Section 4 Configuration Management

Section 5 Safety Management

Section 6 Other Function

Page 17: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 17HUAWEI Confidential

Alarm Management-Basic Concept

Basic conceptFault alarm

It is, reflected as an error, a physical or logical factor causing failur

e of system running.

• Current fault alarm : It is the fault alarm not recovered or conf

irmed. User should pay attention and handle this alarm.

• History fault alarm : It is the fault alarm recovered and confir

med.

Event alarm

It is notification without any impact on services. Some event ala

rms are sent regularly and there are no corresponding recovery

operation.

Page 18: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 18HUAWEI Confidential

Scenario 1: How to monitor alarms of all network devicesChoose: Alarms > Current Fault Alarms

Note: Alarm contents and handling suggestions are defined on each NE.

Contents and sequence of columns are configurable.

Overall alarm monitoring (device alarms, QoS alarms, process error alarms, communication alarms, and environment alarms)

If selected, alarms are displayed in real time.

Centered monitoring of all device alarms

Detailed alarm information

Detailed alarm recovery recommendations

Page 19: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 19HUAWEI Confidential

Scenario 2: How to focus on uncleared alarmsChoose: Alarms > Browse Current Fault Alarms By Status Browsing and operating alarms

based on alarm statuses

Browsing and operating alarms based on alarm statuses

Unacknowledged and uncleared alarms Unacknowledged

and cleared alarms

Acknowledged and uncleared alarms

Acknowledged and cleared alarms

Page 20: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 20HUAWEI Confidential

Scenario 3: How to automatically acknowledge cleared alarms

Choose :

Alarms > Settings> Automatic Acknowledgement Rules

Set to enable automatic acknowledgement

Set to enable automatic acknowledgement

Page 21: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 21HUAWEI Confidential

Scenarios 4: How to shield unimportant alarms

Choose: Alarms > Settings>Alarm Filter Rule

Note: Shielded alarms are discarded, rather than stored in the database.

Set alarm shield rules to shield alarms

Set alarm shield rules to shield alarms

You can shield alarms of specified names or NEs

Page 22: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 22HUAWEI Confidential

Scenario 5: How to redefine the level of an alarm

Alarm processing policies vary with alarm levels. Users can adjust an alarm level by redefining the level to meet the requirements for operation and maintenance, and alarm processing.

Alarm processing policies vary with alarm levels. Users can adjust an alarm level by redefining the level to meet the requirements for operation and maintenance, and alarm processing.

Choose: Alarms > Settings > Alarm Redefine

Original alarm levels

Redefined alarm levels

Page 23: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 23HUAWEI Confidential

Scenario 6: How can I be notified of alarms when I am away

Maintenance engineers can learn the alarm situation of the entire network in real time.

Maintenance engineers can learn the alarm situation of the entire network in real time.

Choose: Alarms > Settings > Remote Notification

Step1:Configuring notification conditions

Step2:Configuring the notification time

Step3:Configuring the notification modeReference documents:

1. Commissioning Guide

2. Knowledge Base > Service and Software > Service and Softwar

e Public > I2000 > Technical Application Reference > Commissi

oning of the Alarm-To-SM Function of the I2000

Page 24: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 24HUAWEI Confidential

Scenario 7: How to record and query alarm handling experienceChoose: Alarms > Settings > Explain and Experience Maintenance

Experience Share

Maintenance Experience Share

With the alarm knowledge library and explanation library, maintenance engineers can accumulate the experience in clearing alarms, and share the experience with others.

Page 25: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 25HUAWEI Confidential

Chapter 2 I2000 Functions

Section 1 Fault Management

Section 2 Performance ManagementSection 2 Performance Management

Section 3 Topology Management

Section 4 Configuration Management

Section 5 Safety Management

Section 6 Other Function

Page 26: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 26HUAWEI Confidential

Performance Management I2000 performance management provides performance statisti

cs data and display it in the following modes:• Data browsing

• Data monitoring

• Performance reports

I2000 principle on collecting performance data: • MML interface: NE device makes a statistics and packets data to I2000 actively in p

eriodical time.

• SNMP interface: I2000 periodically queries corresponding statistics data from NE sid

e.

• NEs accessed through UOA: NE collects performance statistics and reports the data

to the UOA. The UOA periodically sends the data to the I2000 server through FTP.

