194
Document Number: 999-00015-001 Release: 1.0 Revision: A Publish Date: January 24, 2008 WiChorus Confidential Element Management System (EMS) User’s Guide

EMS User's Guide

Embed Size (px)

Citation preview

Page 1: EMS User's Guide

Document Number: 999-00015-001Release: 1.0 Revision: APublish Date: January 24, 2008

WiChorus Confidential

Element Management System (EMS)User’s Guide

Page 2: EMS User's Guide

CopyrightCopyright © 2007-2008 WiChorus®. All rights reserved.This publication is protected by federal copyright law. No part of this publication may be copied or distributed, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language in any form or by any means, electronic, mechanical, magnetic, manual or otherwise, or disclosed to third parties without the express written permission from WiChorus.WiChorus makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for a particular purpose. Further, WiChorus reserves the right to revise this publication and to make changes from time to time in the contents hereof without obligation from WiChorus to notify any person of such revision or changes.

TrademarksWiChorus is a registered trademark of WiChorus. The WiChorus logo, and WiChorus are trademarks of WiChorus. All other registered and unregistered trademarks are the properties of their respective holders.

Technical SupportYou can obtain valuable information, as well as report bugs and submit engineering questions about WiChorus devices, tools, or general application questions by contacting WiChorus Technical Support.

RevisionsProduct features and specifications described in this manual are subject to change without notice. WiChorus reserves the right to periodically revise this manual without notice. Revisions will be incorporated into new editions. WiChorus shall not be liable for any damages, or for the loss of information resulting from the performance or use of the information contained herein. The material contained herein is for informational purposes only.

LicenseSubject to the WiChorus standard terms and conditions of sale or, if applicable, an existing sales agreement between our companies, WiChorus grants and you accept a perpetual, non-exclusive license to use any object code software provided by WiChorus (the Licensed Program) only with WiChorus supplied equipment up to the number of cards at your company’s location or at the locations of users who have acquired WiChorus equipment through your company as provided in the upgrade purchase agreement. In no event will the rights to copy, transfer or transmit the Licensed Program exceed the prescribed quantity limitation in the upgrade purchase agreement. All other terms of the Software License and Warranty remain in effect.

Non-DisclosureThis document contains information proprietary to Wichorus and is available for review under mutual Non Disclosure Agreement only. No part of this document may be reproduced or distributed by any means without written permission of Wichorus.

WiChorus Inc. 3590 N. 1st. Street, Suite 300 San Jose, California 95134 Phone: (408) 435-0777 Fax: (408) 955-9093 Email: [email protected] Web: www.wichorus.com

Page 3: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential i

00About This Manual

The primary objective of this manual is to provide information that you need to use the Element Management System (EMS) application to configure and manage your SmartCore™ WiMax product.

Intended Audience

This guide is intended for experienced system and network specialists who will use the Element Management System to configure the SmartCore™ WiMax devices.

Organization

The Element Management System (EMS) User’s Guide contains eight chapters, one appendix, and an "Index.".

Chapter 1, "Element Management System," provides a product overview of the Element Management System (EMS) for all SmartCore™ Family of Products.

Chapter 2, "Initial EMS Configuration," describes how to configure the Element Management System (EMS).

Chapter 3, "Configuration Management," describes how to perform common configuration management tasks to setup the network using the EMS application.

Chapter 4, "Network Maps," describes the Element Management System Network Maps.

Chapter 5, "Network Views," describes the Element Management System (EMS) Network Views.

Chapter 6, "Performance Management," describes how to setup and retrieve performance management statistics and determine the degree to which the network is meeting assigned service levels.

Chapter 7, "Fault Management," describes how the EMS provides advanced fault management capabilities for proactive monitoring of network reliability and availability.

Chapter 8, "Administration," describes how to manage system security for the Element Management System (EMS).

Appendix A, "Glossary," gives brief descriptions of terms used throughout this document.

Page 4: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential ii

Related Publications

For more information about evaluating, using, and developing with any of WiChorus’ SmartCore™ Family of Products, refer to the following list of documentation:

Changes from Last Revision

The following changes have been made from the last revision:

Customer and Technical Support

If you require technical assistance with installation, operation, or maintenance of your system, or if you want to return a product under warranty for repair, please contact your distributor.

If you purchased this product from an authorized dealer, distributor, Value Added Reseller (VAR), or third party, please contact that vendor for technical assistance and warranty support.

Sales and Product Ordering Information

Contact WiChorus Corporation for sales, and product ordering information.

• WiChorus has an online mailbox: [email protected]. Your message will automatically be forwarded to a WiChorus representative.

Alternatively, you can call WiChorus directly at 1-408-435-0777.

Manual Title Part Number

SmartCore™ SC 600 User’s Guide 999-00010-001

SmartCore™ SC 600 Quick Start Guide 999-00014-001

Element Management System (EMS) User’s Guide (this manual) 999-00015-001

Element Management System (EMS) Installation Guide 999-00056-001

WiChorus Command Line Interface Software User’s Guide 999-00031-001

Revision History Change Date

1st Draft - Release 0.6 Revision A August 20, 2007

Preliminary Release - Release 1.0 Revision A January 24, 2008

Page 5: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential iii

00Table of Contents

Chapter 1 Element Management System ......................................................................................... 1-11.1 WiMax Network Overview ................................................................................... 1-2

1.1.1 EMS Application Overview ....................................................................... 1-21.1.2 Configuration Management ........................................................................ 1-21.1.3 Performance Management .......................................................................... 1-31.1.4 Fault Management ...................................................................................... 1-31.1.5 Security Management ................................................................................. 1-31.1.6 Administration ............................................................................................ 1-41.1.7 Benefits ....................................................................................................... 1-4

Chapter 2 Initial EMS Configuration ............................................................................................... 2-12.1 Overview ............................................................................................................... 2-22.2 Using the EMS Application .................................................................................. 2-3

2.2.1 Starting the EMS Application .................................................................... 2-32.2.1.1 Logging In ..................................................................................... 2-42.2.1.2 Administrator ................................................................................. 2-52.2.1.3 Exiting the Application ................................................................. 2-5

2.3 EMS Navigation Tools .......................................................................................... 2-62.3.1 Using the Mouse ......................................................................................... 2-62.3.2 Using Shortcut Keys ................................................................................... 2-72.3.3 Selecting from Lists in EMS ...................................................................... 2-7

2.3.3.1 Selecting Multiple Items by Clicking and the Shift Key ............... 2-72.3.3.2 Selecting Multiple Items by Clicking and the Ctrl Key ................ 2-72.3.3.3 Selecting All Items ........................................................................ 2-72.3.3.4 Deselecting All Items .................................................................... 2-7

2.3.4 Closing Windows ....................................................................................... 2-82.3.5 Detaching a Frame from a Window ........................................................... 2-82.3.6 Accessing Help ........................................................................................... 2-82.3.7 Window Option .......................................................................................... 2-8

2.4 Understanding the User Interface ........................................................................ 2-102.4.1 Application Work Area Components ....................................................... 2-10

2.4.1.1 Using the Menu Bar .................................................................... 2-112.4.1.2 Using the Navigation Toolbar ..................................................... 2-132.4.1.3 Using the Topology Toolbar ....................................................... 2-132.4.1.4 Using Pop-Up Menus .................................................................. 2-142.4.1.5 Tree .............................................................................................. 2-152.4.1.6 Alarm Summary View ................................................................. 2-152.4.1.7 Performance Summary View ...................................................... 2-152.4.1.8 Status Bar .................................................................................... 2-152.4.1.9 Display Panel ............................................................................... 2-15

2.4.2 Performing Basic Operations ................................................................... 2-162.4.2.1 Navigating through Active Windows .......................................... 2-162.4.2.2 Detaching a Window from the Client .......................................... 2-16

Page 6: EMS User's Guide

iv WiChorus Confidential Element Management System (EMS) User’s Guide

2.4.2.3 Arranging Windows .................................................................... 2-162.4.2.4 Saving Location and Size of Windows ....................................... 2-172.4.2.5 Closing a Window ....................................................................... 2-17

2.4.3 Performing Table View Operations ......................................................... 2-172.4.3.1 Navigating through the Table ...................................................... 2-192.4.3.2 Setting the Page Length for a Table ............................................ 2-192.4.3.3 Refreshing the Page View ........................................................... 2-192.4.3.4 Viewing a Range of Table Details .............................................. 2-192.4.3.5 Sorting Table Details ................................................................... 2-192.4.3.6 Rearranging and Resizing Columns in a Table ........................... 2-202.4.3.7 Viewing Row Details .................................................................. 2-20

2.4.4 Broadcast a Message ................................................................................ 2-21

Chapter 3 Configuration Management ............................................................................................ 3-13.1 Overview ............................................................................................................... 3-23.2 Before You Begin .................................................................................................. 3-33.3 Create a Core Service Network (CSN) .................................................................. 3-4

3.3.1 Create a Top-Level Group - CSN ............................................................... 3-43.4 AAA Server ........................................................................................................... 3-6

3.4.1 Add a AAA Server to a CSN ...................................................................... 3-63.5 Creating Access Service Network (ASN) ............................................................. 3-8

3.5.1 Create a Top-Level Gateway - ASN .......................................................... 3-93.6 Configuring an ASN Gateway ............................................................................ 3-11

3.6.1 Configuration Details ............................................................................... 3-133.6.1.1 Globals Configuration ................................................................. 3-153.6.1.2 Authenticator Parameter Configuration ...................................... 3-163.6.1.3 DHCP Configuration ................................................................... 3-173.6.1.4 Mobile IP FA ............................................................................... 3-183.6.1.5 Mobile IP Proxy Client ................................................................ 3-193.6.1.6 Configure Load Balancing Profile .............................................. 3-203.6.1.7 Subscriber Station Handover Configuration ............................... 3-213.6.1.8 Subscriber Station Handover Signal Optimization ..................... 3-223.6.1.9 OSPF General Group Configuration ........................................... 3-233.6.1.10 OSPF Interfaces ......................................................................... 3-243.6.1.11 OSPF Areas ............................................................................... 3-263.6.1.12 OSPF Area Aggregates ............................................................. 3-273.6.1.13 OSPF Interface Metrics ............................................................. 3-283.6.1.14 OSPF Virtual Interfaces ............................................................ 3-293.6.1.15 OSPF Configured Hosts ............................................................ 3-303.6.1.16 OSPF Configured Neighbors ..................................................... 3-313.6.1.17 Redistribute OSPF Routes ......................................................... 3-323.6.1.18 RIP Global Configuration Details ............................................. 3-333.6.1.19 RIP Interface Configuration ...................................................... 3-343.6.1.20 Redistribute RIP Routes ............................................................ 3-353.6.1.21 Static Routes .............................................................................. 3-363.6.1.22 Installed Routes ......................................................................... 3-373.6.1.23 DNS Settings ............................................................................. 3-383.6.1.24 NTP Servers .............................................................................. 3-39

Page 7: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential v

3.6.2 State .......................................................................................................... 3-403.6.2.1 Managed Basestations ................................................................. 3-403.6.2.2 Neighbor ASN Gateways ............................................................ 3-413.6.2.3 Paging .......................................................................................... 3-423.6.2.4 Configured AAA Servers ............................................................ 3-433.6.2.5 DHCP Server Statistics ............................................................... 3-443.6.2.6 DHCP Lease Table ...................................................................... 3-453.6.2.7 OSPF General Group Configuration ........................................... 3-463.6.2.8 Configured Virtual Neighbors ..................................................... 3-473.6.2.9 Configured Link State Database .................................................. 3-483.6.2.10 RIP Global Configuration Details ............................................. 3-493.6.2.11 Configured RIP Interface Statistics ........................................... 3-503.6.2.12 Configured RIP Peers ................................................................ 3-51

3.7 Creating Basestations .......................................................................................... 3-523.7.1 Create a Basestation - ASN ...................................................................... 3-52

3.8 Mobility Neighbors Configuration ...................................................................... 3-543.8.1 To Assign a Candidate Basestation to Mobility Neighbors ..................... 3-54

3.9 Creating a Paging Group ..................................................................................... 3-563.9.1 To Create a Paging Group ........................................................................ 3-56

Chapter 4 Network Maps ................................................................................................................. 4-14.1 Overview ............................................................................................................... 4-24.2 Performing Network Map Operations ................................................................... 4-3

4.2.1 Viewing Properties ..................................................................................... 4-34.2.1.1 Viewing Network Device Properties ............................................. 4-3

4.2.2 Viewing AAA Server ................................................................................. 4-44.2.3 Viewing Home Agents ............................................................................... 4-44.2.4 Viewing List of ASNs ................................................................................ 4-44.2.5 Viewing Fault ............................................................................................. 4-5

4.2.5.1 Viewing Events ............................................................................. 4-54.2.5.2 Viewing Alarms ............................................................................ 4-64.2.5.3 Viewing Events and Alarms for a Particular Gateway .................. 4-6

4.2.6 Viewing Performance Data of a Device ..................................................... 4-64.2.7 Opening Submaps ....................................................................................... 4-74.2.8 Opening a Basestation List ......................................................................... 4-74.2.9 Filter Neighbors by Basestation ................................................................. 4-84.2.10 Showing Paging Membership .................................................................. 4-94.2.11 Neighbor Basestations ............................................................................ 4-104.2.12 Associated Mobile Stations .................................................................... 4-114.2.13 Updating Status ...................................................................................... 4-124.2.14 Unmanaging a Device ............................................................................ 4-12

4.3 Viewing Chassis Information .............................................................................. 4-134.3.1 Viewing IPP Card Information ................................................................. 4-154.3.2 Viewing MSC Card Information .............................................................. 4-164.3.3 Viewing Port Information ........................................................................ 4-184.3.4 Viewing Interface Metrics ........................................................................ 4-194.3.5 Chassis Activity Modes ............................................................................ 4-20

4.3.5.1 Activity Modes for MSC ............................................................. 4-20

Page 8: EMS User's Guide

vi WiChorus Confidential Element Management System (EMS) User’s Guide

4.3.5.2 Activity Modes for SMM ............................................................ 4-204.4 SSH to Gateway .................................................................................................. 4-21

Chapter 5 Network Views ................................................................................................................ 5-15.1 Overview ............................................................................................................... 5-25.2 Viewing Configured Network ............................................................................... 5-2

5.2.1 Viewing Configured CSNs ......................................................................... 5-25.2.2 Viewing Configured ASNs and ASN Gateways ........................................ 5-25.2.3 Viewing Configured Basestation(s) ........................................................... 5-25.2.4 Viewing Mobility Neighbors ...................................................................... 5-3

5.3 Viewing Subscriber Stations ................................................................................. 5-45.4 Viewing Paging Groups ........................................................................................ 5-55.5 Viewing Home Agents .......................................................................................... 5-6

Chapter 6 Performance Management ............................................................................................... 6-16.1 Overview ............................................................................................................... 6-26.2 Performance Manager ........................................................................................... 6-36.3 ASNGW Metrics ................................................................................................... 6-4

6.3.1 ASNGW Metrics Details ............................................................................ 6-66.3.1.1 Managed Subscribers .................................................................... 6-76.3.1.2 GW Traffic Metrics ....................................................................... 6-76.3.1.3 SS Traffic Metrics ......................................................................... 6-86.3.1.4 RRA Metrics (Radio Resource Allocation) ................................... 6-86.3.1.5 Control IP Statistics ....................................................................... 6-86.3.1.6 Ethernet Statistics .......................................................................... 6-96.3.1.7 Paging Metrics ............................................................................... 6-96.3.1.8 Handover Metrics ........................................................................ 6-10

6.4 JVM Monitoring Details ..................................................................................... 6-116.4.1 Monitoring and Management ................................................................... 6-11

6.4.1.1 BE Server .................................................................................... 6-116.4.1.2 Client ........................................................................................... 6-12

6.4.2 Viewing JVM Monitoring Details ............................................................ 6-12

Chapter 7 Fault Management ........................................................................................................... 7-17.1 Overview ............................................................................................................... 7-27.2 Network Events ..................................................................................................... 7-3

7.2.1 Viewing Network Events ........................................................................... 7-47.2.2 Viewing Event Details ................................................................................ 7-47.2.3 Viewing Related Alarms ............................................................................ 7-67.2.4 Saving Events ............................................................................................. 7-67.2.5 Exporting Events ........................................................................................ 7-67.2.6 Printing Events ........................................................................................... 7-7

7.3 Alarm Management ............................................................................................... 7-87.3.1 Alarm Operations ....................................................................................... 7-87.3.2 Viewing Alarms ......................................................................................... 7-97.3.3 Sorting Alarms ........................................................................................... 7-97.3.4 Searching Alarms ..................................................................................... 7-107.3.5 Exporting Alerts ....................................................................................... 7-10

Page 9: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential vii

7.3.6 Printing Alarms ........................................................................................ 7-107.3.7 Alarm Summary View .............................................................................. 7-11

7.3.7.1 Viewing Alarms .......................................................................... 7-117.3.7.2 Viewing Alarm Details ................................................................ 7-147.3.7.3 Viewing Related Events .............................................................. 7-157.3.7.4 Picking Up / Unpicking an Alarm ............................................... 7-157.3.7.5 Adding Comments to an Alarm ................................................... 7-167.3.7.6 Viewing Alarm History ............................................................... 7-167.3.7.7 Viewing Both Annotation and History of an Alarm ................... 7-177.3.7.8 Saving Alarms ............................................................................. 7-177.3.7.9 Exporting Alarms ........................................................................ 7-177.3.7.10 Printing Alarms ......................................................................... 7-17

Chapter 8 Administration ................................................................................................................. 8-18.1 Overview ............................................................................................................... 8-28.2 Runtime Administration ........................................................................................ 8-3

8.2.1 Configuring Log Settings ........................................................................... 8-48.2.1.1 Opening Log File Configuration Tool ........................................... 8-48.2.1.2 Adding Log Files ........................................................................... 8-58.2.1.3 Viewing Details of Log Files ........................................................ 8-78.2.1.4 Modifying Log Files ...................................................................... 8-8

8.3 Security Administration ...................................................................................... 8-108.3.1 Security Levels ......................................................................................... 8-10

