Upload
amin
View
152
Download
4
Tags:
Embed Size (px)
Citation preview
HUAWEI TECHNOLOGIES Co., Ltd.
www.huawei.com
HUAWEI Confidential
Security Level:
Basic Training on I2000V3 Network Management (Dh version)
ISSUE 2.1ISSUE 2.1
HUAWEI TECHNOLOGIES Co., Ltd. Page 2HUAWEI Confidential
Contents
Chapter 1 I2000 V3 NM Solutions
Chapter 2 Functions of I2000 V3 Client
Chapter 3 Maintenance Tools of I2000 V3
HUAWEI TECHNOLOGIES Co., Ltd. Page 3HUAWEI Confidential
Hierarchical Management
Environmental control
AMOS control solution
service management solution Application in IN, RBT and Mobile Data, etc.
Host, database and middleware, etc.
Equipment room, temperature, access
control and moisture, etc. RMU
AMOS
Service NM , i.e. I2000 IN
Based on complicated network integrating telecommunication and IT, Huawei iManager I2000 provides multilayer solutions to meet customers’ requirements.
Based on complicated network integrating telecommunication and IT, Huawei iManager I2000 provides multilayer solutions to meet customers’ requirements.
Telecom System
Overall Huawei Management Solutions
HUAWEI TECHNOLOGIES Co., Ltd. Page 4HUAWEI Confidential
Note: NML is network management system of Mobile company, for example, Yiyang NMS.
EML
Integrated Management PlatformIntegrated Management PlatformBillingService ProvisionCustom information mgt…
BillingService ProvisionCustom information mgt…
CC&CRMCC&CRM
Networking deviceNetworking device
Host/database/middlewareHost/database/middleware
Temperature, moisture, smoke, intrusion, etc
Temperature, moisture, smoke, intrusion, etc
I2000 service subsystemI2000 service subsystem I2000 AMOS subsystemI2000 AMOS subsystem I2000 RMU subsystemI2000 RMU subsystem
ININSMSCSMSC RBTRBT
ICDICD Data…Data…Configuration consoleMaintenance and Test console
LMT
RMS, comprehensive faults……RMS, comprehensive faults……NML
SML
Operation tool, product engineeringOperation tool, product engineering
NEL
I2000 NM LocationI2000 NM Location
HUAWEI TECHNOLOGIES Co., Ltd. Page 5HUAWEI Confidential
OM Solution
…Maintenance Tools
HUAWEI TECHNOLOGIES Co., Ltd. Page 6HUAWEI Confidential
IN NM Solutions
Database + alarm real-time forwarding interface
NM Center Upper-layer
comprehensive NM system
Local Maintenancecenter
Reference: support website: Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advanced Training> A&S public - Advanced Training on I2000 IN Uniform Monitor
MML MML MML
HUAWEI TECHNOLOGIES Co., Ltd. Page 7HUAWEI Confidential
OCS NM Solution
USAUUSAUServerServer
SCPSCP
I2000 system
ClientClient
Upper-layer NM
CBPCBP BMPBMP
SNMP
OAM Server
BAM
RBIRBI
SNMP
MML
MML MML
UOA UOA
Agent
MML
FEPFEP
MML
Agent
host, databasehost, database
SNMP
iMonitorOAMAgent
HUAWEI TECHNOLOGIES Co., Ltd. Page 8HUAWEI Confidential
SMC NM Solutions
ServerServer
I2000 system
ClientClient
Upper-layer NM
SMSC infoX
Local maintenance Local
maintenance
MMLMML MMLMML
MT Server
MMLMML
Reference: support website: Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advance
d Training > 《业软公共 提高培训 I2000 短消息集中监控培训胶片》
HUAWEI TECHNOLOGIES Co., Ltd. Page 9HUAWEI Confidential
Data Service NM Solutions
ServerServer
MMSC
I2000 systemClientClient
Upper-layer NM
WAPGW MDSP …
SNMP
Reference: support website: Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advanced Training> A&S public - Advanced Training on I2000 Data Service Uniform Monitor
SNMP SNMP
HUAWEI TECHNOLOGIES Co., Ltd. Page 10HUAWEI Confidential
RBT NM Solutions (old)
Reference : support website : Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advanced Trainin
g> A&S public - Advanced Training on I2000 RBT Uniform Monitor
CTI Server
UIScript Server
AIP
VP Portal WEB Server
FileServer
I2000 ClientI2000 Client
OMD OMD OMD OMD OMD OMD OMD OMD
FEP
…
OMD
icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm
VRS
OAS DB
I2000 DB
I2000 ServerI2000 Server
DBServer
icdcomm
MML
MML
OAS Server
MMLUpper-layer NM
HUAWEI TECHNOLOGIES Co., Ltd. Page 11HUAWEI Confidential
RBT NM Solutions (new)
Upper-layer NM
HUAWEI TECHNOLOGIES Co., Ltd. Page 12HUAWEI Confidential
CC&CRM NM Solutions (old)
CTI Server
UIScript Server
AIP
VP IVR WEB Server
DBServer
FileServer
I2000 ClientI2000 Client
I2000 Server
OAS Server
OMD OMD OMD OMD OMD OMD OMD OMD
CTI LINK
CCS, FP, APLOGIC
…
OMD
OAS DB
Reference : support website : Documentation > Application and Software Product Line > Service and Software Public > I2000 > Function and Feature > Training Document > Advanced Training> A&S public - Advanced Training on I2000 CC&CRM Uniform Monitor
Note: The I2000 cannot monitor customer service system of earlier versions. Therefore, only the CTI platform and AIP NEs are shown in the figure above.