• I2000 principle on collecting RBI data (applied only to IN):

RBI data is periodically reported to /usr/omc/data of the I2000 through FTP and the I

2000 imports the data to the I2000 database at 12:00 every day.

Page 27: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 27HUAWEI Confidential

Scenario 1: How to view results of a statistics task

The DH04SPC006 version allows you to directly view and export results of a statistics task on the user interface of the I2000 client.

The DH04SPC006 version allows you to directly view and export results of a statistics task on the user interface of the I2000 client.

Display of statistics results

Page 28: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 28HUAWEI Confidential

Entry 1: Choose Statistics Tasks, right-click a task, and choose

Page 29: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 29HUAWEI Confidential

Entry 2: Choose Performance > Browse Data. Select an NE and choose

Query

Page 30: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 30HUAWEI Confidential

Scenario 2: How to monitor the variation of key performance indexes in real time during service peak hours

Performance monitoringPerformance monitoringChoose: Performance > Performance Monitoring

Step1: Create a monitoring task of up to 256 indexes

Step2: View monitoring results displayed in histograms and line charts

Double-click histograms or line charts to view data tables

Page 31: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 31HUAWEI Confidential

Scenario 3: How to know abnormal performance indexes at the earliest timeYou can set alarm conditions for each performance index. When the alarm conditions of an index are met, the I2000 generates an alarm to notify you of the abnormal index.

You can set alarm conditions for each performance index. When the alarm conditions of an index are met, the I2000 generates an alarm to notify you of the abnormal index.

Step 1: Set alarm conditions for an index by choosing Performance > Performance Alarms

Click to add

Set alarm details

Set the measurement object

Set alarm generation and recover conditions (new function)

Set the valid time segment

Set the reason and suggestion

Select NEs

Page 32: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 32HUAWEI Confidential

Step 2: Create a statistics task for the index by choosing Performance > Statistics Tasks

Note:1. If the statistics task already exists, skip this step.2. If the statistics task does not exist, it can be automatically created in the Dho4 version and

later. This step is required in the DH04 version and earlier.

Select NEs

Click to create

Set statistics parameters

Page 33: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 33HUAWEI Confidential

Step 3: View alarm information by choosing Alarms > Current Fault Alarms

When the alarms conditions are met, the alarm is displayed.

Page 34: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 34HUAWEI Confidential

Scenario 4: How to analyze the variation of a performance index in a time period

• The report system is an optional value-added peripheral compon

ent of the I2000.

• Not all types of NEs provide report template, for example, SNMP

NEs.

• The report system is installed with the I2000 server on the same h

ost.

To use the report system:

• Step 1: Create a statistics task.

• Step 2: Generate real-time or periodical reports.

For details, see the commissioning guide.

Report systemReport system

Page 35: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 35HUAWEI Confidential

Scenario 5: What statistics task needs to be created to commission a report template

View the statistics task matching each report template by selecting a

report template and clicking

Note: This method applies to Dh04SPC006 and later. In the earlier versions, install the webtools.

Page 36: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 36HUAWEI Confidential

Scenario 6: How to diagnose the problem that a report has no data or incomplete data

In DH04SPC006, the report system provides the data

diagnosis function

In DH04SPC006, the report system provides the data

diagnosis function

Page 37: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 37HUAWEI Confidential

Click Data Diagnosis, use the following functions:

View diagnosis results to known the causes and solutions

Diagnosis results

Possible causes

Solution

Page 38: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 38HUAWEI Confidential

View statistics task informationStatistics tasks for this report

Information about the created statistics task

Page 39: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 39HUAWEI Confidential

View the data sources of each report field and the table structure

Click to view the table structure

Page 40: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 40HUAWEI Confidential

Scenario 7: How to make sure the completeness of reported performance data

Requirement 1 : The performance data’s real time and completeness is very i

mportant. If the data is incomplete, we can know it immediately and use the man

ual supplement function or other method to complete the data.

. Scheme : When system detect the incompleteness, it can auto supply the lost d

ata firstly. Then if the data is still incomplete, alarm will appear to notify the user

using the manual supplement function or other method to complete the data.

Requirement 1 : The performance data’s real time and completeness is very i

mportant. If the data is incomplete, we can know it immediately and use the man

ual supplement function or other method to complete the data.