8.3.1.1 User Access Levels ..................................................................... 8-108.3.2 Adding Users ............................................................................................ 8-118.3.3 Changing User Profile .............................................................................. 8-158.3.4 Assigning Groups to Users ....................................................................... 8-168.3.5 Changing User Password .......................................................................... 8-178.3.6 Managing Audit Trails ............................................................................. 8-17

8.3.6.1 Viewing Audit Trails of All Users .............................................. 8-188.3.6.2 Viewing Audit Trails of a Single User ........................................ 8-198.3.6.3 Sorting Audit Trails ..................................................................... 8-198.3.6.4 Searching the Audit Trails ........................................................... 8-19

8.3.7 Deleting Users .......................................................................................... 8-208.3.8 Managing Operations ............................................................................... 8-20

8.3.8.1 Understanding Default Operations .............................................. 8-208.3.8.2 Assigning Operations .................................................................. 8-268.3.8.3 Adding Operations ...................................................................... 8-278.3.8.4 Deleting Operations ..................................................................... 8-288.3.8.5 Security Management: An Example ............................................ 8-28

8.4 Image Management ............................................................................................. 8-30

Appendix A Glossary ..................................................................................................................... A-1

Page 10: EMS User's Guide

viii WiChorus Confidential Element Management System (EMS) User’s Guide

- This page intentionally left blank -

Page 11: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential ix

00Figures

Figure 2-1 Starting the EMS Server Application .......................................................................... 2-3Figure 2-2 Starting the EMS Application Client ........................................................................... 2-4Figure 2-3 Window Drop Down Menu ......................................................................................... 2-9Figure 2-4 EMS Main Window ................................................................................................... 2-11Figure 2-5 Pop-Up Menu Selections ........................................................................................... 2-14Figure 2-6 Network Events Table View ...................................................................................... 2-18Figure 2-7 Broadcast a Message .................................................................................................. 2-21Figure 3-1 Creating a Core Services Network (CSN) ................................................................... 3-4Figure 3-2 Adding a CSN .............................................................................................................. 3-5Figure 3-3 Adding a AAA Server to a CSN .................................................................................. 3-7Figure 3-4 ASN Configuration ...................................................................................................... 3-9Figure 3-5 Add an ASN ............................................................................................................... 3-10Figure 3-6 Configure ASNGW Details ....................................................................................... 3-11Figure 3-7 Interface Configuration .............................................................................................. 3-12Figure 3-8 View ASNGW Detail Information (Interface Configuration) ................................... 3-13Figure 3-9 Globals Configuration ................................................................................................ 3-15Figure 3-10 Authenticator Parameter Configuration ..................................................................... 3-16Figure 3-11 DHCP Configuration ................................................................................................. 3-17Figure 3-12 Mobile IP FA ............................................................................................................. 3-18Figure 3-13 Mobile IP Proxy Client .............................................................................................. 3-19Figure 3-14 Configure Load Balancing Profile ............................................................................. 3-20Figure 3-15 Subscriber Station Handover Configuration .............................................................. 3-21Figure 3-16 SS Handover Signal Optimization ............................................................................. 3-22Figure 3-17 OSPF General Group Configuration .......................................................................... 3-23Figure 3-18 OSPF Interfaces ......................................................................................................... 3-24Figure 3-19 OSPF Areas ................................................................................................................ 3-26Figure 3-20 OSPF Area Aggregates .............................................................................................. 3-27Figure 3-21 OSPF Interface Metrics ............................................................................................. 3-28Figure 3-22 OSPF Virtual Interfaces ............................................................................................. 3-29Figure 3-23 OSPF Configured Hosts ............................................................................................. 3-30Figure 3-24 OSPF Configured Neighbors ..................................................................................... 3-31Figure 3-25 Redistribute OSPF Routes ......................................................................................... 3-32Figure 3-26 RIP Global Configuration Details .............................................................................. 3-33Figure 3-27 RIP Interface Configuration ....................................................................................... 3-34Figure 3-28 Redistribute RIP Routes ............................................................................................. 3-35Figure 3-29 Static Routes .............................................................................................................. 3-36Figure 3-30 Installed Routes .......................................................................................................... 3-37Figure 3-31 DNS Settings .............................................................................................................. 3-38Figure 3-32 NTP Servers ............................................................................................................... 3-39Figure 3-33 Managed Basestations ................................................................................................ 3-40Figure 3-34 Neighbor ASN Gateways ........................................................................................... 3-41Figure 3-35 Paging ........................................................................................................................ 3-42

Page 12: EMS User's Guide

x WiChorus Confidential Element Management System (EMS) User’s Guide

Figure 3-36 Configured AAA Servers ........................................................................................... 3-43Figure 3-37 DHCP Server Statistics .............................................................................................. 3-44Figure 3-38 DHCP Lease Table .................................................................................................... 3-45Figure 3-39 OSPF General Group Configuration .......................................................................... 3-46Figure 3-40 Configured Virtual Neighbors ................................................................................... 3-47Figure 3-41 Configured Link State Database ................................................................................ 3-48Figure 3-42 RIP Global Configuration Details .............................................................................. 3-49Figure 3-43 Configured RIP Interface Statistics ........................................................................... 3-50Figure 3-44 Configured RIP Peers ................................................................................................ 3-51Figure 3-45 Add a Basestation ...................................................................................................... 3-52Figure 3-46 Mobility Neighbors Configuration ............................................................................ 3-54Figure 3-47 Creating a Paging Group ............................................................................................ 3-56Figure 3-48 Add a Paging Group .................................................................................................. 3-57Figure 4-1 List of ASNs for a Specified CSN ............................................................................... 4-5Figure 4-2 ASN Gateway Events and Alarms ............................................................................... 4-6Figure 4-3 Opening a Basestation List .......................................................................................... 4-7Figure 4-4 Filtering Neighbors by Basestation .............................................................................. 4-8Figure 4-5 Show Paging Membership ........................................................................................... 4-9Figure 4-6 Viewing List of Mobility Neighbors ......................................................................... 4-10Figure 4-7 Associated Mobile Stations ....................................................................................... 4-11Figure 4-8 Viewing Chassis Information (Front View) .............................................................. 4-13Figure 4-9 Viewing Chassis Information (Behind Front Bezel) ................................................. 4-14Figure 4-10 Viewing Chassis Information (Rear View) ............................................................... 4-14Figure 4-11 Board Details ............................................................................................................. 4-15Figure 4-12 Chassis Details ........................................................................................................... 4-16Figure 4-13 Board Level Resource Information - Memory .......................................................... 4-17Figure 4-14 Port Configuration Details ......................................................................................... 4-18Figure 4-15 Interface Metrics ........................................................................................................ 4-19Figure 4-16 Enter SSH Authorization Required ............................................................................ 4-21Figure 4-17 SSH Command Shell ................................................................................................. 4-22Figure 5-1 Viewing Mobility Neighbors ....................................................................................... 5-3Figure 5-2 Subscriber Station Filter Criteria ................................................................................. 5-4Figure 5-3 Paging Groups .............................................................................................................. 5-5Figure 5-4 Home Agents ............................................................................................................... 5-6Figure 6-1 ASNGW Metrics Performance Summary .................................................................... 6-4Figure 6-2 ASNGW Metrics Details ............................................................................................. 6-5Figure 6-3 GW Traffic Metrics - Incoming Octets Chart .............................................................. 6-6Figure 6-4 JVM Monitoring Details - Tabular View .................................................................. 6-13Figure 7-1 Network Events Screen ................................................................................................ 7-4Figure 7-2 Viewing Network Event Details .................................................................................. 7-5Figure 7-3 Exporting Data ........................................................................................................... 7-10Figure 7-4 Alarm Summary Tabular View .................................................................................. 7-12Figure 7-5 Graphical View - Bar Graph ...................................................................................... 7-13Figure 7-6 Pie Chart Alarm Summary View ............................................................................... 7-13Figure 7-7 Alarm Details ............................................................................................................. 7-14Figure 8-1 Runtime Administration .............................................................................................. 8-3Figure 8-2 Logging Configuration ................................................................................................ 8-5

Page 13: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential xi

Figure 8-3 Adding Log Settings Information ................................................................................ 8-5Figure 8-4 Add Log Settings Information (continued) .................................................................. 8-6Figure 8-5 Viewing Log Details .................................................................................................... 8-7Figure 8-6 Modifying Log Detail Information .............................................................................. 8-8Figure 8-7 Modifying Log Detail Information (continued) ........................................................... 8-9Figure 8-8 Security Administration ............................................................................................. 8-11Figure 8-9 User Administration ................................................................................................... 8-12Figure 8-10 User Account and Password Expiry .......................................................................... 8-12Figure 8-11 Assigning Groups for Users ....................................................................................... 8-13Figure 8-12 Permission for Groups: Users .................................................................................... 8-14Figure 8-13 Changing User Profile ............................................................................................... 8-15Figure 8-14 Select Groups ............................................................................................................. 8-16Figure 8-15 Auth Audit ................................................................................................................. 8-18Figure 8-16 Operation Tree Configuration .................................................................................... 8-21Figure 8-17 Permitted Operations for User ................................................................................... 8-26Figure 8-18 Assign Permissions .................................................................................................... 8-27Figure 8-19 Image Management .................................................................................................... 8-30

Page 14: EMS User's Guide

xii WiChorus Confidential Element Management System (EMS) User’s Guide

- This page intentionally left blank -

Page 15: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential xiii

00Tables

Table 2-1 EMS Main Menu Selection ......................................................................................... 2-12Table 2-2 WiMax Topology Map Toolbar .................................................................................. 2-13Table 2-3 EMS Navigation Buttons............................................................................................. 2-19Table 3-1 Add CSN ....................................................................................................................... 3-5Table 3-2 AAA Server ................................................................................................................... 3-7Table 3-3 Add an ASN ................................................................................................................ 3-10Table 3-4 Interface Configuration Port Information.................................................................... 3-12Table 3-5 Globals Configuration ................................................................................................. 3-15Table 3-6 Authenticator Parameter Configuration ...................................................................... 3-16Table 3-7 DHCP Configuration ................................................................................................... 3-17Table 3-8 Mobile IP FA............................................................................................................... 3-18Table 3-9 Mobile IP Proxy Client................................................................................................ 3-19Table 3-10 Configure Load Balancing Profile............................................................................. 3-20Table 3-11 Subscriber Station Handover Configuration ............................................................. 3-21Table 3-12 SS Handover Signal Optimization ............................................................................ 3-22Table 3-13 OSPF General Group Configuration ......................................................................... 3-23Table 3-14 OSPF Interfaces......................................................................................................... 3-25Table 3-15 OSPF Areas ............................................................................................................... 3-26Table 3-16 OSPF Area Aggregates.............................................................................................. 3-27Table 3-17 OSPF Interface Metrics ............................................................................................. 3-28Table 3-18 OSPF Virtual Interfaces ............................................................................................ 3-29Table 3-19 OSPF Configured Hosts ............................................................................................ 3-30Table 3-20 OSPF Configured Neighbors..................................................................................... 3-31Table 3-21 Redistribute OSPF Routes......................................................................................... 3-32Table 3-22 RIP Global Configuration Details ............................................................................. 3-33Table 3-23 RIP Interface Configuration ...................................................................................... 3-35Table 3-24 Redistribute RIP Routes ............................................................................................ 3-36Table 3-25 Static Routes.............................................................................................................. 3-37Table 3-26 Installed Routes ......................................................................................................... 3-37Table 3-27 DNS Settings ............................................................................................................. 3-38Table 3-28 NTP Servers .............................................................................................................. 3-39Table 3-29 Managed Basestations ............................................................................................... 3-40Table 3-30 Neighbor ASN Gateways .......................................................................................... 3-41Table 3-31 Paging........................................................................................................................ 3-42Table 3-32 Configured AAA Servers .......................................................................................... 3-43Table 3-33 DHCP Server Statistics ............................................................................................. 3-44Table 3-34 DHCP Lease Table .................................................................................................... 3-45Table 3-35 OSPF General Group Configuration ......................................................................... 3-46Table 3-36 Configured Virtual Neighbors................................................................................... 3-47Table 3-37 Configured Link State Database................................................................................ 3-48Table 3-38 RIP Global Configuration Details ............................................................................. 3-49Table 3-39 Configured RIP Interface Statistics ........................................................................... 3-50

Page 16: EMS User's Guide

xiv WiChorus Confidential Element Management System (EMS) User’s Guide

Table 3-40 Configured RIP Peers ................................................................................................ 3-51Table 3-41 Add a Basestation...................................................................................................... 3-53Table 3-42 Add Paging Group..................................................................................................... 3-57Table 4-1 Board Details ............................................................................................................... 4-15Table 4-2 Resource Information for the IPP Card ....................................................................... 4-17Table 4-3 Port Configuration Details........................................................................................... 4-18Table 6-1 BE Server Arguments.................................................................................................. 6-11Table 6-2 Client Parameters ........................................................................................................ 6-12Table 7-1 Event Details Properties ................................................................................................ 7-5Table 7-2 Alarm Color Codes........................................................................................................ 7-8Table 8-1 Administrative Operation ............................................................................................ 8-21Table 8-2 Security Administration .............................................................................................. 8-22Table 8-3 Services ....................................................................................................................... 8-22Table 8-4 Events .......................................................................................................................... 8-22Table 8-5 Topology ..................................................................................................................... 8-23Table 8-6 Policy........................................................................................................................... 8-23Table 8-7 User Administration .................................................................................................... 8-23Table 8-8 Trap Parsers and Filters ............................................................................................... 8-24Table 8-9 Alerts ........................................................................................................................... 8-24Table 8-10 Configuration............................................................................................................. 8-24Table 8-11 Maps .......................................................................................................................... 8-24Table 8-12 Polling Units.............................................................................................................. 8-25Table 8-13 Polling Object............................................................................................................ 8-25Table 8-14 Threshold Object ....................................................................................................... 8-25Table 8-15 Poll Filters ................................................................................................................. 8-25Table 8-16 Provisioning............................................................................................................... 8-25

Page 17: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential 1-1

Chapter 1 Element Management System

This chapter provides a product overview of the Element Management System (EMS) for all SmartCore™ Family of Products.

The chapter contains the following sections:

• WiMax Network Overview

– EMS Application Overview

– Configuration Management

– Performance Management

– Fault Management

– Security Management

– Administration

– Benefits

Page 18: EMS User's Guide

1-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Element Management System

1.1 WiMax Network Overview

1.1.1 EMS Application Overview

The Element Management System (EMS) is a suite of servers and a graphical user interface (GUI) oriented applications that are capable of managing a network of geographically distributed network elements or network devices. This is accomplished by exchanging management data between management consoles at remote sites with a management station at the main site. A distributed architecture also allows personnel to manage their networks from remote sites.

Most element management architectures use the same basic structure and set of relationships. End stations (managed devices), such as computer systems and other network devices, run software that enables them to send alerts when they recognize problems (for example, when one or more user-determined thresholds are exceeded). Upon receiving these alerts, management entities are programmed to react by executing one, several, or a group of actions, including operator notification, event logging, system shutdown, and automatic attempts at system repair.

Management entities also can poll end stations to check the values of certain variables. Polling can be automatic or user-initiated, but agents in the managed devices respond to all polls. Agents are software modules that first compile information about the managed devices in which they reside, then store this information in a management database, and finally provide it (pro actively or reactively) to management entities within element management system (EMS) via a network management protocol. Well-known network management protocols include the Simple Network Management Protocol (SNMP) and Common Management Information Protocol (CMIP). Management proxies are entities that provide management information on behalf of other entities.

1.1.2 Configuration Management

The goal of configuration management is to enable setting up the network devices and their configurations so as to establish the desired operational network topology. It also facilitates monitoring the configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed.

Each network device has a variety of information associated with it. An engineering workstation, for example, may be configured.

Configuration management subsystems store this information in a database for easy access. When a problem occurs, this database can be searched for clues that may help solve the problem.

Refer to Chapter 3, “Configuration Management,” on page 3-1.

Page 19: EMS User's Guide

WiMax Network Overview

Element Management System (EMS) User’s Guide WiChorus Confidential 1-3

1.1.3 Performance Management

The goal of performance management is to measure and make available various aspects of network performance so that internetwork performance can be maintained at an acceptable level. Examples of performance variables that might be provided include network throughput, user response times, and line utilization.

Performance management involves three main steps. First, performance data is gathered on variables of interest to network administrators. Second, the data is analyzed to determine normal (baseline) levels. Finally, appropriate performance thresholds are determined for each important variable so that exceeding these thresholds indicates a network problem worthy of attention.

Management entities within EMS continually monitor performance variables.

Each of the steps just described is part of the process to set up a reactive system. When performance becomes unacceptable because of an exceeded user-defined threshold, the system reacts by sending a message.

Refer to Chapter 6, “Performance Management,” on page 6-1.

1.1.4 Fault Management

The goal of fault management is to detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running effectively. Because faults can cause downtime or unacceptable network degradation, fault management is perhaps the most crucial component.

Fault management involves first determining symptoms and isolating the problem. Then the problem is fixed and the solution is tested on all-important subsystems. Finally, the detection and resolution of the problem is recorded.

Refer to Chapter 7, “Fault Management,” on page 7-1.

1.1.5 Security Management

The goal of security management is to control access to network resources according to local guidelines so that the network cannot be sabotaged (intentionally or unintentionally) and sensitive information cannot be accessed by those without appropriate authorization. A security management subsystem, for example, can monitor users logging on to a network resource and can refuse access to those who enter inappropriate access codes.

Security management subsystems work by partitioning network resources into authorized and unauthorized areas. For some users, access to any network resource is inappropriate, mostly because such users are usually company outsiders. For other (internal) network users, access to information originating from a particular department is inappropriate. Access to Human Resource files, for example, is inappropriate for most users outside the Human Resources department.

Security management subsystems perform several functions. They identify sensitive network resources (including systems, files, and other entities) and determine mappings between sensitive network resources and user sets. They also monitor access points to sensitive network resources and log inappropriate access to sensitive network resources.