icdcomm
MML
MML
Upper-layer NM
HUAWEI TECHNOLOGIES Co., Ltd. Page 13HUAWEI Confidential
CC&CRM NM Solutions (new)
Upper-layer NM
HUAWEI TECHNOLOGIES Co., Ltd. Page 14HUAWEI Confidential
Monitoring of the RBT Customer Service System with Multiple Call Planes
Note: New versions of the CTI platform can also be accessed in the I2000 through the UOA, that is, an OASserver connects to a UOA, and the UOA connects to the I2000 through SNMP. Multiple OASservers can connect to only one UOA and one OASserver can connect to multiple UOAs.
I2000 ClientI2000 Client
I2000 ServerI2000 Server
… …
OAS Server OAS Server
Call Plane 1Call Plane 1 Management Management PlanePlane
…
OAS Server
Call Plane 2Call Plane 2 Call Plane n...Call Plane n...
Call plane 1 AIP Call plane 2 AIP Management plane AIP
MML MML
Upper-layer NM
HUAWEI TECHNOLOGIES Co., Ltd. Page 15HUAWEI Confidential
Contents
Chapter 1 I2000 V3 NM Solutions
Chapter 2 Functions of I2000 V3 Client
Chapter 3 Maintenance Tools of I2000 V3
HUAWEI TECHNOLOGIES Co., Ltd. Page 16HUAWEI Confidential
Chapter 2 I2000 Functions
Section 1Section 1 Fault ManagementFault Management
Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function
HUAWEI TECHNOLOGIES Co., Ltd. Page 17HUAWEI Confidential
Alarm Management-Basic Concept
Basic conceptFault alarm
It is, reflected as an error, a physical or logical factor causing failur
e of system running.
• Current fault alarm : It is the fault alarm not recovered or conf
irmed. User should pay attention and handle this alarm.
• History fault alarm : It is the fault alarm recovered and confir
med.
Event alarm
It is notification without any impact on services. Some event ala
rms are sent regularly and there are no corresponding recovery
operation.
HUAWEI TECHNOLOGIES Co., Ltd. Page 18HUAWEI Confidential
Scenario 1: How to monitor alarms of all network devicesChoose: Alarms > Current Fault Alarms
Note: Alarm contents and handling suggestions are defined on each NE.
Contents and sequence of columns are configurable.
Overall alarm monitoring (device alarms, QoS alarms, process error alarms, communication alarms, and environment alarms)
If selected, alarms are displayed in real time.
Centered monitoring of all device alarms
Detailed alarm information
Detailed alarm recovery recommendations
HUAWEI TECHNOLOGIES Co., Ltd. Page 19HUAWEI Confidential
Scenario 2: How to focus on uncleared alarmsChoose: Alarms > Browse Current Fault Alarms By Status Browsing and operating alarms
based on alarm statuses
Browsing and operating alarms based on alarm statuses
Unacknowledged and uncleared alarms Unacknowledged
and cleared alarms
Acknowledged and uncleared alarms
Acknowledged and cleared alarms
HUAWEI TECHNOLOGIES Co., Ltd. Page 20HUAWEI Confidential
Scenario 3: How to automatically acknowledge cleared alarms
Choose :
Alarms > Settings> Automatic Acknowledgement Rules
Set to enable automatic acknowledgement
Set to enable automatic acknowledgement
HUAWEI TECHNOLOGIES Co., Ltd. Page 21HUAWEI Confidential
Scenarios 4: How to shield unimportant alarms
Choose: Alarms > Settings>Alarm Filter Rule
Note: Shielded alarms are discarded, rather than stored in the database.