. Scheme : When system detect the incompleteness, it can auto supply the lost d

ata firstly. Then if the data is still incomplete, alarm will appear to notify the user

using the manual supplement function or other method to complete the data.

Step1 : Modify the configuration file in the I2000 server. ( If I2000

version is V300R001C02B280 or higher version, you can pass t

his step. )Modify the following parameter of this file : $I2000_ROOT/etc/conf/PerfPara_svc_

ex.xml

<param name=“DataMissAlarmRepeat”>0</param> -- Change “0” to “1”

Page 41: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 41HUAWEI Confidential

Step2 : To set supplement policies, choose: Performance > Data Integ

rity > Set Policy

If the performance data of some tasks need to be real time and complete, you can add the policy for these tasks.

This is the default policy after the system is installed. That is system will detect the completeness of all the task’s performance data 72 hours before 3:00 at 3:15 every day(period:24h) 。

If you need to realize the following function you must choose both: when system detect the incompleteness, it can auto supply the lost data firstly. Then if the data is still incomplete, alarm will appear

The setting in the picture means the system will detect the completeness of all the task’s performance data 1 hour before 11:00(that is 10~11:00) from 11:47. Later do the same thing per hour.

Page 42: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 42HUAWEI Confidential

Manual supplement

You can verify the correction of the alarm in the data brower page: no data from 10:00 to 11:00

When you get the alarm of “Performance data is incomplete”, you can right click to choose “Lost information” and you can see the data incompleteness duration and collection percentage in the collect scope.

Page 43: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 43HUAWEI Confidential

Requirement 2: The performance data need to be complete. But need not to be real

time complete.

Scheme: When system detect the incompleteness, it can auto supply the lost data. T

hen you need to check the completeness manually at regular intervals. If you find the

data lost you can use the manual supplement function or other method to complete th

e data.

Requirement 2: The performance data need to be complete. But need not to be real

time complete.

Scheme: When system detect the incompleteness, it can auto supply the lost data. T

hen you need to check the completeness manually at regular intervals. If you find the

data lost you can use the manual supplement function or other method to complete th

e data.

Step1 : To set supplement policies, choose: Performance > Data Integrity

> Set Policy. The method is the same as the step2 of requirement 1. The

only difference is no need to choose “Send alarm when data lost”.

Page 44: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 44HUAWEI Confidential

Step2 : To query data completeness, choose: Performance > Data Inte

grity > Recollect Data

1: Select an NE

2: Select a time period

3: Query

4: View results

5: Manual supplement

Page 45: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 45HUAWEI Confidential

Chapter 2 I2000 Functions

Section 1 Fault Management

Section 2 Performance Management

Section 3 Topology ManagementSection 3 Topology Management

Section 4 Configuration Management

Section 5 Safety Management

Section 6 Other Function

Page 46: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 46HUAWEI Confidential

Topology Management Basics

The I2000 provides three topology views:1. Service view (called physical view in Dh version and earlier) This view displays the network structure by function entity. The I2000 supports most of A&S products. To create a service NE, see the matching NE guide.

2. Physical view (called machine view in Dh version and earlier) This view displays the network structure by hardware device. The I2000 supports devices in the list of A&S purchased devices. To create a purchased device NE, see the iMonitor documents.

3. Customized view (called logical view in Dh version and earlier) This view can be customized as required by creating logical subnets

and adding NEs to logical subnets.

Page 47: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 47HUAWEI Confidential

Scenario 1: Suppose the I2000 accesses multiple service systems including IN, RBT, and customer service. How can I manage only IN NEs

Method 1:

Step 1: Right-click a blank area of the service view, choose New >

Create Physical Subnet. In the Objects Selection window, select NEs that

you want to manage, set their information, and finish creating the subnet.

Step 2: Right-click the created subnet and select Setup to Startup Subnet or

Setup to My Topology.

Then, after you re-log in to the I2000 client, only the NEs in the created

subnet are displayed in the service view.

Method 2:

Choose Topology > New > Custom View. Add NEs that you want to

manage to the customized view.

Then, the customized view is displayed, consisting of the added NEs.

Create a physical subnet or customized view

Create a physical subnet or customized view

Page 48: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 48HUAWEI Confidential

Do as follows:Step 1: Create an NE user.