Page 20: EMS User's Guide

1-4 WiChorus Confidential Element Management System (EMS) User’s Guide

Element Management System

1.1.6 Administration

The Administration tool provides access to runtime administration, security administration and image management capabilities. Refer to Chapter 8, “Administration,” on page 8-1.

1.1.7 Benefits• Centralized Element Management Platform

To achieve greater business successes, networks must adapt well with ever-evolving applications and business environment. Stability and top service quality are the fundamental for daily business operation. As network size grows, it can be a challenge to maintain the network and react to possible network failures promptly. Especially when the network is large and geographically distributed.

To simplify network management, EMS (Element Management System) provides a centralized management platform that allows administrators and network operators to easily maintain and monitor each WiMax network and gateway from a single computer. This allows effective network management.

• Intuitive Hassle-free Operation Interface

With intuitive and user-friendly graphical user interface (GUI), EMS polls network element status and presents the graphical topology in the WiMax Topology Map Viewer. Furthermore, double-click an icon to see the front panel graphical view and get real-time element status updates.

• Network Health Monitoring and Management

It is vital to monitor network traffic to be aware of any abnormal activity. The EMS allows you to monitor network traffic and generate graphical report down to the port level.

In addition, event and alarm management tools can capture SNMP traps and the occurrences and the relevant details as events and in generate alarms as needed.

Event logs are displayed in different colors to indicate the event severity level (Minor, Major or Critical). Actions can be triggered by trap automatically without manual initiation; thus leaves flexibility and convenience to network managers.

• Complete Screen-Based Element Management

With EMS, network maintenance is just a few simple mouse clicks away. Multi-site network operation and maintenance become easier than ever before. You can remotely perform general device maintenance (such as firmware upgrade and configuration file backup/restore) on more than one device on the network. With complete system management features, efficient device monitoring and configuration allow for better network quality and can be cost-effective.

• Strict Secure Access Management

Tight access control is essential for a secure network. In the EMS, access to configuration screens and/or status screens are strictly based on user name, password, user's computer IP address and user account category. The three user categories give login accounts different administration authority. The EMS allows up to 10 users to log in at a time. Information such as the user ID, user group, IP address, configuration actions and time is logged for security reasons. So network managers know who logged in, and what time.

Page 21: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential 2-1

Chapter 2 Initial EMS Configuration

This chapter describes how to configure the Element Management System (EMS).

This chapter contains the following sections:

• Overview

• Using the EMS Application

• EMS Navigation Tools

• Understanding the User Interface

• Broadcast a Message

Page 22: EMS User's Guide

2-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

2.1 Overview

The Element Management System (EMS) uses a graphical layout of the application, explains how to navigate through the GUI, and describes how to configure devices.

These sections outline simple application principals used within the Element Management System:

• Starting the EMS Application

• Using the Mouse

• Using Shortcut Keys

• Selecting from Lists in EMS

• Closing Windows

• Detaching a Frame from a Window

• Accessing Help

• Window Option

• Application Work Area Components

• Performing Basic Operations

• Performing Table View Operations

• Broadcast a Message

Page 23: EMS User's Guide

Using the EMS Application

Element Management System (EMS) User’s Guide WiChorus Confidential 2-3

2.2 Using the EMS Application

The EMS application uses many standard conventions employed in other Linux based software applications.

2.2.1 Starting the EMS Application

You must first start the EMS server components before running the EMS application. You can start the server components by double-clicking the "Start EMS Server" icon as shown in Figure 2-1.

Figure 2-1 Starting the EMS Server Application

Page 24: EMS User's Guide

2-4 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

Starting the EMS Application:

Once the server has started successfully, you can start the EMS client application by double-clicking the "Application Client" icon as shown in Figure 2-2.

Figure 2-2 Starting the EMS Application Client

2.2.1.1 Logging In

When you run the EMS application, the User Authentication dialog box appears.

Your username and password prevents unauthorized users from accessing your device configuration. Only an administrator can create a new user. Users, however, can change their own passwords.

To log in to the EMS application, perform the following:

1. Select your username from the User Name drop-down list.

2. Enter your password. Then click OK to proceed.

If an unknown user name or password is entered, an error message is displayed.

3. Click OK to clear the error message, then enter a valid user name and corresponding password.

You have three attempts to specify a valid user name and corresponding password. When you specify a valid user name and password, the session starts and the EMS window, is displayed. If, after three

Page 25: EMS User's Guide

Using the EMS Application

Element Management System (EMS) User’s Guide WiChorus Confidential 2-5

attempts, you do not specify a valid user name and password, the session does not start and the Login window closes.

2.2.1.2 Administrator

To log in as the default administrator:

1. For initial login, accept the default username: root

2. Enter the default password: public

3. Click OK.

You can change the default admin password (admin), but you cannot change or delete the default username (admin).

As the network administrator, you can create a new name and password with admin privileges and assign them to yourself or to another user.

2.2.1.3 Exiting the Application

From the Menu bar, choose File > Exit or press Alt+F4 or click the "X" to close the window. All active applications are closed and the session terminates.

Note:When you are logged in to the EMS application, you can change your default password.

Note:It is strongly recommended that you change the admin password and store it in a secure location.

Page 26: EMS User's Guide

2-6 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

2.3 EMS Navigation Tools

You can use either the mouse or the keyboard to access the various features provided by EMS. The mouse buttons are used for the functions listed below.

If you are unsure of what an icon means, hold the cursor over any icon, and the tooltip appears.

2.3.1 Using the Mouse

Each button on the mouse is used for different functions. This of course depends on the type of mouse.

• Click the left mouse button to:

– Choose

– Activate

– Set the location of the cursor

• Click the middle mouse button to:

– Copy

– Move

– Drag

• Click the right mouse button to:

– Access pop up menus

– Display object name

Note:If you change the mouse settings, you must restart the EMS for the changes to take effect.

Page 27: EMS User's Guide

EMS Navigation Tools

Element Management System (EMS) User’s Guide WiChorus Confidential 2-7

2.3.2 Using Shortcut Keys

Standard EMS menus are available from the Menu bar. Items in the windows may be presented with the first (initial) letter underlined; for example, Forward. This means you can either choose this option by left-clicking the mouse, or you can type the shortcut key Ctrl+Shift+F (in this example) from the keyboard. EMS uses the following function keys:

• Ctrl+

• Ctrl+Shift +

• Alt+

• Function Key only (i.e., F4)

2.3.3 Selecting from Lists in EMS

2.3.3.1 Selecting Multiple Items by Clicking and the Shift Key

1. Select the first item. The item is highlighted.

2. Press and hold the Shift key.

3. Select the last item in the sequence.

4. Release the Shift key. All items between the first and last item are highlighted.

2.3.3.2 Selecting Multiple Items by Clicking and the Ctrl Key

1. Select a relevant item in the list. The item is highlighted.

2. Place the cursor over the next item to be selected.

3. Press Ctrl and click the left mouse button. The item is highlighted.

4. Repeat Step 3 until all the required items are highlighted.

2.3.3.3 Selecting All Items

1. Place the cursor anywhere in the relevant window.

2. Press and hold the right mouse button. A pop up menu is displayed.

3. Move the cursor to the Select All option. All items are highlighted. Note, this option may not be available in all windows.

2.3.3.4 Deselecting All Items

1. Place the cursor anywhere in the relevant window.

2. Press and hold the right mouse button. A pop up menu is displayed.

3. Move the cursor anywhere in the window to deselected. Note, this option may not be available in all windows.

Note:When a menu option is greyed out, it is not available for selection.

Page 28: EMS User's Guide

2-8 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

2.3.4 Closing Windows1. From the Menu bar, choose File > Close or

2. Press Ctrl+Shift+C keys simultaneously to close the displayed window.

3. To close all active windows, choose File > Close All > or

4. Press Ctrl+Shift+O keys simultaneously to close all displayed windows.

2.3.5 Detaching a Frame from a Window1. From the Menu bar, choose File > Detach or

2. Press Ctrl+Shift+T keys simultaneously to detach the displayed window. Once the window is detached from the EMS work area, the menu selections that correspond with that particular window will now be displayed within that detached window.

To re-attach the window, click the X "Close Window" icon on the detached window. This will automatically re-position the window back into the EMS application frame.

2.3.6 Accessing Help

Each window has the option to click the Help icon or to choose Help from the menu bar. A list of help topics is displayed.

2.3.7 Window Option

The window menu displays the set of windows already open, selecting one from the list allows you to switch to that window, as shown in Figure 2-3.

Page 29: EMS User's Guide

EMS Navigation Tools

Element Management System (EMS) User’s Guide WiChorus Confidential 2-9

Figure 2-3 Window Drop Down Menu

Drop-Down Menu

Page 30: EMS User's Guide

2-10 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

2.4 Understanding the User Interface

The EMS application presents the management information in two representations. It can be viewed in the form of graphical maps or as tabular views. This includes fault management, performance management, and provisioning.

This section describes the graphical user interface (GUI) of the EMS application, which you use to manage and monitor the devices.

The following topics are covered in this section:

• Application Work Area Components

• Performing Basic Operations

• Performing Table View Operations

• Broadcast a Message

2.4.1 Application Work Area Components

When you log on to the Application, the EMS main screen is the default window displayed. The basic components of the Application work area are:

• Using the Menu Bar

• Using the Navigation Toolbar

• Using the Topology Toolbar

• Using Pop-Up Menus

• Tree

• Alarm Summary View

• Performance Summary View

• Status Bar

• Display Panel

Page 31: EMS User's Guide

Understanding the User Interface

Element Management System (EMS) User’s Guide WiChorus Confidential 2-11

The EMS application uses several windows throughout the screen. Each window is composed of eight areas. They are; Menu Bar, Toolbar, Topology Toolbar, Tree area, Alarm Summary View, Performance Summary View, Display Panel, and Status Bar as shown in Figure 2-4.

Figure 2-4 EMS Main Window

2.4.1.1 Using the Menu Bar

A menu bar consists of components that are positioned at the top edge of the Display area. By clicking the menu and choosing a particular menu item, the preferred function can be performed. The menu bar differs from screen to screen based on the functions and also based on your privileges as a user. For instance, the Fault Management module has additional menu items, such as Actions. But certain menu items, such as File, Tools, Window, and Help are common for the complete Application Client.

The menu bar lets you execute commands that are related to each of the menu items as well as sub-menu items. Additional menu items will display depending on the configuration and management options selected. These are explained throughout this document. Table 2-1 describes some of the menu bar selections.

Menu BarNavigation Toolbar

Tree area

Display Panel

Performance Summary View

Alarm Summary View

Status Bar

Topology Toolbar

Page 32: EMS User's Guide

2-12 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

Table 2-1 EMS Main Menu Selection

Menu Command Action

File

Back Moves Back a screen.

Forward Moves Forward a screen.

Detach Releases or unlocks the current screen to allow for movement.

Close Closes the current screen displayed.

Close All Closes all the screens displayed.

Broadcast Message This allows on-the-fly messaging to a Field Service Engineer or to All Clients.

Exit Exits the EMS application.

Tools

Runtime Administration The will open the Runtime Administration screen for Logging Configuration Settings.

Security Administration This will open the Security Administration screen to set Groups and Users security operations.

Change Password Allows the system administrator to change existing password along with time frame specifications.

Debug Mode Check this box to enabled "Debug Mode" in the client. All client operations can be logged in the client logs.

Client Details The Client Details in the client cache can be logged by enabling the "Client Details" option.

JVM Monitoring Details

The collected memory and thread information of the EMS JVM can be viewed in the following formats: Line Chart, Bar Chart, Area Chart, Scatter Chart, XY Step Chart, and Table.

Window

WiChorus EMS Network Maps (Example)A list of all open windows will display here. You can select any window from the list to display by clicking on the dial button.

Cascade This will display all open windows in a Cascade view. One window diagonally on top of the other.

Tile Horizontal This will display all open windows in a Tile "Horizontal" view.

Tile Vertical This will display all open windows in a Tile "Vertical" view.

Save Location and Size This will save the location and size of all open windows for the next time you log in.

Show Toolbar Select this check box to display the tool bar at the top of the window or uncheck the box to hide the tool bar.

Help Help Contents Displays a list of help features for the EMS application.

Page 33: EMS User's Guide

Understanding the User Interface

Element Management System (EMS) User’s Guide WiChorus Confidential 2-13

2.4.1.2 Using the Navigation Toolbar

Toolbar is a component that displays a collection of actions, commands, or control functions. Toolbar is useful to display the frequently used components. It is placed below the menu bar and consists of various tools for different nodes. A tool tip is provided for each tool, which indicates the operations performed by them.

The navigation toolbar area displays simple icons for a one-click access to move forward, move backward, detach current window, access to system administrator options, and quick help instructions. Figure 2-4 illustrates the navigation toolbar.

Show/Hide the Toolbar

The Toolbar will be displayed when logging into the EMS application. There are two ways to hide the toolbar. The first one is to uncheck the box next to the Show Toolbar from the Windows drop-down menu selection. The second option is to place the mouse cursor next to the active selection tab near the Toolbar icons. The Show/Hide Toolbar will display, click to hide or show.

On performing either of the above two options, the navigation button changes from vertical to horizontal position.

2.4.1.3 Using the Topology Toolbar

Topology Toolbar is a component within the Display Panel that displays a collection of actions, commands, or control functions. Topology Toolbar is useful to display the frequently used components within the WiMax Network Maps screens. It is placed within the WiMax Topology Display Panel.

The topology toolbar area displays simple icons for a one-click access to select mode, zoom window, zoom mode, zoom in, zoom out, cut, copy, paste, undo last action, and a glide bar to zoom in and out of a specific area within the Topology map. Figure 2-4 illustrates the topology toolbar. Table 2-2 describes the Topology Map Toolbar functions.

Table 2-2 WiMax Topology Map Toolbar

Toolbar Option Description

Select ModeThe Select option is used to select a map symbol in the map view, which is indicated by enclosing it within four blocks. You can select only one map symbol at a time using this option.

Zoom Window

This option displays the Zoom Overview window highlighting the area of the Map (with red bars) which is being zoomed.Click and drag the red bar to run through the open map.This option is useful when there are many map symbols displayed in the map view, wherein you can find the exact location of the map symbol.

Zoom Mode

This tool enables you to zoom in map symbols in a map. This option is used for viewing the enlarged version of a specific map symbol.When using this option, the map symbols cannot be selected. They can only be enlarged. If you need to select map symbols in the enlarged view, click the Select Mode option and then select the map symbols.

Zoom In

Click Zoom In for an enlarged view of the selected map. The selected map is zoomed at the center.The difference between Zoom Mode and Zoom In options is that, Zoom Mode is used to enlarge a specific map symbol or an area of the map, whereas the Zoom In option is used to enlarge the complete map from the center.

Page 34: EMS User's Guide

2-14 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

2.4.1.4 Using Pop-Up Menus

If you select an instance or object type and then click the right mouse button, a pop-up menu appears. Available commands relative to the selected object appear. If the command appears dimmed, it is not available.

Figure 2-5 Pop-Up Menu Selections

Zoom Out Retracts the zoomed map. With every click on the tool, the Map retracts by one size.

Cut Click on a map symbol within the WiMax Topology window and click Cut. This will cut the selected item from the map.

CopyClick on a map symbol within the WiMax Topology window and click Copy. This will place the selected icon within the Windows Clipboard to either Cut or Paste it within the WiMax Topology window.

Paste Click Paste to paste the item within the Windows Clipboard to the selected area in the WiMax Topology window.

Undo Click Undo to undo previous command.

Note:After selecting an object in the tree or work area, you can click the right mouse button anywhere within the EMS application to display its pop-up menu.

Table 2-2 WiMax Topology Map Toolbar (continued)

Toolbar Option Description

Pop-Up Menu

Page 35: EMS User's Guide

Understanding the User Interface

Element Management System (EMS) User’s Guide WiChorus Confidential 2-15

For more information on how to use the shortcut keys refer to Section 2.3.2 , "Using Shortcut Keys" on page 2-7.

2.4.1.5 Tree

The Tree present on the left-side of the Application displays set of hierarchical data (refer to Figure 2-4). The fundamental object in a tree is called a node, which represents a data item in the given hierarchical set. Thus, a tree is composed of one or more nodes. The root node is the top node of the hierarchical data. Nodes inside the root nodes are called child nodes. By choosing a particular node, the corresponding panel is displayed on the right-side display panel.

2.4.1.6 Alarm Summary View

The Alarm Summary View panel shows the alarm count of each Alarm group. Within each group, alarms of appropriate severity are shown. The Alarm Summary View panel is located below the Application tree (see Figure 2-4). On clicking the count displayed in the Alarm Summary View panel, the alarms of specific severity for that alarm group are displayed in the corresponding Alarm panel. This panel is updated automatically and the counts can be seen all the time, irrespective of the functional view, be it maps or events that are chosen.

2.4.1.7 Performance Summary View

The Performance Summary View panel shows the performance of each Gateway. The Performance Summary View panel is located just below the Alarm Summary View (see Figure 2-4). Running the mouse arrow over the performance summary area will display a Tool tip with a brief description of specific Gateway criteria.

2.4.1.8 Status Bar

The Status Bar is present at the bottom of the screen (see Figure 2-4). It indicates the status of the ongoing process, i.e., it displays Done if all the data is loaded and displays loading... if the process is still going on. The transformation of the color of the status bar from dark blue to green takes place while loading the Application Client.

2.4.1.9 Display Panel

The display panel is displayed on the right-side of Application Client and appears as a window within the main window (see Figure 2-4). This panel is shown when a tree node is selected. For example, if you click Fault Management > Network Events on the tree, the Network Events display panel is displayed on the right-side.

Page 36: EMS User's Guide

2-16 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

2.4.2 Performing Basic Operations

This section describes the following basic window operations:

• Navigating through Active Windows

• Detaching a Window from the Client

• Arranging Windows

• Saving Location and Size of Windows

• Closing a Window

2.4.2.1 Navigating through Active Windows

When many windows are open in the display panel, you can move forward to the next active screen or move back to the previous one.