Set alarm shield rules to shield alarms
Set alarm shield rules to shield alarms
You can shield alarms of specified names or NEs
HUAWEI TECHNOLOGIES Co., Ltd. Page 22HUAWEI Confidential
Scenario 5: How to redefine the level of an alarm
Alarm processing policies vary with alarm levels. Users can adjust an alarm level by redefining the level to meet the requirements for operation and maintenance, and alarm processing.
Alarm processing policies vary with alarm levels. Users can adjust an alarm level by redefining the level to meet the requirements for operation and maintenance, and alarm processing.
Choose: Alarms > Settings > Alarm Redefine
Original alarm levels
Redefined alarm levels
HUAWEI TECHNOLOGIES Co., Ltd. Page 23HUAWEI Confidential
Scenario 6: How can I be notified of alarms when I am away
Maintenance engineers can learn the alarm situation of the entire network in real time.
Maintenance engineers can learn the alarm situation of the entire network in real time.
Choose: Alarms > Settings > Remote Notification
Step1:Configuring notification conditions
Step2:Configuring the notification time
Step3:Configuring the notification modeReference documents:
1. Commissioning Guide
2. Knowledge Base > Service and Software > Service and Softwar
e Public > I2000 > Technical Application Reference > Commissi
oning of the Alarm-To-SM Function of the I2000
HUAWEI TECHNOLOGIES Co., Ltd. Page 24HUAWEI Confidential
Scenario 7: How to record and query alarm handling experienceChoose: Alarms > Settings > Explain and Experience Maintenance
Experience Share
Maintenance Experience Share
With the alarm knowledge library and explanation library, maintenance engineers can accumulate the experience in clearing alarms, and share the experience with others.
HUAWEI TECHNOLOGIES Co., Ltd. Page 25HUAWEI Confidential
Chapter 2 I2000 Functions
Section 1 Fault Management
Section 2 Performance ManagementSection 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function
HUAWEI TECHNOLOGIES Co., Ltd. Page 26HUAWEI Confidential
Performance Management I2000 performance management provides performance statisti
cs data and display it in the following modes:• Data browsing
• Data monitoring
• Performance reports
I2000 principle on collecting performance data: • MML interface: NE device makes a statistics and packets data to I2000 actively in p
eriodical time.
• SNMP interface: I2000 periodically queries corresponding statistics data from NE sid
e.
• NEs accessed through UOA: NE collects performance statistics and reports the data
to the UOA. The UOA periodically sends the data to the I2000 server through FTP.
• I2000 principle on collecting RBI data (applied only to IN):
RBI data is periodically reported to /usr/omc/data of the I2000 through FTP and the I
2000 imports the data to the I2000 database at 12:00 every day.
HUAWEI TECHNOLOGIES Co., Ltd. Page 27HUAWEI Confidential
Scenario 1: How to view results of a statistics task
The DH04SPC006 version allows you to directly view and export results of a statistics task on the user interface of the I2000 client.
The DH04SPC006 version allows you to directly view and export results of a statistics task on the user interface of the I2000 client.
Display of statistics results
HUAWEI TECHNOLOGIES Co., Ltd. Page 28HUAWEI Confidential
Entry 1: Choose Statistics Tasks, right-click a task, and choose
HUAWEI TECHNOLOGIES Co., Ltd. Page 29HUAWEI Confidential
Entry 2: Choose Performance > Browse Data. Select an NE and choose
Query
HUAWEI TECHNOLOGIES Co., Ltd. Page 30HUAWEI Confidential
Scenario 2: How to monitor the variation of key performance indexes in real time during service peak hours
Performance monitoringPerformance monitoringChoose: Performance > Performance Monitoring
Step1: Create a monitoring task of up to 256 indexes
Step2: View monitoring results displayed in histograms and line charts
Double-click histograms or line charts to view data tables
HUAWEI TECHNOLOGIES Co., Ltd. Page 31HUAWEI Confidential
Scenario 3: How to know abnormal performance indexes at the earliest timeYou can set alarm conditions for each performance index. When the alarm conditions of an index are met, the I2000 generates an alarm to notify you of the abnormal index.