Step 2: Bind the NE user to an I2000 user.

Step 3: Click the NE icon and select Telnet to check whether you can log in to the NE.

After performing the following configuration in the I2000, you can log in to an NE directly in the I2000 without login authentication.

After performing the following configuration in the I2000, you can log in to an NE directly in the I2000 without login authentication.

Scenario 2: After finding that an NE reports an alarm in the I2000, how can I directly log in to the NE through Telnet to rectify the fault

Page 49: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 49HUAWEI Confidential

Press Ctrl+F for search by IP address or NE name.Press Ctrl+F for search by IP address or NE name.

Right-click the NE and click Block. After the upgrade is complete, right-click the NE and click Unblock. This is a new function of the Dh version.

Right-click the NE and click Block. After the upgrade is complete, right-click the NE and click Unblock. This is a new function of the Dh version.

Scenario 4: How to discard alarms of an NE that are generated during the upgrade of the NE?

Scenario 3: How to find an NE quickly in a complicated topology structure

Page 50: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 50HUAWEI Confidential

Chapter 2 I2000 Functions

Section 1 Fault Management

Section 2 Performance Management

Section 3 Topology Management

Section 4 Configuration ManagementSection 4 Configuration Management

Section 5 Safety Management

Section 6 Other Function

Page 51: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 51HUAWEI Confidential

Configuration Management Basics

This is the new configuration management GUI, which is applied to new products and solutions, such as OCS, NGIN, convergent messaging, DLSC, IPTV. The iCnfg uses the B/S architecture and can be deployed independently or with the I2000. If the iCnfg is installed with the I2000, you can choose this menu to start the iCnfg in the I2000. The iCnfg can both read and write NE configuration data, which is often used for NE deployment.

Note: Only Resource Manager and Resource Configuration in Equipment Configuration are commonly used. Customers are recommended not to use Maintenance and Operation.

This slide does not describe the iCnfg.

This is the old configuration management GUI, where the configuration data read from NEs is displayed. You cannot deliver configuration data to NEs (except SMS debugging workstation). The displayed configuration data is synchronized with NE every 12 hours.

Page 52: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 52HUAWEI Confidential

Configuration Management---Resource Management

For most of NE types, you can query and export their configuration information on the

following GUI

Page 53: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 53HUAWEI Confidential

Configuration Management---Resource Configuration

This GUI is used to record some office information that cannot be read from NEs but are required for creating statistics reports and statistics tasks.

Page 54: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 54HUAWEI Confidential

Chapter 2 I2000 Functions

Section 1 Fault Management

Section 2 Performance Management

Section 3 Topology Management

Section 4 Configuration Management

Section 5 Safety ManagementSection 5 Safety Management

Section 6 Other Function

Page 55: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 55HUAWEI Confidential

Function Collection of Safety Management

I2000 self safety managementUser monitoring

Access control

Users’ certification, authorization, and use of terminal

Password strategy

Password length, complication and encryption for saving

Safety alarm

Multiply attempts to configure passwordSystem administrator monitors

operations of current users.

Log management

Log query, export, printing, statistics

and log dump.

Cannot access?

illegal login

Page 56: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 56HUAWEI Confidential

Scenario 1: SOX has strict requirements for account and password security

I2000 meets SOX requirementsI2000 meets SOX requirements

Page 57: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 57HUAWEI Confidential

Scenario 2: The carrier requires different department to have different rights to use the I2000

Step Operation Description

1 Set the IP addresses or network segment that can access the I2000.

Confirm the settings with the carrier.

2 Plan user group names, management area, and operation rights

Divide I2000 users into several groups by device or operation right.

3 Create I2000 user groups. Grouping users simplifies the management of users.

3.1 Set the management area for each I2000 user group.

Set the area that an I2000 user group can manage.

3.2 Set operation rights for each I2000 user group.

The operation rights include the rights for operating the I2000 and NEs.

3.3 Set the new device right for each I2000 user group.

With the new device right, users can manage newly added devices.

4 Create I2000 user accounts.

4.1 Add users to I2000 user group. Add a user to a user group so that the user has the rights of the user group.

4.2 Set the management area for each I2000 user

A user can manage both the areas that are specified for the user and the areas that are specified for the user group that the user belongs to.