1. To move back to the previous window, from the File menu, choose Back or

2. Click Go Back to Previous on the toolbar or

3. Press Ctrl+Shift+B keys simultaneously.

4. To move to the next window, from File menu, choose Forward or

5. Click Go Forward to Next on the toolbar or

6. Press Ctrl+Shift+F keys simultaneously.

2.4.2.2 Detaching a Window from the Client

To detach a window from the display panel of the Application Client and view it as a separate window, perform the following procedures:

1. From File menu, choose Detach or

2. Click Detach Current Window on the toolbar or

3. Press Ctrl+Shift+T keys simultaneously.

2.4.2.3 Arranging Windows

You can arrange windows horizontally, vertically, or as a cascade of windows.

1. To tile all the open windows horizontally, from the Window menu, choose Tile Horizontal.

2. To tile all the open windows vertically, from the Window menu, choose Tile Vertical.

3. To display a cascade of all the open windows, from the Window menu, choose Cascade. The windows overlap each other with their title bars visible.

Page 37: EMS User's Guide

Understanding the User Interface

Element Management System (EMS) User’s Guide WiChorus Confidential 2-17

2.4.2.4 Saving Location and Size of Windows

When you rearrange and resize windows, you need to save them to retain the same location and size. To save location and size after rearranging and resizing windows, from the Window menu, choose Save Location and Size.

You will be able to see the retained location and size if you close and reopen the same panel when you reopen the Application Client (If you close the application client and reopen the Application client the positions will not be retained).

2.4.2.5 Closing a Window

To close the current active window, perform the following procedures.

1. From File menu, choose Close or

2. Press Ctrl+Shift+C keys simultaneously.

To close all the open windows, perform the following procedures.

1. From File menu, choose Close All or

2. Press Ctrl+Shift+O keys simultaneously.

2.4.3 Performing Table View Operations

Table View refers to the display panel that you can view on the right side of the Application Client. For instance, clicking on Alarms under Fault Management displays a panel on the right side that shows a table containing details of the generated alarms.

Figure 2-6 depicts a Network Events Table View.

Page 38: EMS User's Guide

2-18 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

Figure 2-6 Network Events Table View

The table views are available only in Fault Management, Network Database, and Configured Collection modules and they differ from module to module.

The following topics are covered in this section:

• Navigating through the Table

• Setting the Page Length for a Table

• Refreshing the Page View

• Viewing a Range of Table Details

• Sorting Table Details

• Rearranging and Resizing Columns in a Table

• Viewing Row Details

Page 39: EMS User's Guide

Understanding the User Interface

Element Management System (EMS) User’s Guide WiChorus Confidential 2-19

2.4.3.1 Navigating through the Table

This section explains the ways in which you can navigate through the table.

The four navigator buttons, First Page, Previous Page, Next Page, and Last Page are located at the top of each table. The purpose of these buttons is detailed in Table 2-3.

2.4.3.2 Setting the Page Length for a Table

To display only a certain number of rows per page, select the value from the Page Length drop-down box.

2.4.3.3 Refreshing the Page View

To refresh the page view, perform the following procedures.

1. Click the right mouse button on a row and click Refresh or

2. From View menu, choose Refresh or

3. Press F5.

2.4.3.4 Viewing a Range of Table Details

To view a range of details, perform the following:

1. Enter the starting range number in the Displaying field.

2. Enter the ending range number in the to field.

3. Press Enter.

2.4.3.5 Sorting Table Details

You can sort the data in a table based on the column type and the details can be viewed either in ascending or descending order. The type of sorting (ascending or descending) is indicated by arrows.

A simple click on the column header does the sorting, i.e., the complete data will be sorted. Subsequent click on the same header sorts the data in ascending order (if it were sorted in descending before).

There are two types of sorting.

• Server-side sorting: Server-side sorting sorts all data in the EMS Server and is not restricted to the data available in the Application Client. For example, if there are 100 events in the EMS Server and only 50 are

Table 2-3 EMS Navigation Buttons

Button Purpose

First Page To view the first page of the window that displays the data retrieved from the database.

Previous Page To view the previously viewed page of the window that displays the data retrieved from the database.

Next Page To view the next page of the window frame that displays the data retrieved from the database.

Last Page To view the last page of the window that displays the data retrieved from the database.

Page 40: EMS User's Guide

2-20 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

displayed in the Page View of the table, a server-side sorting sorts the complete set of 100 events and not just the 50 events. For server-side sorting, click the column header. Subsequent click on the same column header sorts the data in ascending order (if it were sorted in descending before). The sort indicators for server-side sorting for ascending and descending are up arrow and, down arrow respectively.

• Client-side sorting: Client-side sorting sorts data displayed only in the Application Client. For example, if there are 50 alarms in the EMS Server and only 25 are displayed in the Page View of the table (25 per page), a client-side sorting sorts only 25 alarms and not the 50 alarms in the EMS Server. For client-side sorting, press the Ctrl button and click the column header. Subsequent click on the same header sorts the data in ascending order (if it were sorted in descending before). The sort indicator for client-side sorting for ascending and descending are up arrow and, down arrow respectively.

2.4.3.6 Rearranging and Resizing Columns in a Table

For easy view of the data, rearrange the columns by just dragging the column header and moving it to the required place in the table. This will be helpful to view a couple of data at closer position.

To resize the column header, simply drag the right-side edge of a column.

On performing the rearrangement and resizing, the table remains the same only until the Application Client is open. When reopened, the settings would be lost. To retain the same size of columns, save the style by choosing Custom Views > Save Custom View State menu or click the right mouse button on the node in tree and choose Custom Views > Save Custom View State or press Ctrl+S. Note that on saving the custom view the resizing will only be saved and the rearrangement will not get saved, and the custom view will be displayed in the default order.

2.4.3.7 Viewing Row Details

To view details or object properties of each row in a table, perform the following procedures:

1. Double-click a row.

2. Click the right mouse button on a row and click Details or

3. Press Alt+D keys simultaneously.

A dialog box is displayed with specific details about the selected row.

Page 41: EMS User's Guide

Understanding the User Interface

Element Management System (EMS) User’s Guide WiChorus Confidential 2-21

2.4.4 Broadcast a Message

The option Broadcast Message can be used to send messages to all the clients connected to the EMS Server.

To broadcast a message, perform the following:

1. In the Application, from the File menu, choose Broadcast Message or

2. Press Ctrl+G keys simultaneously. The Broadcast Message dialog box is displayed as shown in Figure 2-7.

Figure 2-7 Broadcast a Message

3. Type the message to be broadcast in the Message field.

4. If Send to my FE client only is selected, the message is sent to all the clients connected to that particular Server. If Send to all client is selected, the message is sent to all the clients connected to different FE Servers, which, in turn, are managed by the main EMS Server.

5. Click BroadCast.

The message is delivered to intended clients that are connected to the EMS Server and is displayed on the status bar.

Page 42: EMS User's Guide

2-22 WiChorus Confidential Element Management System (EMS) User’s Guide

Initial EMS Configuration

- This page intentionally left blank -

Page 43: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential 3-1

Chapter 3 Configuration Management

This chapter describes how to perform common configuration management tasks to setup the network using the EMS application.

This chapter contains the following sections:

• Overview

• Before You Begin

• Create a Core Service Network (CSN)

• AAA Server

• Creating Access Service Network (ASN)

• Creating Basestations

• Mobility Neighbors Configuration

• Creating a Paging Group

Page 44: EMS User's Guide

3-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.1 Overview

To setup a WiMax network, complete these common configuration tasks in order. After performing theses tasks you can navigate through the rest of the EMS application to manage the network and to view summary information, and statistics.

You will learn how to:

1. Add Core Services Network (CSN).

2. Add Access Service Network (ASN).

3. Add Basestation(s) in ASN.

4. Add Neighbor Basestations.

5. Add Paging Group(s).

Page 45: EMS User's Guide

Before You Begin

Element Management System (EMS) User’s Guide WiChorus Confidential 3-3

3.2 Before You Begin

Ensure that the EMS application is running. Make sure that at least one ASNGW has been boot-strapped and is reachable from the EMS server.

For information about installing the software, refer to the Element Management System (EMS) Installation Guide.

Page 46: EMS User's Guide

3-4 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.3 Create a Core Service Network (CSN)

Core Service Network (CSN), is a concept in the mobile WiMax network. It is at the core of the WiMax network architecture providing control and management for the Access Service Network (ASN) and subscribers with services such as DHCP server, AAA, FTP, inter-operator and inter-technology roaming, services and other applications. The CSN also includes the Internet Protocol Multimedia Subsystem (IMS) services support capable of offering Internet access, location-based services, Internet Multimedia and Multimedia Broadcast/Multicast MBS services and voice services.

3.3.1 Create a Top-Level Group - CSN

The CSN can be created or modified using the Configured CSN(s) window.

To create a CSN top-level group, perform the following:

1. In the EMS application, click Configuration > CSN node on the tree.

2. The CSN is displayed as shown in Figure 3-1 below.

Figure 3-1 Creating a Core Services Network (CSN)

This screen is divided into two parts. The top portion of the screen is related to configuring CSN(s). The bottom portion is for configuring Servers related to the configured CSN.

Page 47: EMS User's Guide

Create a Core Service Network (CSN)

Element Management System (EMS) User’s Guide WiChorus Confidential 3-5

3. Click the Add button. The Add CSN dialog screen will display as shown in Figure 3-2.

Figure 3-2 Adding a CSN

Enter values for the Configuring CSN. For information on each of the fields, refer to Table 3-1.

4. Enter the CSN information; the CSN Name, and Network Service Provider (NSP) Name. These are mandatory fields, as indicated by the "*". Click OK.

A message will appear indicating that the CSN was added successfully. You can add as many CSN(s) that are associated with your environment.

5. Once you are finished entering the CSN(s), the CSN configuration screen will re-display with a list of CSN(s) that you added.

6. Next, you will add a AAA Server for each of the CSN(s) that where created.

Table 3-1 Add CSN

Field Description

CSN Name This is a name given to the Core Service Network. This name will uniquely identify this group of service within this CSN.

NSP Name This is the Network Service Provider name.

Page 48: EMS User's Guide

3-6 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.4 AAA Server

AAA server is a service that handles requests for access to resources and provides authentication, authorization, and accounting (AAA) services. A AAA server is normally identified by a Fully Qualified Domain Name (FQDN) or by an IP address of the computer system that hosts that service.

The AAA server typically interacts with network access and gateway servers and with databases and directories containing user information. The current standard by which devices or applications communicate with a AAA server is the Remote Authentication Dial-In User Service (RADIUS). When a AAA server is configured within EMS, the details are maintained and then forwarded to the ASNGW so that the authenticator within the ASNGW(s) can use the services provided by the AAA server. The EMS does not directly configure the AAA server.

When a subscriber wants to enter the network, and must be authenticated against a AAA server that provides services for the domain from the which subscriber is entering the network. For example, [email protected], must be authenticated against a AAA server that can authenticate users in the domain city.sanjose.com

A AAA server can provide services to one, multiple or all domains.

For any given CSN there can be multiple AAA servers configured. Each AAA server could provide services to one or more domains.

At most, one AAA server can be configured to provide services to one domain and one server to act as the default server that will provide services to all domains. This default server will be used when no other server supports that domain.

3.4.1 Add a AAA Server to a CSN

Begin this procedure from the open Configured CSN(s) screen.

To add a AAA Server to a CSN(s), perform the following:

1. Select Configuration Management > CSN from the configuration tree. The CSN dialog box will display.

2. To configure a AAA Server, first select the CSN that will host the AAA service. When a CSN is selected in the top table - the set of AAA servers associated with that CSN are shown in the dialog at the bottom panel.

3. Select the Add button under the Servers configured for CSN directly from the bottom portion of the CSN screen.

4. The Add AAA Server dialog box will display as shown in Figure 3-3.

Page 49: EMS User's Guide

AAA Server

Element Management System (EMS) User’s Guide WiChorus Confidential 3-7

Figure 3-3 Adding a AAA Server to a CSN

5. Enter the following AAA Server information in each one of the fields and click OK. Table 3-2 describes each one of the fields.

Table 3-2 AAA Server

Field DescriptionServer FQDN The Fully Qualified Domain Name for the server.

Retry Interval (HH:MM:SS) This is the time entered in (HH:MM:SS) that the server will retry to connect.

Server preshared key This ASCII string is the secret key that is shared between the AAA server and the authenticator on the ASNGW.

Retry count The number of times the authenticator will try to contact the sever in case of failures before it gives up talking to he server.

Config auth mode This field cannot be altered. The default is Single_EAP.

CSN name Select a CSN from the drop-down menu.

Distribute to You can distribute to a specific ASNGW, all ASNGW(s), or none.

Domain Configuration

All Domains When this check box is selected, it implies that the server identified by the FQDN is the default server for all domains supported by this CSN.

Add domains (Separated by semicolon)

Manually type in the domain names that this AAA server provides services for separated by a semicolon.

Configured domain(s) This will display all the configured domain(s) for this CSN.

Page 50: EMS User's Guide

3-8 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.5 Creating Access Service Network (ASN)

The ASN Gateway is a high capacity platform with linear scaling properties and the flexibility to meet the needs of small and large networks. Each ASN Gateway can concentrate traffic from hundreds to thousands of radio base stations, which reduces the required number of devices under management and AAA transactions while minimizing connection setup latency by decreasing the number of call hand-offs in the network.

The Access Service Network (ASN) sets and defines the network functions for providing WiMAX subscribers with wireless access. The ASN is comprised of network elements (such as one or more BS and ASNGW) and provides the following functions:

• Layer 2 connectivity with MS/SS

• Transfers AAA messages (Authentication, Authorization, Accounting) to WiMAX subscribers’ Home Network Service Providers (H-NSP)

• Detection and selection of NSP networks chosen by WiMAX subscribers

• Relay functions for building MS/SS and Layer 3 connectivity

• Wireless resource management

• ASN anchored mobility

• CSN anchored mobility

• Paging

Within the EMS application, ASN(s) represent ASNGW and the set of BS(s) managed by that ASNGW. You view gateways as part of your network's hierarchy. In this section, you will add ASN to the CSN group and set basic identification parameters.

Note:Before you begin, you will need a valid IP address for an ASN on your network.

Page 51: EMS User's Guide

Creating Access Service Network (ASN)

Element Management System (EMS) User’s Guide WiChorus Confidential 3-9

3.5.1 Create a Top-Level Gateway - ASN

To add a ASN to an associated CSN:

1. Select Configuration option in the Tree area of the EMS application. Click on ASN. The ASN window will display as shown in Figure 3-4 below.

Figure 3-4 ASN Configuration

2. The ASN screen is divided into two parts. The top portion of the screen is related to configuring ASN(s). The bottom portion configures Basestation(s) that are associated to a particular ASN(s). For now we will focus on configuring an ASN.

3. Click the Add button under the Configured ASN(s) section of the screen. The Add ASN screen will display as shown in Figure 3-5.

Page 52: EMS User's Guide

3-10 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

Figure 3-5 Add an ASN

4. Add the following ASN information described in Table 3-3.

5. When finished, click OK. The ASN window displays with the Configuration ASN(s) information filled in. This will discover the ASNGW and enable it for WiMax operation. For the ASNGW to participate in a WiMax network and provide WiMax services, it must be further configured as described in the following section.

Table 3-3 Add an ASN

Field Description

ASN name Access Service Network name. This name uniquely identifies this ASN.

Associated CSNs Select from the CSN(s) that were previously added to associate the ASN with a CSN.

Management IP Address The IP address for the ASNGW that services this ASN.

Management Netmask NetMask for the Management IP address of the ASNGW.

NAP The name of the Network Access Provider.

ASNGW host name Access Services Network Gateway host name.

WiMax profile Options are either Profile A or Profile C (supported currently)

ASNGW IP address Access Service Network Gateway IP address. The data-plane IP address used by the ASNGW associated with this ASN.

SNMP credentialsSNMP version Supports SNMP version v2c

Community The SNMPv2 community string configured within the ASNGW.

Page 53: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-11

3.6 Configuring an ASN Gateway

To configure an existing ASN Gateway, perform the following:

1. Select Configuration option in the Tree area of the EMS application. Click on ASN. The ASN window will display.

2. Highlight an active ASN from the list of Configured ASN(s). Select the Configure ASNGW button.

3. The Configure ASNGW Details screen will display as shown in Figure 3-6 below.

Figure 3-6 Configure ASNGW Details

4. There are several configuration options available throughout this screen. This screen is only used by System Administrators. For this example we are only going to explain the Configuration Details "Interfaces" option.

5. Select the Interface option under the Gateway Configuration Details tree.

6. The Interface Configuration screen will display as shown in Figure 3-7.

7. Select a Management or Interface port(s) under the Available ports column that you wish to edit the detailed information. The Available ports column should have a list of 2 Management Ports (Mgmt1 and Mgmt2) and 10 Interface Ports (Gig0 through Gig9).

8. !!Very Important!! - the Clear button is not meant to clear any existing configuration settings. The Clear button is used if you want to change anything before clicking OK and you may want to get rid of the changes that you made and fall back to the earlier shown settings. After clicking OK the Clear button does not hold any value until new changes are made again.

9. The Port Addresses information will display as Primary and Secondary.

Page 54: EMS User's Guide

3-12 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

10. To add a new address, click the Add Address button.

The Interface Configuration screen fields are described in Table 3-4.

Figure 3-7 Interface Configuration

Table 3-4 Interface Configuration Port Information

Field Description

Port configuration

Port name Name of the port selected.

MAC MAC address of the port selected.

Port speed The speed of the port selected. This will automatically display "Auto Detect."

Enable port Check this box to enable the individual port selected.

Operational status Status of the port (e.g., Major Fault).

MTU Maximum Transmission Unit.

Port duplex The selections are Half and Full.

OK Click the OK button when finished with port configuration selections.

Clear Click the Clear button to Clear all the information currently displayed for a particular port.

Port addresses

Primary /Secondary This will list the primary and secondary port address information (i.e., Address Type, Port IP Address, and Port NetMask).

Add Address Click the Add Address button to add a new address to one of the ports.

Delete Address Click the Delete Address button to delete the current address information.