You can set alarm conditions for each performance index. When the alarm conditions of an index are met, the I2000 generates an alarm to notify you of the abnormal index.
Step 1: Set alarm conditions for an index by choosing Performance > Performance Alarms
Click to add
Set alarm details
Set the measurement object
Set alarm generation and recover conditions (new function)
Set the valid time segment
Set the reason and suggestion
Select NEs
HUAWEI TECHNOLOGIES Co., Ltd. Page 32HUAWEI Confidential
Step 2: Create a statistics task for the index by choosing Performance > Statistics Tasks
Note:1. If the statistics task already exists, skip this step.2. If the statistics task does not exist, it can be automatically created in the Dho4 version and
later. This step is required in the DH04 version and earlier.
Select NEs
Click to create
Set statistics parameters
HUAWEI TECHNOLOGIES Co., Ltd. Page 33HUAWEI Confidential
Step 3: View alarm information by choosing Alarms > Current Fault Alarms
When the alarms conditions are met, the alarm is displayed.
HUAWEI TECHNOLOGIES Co., Ltd. Page 34HUAWEI Confidential
Scenario 4: How to analyze the variation of a performance index in a time period
• The report system is an optional value-added peripheral compon
ent of the I2000.
• Not all types of NEs provide report template, for example, SNMP
NEs.
• The report system is installed with the I2000 server on the same h
ost.
To use the report system:
• Step 1: Create a statistics task.
• Step 2: Generate real-time or periodical reports.
For details, see the commissioning guide.
Report systemReport system
HUAWEI TECHNOLOGIES Co., Ltd. Page 35HUAWEI Confidential
Scenario 5: What statistics task needs to be created to commission a report template
View the statistics task matching each report template by selecting a
report template and clicking
Note: This method applies to Dh04SPC006 and later. In the earlier versions, install the webtools.
HUAWEI TECHNOLOGIES Co., Ltd. Page 36HUAWEI Confidential
Scenario 6: How to diagnose the problem that a report has no data or incomplete data
In DH04SPC006, the report system provides the data
diagnosis function
In DH04SPC006, the report system provides the data
diagnosis function
HUAWEI TECHNOLOGIES Co., Ltd. Page 37HUAWEI Confidential
Click Data Diagnosis, use the following functions:
View diagnosis results to known the causes and solutions
Diagnosis results
Possible causes
Solution
HUAWEI TECHNOLOGIES Co., Ltd. Page 38HUAWEI Confidential
View statistics task informationStatistics tasks for this report
Information about the created statistics task
HUAWEI TECHNOLOGIES Co., Ltd. Page 39HUAWEI Confidential
View the data sources of each report field and the table structure
Click to view the table structure
HUAWEI TECHNOLOGIES Co., Ltd. Page 40HUAWEI Confidential
Scenario 7: How to make sure the completeness of reported performance data
Requirement 1 : The performance data’s real time and completeness is very i
mportant. If the data is incomplete, we can know it immediately and use the man
ual supplement function or other method to complete the data.
. Scheme : When system detect the incompleteness, it can auto supply the lost d
ata firstly. Then if the data is still incomplete, alarm will appear to notify the user
using the manual supplement function or other method to complete the data.
Requirement 1 : The performance data’s real time and completeness is very i
mportant. If the data is incomplete, we can know it immediately and use the man
ual supplement function or other method to complete the data.
. Scheme : When system detect the incompleteness, it can auto supply the lost d
ata firstly. Then if the data is still incomplete, alarm will appear to notify the user
using the manual supplement function or other method to complete the data.
Step1 : Modify the configuration file in the I2000 server. ( If I2000
version is V300R001C02B280 or higher version, you can pass t
his step. )Modify the following parameter of this file : $I2000_ROOT/etc/conf/PerfPara_svc_
ex.xml
<param name=“DataMissAlarmRepeat”>0</param> -- Change “0” to “1”
HUAWEI TECHNOLOGIES Co., Ltd. Page 41HUAWEI Confidential
Step2 : To set supplement policies, choose: Performance > Data Integ
rity > Set Policy
If the performance data of some tasks need to be real time and complete, you can add the policy for these tasks.