4.3 Set operation rights for each I2000 user. A user has both the operation rights assigned for the user and the operation rights assigned for the user group that the user belongs to.

4.4 Specify the IP address or network segment from which an I2000 user can log in.

Perform this step to ensure the I2000 security.

I2000 can control account by right and areaI2000 can control account by right and area

Page 58: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 58HUAWEI Confidential

Operation Guide1. Log in to the I2000 client as the Administrator user.

2. Create the following user group:• Name: XX operator group• Management area: Part of NEs in the experiment environment• Operation rights: rights to acknowledge fault alarms and browse statistics tasks.

3. Create the following user:• Name: first letter of the name + work ID• Set the login time segment.• Set the allowed login IP address.• Set that the user needs to change the password after initial login.• Set the password reservation time to 60 days.• Add the user to the user group created in the previous step.

4. Log out, and then log in again as the created user.

5. Check the user rights:• You can view the NEs of the specified management areas in the service view and physical vie

w.• You can only acknowledge alarms. Other operations are unavailable.• You can only query statistics tasks. Other operations such as create and delete area unavailabl

e.

Page 59: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 59HUAWEI Confidential

Chapter 2 I2000 Functions

Section 1 Fault Management

Section 2 Performance Management

Section 3 Topology Management

Section 4 Configuration Management

Section 5 Safety Management

Section 6 Other FunctionSection 6 Other Function

Page 60: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 60HUAWEI Confidential

Common Functions

Self management:

Managing I2000 services, disks, and databases

Choose System > System Monitoring

Monitoring I2000 databases

Choose System > System Monitoring > Browse > Database Monitoring and right-cli

ck a database

Managing I2000 data

Choose Tools > Data Management

NE management:

Managing access packages

Choose Tools > Access Package Management

Application: When the alarms or performance indexes of an NE are changed after t

he NE is upgraded, you need to load the matching access package the NE in the I20

00 so that the I2000 supports the new alarms and performance indexes.

For details, see the I2000 Help.

Page 61: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 61HUAWEI Confidential

Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Foreground

Chapter 3 Maintenance Tools of I2000 V3

Page 62: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 62HUAWEI Confidential

I2000 Operation and Maintenance Tool

Problems There is not dedicated or skillful I2000 maintenance engineers. Engineers are not familiar with I2000 commands. Engineers cannot solve some common I2000 problems on their own. Some I2000 offices are out of maintenance for a long time. System faults

are found a time long after they occur.

To solve the problems, we provide: I2000 Troubleshooting Guide Breeze MainAst Breeze iCheck (with I2000 inspection package)

Page 63: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 63HUAWEI Confidential

1 I2000 Troubleshooting GuideThis document provides troubleshooting for the I2000.This document provides troubleshooting for the I2000.

Main contents:

Basic knowledge about I2000 modules

Troubleshooting

Case studies

Path:

Support website: Software Center > Version Software > Application and Software > Service and Software Public > iManager I2000 > iManager I2000 V300R001 >

Page 64: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 64HUAWEI Confidential

2 Breeze MainAstThe Breeze MainAst is a graphic Windows-based tool for maintaining the I2000. The Breeze MainAst is a graphic Windows-based tool for maintaining the I2000.

Functions:

Running basic I2000 server command

Collecting operating system information

Collecting logs

Performing common database operations

The Breeze MainAst will provide more and better functions.

Path:

iManager I2000 Troubleshooting Guide

Page 65: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 65HUAWEI Confidential

GUI of the Breeze MainAst

Step2: Double-click the execute and view results

Step 1: Add the device and import the device package

Page 66: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 66HUAWEI Confidential

3 Breeze iCheck

For details, see the I2000 Inspection Guide in the following path:

Support website: Knowledge Center > Application and Software > Service and Software Public > I2000 > Technical Guides > Quality Check

The Breeze iCheck is an inspection framework used in A&S. The I2000 also provides the I2000 inspection package based on the Breeze iCheck.

The Breeze iCheck is an inspection framework used in A&S. The I2000 also provides the I2000 inspection package based on the Breeze iCheck.

Step1: Add the device and import the inspection package

Step 2: Start inspection

Page 67: Basic Training on I2000V3 Network Dh V2.1

HUAWEI TECHNOLOGIES Co., Ltd. Page 67HUAWEI Confidential

Thank You