Page 55: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-13

To display the ASN Gateway Details screen (this is for system operators only), perform the following:

1. Select an active ASN Gateway from the WiMax Topology Node.

2. An active ASN Gateway Topology map will display. Select an active Gateway and click the right mouse button over the Gateway. A sub-menu will display.

3. Select View Configuration. The View ASNGW Details screen will display as shown in Figure 3-8.

Figure 3-8 View ASNGW Detail Information (Interface Configuration)

3.6.1 Configuration Details

Under the Configuration Details umbrella the following will be covered in this section. Please note that the Configuration Details Interface selection is described in Section 3.6 , "Configuring an ASN Gateway" on page 3-11.

• Globals Configuration

• Authenticator Parameter Configuration

• DHCP Configuration

• Mobile IP FA

• Mobile IP Proxy Client

• Configure Load Balancing Profile

• Subscriber Station Handover Configuration

• Subscriber Station Handover Signal Optimization

Page 56: EMS User's Guide

3-14 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

• OSPF General Group Configuration

• OSPF Interfaces

• OSPF Areas

• OSPF Area Aggregates

• OSPF Interface Metrics

• OSPF Virtual Interfaces

• OSPF Configured Hosts

• OSPF Configured Neighbors

• Redistribute OSPF Routes

• RIP Global Configuration Details

• RIP Interface Configuration

• Redistribute RIP Routes

• Static Routes

• Installed Routes

• DNS Settings

• NTP Servers

• Managed Basestations

• Neighbor ASN Gateways

• Paging

• Configured AAA Servers

• DHCP Server Statistics

• DHCP Lease Table

• OSPF General Group Configuration

• Configured Virtual Neighbors

• Configured Link State Database

• RIP Global Configuration Details

• Configured RIP Interface Statistics

• Configured RIP Peers

Page 57: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-15

3.6.1.1 Globals Configuration

The Globals Configuration option located under the Configuration Details tree. Figure 3-9 shows the Globals Configuration screen.

Figure 3-9 Globals Configuration

The Globals Configuration screen consists of the following fields as described in Table 3-5.

Table 3-5 Globals Configuration

Field Description

ASNGW IP address Access Service Network Gateway IP address. The data-plane IP address used by the ASNGW associated with this ASN.

Console User Name Used to CLI into that Gateway. Once entered it will be saved and used to connect to the Gateway.

Console Password Used to CLI into that Gateway. Once entered it will be saved and used to connect to the Gateway.

Enable ASNGWSelect this check box to administratively enable the gateway. Also describe console username and password as the console username and password of the Gateway.

Page 58: EMS User's Guide

3-16 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.2 Authenticator Parameter Configuration

The Authenticator Parameter Configuration option located under the Configuration Details tree. Figure 3-10 shows the Authenticator Parameter Configuration screen.

Figure 3-10 Authenticator Parameter Configuration

The Authenticator Parameter Configuration screen consists of the following fields as described in Table 3-6.

Table 3-6 Authenticator Parameter Configuration

Field DescriptionAuth mode Authenticator Authentication Mode.

Auth IP address Configure Authenticator IP Address.

Authenticator Timeout Authenticator Timeout for the default server (change will be effective at next EAP session).

Authenticator max retries Authenticator maximum retries (change will be effective at next EAP session).

Page 59: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-17

3.6.1.3 DHCP Configuration

The DHCP Configuration option located under the Configuration Details tree. Figure 3-11 shows the DHCP Address Configuration screen.

Figure 3-11 DHCP Configuration

The DHCP Configuration screen consists of the following fields as described in Table 3-7.

Table 3-7 DHCP Configuration

Field DescriptionProxy IP Configure the DHCP-Proxy Server IP Address.

Page 60: EMS User's Guide

3-18 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.4 Mobile IP FA

The Mobile IP FA option located under the Configuration Details\Mobile IP tree. Figure 3-12 shows the Mobile IP FA screen.

Figure 3-12 Mobile IP FA

The Mobile IP FA screen consists of the following fields as described in Table 3-8.

Table 3-8 Mobile IP FA

Field DescriptionFA Care-of IP address Foreign Agent Care-of-Address.

Disable FA-HA authentication Select this check box to disable FA-HA Authentication (default is Enabled).

Page 61: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-19

3.6.1.5 Mobile IP Proxy Client

The Mobile IP Proxy Client option located under the Configuration Details\Mobile IP tree. Figure 3-13 shows the Mobile IP Proxy Client screen.

Figure 3-13 Mobile IP Proxy Client

The Mobile IP Proxy Client screen consists of the following fields as described in Table 3-9.

Table 3-9 Mobile IP Proxy Client

Field Description

Registration lifetime Configure registration lifetime to be used by proxy client (default is 300 seconds).

Replay protection Configure nonce based replay protection for proxy client (default is timestamps).

Page 62: EMS User's Guide

3-20 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.6 Configure Load Balancing Profile

The Configure Load Balancing Profile option located under the Configuration Details tree. Figure 3-14 shows the Configure Load Balancing Profile screen.

Figure 3-14 Configure Load Balancing Profile

Load Balancing across Basestations will be triggered with either the Uplink or Downlink when thresholds are exceeded.

The Configure Load Balancing Profile screen consists of the following fields as described in Table 3-10.

Table 3-10 Configure Load Balancing Profile

Field DescriptionEnable LB Select this check box to enable Load Balancing.

BS available uplink threshold (%) Available Base Station uplink radio resource balance threshold in percentage.

BS available downlink threshold (%) Available Base Station downlink radio resource load balance threshold in percentage.

Page 63: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-21

3.6.1.7 Subscriber Station Handover Configuration

The Subscriber Station Handover Configuration option located under the Configuration Details\SS Handover tree. Figure 3-15 shows the Subscriber Station Handover Configuration screen.

Figure 3-15 Subscriber Station Handover Configuration

The Subscriber Station Handover Configuration screen consists of the following fields as described in Table 3-11.

Table 3-11 Subscriber Station Handover Configuration

Field DescriptionN/W initiated HO admin state Network initiated Handover.

Client initiated HO admin state Client initiated Handover.

Handover RSSI Threshold (dBm) Handover Received Signal Strength Indicator (RSSI) threshold.

Page 64: EMS User's Guide

3-22 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.8 Subscriber Station Handover Signal Optimization

The Subscriber Station Handover Signal Optimization option located under the Configuration Details\SS Handover tree. Figure 3-16 shows the Subscriber Station Handover Signal Optimization screen.

Figure 3-16 SS Handover Signal Optimization

Configure signal optimization settings on a per BS basis. When the signal quality as detected from this BS falls below the "signal optimization level" - SS load balancing will be triggered.

The Subscriber Station Handover Signal Optimization screen consists of the following fields as described in Table 3-12.

Table 3-12 SS Handover Signal Optimization

Field DescriptionSignal optimization admin state Select this check box

Signal optimization level

Select BS

Page 65: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-23

3.6.1.9 OSPF General Group Configuration

The OSPF General Group Configuration option located under the Configuration Details\Routing tree. Figure 3-17 shows the OSPF General Group Configuration screen.

Figure 3-17 OSPF General Group Configuration

The OSPF General Group Configuration screen consists of the following fields as described in Table 3-13.

Table 3-13 OSPF General Group Configuration

Field Description

Enable OSPF Select this check box to enable the OSPF Process. Deselecting the check box disables the OSPF process.

Router ID Select an IP address form list of IP interface addresses, to configure as Router ID.

AS border router Select this check box to configure this router as autonomous System border router.

External LSDB limit This is used to configure maximum number of link state advertisements that can be stored in link state database.

Exit overflow interval This is used to configure the seconds that, after entering the overflow state, this router will attempt to leave overflow state.

Enable OSPF operation state This is a read-only parameter. Shows the operational status of this router.

Area border router This is a read-only parameter. If this check box is selected, this router is an area border router.

TOS support This is a read-only parameter. If this check box is selected, this router supports for type-of-service routing.

Demand extensions This is a read-only parameter. If this is enabled this router for demand routing.

Page 66: EMS User's Guide

3-24 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.10 OSPF Interfaces

The OSPF Interfaces option located under the Configuration Details\Routing\OSPF tree allows the user to configure one or more interfaces on the ASNGW to participate in OSPF routing protocol topology. Different OSPF parameters may be configured for the associated OSPF interface - that dictates how that interacts with the OSPF protocol. Figure 3-18 shows the OSPF Configured Interfaces screen.

Figure 3-18 OSPF Interfaces

Version number Shows the current version number of OSPF Protocol.

External LSA count Shows the number of external Link State advertisements in the link state database.

External LSA checksum sum Shows the sum of Link State checksums of the external Link state advertisements.

Originated new LSA(s) count Shows the number of new link state advertisements that have been originated. This number of incremented each time the router originates a new LSA.

Received LSA(s) count Shows the number of link state advertisements received determined to be new instantiations.

Multicast extensions Shows whether this router is forwarding IP multicast datagrams based on the algorithms defined in the Multi-cast Extensions to OSPF.

Table 3-13 OSPF General Group Configuration (continued)

Field Description

Page 67: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-25

The OSPF Interfaces screen fields shown in Table 3-14 describe the relevant configurable attributes.

Table 3-14 OSPF Interfaces

Field Description

IP address Select a IP address from list of IP interface addresses, to configure as OSPF interface.

Area id Enter an IP address range between 0.0.0.0 and 255.255.255.255 or decimal format between 0 and 4294967295.

Interface type Select a interface type from the list of interface type.

Enable interface Select this check box to enable the interface.

Interface priority Priority of this interface, valid range between 0 and 255.

Transmit delay in seconds The estimated number of seconds it takes to transmit a link state update packet over this interface. Accepts valid range between 1 and 65535.

Retransmission interval(sec) Used to enter the number of seconds between link-state advertisement retransmission, valid range between 1 and 65535.

PassiveSelect this check box to enable this interface as passive. By configuring as a passive-interface, sending "Hello" packets will suppressed on the interface.

Hello interval The length of time, in seconds, between the Hello packets that the router sends on this interface. Accepts valid range between 1 and 65535.

Dead intervalThe number of seconds this router's Hello packets have not been seen before it's neighbors declare the router down. Accepts valid range between 1 and 65535.

Poll interval The larger time interval, in seconds, between the Hello packets sent to an inactive non-broadcast multi-access neighbor accepts.

Authentication type The authentication type specified for this interface. Select an authentication type from the list.

Authentication keyThe Authentication key. If the Authentication type is MD5, user should enter authentication key. If the Authentication type is NONE, this will be disabled.

Page 68: EMS User's Guide

3-26 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.11 OSPF Areas

The OSPF Areas option located under the Configuration Details\Routing\OSPF tree allows the user to configure an OSPF area. The OSPF area allows OSPF route aggregation and distribution. Different parameters may be configured for an OSPF area. Figure 3-19 shows the OSPF Configured Areas screen.

Figure 3-19 OSPF Areas

The OSPF Area screen fields shown in Table 3-15 describe the configurable attributes.

Table 3-15 OSPF Areas

Field Description

Area ID OSPF Area ID, enter an IP address format range between 0.0.0.0 and 255.255.255.255 or decimal value format between 0 and 4294967295.

Import as externalSelect a type from the list of Import as external. Selecting “Import NSSA” configures this area as NSSA. Selecting “Import No External”, configures this Area as stub.

Area summary Select a summary from the list of area summary. Selecting “No Area Summary” does not inject inter-area routes into stub.

Associate interface(s) Select a interface(s) to configure this area to connect to the interface(s).

TOS Type of service associated with the metric.

Metric The metric value applied at the indicated type of service. Accepts valid range between 0 and 16777214.

Metric Type The metric value applied at the indicated type of service.

Page 69: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-27

3.6.1.12 OSPF Area Aggregates

The OSPF Area Aggregates option located under the Configuration Details\Routing\OSPF tree allows the user to configure an OSPF area aggregate. The OSPF area aggregates is used to aggregate OSPF routes and publish only the aggregated routes, thus reducing the number of routes that are distributed in the network. Figure 3-20 shows the OSPF Configured Area Aggregates screen.

Figure 3-20 OSPF Area Aggregates

The OSPF Area Aggregates screen fields shown in Table 3-16 describe the attributes that may be configured for OSPF area aggregates.

Table 3-16 OSPF Area Aggregates

Field DescriptionArea ID Select an IP address from list of Area IDs.

LSDB type

Aggregate IP address Enter an IP address of the Net or Subnet indicated by the range.

Aggregate netmask Enter an Subnet mask that pertains to the Net or Subnet.

Effect Select Advertise matching to trigger the advertisement of the indicated summary or do not advertise matching to not being advertised.

Page 70: EMS User's Guide

3-28 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.13 OSPF Interface Metrics

The OSPF Interface Metrics option located under the Configuration Details\Routing\OSPF tree allows the user to configure the Metrics associated with an OSPF interface. Figure 3-21 shows the Configured OSPF Interface Metrics screen.

Figure 3-21 OSPF Interface Metrics

The OSPF Interface Metrics screen fields shown in Table 3-17 describe the attributes that may be configured.

Table 3-17 OSPF Interface Metrics

Field DescriptionInterface IP address The IP address of OSPF interfaces.

Addressed / addressless interface This variable takes the value 0 on interfaces with IP Addresses, and the value of ifIndex for interfaces having no IP Address.

Metric TOS The type of service metric being referenced.

Metric value The metric of using this type of service on this interface.

Page 71: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-29

3.6.1.14 OSPF Virtual Interfaces

The OSPF Virtual Interfaces option located under the Configuration Details\Routing\OSPF tree allows the user to configure OSPF Virtual interfaces. Figure 3-22 shows the Configured OSPF Virtual Interfaces screen.

Figure 3-22 OSPF Virtual Interfaces

The OSPF Virtual Interfaces screen fields shown in Table 3-18 describe the attributes that may be configured for the OSPF virtual interface.

Table 3-18 OSPF Virtual Interfaces

Field Description

Area ID The transit Area that the Virtual Link traverses. Select from list of Area IDs.

Router ID of the virtual neighbor Router ID of the virtual neighbor.

Transmit delay in seconds The estimated number of seconds it takes to transmit a link state update packet over this interface. Accepts valid range between 1 and 65535.

Hello packet interval The length of time, in seconds, between the Hello packets that the router sends on this interface. Accepts valid range between 1 and 65535.

Dead interval in secondsThe number of seconds this router's Hello packets have not been seen before it's neighbors declare the router down. Accepts valid range between 1 and 65535.

Authentication key The Authentication key. If the Authentication type is MD5, user should enter authentication key.

Authentication type The authentication type specified for this interface. Select an authentication type from the list.

Page 72: EMS User's Guide

3-30 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.15 OSPF Configured Hosts

The OSPF Configured Hosts option located under the Configuration Details\Routing\OSPF tree allows the user to configure the OSPF Hosts that are part of an OSPF area. Figure 3-23 shows the Configured OSPF Hosts screen.

Figure 3-23 OSPF Configured Hosts

The OSPF Configured Hosts screen fields shown in Table 3-19 describe the attributes that may be configured.

Table 3-19 OSPF Configured Hosts

Field DescriptionHost IP address The IP Address of this Host.

Type of service The type of service of the route being configured.

Area ID The Area the Host Entry is to be found within.

Host metric The Metric to be advertised.

Page 73: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-31

3.6.1.16 OSPF Configured Neighbors

The OSPF Configured Neighbors option located under the Configuration Details\Routing\OSPF tree allows the user to configure OSPF neighbors. Figure 3-24 shows the Configured OSPF Neighbors.

Figure 3-24 OSPF Configured Neighbors

The OSPF Configured Neighbors screen fields shown in Table 3-20 describe the attributes that may be configured.

Table 3-20 OSPF Configured Neighbors

Field DescriptionIP address The IP Address should subnet range of the interface.

IP address / addressless On an interface having an IP Address, zero. On address less interfaces, the corresponding value of ifIndex in the Internet Standard MIB

Neighboring router ID This is a read-only parameter. IP Address uniquely identifying the neighboring router in the Autonomous System

Options field This is a read-only parameter. A Bit Mask corresponding to the neighbor's options field

State of relationship This is a read-only parameter. The State of the relationship with this Neighbor.

No of times the state changed This is a read-only parameter. The number of times this neighbor relationship has changed state, or an error has occurred

Length of retransmission queue This is a read-only parameter. The current length of the retransmission queue.

Page 74: EMS User's Guide

3-32 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.17 Redistribute OSPF Routes

The Redistribute OSPF Routes option located under the Configuration Details\Routing\OSPF tree allows the user to configure to which other routing protocols the OSPF routes need to be advertised. Figure 3-25 shows the Redistribute OSPF Routes.

Figure 3-25 Redistribute OSPF Routes

The Redistribute OSPF Routes screen fields shown in Table 3-21 describe the attributes that may be configured.

Neighbor become known This is a read only parameter. This displays the status of the entry. “dynamic” or “permanent” refer to how the neighbor became known.

Hello surpressed This is a read only parameter. Indicates whether Hellos are being suppressed to the neighbor.

Priority of this neighbor The priority of this neighbor in the designated router election algorithm.

Table 3-21 Redistribute OSPF Routes

Field Description

RIP

RIP Selecting the check box, redistributes the information from RIP protocol.

Metric Used to enter metric. Accepts valid range between 0 and 16777214.

Route Map Used to enter string that points to route map entries.

Table 3-20 OSPF Configured Neighbors (continued)

Field Description

Page 75: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-33

3.6.1.18 RIP Global Configuration Details

The RIP Global Configuration Details option located under the Configuration Details\Routing tree allows the user to configure RIP routing protocol on the ASNGW. Figure 3-26 shows the RIP Global Configuration Details screen.

Figure 3-26 RIP Global Configuration Details

The RIP Global Configuration Details screen fields shown in Table 3-22 describe the attributes that may be configured.

Static

Static Selecting the check box, redistributes the information from static.

Metric Used to enter metric. Accepts valid range between 0 and 16777214.

Route Map Used to enter string that points to route map entries.

Connected

Connected Selecting the check box, redistributes the information from connected.

Metric Used to enter metric. Accepts valid range between 0 and 16777214.

Route Map Used to enter string that points to route map entries.