This is the default policy after the system is installed. That is system will detect the completeness of all the task’s performance data 72 hours before 3:00 at 3:15 every day(period:24h) 。
If you need to realize the following function you must choose both: when system detect the incompleteness, it can auto supply the lost data firstly. Then if the data is still incomplete, alarm will appear
The setting in the picture means the system will detect the completeness of all the task’s performance data 1 hour before 11:00(that is 10~11:00) from 11:47. Later do the same thing per hour.
HUAWEI TECHNOLOGIES Co., Ltd. Page 42HUAWEI Confidential
Manual supplement
You can verify the correction of the alarm in the data brower page: no data from 10:00 to 11:00
When you get the alarm of “Performance data is incomplete”, you can right click to choose “Lost information” and you can see the data incompleteness duration and collection percentage in the collect scope.
HUAWEI TECHNOLOGIES Co., Ltd. Page 43HUAWEI Confidential
Requirement 2: The performance data need to be complete. But need not to be real
time complete.
Scheme: When system detect the incompleteness, it can auto supply the lost data. T
hen you need to check the completeness manually at regular intervals. If you find the
data lost you can use the manual supplement function or other method to complete th
e data.
Requirement 2: The performance data need to be complete. But need not to be real
time complete.
Scheme: When system detect the incompleteness, it can auto supply the lost data. T
hen you need to check the completeness manually at regular intervals. If you find the
data lost you can use the manual supplement function or other method to complete th
e data.
Step1 : To set supplement policies, choose: Performance > Data Integrity
> Set Policy. The method is the same as the step2 of requirement 1. The
only difference is no need to choose “Send alarm when data lost”.
HUAWEI TECHNOLOGIES Co., Ltd. Page 44HUAWEI Confidential
Step2 : To query data completeness, choose: Performance > Data Inte
grity > Recollect Data
1: Select an NE
2: Select a time period
3: Query
4: View results
5: Manual supplement
HUAWEI TECHNOLOGIES Co., Ltd. Page 45HUAWEI Confidential
Chapter 2 I2000 Functions
Section 1 Fault Management
Section 2 Performance Management
Section 3 Topology ManagementSection 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function
HUAWEI TECHNOLOGIES Co., Ltd. Page 46HUAWEI Confidential
Topology Management Basics
The I2000 provides three topology views:1. Service view (called physical view in Dh version and earlier) This view displays the network structure by function entity. The I2000 supports most of A&S products. To create a service NE, see the matching NE guide.
2. Physical view (called machine view in Dh version and earlier) This view displays the network structure by hardware device. The I2000 supports devices in the list of A&S purchased devices. To create a purchased device NE, see the iMonitor documents.
3. Customized view (called logical view in Dh version and earlier) This view can be customized as required by creating logical subnets
and adding NEs to logical subnets.
HUAWEI TECHNOLOGIES Co., Ltd. Page 47HUAWEI Confidential
Scenario 1: Suppose the I2000 accesses multiple service systems including IN, RBT, and customer service. How can I manage only IN NEs
Method 1:
Step 1: Right-click a blank area of the service view, choose New >
Create Physical Subnet. In the Objects Selection window, select NEs that
you want to manage, set their information, and finish creating the subnet.
Step 2: Right-click the created subnet and select Setup to Startup Subnet or
Setup to My Topology.
Then, after you re-log in to the I2000 client, only the NEs in the created
subnet are displayed in the service view.
Method 2:
Choose Topology > New > Custom View. Add NEs that you want to
manage to the customized view.
Then, the customized view is displayed, consisting of the added NEs.
Create a physical subnet or customized view
Create a physical subnet or customized view
HUAWEI TECHNOLOGIES Co., Ltd. Page 48HUAWEI Confidential
Do as follows:Step 1: Create an NE user.
Step 2: Bind the NE user to an I2000 user.
Step 3: Click the NE icon and select Telnet to check whether you can log in to the NE.
After performing the following configuration in the I2000, you can log in to an NE directly in the I2000 without login authentication.
After performing the following configuration in the I2000, you can log in to an NE directly in the I2000 without login authentication.