Table 3-22 RIP Global Configuration Details

Field Description

Enable RIP Select this check box to enable the RIP Process. Deselecting the check box disables the RIP process.

Version Select version from the list, to configure the RIP version.

Generate default route Selecting the check box, controls the distribution of default route.

Table 3-21 Redistribute OSPF Routes (continued)

Field Description

Page 76: EMS User's Guide

3-34 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.19 RIP Interface Configuration

The RIP Interface Configuration option located under the Configuration Details\Routing\RIP tree allows the user to configure the set of Interfaces that may participate in the RIP protocol. Figure 3-27 shows the Configured RIP Interfaces screen.

Figure 3-27 RIP Interface Configuration

The RIP Interface Configuration screen fields shown in Table 3-23 describe the attributes that may be configured.

Default metric Used to configure the metrics, accepts valid range between 1 and 16.

Maximum routes Used to configure the maximum number of routes.

Neighbor IP Used to configure neighbor router.

Global route changes This is a read only parameter. The number of route changes made to the IP Route Database by RIP. This does not include the refresh of a route's age.

Global queries The number of responses sent to RIP queries from other systems.

Table 3-22 RIP Global Configuration Details (continued)

Field Description

Page 77: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-35

3.6.1.20 Redistribute RIP Routes

The Redistribute RIP Routes option located under the Configuration Details\Routing\RIP tree allows the user to configure to which other routing protocols the available RIP routes should be forwarded. Figure 3-28 shows the Redistribute RIP Routes screen.

Figure 3-28 Redistribute RIP Routes

Table 3-23 RIP Interface Configuration

Field Description

IP address Select a IP address from list of IP interface addresses, to configure as RIP interface.

Auth type Select the Auth type from the list.

Password / KeyThe Authentication key. If the Authentication type is MD5, user should enter authentication key. If the Authentication type is NONE, this will be disabled.

Send

Select from the list of send options. “RipV1” implies sending RIP updates compliant with RFC 1058. “RipV1Compatible” implies broadcasting RIP-2 updates using RFC 1058 route subsumption rules. “RipV2” implies multicasting RIP-2 updates.

Receive This indicates which version of RIP updates are to be accepted. The “RipV2” and “RipV1OrRipV2” implies reception of multicast packets.

Split horizon The split horizon command omits routes learned from one neighbor, in updates sent to that neighbor.

PassiveSelect this check box to enable this interface as passive. By configuring as a passive-interface, sending "Hello" packets will suppressed on the interface.

Page 78: EMS User's Guide

3-36 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

The Redistribute RIP Routes screen fields shown in Table 3-24 describe the attributes that may be configured.

3.6.1.21 Static Routes

The Static Routes option located under the Configuration Details\Routing tree allows the user to configure a set of static routes on the ASNGW. Figure 3-29 shows the Static Routes screen.

Figure 3-29 Static Routes

Table 3-24 Redistribute RIP Routes

Field Description

OSPF

OSPF Selecting the check box, redistributes the information from RIP protocol.

Metric Used to enter metric. Accepts valid range between 0 and 16.

Route Map Used to enter string that points to route map entries.

Static

Static Selecting the check box, redistributes the information from static.

Metric Used to enter metric. Accepts valid range between 0 and 16.

Route Map Used to enter string that points to route map entries.

Connected

Connected Selecting the check box, redistributes the information from connected.

Metric Used to enter metric. Accepts valid range between 0 and 16.

Route Map Used to enter string that points to route map entries.

Page 79: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-37

The Static Routes screen fields shown in Table 3-25 describe the attributes that may be configured.

3.6.1.22 Installed Routes

The Installed Routes option located under the Configuration Details\Routing tree shows the set of routes currently in effect in the Kernel on the ASNGW. Figure 3-30 shows the Installed Routes screen.

Figure 3-30 Installed Routes

The Installed Routes screen consists of the following fields as described in Table 3-26.

Table 3-25 Static Routes

Field DescriptionDestination Network Destination Network/IP address for the route.

Prefix Length Network Prefix for the destination.

Gateway IP Address ASN Gateway IP address.

Table 3-26 Installed Routes

Field DescriptionDestination IP Destination IP address for this route.

Prefix Length Network Prefix Length for the destination.

Next Hop The next Hop this route is going to take.

Page 80: EMS User's Guide

3-38 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.1.23 DNS Settings

The DNS Settings option located under the Configuration Details tree allows the user to configure up to 3 Domain Name Server Addresses. Figure 3-31 shows the DNS Settings screen.

Figure 3-31 DNS Settings

The DNS Settings screen fields shown in Table 3-27 describe the attributes that may be configured.

Table 3-27 DNS Settings

Field DescriptionPrimary DNS Primary Domain Name Server address.

Secondary DNS Secondary Domain Name Server address.

Tertiary DNS Tertiary Domain Name Server address.

Page 81: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-39

3.6.1.24 NTP Servers

The NTP Servers option located under the Configuration Details tree allows the user to configure NTP servers on the ASNGW. Figure 3-32 shows the NTP Servers screen.

Figure 3-32 NTP Servers

The NTP Servers screen fields shown in Table 3-28 describe the attributes that may be configured.

Table 3-28 NTP Servers

Field DescriptionNTP Server FQDN Fully Qualified domain name or the IP address of the NTP server.

Configured NTP FQDN Servers Shows the list of Configured NTP Servers.

Delete button Select the Delete button to delete a configured NTP server.

Page 82: EMS User's Guide

3-40 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.2 State

3.6.2.1 Managed Basestations

The Managed Basestations option located under the State tree shows the set of Basestations that this ASNGW is currently managing. Figure 3-33 shows the Managed Basestations screen.

Figure 3-33 Managed Basestations

The Managed Basestations screen consists of the following fields as described in Table 3-29.

Table 3-29 Managed Basestations

Field DescriptionBS ID Basestation Identifier.

BS name A unique name for the Basestation.

NAP name Network Access Provider’s name.

NSP name Network Service Provider’s name.

Wimax profile The WiMax profile that is currently in effect on that Basestation.

Tunnel type The tunnel type used to communicate with that Basestation.

Admin state If True the ASNGW actively manages that Basestation else not.

Page 83: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-41

3.6.2.2 Neighbor ASN Gateways

The Neighbor ASN Gateways option located under the State tree shows the set of ASNGW’s that are neighbors to this ASNGW. A neighbor ASNGW is defined as the ASNGW that one or more of whose Basestations is a neighbor to a Basestation managed by this ASNGW. Figure 3-34 shows the Neighbor ASNGW(s) screen.

Figure 3-34 Neighbor ASN Gateways

The Neighbor ASN Gateways screen consists of the following fields as described in Table 3-30.

Table 3-30 Neighbor ASN Gateways

Field DescriptionIP address The IP address of the neighbor ASNGW.

Associated Whether this ASNGW actively communicating with the neighbor ASNGW.

Page 84: EMS User's Guide

3-42 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.2.3 Paging

The Paging option located under the State tree shows the set of Paging groups and the associated members of each paging group in effect on that ASNGW. Figure 3-35 shows the Paging detail screen.

Figure 3-35 Paging

The Paging screen consists of the following fields as described in Table 3-31.

Table 3-31 Paging

Field DescriptionManaging ASNGW The Mgmt IP address of the ASNGW.

Paging group name The name of the paging group.

Paging group ID ID of the paging group - unique within the GW.

Response wait time Amount of time the ASNGW waits for a paging response from SS.

Request repeat count The number of times a Paging request is sent out.

Packet buffer size Represents the amount of data that will be buffered when paging is being attempted for a SS.

Enable page group If enabled that paging feature for that paging group will be turned on else disabled.

Page 85: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-43

3.6.2.4 Configured AAA Servers

The Configured AAA Servers option located under the State tree shows the set of AAA servers configured on this ASNGW. Figure 3-36 shows the Configured AAA Server(s) screen.

Figure 3-36 Configured AAA Servers

The Configured AAA Servers screen consists of the following fields as described in Table 3-32.

Table 3-32 Configured AAA Servers

Field DescriptionServer FQDN The fully qualified domain name or IP address of the AAA server.

CSN name The CSN that this AAA server is part of.

Shared key The shared secret between this ASNGW and the AAA server.

Retry interval The authentication retry interval in seconds.

Retry count The number of times the authentication client will try to contact the AAA server before giving up.

Domain set The set of domains that this server serves.

Config auth mode The authentication mode supported by the AAA server.

Page 86: EMS User's Guide

3-44 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.2.5 DHCP Server Statistics

The DHCP Server Statistics option located under the State\DHCP tree shows the DHCP proxy server statistics. Figure 3-37 shows the DHCP Server Statistics screen.

Figure 3-37 DHCP Server Statistics

The DHCP Server Statistics screen consists of the following fields as described in Table 3-33.

Table 3-33 DHCP Server Statistics

Field DescriptionDHCP start time Initialization time of the server.

Total number of discoveries The number of DHCP discover messages received.

Total number of requests Total number of DHCP requests received.

Total number of releases Total number of DHCP assignments released.

Number of Active leases Total number of active DHCP lease assignments.

Total MIP registrations Total Mobile IP registrations.

Total number of offers Total number of DHCP lease offers.

Total number of acks Total number of acknowledgements sent.

Total number of nacks Total number of negative acknowledgements sent.

Total number of declines Total number of DHCP request that where declined.

Number of DHCP serves The number of DHCP served.

MIP deregistrations Total number of Mobile IP de-registrations.

Page 87: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-45

3.6.2.6 DHCP Lease Table

The DHCP Lease Table option located under the State\DHCP tree shows the current DHCP lease assignments on the ASNGW. Figure 3-38 shows the DHCP Lease Table screen.

Figure 3-38 DHCP Lease Table

The DHCP Lease Table screen consists of the following fields as described in Table 3-34.

Table 3-34 DHCP Lease Table

Field DescriptionMAC address MAC address of the SS.

Address type IPv4

Leased address Address assigned to the SS.

Lease start time When the address lease become effective.

Lease end time When the leased address expired.

Lease binding state Shows whether the leased address is active or expired.

Page 88: EMS User's Guide

3-46 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.2.7 OSPF General Group Configuration

The OSPF General Group Configuration option located under the State/Routing tree allows the user to configure the global OSPF settings for the OSPF protocol on the ASNGW. Figure 3-39 shows the OSPF General Group Configuration screen.

Figure 3-39 OSPF General Group Configuration

The OSPF General Group Configuration screen fields shown in Table 3-35 describe the attributes that may be configured.

Table 3-35 OSPF General Group Configuration

Field DescriptionEnable OSPF

Router ID

AS border router

External LSDB limit

Exit overflow interval

Enable OSPF operation state

Area border router

TOS support

Demand extensions

Version number

External LSA count

External LSA checksum sum

Page 89: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-47

3.6.2.8 Configured Virtual Neighbors

The Configured Virtual Neighbors option located under the State\Routing\OSPF tree shows the set of OSPF virtual neighbors configured on this ASNGW. Figure 3-40 shows the Configured Virtual Neighbor(s) screen.

Figure 3-40 Configured Virtual Neighbors

The Configured Virtual Neighbors screen consists of the following fields as described in Table 3-36.

Originated new LSA(s) count

Received LSA(s) count

Multicast extensions

Table 3-36 Configured Virtual Neighbors

Field DescriptionArea The Transit Area identifier.

Router ID Displays the neighboring router in the autonomous system.

IP Address The IP Address this virtual neighbor is using.

Options This is a read only parameter. A Bit Mask corresponding to the neighbor's options field.

State The state of the Virtual Neighbor relationship.

Table 3-35 OSPF General Group Configuration (continued)

Field Description

Page 90: EMS User's Guide

3-48 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.2.9 Configured Link State Database

The Configured Link State Database option located under the State\Routing\OSPF tree shows the Link state database present within the ASNGW. Figure 3-41 shows the Configured Link State Database screen.

Figure 3-41 Configured Link State Database

The Configured Link State Database screen consists of the following fields as described in Table 3-37.

Events The number of times this virtual link has changed its state, or an error has occurred.

Queue Length The current length of the retransmission queue.

Hello Suppressed Indicates whether Hellos area being suppressed to the neighbor.

Table 3-37 Configured Link State Database

Field DescriptionTotal The total number of link state entries in the screen.

From / To User can enter to view the record by giving the integer values.

Page Length No of LS entries shown in page.

Area id Area ID.

Type The type of this link state advertisement. Each link state type has a separate advertisement format.

Link state idThe link state ID is an LS type specific field containing either a Router ID or an IP Address. It identifies the piece of the routing domain that is being described by the advertisement.

Table 3-36 Configured Virtual Neighbors (continued)

Field Description

Page 91: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-49

3.6.2.10 RIP Global Configuration Details

The RIP Global Configuration Details option located under the State\Routing tree shows the RIP routing protocol global configuration. Figure 3-42 shows the RIP Global Configuration Details screen.

Figure 3-42 RIP Global Configuration Details

The RIP Global Configuration Details screen consists of the following fields as described in Table 3-38.

Router id The originating router in the autonomous system.

Sequence It is used to detect old and duplicate link state advertisements.

Age This field is the age of the link state advertisement in seconds.

Checksum This field is the checksum of the complete contents of the advertisement, excepting the age field.

Advertisement The entire Link state advertisement, including its header.

Table 3-38 RIP Global Configuration Details

Field Description

Enable RIP Select this check box to enable the RIP Process. Deselecting the check box disables the RIP process.

Version Select version from the list, to configure the RIP version.

Generated default route Selecting the check box, controls the distribution of default route.

Default metric Used to configure the metrics, accepts valid range between 1 and 16.

Maximum routes Used to configure the maximum number of routes.

Table 3-37 Configured Link State Database (continued)

Field Description

Page 92: EMS User's Guide

3-50 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.6.2.11 Configured RIP Interface Statistics

The Configured RIP Interface Statistics option located under the State\Routing\RIP tree shows the interface level statistics for all configured RIP interfaces on the ASNGW. Figure 3-43 shows the Configured RIP Interface Statistics screen.

Figure 3-43 Configured RIP Interface Statistics

The Configured RIP Interface Statistics screen consists of the following fields as described in Table 3-39.

Neighbor IP Used to configure neighbor router.

Global route changes This is a read only parameter. The number of route changes made to the IP Route Database by RIP. This does not include the refresh of a route's age.

Global queries The number of responses sent to RIP queries from other systems.

Table 3-39 Configured RIP Interface Statistics

Field DescriptionStats address The IP Address of this system on the indicated subnet.

Received bad packetsThe number of RIP response packets received by the RIP process which were subsequently discarded for any reason (e.g. a version 0 packet, or an unknown command type).

Received bad routes The number of routes, in valid RIP packets, which were ignored for any reason (e.g. unknown address family, or invalid metric).

Sent updates The number of triggered RIP updates actually sent on this interface. This explicitly does NOT include full updates sent containing new information.

Table 3-38 RIP Global Configuration Details (continued)

Field Description

Page 93: EMS User's Guide

Configuring an ASN Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 3-51

3.6.2.12 Configured RIP Peers

The Configured RIP Peers option located under the State\Routing\RIP tree shows the set of configured RIP peers for the RIP routing protocol. Figure 3-44 shows the Configured RIP Peers screen.

Figure 3-44 Configured RIP Peers

The Configured RIP Peers screen consists of the following fields as described in Table 3-40.

Table 3-40 Configured RIP Peers

Field DescriptionTotal The total number of RIP Peer entries in the screen.

From / To User can enter to view the record by giving the integer values.

Page Length No of RIP peer entries shown in page.

Peer address The IP Address that the peer is using as its source address. Note that on an unnumbered link, this may not be a member of any subnet on the system.

Last update The value of sysUpTime when the most recent RIP update was received from this system.

Version The RIP version number in the header of the last RIP packet received.

Received bad packets The number of RIP response packets from this peer discarded as invalid.

Received bad routes The number of routes from this peer that were ignored because the entry format was invalid.

Page 94: EMS User's Guide

3-52 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.7 Creating Basestations

Creating Basestations is the process of notifying an ASNGW that it must now start managing the WiMax services provided by the Basestation.

For an ASNGW to effectively manage a Basestation, certain attributes of the Basestation must be configured within the ASNGW, it is done as described below.

3.7.1 Create a Basestation - ASN

Begin this procedure from the Tree area of the EMS application.

To create a Basestation in an ASN, perform the following:

1. Since the Configured ASN window is already opened, click the Add button under the Basestations in ASN portion of the screen.

2. The Add Basestation ASN dialog window will display as shown in Figure 3-45 below.

Figure 3-45 Add a Basestation

3. Add the following Basestation information as described in Table 3-41.

Page 95: EMS User's Guide

Creating Basestations

Element Management System (EMS) User’s Guide WiChorus Confidential 3-53

4. When finished, click OK. The ASN screen will re-appear with the Basestations information filled in. Once a Basestation has been successfully added to the ASNGW; the ASNGW will start managing the WiMax traffic from that Basestation.

5. Next, you will add mobility neighbors.

Table 3-41 Add a Basestation

Field Description(Re) Parent gateway This will display a list of possible gateways that were added previously.

BS ID Enter a valid Basestation ID. This must be the Basestation's ID as described by NWG. Its syntax is that of a MAC address.

BS name Enter a valid Basestation Name. This must be a unique alphanumeric name. This name identifies this Basestation uniquely within EMS.

IP address Enter a valid control plane IP address of the Basestation. The ASNGW will communicate with the Basestation using this IP address.

Paging group Select a paging group that this Basestation must belong to.

Neighbors Select a neighboring Basestation for this Basestation. One or more Basestations may be selected.

SectorThis identifies the sector type of the Basestation the choices are Omni-BS or Multi-Sector BS. The drop-down selections are Omni BS or Multi Sectored BS.

Dataplane IP addressEnter a valid IP address. Some Basestations use an IP address different from the control plane IP address for sending the data traffic from the mobile stations to the ASNGW. Specify the dataplane IP address here.

Enable BS Check this box to Enable Basestation.

Note:To delete a Basestation(s) you will need Administrative privileges.

Page 96: EMS User's Guide

3-54 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.8 Mobility Neighbors Configuration

The Mobility Neighbors Configuration portion of the EMS application allows you to associate mobility neighbor Basestations to a given Basestation.

Neighbor Basestations are used for mobility handovers of mobile stations and for load balancing.

3.8.1 To Assign a Candidate Basestation to Mobility Neighbors1. Click the Neighbors option under the Configuration Management tree of the EMS window.

2. The Mobility Neighbors Configuration screen will display as shown in Figure 3-46 below.

Figure 3-46 Mobility Neighbors Configuration

3. This panel allows you to assign mobility neighbors to a selected Basestation. First select the managing ASNGW (or select "All" if the managing ASNGW is now known) from the drop-down list box "Select ASNGW." The Basestations managed by the ASNGW (or ALL ASNGWs) will be made available in the "Selected a basestation" drop down list box. Second, select the desired Basestation from the "Select a Basestation" drop-down list box. This will display two lists, the set of currently configured neighbor Basestations on the right hand list box and the Basestations that can become neighbors as candidates in the left hand list box.

4. Click on BS2 to highlight and click the Add button. This will assign the BS2 as a neighbor to BS1. At this point you can keep going to assign more candidate Basestations to there neighboring Basestations. Once complete, click on the Apply button.

5. This will take several seconds. A message will display indicating that the neighboring Basestations have been successfully added. Click OK.

Page 97: EMS User's Guide

Mobility Neighbors Configuration

Element Management System (EMS) User’s Guide WiChorus Confidential 3-55

6. To verify that the neighboring Basestations have been assigned, select the WiMax Topology and the gateways you want to view. For this session we will choose gateway ASN1. The ASN1 graphical topology will display indicating the added gateway (ASN1), two Basestations (BS1 and BS2) and how they are now mobile neighbors, depicted by a blue solid line connecting each other. Of course, your environment may be different as well as very extensive.

7. Next, we are now going to add a paging group.

Page 98: EMS User's Guide

3-56 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

3.9 Creating a Paging Group

A Paging Group represents a group of Basestations managed by one ASNGW that will be paged when idle Mobile stations need to be located. Each paging group is uniquely identified by a paging group name and by a unique paging group ID.

Begin this procedure from the Configuration Management tree of the EMS application.

3.9.1 To Create a Paging Group1. In the EMS application, click Configuration > Paging node on the tree.

2. The Paging screen will display as shown in Figure 3-47 below.

Figure 3-47 Creating a Paging Group

3. To add a new paging group, click the Add button. The Paging screen will display with the Add Paging Group located on the right-side of the screen (see Figure 3-48).

Page 99: EMS User's Guide

Creating a Paging Group

Element Management System (EMS) User’s Guide WiChorus Confidential 3-57

Figure 3-48 Add a Paging Group

4. To add Paging Group information, enter the following described in Table 3-42.

Table 3-42 Add Paging Group

Field Description

Managing ASNGW Select a valid Gateway from the drop-down list. Note, these are the gateways that where added in the configured ASN screen.

Paging group name The name of the Paging Group. An alphanumeric name must be unique within EMS.

Paging group ID The ID of the Paging Group. A numeric ID unique within the EMS

Response wait timeResponse wait time in HH:MM:SS. The amount of time the paging server within the ASNGW will wait for a paging response before retrying the paging request.

Request repeat count The number of times a paging request will be sent out by the ASNGW - before giving.

Packet buffer size The amount of data sent to the mobile station that will be buffered, when the MS is being paged, when the buffer overflows, the data will be dropped.

Enable page group This check box Enable or Disable. This should enable/disable the paging group.

Member details

No members Select this button to add No member Basestations to a paging group.

Select member BS(s) Select this button to allow selections of Basestation(s) to a paging group.

BSs(Comma separated) Select this button to enter valid Basestation(s) to be assigned to this paging group.

All BSs managed by GW Select this button for All Basestations to be managed by the Gateway.

Page 100: EMS User's Guide

3-58 WiChorus Confidential Element Management System (EMS) User’s Guide

Configuration Management

• Member details:

– No member: selecting this button will not assign any Basestation(s) to the gateway.

– Select member BS(s): selecting this button will highlight the available Basestations. You can select as many Basestations to assign a paging group by holding down the Ctrl or Shift key and click on the desired Basestations.

– BSs (comma separated): selecting this button will allow you to manually type in specific Basestations. Each Basestation must be identified by its BSID and be separated by a comma.

– All BS managed by gateway: selecting this button will automatically select all the Basestations managed by this ASNGW and add them to the paging group.

5. Click OK. A message will display indicating that the Paging Group has been successfully added. Click OK again. You will be asked if you want to add another Paging Group. Select Yes or No. For this transaction we are going to select No to continue.

6. This will return to the Paging Configuration screen. As you can see all the information entered is now displayed under the Configured Paging Group(s) and Members in Paging Group windows. You can select the "Show Details" box to display the Paging Group Details for this particular Basestation. Notice that these fields cannot be changed, this is read-only. You can click on the Show Details box again to de-activate it and return to the "Paging" screen to make any changes if needed.

7. You will notice that "Paging Topology" is displayed under the Network Maps and is part of the WiMax Topology tree. Select "Paging Topology" to view the added paging groups. You should see connecting lines from the Basestation(s) to the paging group(s).

Additional information regarding "Paging Topology" mapping features will be discuss further in Chapter 4, “Network Maps,” on page 4-1.

Note:When assigning members in a Paging Group, they must be members of the same Gateway.

Page 101: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential 4-1

Chapter 4 Network Maps

This chapter describes the Element Management System Network Maps.

This chapter contains the following sections:

• Overview

• Performing Network Map Operations

• Viewing Chassis Information

• SSH to Gateway

Page 102: EMS User's Guide

4-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

4.1 Overview

A Network Map is a graphical representation of related objects being managed by the EMS (e.g., Gateways, Basestations, etc.). You can view different levels of complexity in your managed network by looking at high level and low level detailed information in the managed network by clicking the right mouse button over anyone of the objects.

Page 103: EMS User's Guide

Performing Network Map Operations

Element Management System (EMS) User’s Guide WiChorus Confidential 4-3

4.2 Performing Network Map Operations

The operations explained in this section can be performed in all the default maps. These operations are available in your Application based on your privileges as a user.

The following topics are covered in this section:

• Viewing Properties

• Viewing Fault

• Viewing Performance Data of a Device

• Opening Submaps

• Opening a Basestation List

• Filter Neighbors by Basestation

• Showing Paging Membership

• Neighbor Basestations

• Associated Mobile Stations

• Updating Status

• Unmanaging a Device

4.2.1 Viewing Properties

The following topics are covered in this section:

• Viewing Network Device Properties

4.2.1.1 Viewing Network Device Properties

To view network/device details, perform the following:

1. Open the Network Maps.

2. Select a network/device in that map.

3. From the device-specific menu, choose View Properties.

A device-specific menu is a menu that is available in the Application Client only for a specific type of device. For example, if you select an ASN node in the map, a menu named "ASNGateway" is available.

Page 104: EMS User's Guide

4-4 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

4.2.2 Viewing AAA Server

To view AAA Server details, perform the following:

1. Click on the WiMax Topology option located under the Network Maps tree.

2. The WiMax Topology window will display with the added CSN.

3. From the device-specific menu, choose View AAA Servers.

A device-specific menu is a menu that is available in the Application Client only for a specific type of device. For example, if you select a CSN node in the map, a menu named "CSN" is available.

4.2.3 Viewing Home Agents

To view Home Agent details, perform the following:

1. Click on the WiMax Topology option located under the Network Maps tree.

2. The WiMax Topology window will display with the added Home Agent.

3. From the device-specific menu, choose View Home Agents.

A device-specific menu is a menu that is available in the Application Client only for a specific type of device. For example, if you select a Home Agent node in the map, a menu named "Home Agent" is available.

4.2.4 Viewing List of ASNs

To view a list of ASNs for a particular CSN, perform the following:

1. Click on the WiMax Topology option located under the Network Maps tree.

2. The WiMax Topology window will display with the added available ASNs.

3. Click on the CSN icon located within the WiMax Topology map.

4. Select from the device-specific menu, CSN. The menu will change to CSN.

5. Select CSN > View ASNs or

6. Click the right mouse button on the active CSN within the WiMax Topology map and select View ASNs.

A device-specific menu is a menu that is available in the Application Client only for a specific type of device. For example, if you select a CSN node in the map, a menu named "CSN" is available. Figure 4-1 shows the List of ASNs for a particular CSN.

Page 105: EMS User's Guide

Performing Network Map Operations

Element Management System (EMS) User’s Guide WiChorus Confidential 4-5

Figure 4-1 List of ASNs for a Specified CSN

4.2.5 Viewing Fault

The following topics are covered in this section:

• Viewing Events

• Viewing Alarms

• Viewing Events and Alarms for a Particular Gateway

4.2.5.1 Viewing Events

To view events generated in a network or for a device, perform the following:

1. Open the WiMax Topology map.

2. Select the map symbol (e.g., ASN Gateway).

3. From the View menu, choose Events or

4. Press Ctrl+E keys simultaneously.

The Network Events window is displayed, which shows all the events that are generated in that network or for that device.

Page 106: EMS User's Guide

4-6 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

4.2.5.2 Viewing Alarms

To view alarms generated in a network or for a device, perform the following:

1. Open the WiMax Topology map.

2. Select a map symbol (e.g., ASN Gateway).

3. From the View menu, choose Alarms or

4. Press Ctrl+L keys simultaneously.

The Alarms window is displayed showing all the alarms that are generated in that network or for that device.

4.2.5.3 Viewing Events and Alarms for a Particular Gateway

To view Events and Alarms generated in a network or for a device, perform the following:

1. Open the specific ASN Gateway under the Topology tree.

2. Select the Gateway symbol in the map.

3. Click the right mouse button over the active Gateway.

4. From the sub-menu, choose Events and Alarms.

5. The active ASN Gateway Events and Alarms screen will display as shown in Figure 4-2 below.

Figure 4-2 ASN Gateway Events and Alarms

4.2.6 Viewing Performance Data of a Device

To view performance data of a device, perform the following:

1. Open the device map or sub-network map.

2. Select a map symbol (e.g., ASN Gateway).

3. From the View menu, choose Statistics(P) or

4. Press Ctrl+O keys simultaneously.

The Configured Collection window is displayed.

Page 107: EMS User's Guide

Performing Network Map Operations

Element Management System (EMS) User’s Guide WiChorus Confidential 4-7

4.2.7 Opening Submaps

To open a Submap, perform the following:

1. Open the WiMax Topology window to display an active ASN Gateways.

2. Click the right mouse button on an active ASN Gateway to display the drop-down menu selection box.

3. Select Open Submap from the list or

4. Click on the device-specific menu select - ASN or

5. Directly select an active ASN Gateway under the WiMax Topology tree.

6. The ASN Gateway Submap window will display with a graphical depiction of the active Gateway.

4.2.8 Opening a Basestation List

To open a Basestation List, perform the following:

1. Open the WiMax Topology window to display the active ASN Gateways.

2. Click the right mouse button on an active ASN Gateway to display the drop-down menu selection box.

3. Select BS List.

4. The Basestations in the select ASN Gateway will display as shown in Figure 4-3 below.

A List of Basestations for that particular ASN Gateway will display with the Basestation ID, Basestation Name and Administrative State (Enable or Disabled).

Figure 4-3 Opening a Basestation List

Page 108: EMS User's Guide

4-8 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

4.2.9 Filter Neighbors by Basestation

To Filter Neighbors by Basestation, perform the following:

1. From the WiMax Topology map double-click on an active ASN Gateway.

2. The ASN Gateway map will display. Click the right mouse button on an open area of the map. A drop-down menu will display. Select Filter Neighbors by BS or

3. Select from the WiMax Topology tree an active ASN Gateway or

4. From the ASNMapMenu menu, choose Filter Neighbors by BS. The ASN Gateway Topology map will display the selected criteria from the list by placing connected lines between each Basestation that is associated with this specific ASN Gateway. The options are None, All, or individually selected Basestations as shown by the WiMax Topology map in Figure 4-4.

Figure 4-4 Filtering Neighbors by Basestation

Page 109: EMS User's Guide

Performing Network Map Operations

Element Management System (EMS) User’s Guide WiChorus Confidential 4-9

4.2.10 Showing Paging Membership

To show the Paging Membership for a particular paging group, perform the following:

1. From the WiMax Topology map double-click on an active ASN Gateway.

2. The ASN Gateway map will display. Click the right mouse button on an open area of the map. A drop-down menu will display. Select Show Paging Membership or

3. Select from the WiMax Topology tree an active ASN Gateway or

4. From the ASNMapMenu menu, choose Show Paging Membership. The ASN Gateway Topology map will display the selected criteria from the list by placing boxes around the Paging Groups that are associated with this specific ASN Gateway. The options are None, or individually selected Paging Groups as shown by the WiMax Topology map in Figure 4-5.

Figure 4-5 Show Paging Membership

Page 110: EMS User's Guide

4-10 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

4.2.11 Neighbor Basestations

This will display a list of Mobility Neighbors to a particular Basestation as shown in Figure 4-6 below. These Candidate Basestation(s) are assigned Neighbors through the Mobility Neighbors Configuration option as described in Section 3.8 , "Mobility Neighbors Configuration" on page 3-54.

Figure 4-6 Viewing List of Mobility Neighbors

Page 111: EMS User's Guide

Performing Network Map Operations

Element Management System (EMS) User’s Guide WiChorus Confidential 4-11

4.2.12 Associated Mobile Stations

This will display a list of Associated Mobile Stations for the Basestation that was selected in the WiMax Topology screen. See Figure 4-7 below.

Figure 4-7 Associated Mobile Stations

Perform the following:

1. Select an active ASN Gateway under the WiMax Topology tree.

2. The ASN Gateway map will display with the associated Basestation(s).

3. Click on a Basestation. A box will surround the Basestation icon.

4. Click the right mouse button. A drop-down window will display.

5. Select Associated Mobile Stations from the list. The Associated Mobile Stations for that particular Basestation will display or

6. From the BaseStation menu, select Associated Mobile Stations. Remember to click on a Basestation in order to make it active.

The Associated Mobile Station screen will display the following:

• Gateway ID

• Basestation ID

• MAC Address

• NAI

• Authentication Mode

Page 112: EMS User's Guide

4-12 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

• IP Address

• Home Agent

• Registrations

• Current State of Basestation (Active / Non-Active)

• Handoffs

• Location Updates

These fields can be adjusted with the mouse cursor as well as each column can be moved to another area within the table. For example, The Gateway ID field can be moved to the end of the table, after Location Updates.

4.2.13 Updating Status

By default, the EMS checks and monitors a device's existence and health in the network and displays its currents status in the Application. Therefore, the status of a device or the network itself is updated on a regular interval. You can also update the status manually.

For example, if the EMS gets (or polls for) the status of a router every 300 seconds, during the process, if you want to know the latest status of that router without waiting until the polling to occur, you can simply update its status manually. This retrieves the latest status of the router and makes it available to the map and database.

To update the status of a device, perform the following:

1. Open the device map.

2. Click a device icon. From the device-specific menu (e.g., ASNGateway), choose Update Status or

3. Click the right mouse button on a device icon and click Update Status.

4.2.14 Unmanaging a Device

Managing a network element means that the element is being monitored by the EMS. By default, the EMS monitors all the devices that it discovers or has been added to EMS for management. Regular check is done by the EMS to gather information on a network element's integrity. This option can be disabled by unmanaging the network element which consequently stops the EMS from monitoring that element.

To unmanage/manage a device, perform the following:

1. Open the device map.

2. Click a device icon. From the device-specific menu, choose UnManage/Manage or

3. Click the right mouse button on a device icon and click UnManage/Manage.

The selected device is unmanaged/managed. When unmanaged, the device icon is depicted in gray. When managed, the device icon is depicted in green.

Page 113: EMS User's Guide

Viewing Chassis Information

Element Management System (EMS) User’s Guide WiChorus Confidential 4-13

4.3 Viewing Chassis Information

To view the ASN Gateway chassis, board, and resource information, perform the following:

1. Start the EMS application.

2. Select the Gateway node on the WiMax Topology tree. This node is available on the tree only if at least one device is discovered in your network.

3. Click the Gateway map symbol. The device-specific menu will display.

4. Under ASNGateway, select View Chassis. The front view of the ASN Gateway will display with the card status as shown in Figure 4-8.

Figure 4-8 Viewing Chassis Information (Front View)

5. To view behind the front bezel click on the icon at the upper right-hand corner of the front chassis bezel. The Fan Trays and Shelf Management Modules (SMM) will display as shown in Figure 4-9. You can now see the activity of the Fan Trays and Shelf Management Modules. The board detail information can still be viewed with the bezel removed.

Page 114: EMS User's Guide

4-14 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

Figure 4-9 Viewing Chassis Information (Behind Front Bezel)

6. To view the rear access ports click the mouse on the button that is located on the front panel of the Intelligent Packet Processor (IPP). The Input/Output ethernet interfaces that are installed will display, as shown in Figure 4-10 below.

Figure 4-10 Viewing Chassis Information (Rear View)

Click to View Behind Front Bezel

Click to View Interface Ports

Page 115: EMS User's Guide

Viewing Chassis Information

Element Management System (EMS) User’s Guide WiChorus Confidential 4-15

4.3.1 Viewing IPP Card Information

To view IPP Card information, perform the following:

1. Move the mouse over an active Intelligent Packet Processor (IPP) and click the right mouse button.

2. A sub-menu displays with the following selections:

• Board Details

• Resources

– Storage

– CPU Load

– Process

– Memory

3. Select Board Details. The Board Details dialog box displays as shown in Figure 4-11.

Figure 4-11 Board Details

Table 4-1 describes the Board Details fields.

4. Select Resource to display the IPP card resource information. Refer to Figure 4-13 and Table 4-2 for Resource screens and description.

Table 4-1 Board Details

Field DescriptionFRU device id Field Replaceable Unit Device ID.

Board name Name of the Board.

Board serial number The serial number of the board.

Board slave address The slave address of the board currently installed.

Board slot number Slot number where the board is installed (e.g., slot 1, 2, 3, 4, 5, or 6).

Failure Count The number of times the board has failed.