Scenario 2: After finding that an NE reports an alarm in the I2000, how can I directly log in to the NE through Telnet to rectify the fault
HUAWEI TECHNOLOGIES Co., Ltd. Page 49HUAWEI Confidential
Press Ctrl+F for search by IP address or NE name.Press Ctrl+F for search by IP address or NE name.
Right-click the NE and click Block. After the upgrade is complete, right-click the NE and click Unblock. This is a new function of the Dh version.
Right-click the NE and click Block. After the upgrade is complete, right-click the NE and click Unblock. This is a new function of the Dh version.
Scenario 4: How to discard alarms of an NE that are generated during the upgrade of the NE?
Scenario 3: How to find an NE quickly in a complicated topology structure
HUAWEI TECHNOLOGIES Co., Ltd. Page 50HUAWEI Confidential
Chapter 2 I2000 Functions
Section 1 Fault Management
Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration ManagementSection 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function
HUAWEI TECHNOLOGIES Co., Ltd. Page 51HUAWEI Confidential
Configuration Management Basics
This is the new configuration management GUI, which is applied to new products and solutions, such as OCS, NGIN, convergent messaging, DLSC, IPTV. The iCnfg uses the B/S architecture and can be deployed independently or with the I2000. If the iCnfg is installed with the I2000, you can choose this menu to start the iCnfg in the I2000. The iCnfg can both read and write NE configuration data, which is often used for NE deployment.
Note: Only Resource Manager and Resource Configuration in Equipment Configuration are commonly used. Customers are recommended not to use Maintenance and Operation.
This slide does not describe the iCnfg.
This is the old configuration management GUI, where the configuration data read from NEs is displayed. You cannot deliver configuration data to NEs (except SMS debugging workstation). The displayed configuration data is synchronized with NE every 12 hours.
HUAWEI TECHNOLOGIES Co., Ltd. Page 52HUAWEI Confidential
Configuration Management---Resource Management
For most of NE types, you can query and export their configuration information on the
following GUI
HUAWEI TECHNOLOGIES Co., Ltd. Page 53HUAWEI Confidential
Configuration Management---Resource Configuration
This GUI is used to record some office information that cannot be read from NEs but are required for creating statistics reports and statistics tasks.
HUAWEI TECHNOLOGIES Co., Ltd. Page 54HUAWEI Confidential
Chapter 2 I2000 Functions
Section 1 Fault Management
Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety ManagementSection 5 Safety Management
Section 6 Other Function
HUAWEI TECHNOLOGIES Co., Ltd. Page 55HUAWEI Confidential
Function Collection of Safety Management
I2000 self safety managementUser monitoring
Access control
Users’ certification, authorization, and use of terminal
Password strategy
Password length, complication and encryption for saving
Safety alarm
Multiply attempts to configure passwordSystem administrator monitors
operations of current users.
Log management
Log query, export, printing, statistics
and log dump.
Cannot access?
illegal login
HUAWEI TECHNOLOGIES Co., Ltd. Page 56HUAWEI Confidential
Scenario 1: SOX has strict requirements for account and password security
I2000 meets SOX requirementsI2000 meets SOX requirements
HUAWEI TECHNOLOGIES Co., Ltd. Page 57HUAWEI Confidential
Scenario 2: The carrier requires different department to have different rights to use the I2000
Step Operation Description
1 Set the IP addresses or network segment that can access the I2000.
Confirm the settings with the carrier.
2 Plan user group names, management area, and operation rights
Divide I2000 users into several groups by device or operation right.
3 Create I2000 user groups. Grouping users simplifies the management of users.
3.1 Set the management area for each I2000 user group.
Set the area that an I2000 user group can manage.
3.2 Set operation rights for each I2000 user group.
The operation rights include the rights for operating the I2000 and NEs.
3.3 Set the new device right for each I2000 user group.
With the new device right, users can manage newly added devices.
4 Create I2000 user accounts.
4.1 Add users to I2000 user group. Add a user to a user group so that the user has the rights of the user group.
4.2 Set the management area for each I2000 user
A user can manage both the areas that are specified for the user and the areas that are specified for the user group that the user belongs to.
4.3 Set operation rights for each I2000 user. A user has both the operation rights assigned for the user and the operation rights assigned for the user group that the user belongs to.
4.4 Specify the IP address or network segment from which an I2000 user can log in.
Perform this step to ensure the I2000 security.
I2000 can control account by right and areaI2000 can control account by right and area
HUAWEI TECHNOLOGIES Co., Ltd. Page 58HUAWEI Confidential
Operation Guide1. Log in to the I2000 client as the Administrator user.
2. Create the following user group:• Name: XX operator group• Management area: Part of NEs in the experiment environment• Operation rights: rights to acknowledge fault alarms and browse statistics tasks.
3. Create the following user:• Name: first letter of the name + work ID• Set the login time segment.• Set the allowed login IP address.• Set that the user needs to change the password after initial login.• Set the password reservation time to 60 days.• Add the user to the user group created in the previous step.
4. Log out, and then log in again as the created user.
5. Check the user rights:• You can view the NEs of the specified management areas in the service view and physical vie
w.• You can only acknowledge alarms. Other operations are unavailable.• You can only query statistics tasks. Other operations such as create and delete area unavailabl
e.
HUAWEI TECHNOLOGIES Co., Ltd. Page 59HUAWEI Confidential
Chapter 2 I2000 Functions
Section 1 Fault Management
Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other FunctionSection 6 Other Function
HUAWEI TECHNOLOGIES Co., Ltd. Page 60HUAWEI Confidential
Common Functions
Self management:
Managing I2000 services, disks, and databases
Choose System > System Monitoring
Monitoring I2000 databases
Choose System > System Monitoring > Browse > Database Monitoring and right-cli
ck a database
Managing I2000 data
Choose Tools > Data Management
NE management:
Managing access packages
Choose Tools > Access Package Management
Application: When the alarms or performance indexes of an NE are changed after t
he NE is upgraded, you need to load the matching access package the NE in the I20
00 so that the I2000 supports the new alarms and performance indexes.
For details, see the I2000 Help.
HUAWEI TECHNOLOGIES Co., Ltd. Page 61HUAWEI Confidential
Contents
Chapter 1 I2000 V3 NM Solutions
Chapter 2 Functions of I2000 V3 Foreground
Chapter 3 Maintenance Tools of I2000 V3
HUAWEI TECHNOLOGIES Co., Ltd. Page 62HUAWEI Confidential
I2000 Operation and Maintenance Tool
Problems There is not dedicated or skillful I2000 maintenance engineers. Engineers are not familiar with I2000 commands. Engineers cannot solve some common I2000 problems on their own. Some I2000 offices are out of maintenance for a long time. System faults
are found a time long after they occur.
To solve the problems, we provide: I2000 Troubleshooting Guide Breeze MainAst Breeze iCheck (with I2000 inspection package)
HUAWEI TECHNOLOGIES Co., Ltd. Page 63HUAWEI Confidential
1 I2000 Troubleshooting GuideThis document provides troubleshooting for the I2000.This document provides troubleshooting for the I2000.
Main contents:
Basic knowledge about I2000 modules
Troubleshooting
Case studies
Path:
Support website: Software Center > Version Software > Application and Software > Service and Software Public > iManager I2000 > iManager I2000 V300R001 >
HUAWEI TECHNOLOGIES Co., Ltd. Page 64HUAWEI Confidential
2 Breeze MainAstThe Breeze MainAst is a graphic Windows-based tool for maintaining the I2000. The Breeze MainAst is a graphic Windows-based tool for maintaining the I2000.
Functions:
Running basic I2000 server command
Collecting operating system information
Collecting logs
Performing common database operations
The Breeze MainAst will provide more and better functions.
Path:
iManager I2000 Troubleshooting Guide
HUAWEI TECHNOLOGIES Co., Ltd. Page 65HUAWEI Confidential
GUI of the Breeze MainAst
Step2: Double-click the execute and view results
Step 1: Add the device and import the device package
HUAWEI TECHNOLOGIES Co., Ltd. Page 66HUAWEI Confidential
3 Breeze iCheck
For details, see the I2000 Inspection Guide in the following path:
Support website: Knowledge Center > Application and Software > Service and Software Public > I2000 > Technical Guides > Quality Check
The Breeze iCheck is an inspection framework used in A&S. The I2000 also provides the I2000 inspection package based on the Breeze iCheck.
The Breeze iCheck is an inspection framework used in A&S. The I2000 also provides the I2000 inspection package based on the Breeze iCheck.
Step1: Add the device and import the inspection package
Step 2: Start inspection
HUAWEI TECHNOLOGIES Co., Ltd. Page 67HUAWEI Confidential
Thank You