Refresh Select this button to refresh the board detail information.

Close Closes this window completely.

Page 116: EMS User's Guide

4-16 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

4.3.2 Viewing MSC Card Information

To view MSC information, perform the following:

1. Move the mouse over an active Master Services Card (MSC) and click the right mouse button.

2. A sub-menu displays with the following selections:

• Chassis Configuration

• System Board Details

• Resources

– Storage

– CPU Load

– Process

– Memory

3. Select Chassis Configuration. The Chassis Details dialog box displays as shown in Figure 4-12.

Figure 4-12 Chassis Details

4. Select System Board Details to display board level details of the MSC. The Board Details screen will display as shown in Figure 4-11.

5. Select Resource to display the MSC card resource information. Figure 4-13 shows one of the Resources selected (i.e., Memory).

Page 117: EMS User's Guide

Viewing Chassis Information

Element Management System (EMS) User’s Guide WiChorus Confidential 4-17

Figure 4-13 Board Level Resource Information - Memory

Table 4-2 describes the Resource information.

Table 4-2 Resource Information for the IPP Card

Menu Command Action

Resource >

Storage Displays the storage information screen.

CPU Load

Displays the CPU Load data for the IPP card. This information can be plotted in a line, bar, area, scatter, xystep chart, and table. The data can be filtered by date and time stamp, within the last day, week, hour, or 24 hour intervals.

Process

Displays the Processor Utilization Time for the IPP card. This information can be plotted in a line, bar, area, scatter, xystep chart, and table. The data can be filtered by date and time stamp, within the last day, week, hour, or 24 hour intervals.

Memory

Displays the System Memory Allocation for the IPP card. This information can be plotted in a line, bar, area, scatter, xystep chart, and table. The data can be filtered by date and time stamp, within the last day, week, hour, or 24 hour intervals.

Page 118: EMS User's Guide

4-18 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

4.3.3 Viewing Port Information

To view the Port Configuration Details, perform the following:

1. Select an ethernet port on the IPP card (SFP Modules) or on the MSC card (MGMT1 or MGMT2). Remember the IPP card has to be in rear view mode in order to display the individual ethernet ports.

2. Move the mouse cursor over any one of the ethernet ports and click the right mouse button. On the IPP card there can be up to 10 SFP Modules installed.

3. A drop-down menu will display with two options, Port Configuration and Interface Metrics.

4. Select Port Configuration. Figure 4-14 shows the port configuration details for one of the ethernet ports on the IPP card.

Figure 4-14 Port Configuration Details

Table 4-3 describes the Port Configuration Details fields.

Table 4-3 Port Configuration Details

Field Description

Port Name This is the name of the port. For example, if you selected the first ethernet port on the second IPP card it will be displayed as Gig2.0.

Poll Interval

Operational Status

Status poll enabled/disabled

MTU Maximum Transmission Unit.

MacAddress

Port Type

Page 119: EMS User's Guide

Viewing Chassis Information

Element Management System (EMS) User’s Guide WiChorus Confidential 4-19

4.3.4 Viewing Interface Metrics

To view the Interface Metrics for any one of the ethernet ports located either on the MSC or IPP card, perform the following:

1. Select an ethernet port on either the IPP (SFP Modules) or on the MSC card (MGMT1 or MGMT2). Remember the IPP card has to be in rear view mode in order to display the individual ethernet ports.

2. Move the mouse cursor over any one of the ethernet ports and click the right mouse button. On the IPP card there can be up to 10 SFP Modules installed.

3. A drop-down menu will display with two options, Port Configuration and Interface Metrics.

4. Select Interface Metrics. For this example we are going to choose the Interface Metrics for the Mgmt1 port on the MSC card. By default, statistical data for the last 1 hour is displayed. Filter settings include a drop-down selections for Select Data by: All, Outgoing Octets, Incoming Octets, Incoming Packets, and Outgoing Packets. You can also select criteria by Last One Hour, Last 24 Hours, Last One Week, Today, and Custom based on the range of data you are looking for. If you select Custom, set the From and To range in Month:Date:Year:Hour:Minute:Seconds:AM/PM pattern. On selecting any of the options, click Plot Chart button. Figure 4-15 shows a sample Interface Metrics - Mgmt1 bar chart for the Last One Hour.

Figure 4-15 Interface Metrics

5. The Interface Metrics information can be displayed in Bar, Line, or Table format.

6. You can Save the plotted information by selecting the save icon located at the right-hand corner of the Interface Metrics screen as well as Clear the current graph you are viewing to re-plot the information.

Page 120: EMS User's Guide

4-20 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

4.3.5 Chassis Activity Modes

When viewing the chassis information there are several meaningful displays that are listed on the front of the Master Services Card (MSC), and the Shelf Management Modules (SMM).

4.3.5.1 Activity Modes for MSC

The Master Services Card (MSC) displays either Active or Standby on the front panel when viewing the chassis information.

• Active - when the word "Active" in green is displayed on the front panel of an MSC card this is an indication that the card is active, basically communicating (STAT).

• Standby - when the word "Standby" in grey is displayed on the front panel of an MSC card this is an indication that the card is not communicating properly or not configured.

4.3.5.2 Activity Modes for SMM

The Shelf Management Modules (SMMs) can display Active or Inactive on the front panel when viewing the chassis information. Remember you need to select the bezel viewing button to switch between the bezel being on or off.

• Active - when the word "Active" in green is displayed on the front panel of the MSC card this is an indication that the card is active, basically communicating (STATUS).

• Inactive - when the word "Inactive" in red is displayed on the front panel of the either one of the SMMs this is an indication that the modules are inactive, basically not working properly (OOS).

Page 121: EMS User's Guide

SSH to Gateway

Element Management System (EMS) User’s Guide WiChorus Confidential 4-21

4.4 SSH to Gateway

The SSH to Gateway feature is used to open a secure shell to run CLI commands through the GUI. Refer to the WiChorus Command Line Interface Software User’s Guide for more detailed information on CLI commands.

To open the secure shell (SSH), perform the following:

1. Open an active ASN Gateway under the Network Maps Topology.

2. Select an active ASN Gateway from the list under the Topology tree.

3. The active menu option will change to ASN Gateway.

4. Select ASNGateway > SSH to Gateway or

5. From the drop-down menu on an active Gateway, click the right mouse button, and select SSH to Gateway.

6. The SSH Authorization Required screen will display as shown in Figure 4-16 below.

Figure 4-16 Enter SSH Authorization Required

7. Enter a User Name (admin) and Password (admin) and click the Login button. Please refer to Section 3.6.1.1 , "Globals Configuration" on page 3-15 for more detailed instructions on how to configure the user name and password.

8. The CLI command interface screen will display for that particular Gateway as indicated by the Gateway IP address displayed at the top of the screen (see Figure 4-17).

Page 122: EMS User's Guide

4-22 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Maps

Figure 4-17 SSH Command Shell

Page 123: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential 5-1

Chapter 5 Network Views

This chapter describes the Element Management System (EMS) Network Views.

This chapter consists of the following sections:

• Overview

• Viewing Configured Network

• Viewing Subscriber Stations

• Viewing Paging Groups

• Viewing Home Agents

Page 124: EMS User's Guide

5-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Views

5.1 Overview

The Network Views portion of the Element Management System (EMS) is based on viewing available detailed information pertaining to the networks environment.

5.2 Viewing Configured Network

The following topics are covered in this section:

• Viewing Configured CSNs

• Viewing Configured ASNs and ASN Gateways

• Viewing Configured Basestation(s)

• Viewing Mobility Neighbors

5.2.1 Viewing Configured CSNs

To view configured CSN details, perform the following:

1. Select Configured Network under the Network Views tree.

2. The Configured Network screen will display with a list of Configured CSN(s) as shown in Figure 5-1.

5.2.2 Viewing Configured ASNs and ASN Gateways

To view configured ASNs and ASN Gateways, perform the following:

1. Select Configured Network under the Network Views tree.

2. The Configured Network screen will display with a list of Configured CSN(s).

3. Select any one of the Configured CSNs from the list.

4. All active ASN Gateways will display that are associated with the select CSN(s) as shown in Figure 5-1.

5.2.3 Viewing Configured Basestation(s)

To view configured Basestation(s), perform the following:

1. Select Configured Network under the Network Views tree.

2. The Configured Network screen will display with a list of Configured CSN(s) and a list of ASN Gateways.

3. Select any one of the Configured ASNs from the list.

4. The Configured Basestation(s) associated with the active ASN Gateway that was selected will display as shown in Figure 5-1.

Page 125: EMS User's Guide

Viewing Configured Network

Element Management System (EMS) User’s Guide WiChorus Confidential 5-3

5.2.4 Viewing Mobility Neighbors

To view Mobility Neighbors, perform the following:

1. Select Configured Network under the Network Views tree.

2. The Configured Network screen will display with a list of Configured CSN(s).

3. Click on a Configured CSN in the list. A list of Configured ASN(s)/ASN Gateway(s) will display.

4. Select an ASN Gateway and a list of Configured Basestation(s) will display.

5. Select any one of the Configured Basestation(s) from the list.

6. The Mobility Neighbors associated with the active Basestation(s) that where selected will display under the Mobility Neighbor(s) portion of the Configured Network screen as shown in Figure 5-1.

Figure 5-1 Viewing Mobility Neighbors

Page 126: EMS User's Guide

5-4 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Views

5.3 Viewing Subscriber Stations

To view Subscriber Station(s) information criteria, perform the following:

1. Select Subscriber Stations under the Network Views tree.

2. The Subscriber Stations screen will display as shown in Figure 5-2 below.

3. The Subscriber Station Filter Criteria can be set by Gateway, Basestation, and Paging Group.

4. Select the Subscriber Station search criteria through either one of the following: Mac address, IP address, Home Agent, and NAI. When selecting a Mac address or IP address you can enter a wild card in the field (e.g., 0.6.6.*) to search.

5. Click the Find SS button. The Selected Subscribers Station dialog box will display with a list of your search criteria.

6. You can set Page Length for the number of criteria information displayed per page (15 through 100). You can also page through each displayed page by clicking the First page, Previous page, Next page, and Last page buttons.

7. Once the displayed search criteria information is displayed you filter your search criteria further, by selecting any one of the buttons at the bottom of the dialog box (i.e., SS Details, and SS ServiceFlows). You can also Refresh the screen to re-display the screen with current Subscriber Station criteria.

Figure 5-2 Subscriber Station Filter Criteria

Page 127: EMS User's Guide

Viewing Paging Groups

Element Management System (EMS) User’s Guide WiChorus Confidential 5-5

5.4 Viewing Paging Groups

To view Paging Groups information criteria, perform the following:

1. Select Paging Groups under the Network Views tree.

2. The Paging Groups screen will display.

3. This is an information only screen. Figure 5-3 shows the Paging Groups screen containing the Configured Paging Groups and the Members in Paging Group dialog boxes.

4. Click on the Show Details check box to get a Paging Group Members Details display only screen.

Figure 5-3 Paging Groups

Page 128: EMS User's Guide

5-6 WiChorus Confidential Element Management System (EMS) User’s Guide

Network Views

5.5 Viewing Home Agents

When the Mobile Station (MS) moves to network under a different ASN Gateway, the Home Agent transfers an IP packet to the Mobile Station and to the Foreign Agent (FA) within the destination ASN Gateway. This makes it possible to support MS mobility with the same IP address. The HA also operates as a Radius Client and notifies the AAA of accounting-related information.

To view Home Agents information criteria, perform the following:

1. Select Home Agents under the Network Views tree.

2. The Home Agents screen will display information sent by the AAA Server. This will display different subscriber station information as shown in Figure 5-4.

Figure 5-4 Home Agents

Page 129: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential 6-1

Chapter 6 Performance Management

This chapter describes how to setup and retrieve performance management statistics and determine the degree to which the network is meeting assigned service levels.

This chapter contains the following sections:

• Overview

• Performance Manager

• ASNGW Metrics

• JVM Monitoring Details

Page 130: EMS User's Guide

6-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Performance Management

6.1 Overview

An important element of network management is the ability to receive performance information on a large network of many devices to provide an overall view of the user domain. You can then pro-actively manage your network elements by analyzing the performance data.

The EMS provides the capability to monitor the performance statistics gathered from network elements managed by the EMS system. You can set up the Performance Manager to monitor particular attributes or parameters according to their network requirements.

The Performance Management system is a powerful, flexible tool able to view general and performance specific attributes in one application and in a variety of formats (for example, plotting graphs, tables, report generation, etc.). You define the attributes or parameters, choose the objects you want to view, select the date and time of the view, and set the summary interval.

The Performance statistics provides a summary view of the performance of network elements. These statistics help determine the degree to which the network is meeting assigned service levels. From the network to the chassis level.

A selected object or group of objects has a number of different attributes. You can choose to view the performance data for an area of the network, for example, the performance statistics of a particular attribute. This information could then be used to evaluate the performance of the vendor's equipment and access the requirements for upgrades or software downloads.

Performance statistics also provides a summary view of the performance of network elements. These statistics help you determine the degree to which the network is meeting assigned service levels. You are able to drive down to the chassis level from the network level in a simple manner if you want to view individual chassis statistics.

A Performance Manager can be opened for each network element you wish to monitor. To view up-to-date information on the Performance Manager, choose Refresh and the selected data is displayed.

Page 131: EMS User's Guide

Performance Manager

Element Management System (EMS) User’s Guide WiChorus Confidential 6-3

6.2 Performance Manager

The EMS monitors the performance of your network periodically by collecting necessary data from each of the devices and by providing reports on the same. The performance is measured based on various factors, such as number of bytes of data received/sent (over a period) by a particular interface of a device, the interface's current bandwidth in bits per second, etc.

After discovery, EMS begins to collect data at an interval of 5 to 15 minutes. The collection interval is based on a number of parameters internally determined as part of EMS i.e. user does not have control over it. The data collected from a device in the network is termed Performance Data.

There are two types of performance data that you can view in the Application - Current Performance Data and Historical Performance Data. This performance data can be viewed using Graphs and Reports.

The following topics are covered in this section:

• ASNGW Metrics

Page 132: EMS User's Guide

6-4 WiChorus Confidential Element Management System (EMS) User’s Guide

Performance Management

6.3 ASNGW Metrics

The ASNGW Metrics option is to present the summarized version of the performance data from the selected devices in a predefined interval and stores it in the database. You can view this data through graphs or tables.

Current performance statistics summary data is automatically updated once every 5 minutes.

You can view current performance statistics data in graphs or in a table view, by performing the following:

1. To view the performance summary statistics data, select an active gateway that is listed to the left of the ASNGW Metrics window and click the mouse button.

2. The active Gateway metrics information will display within the Performance Summary showing five (5) separate graphical boxes as shown in Figure 6-1 below.

Figure 6-1 ASNGW Metrics Performance Summary

There are five types of graphical displays:

• Managed Subscribers

• RRA Metrics

• SS Metrics

• Handover Metrics

• GW Traffic Metrics

Page 133: EMS User's Guide

ASNGW Metrics

Element Management System (EMS) User’s Guide WiChorus Confidential 6-5

Another way to get a Detailed Historical Metrics is to:

1. Display the ASNGW Metrics from an active ASN Gateway directly. Select a Gateway from the Topology tree. The Topology screen will display with the active Gateway(s). Move the mouse over the Gateway you want to display metrics for and click the right mouse button. A sub-menu will display with a list of options. Select Statistics.

2. The ASNGW Metrics Details screen will display as shown in Figure 6-2 below.

3. There are a list of several performance statistics criteria that can be selected in order to view summary data.

4. Click the plus sign box next to the ASNGW Metrics criteria that you want to perform a summary view. These boxes will expand to offer other criteria for that particular metrics.

Figure 6-2 ASNGW Metrics Details

5. Select an ASNGW Metrics Detail from the list. For this example we are going to choose the GW Traffic Metrics - Incoming Octets. By default, statistical data for the last 24 hours is displayed. Choose Last One Hour, Last 24 Hours, Last One Week, Today, and Custom based on the range of data you are looking for. If you select custom, set the From and To range in Month:Date:Year:Hour:Minute:Seconds:AM/PM pattern. On selecting any of the options, click Plot Chart button. Figure 6-3 shows a sample GW Traffic Metrics - Incoming Octets bar chart for the Last One Hour.

Page 134: EMS User's Guide

6-6 WiChorus Confidential Element Management System (EMS) User’s Guide

Performance Management

Figure 6-3 GW Traffic Metrics - Incoming Octets Chart

6. To save the graph to a file, click Save.

7. To clear the graph, click Clear Graph. To plot it afresh, click Plot Chart button.

8. To print the graph, click the right mouse button on the graph and choose Print... Note: Click the right mouse button on the graph for performing operations, such as Auto Range, Zooming in and out, Saving, and Setting Properties.

6.3.1 ASNGW Metrics Details

There are eight types of ASNGW Metrics that you can view data for, they are:

• Managed Subscribers

• GW Traffic Metrics

• SS Traffic Metrics

• RRA Metrics (Radio Resource Allocation)

• Control IP Statistics

• Ethernet Statistics

• Paging Metrics

• Handover Metrics

Page 135: EMS User's Guide

ASNGW Metrics

Element Management System (EMS) User’s Guide WiChorus Confidential 6-7

6.3.1.1 Managed Subscribers

You can view current managed subscribers statistics data in graphs, or in a table view option.

• Subscriber Stations

• Active Subscriber Stations / Base Stations

• Idle Subscriber Stations / Base Stations

• Number of Service Flows - for the Subscriber within that Gateway

Number of Subscriber Stations

This will display the number of Subscriber Stations that have been registered for that particular Gateway over time. The Managed Network Size - No of SS window displays the graph (by default, Line Chart) with current performance statistics data plotted in it.

Number of Active Subscriber Stations for every Basestations

This will display the number of Active Subscriber Stations for every Basestation.

Number of Idle Subscriber Stations for every Basestation

This will display the number of Idle Subscriber Stations for every Basestation connected to this particular Gateway.

Service Flows

This will display the total number of Service Flows going through that Gateway.

6.3.1.2 GW Traffic Metrics

You can view current Gateway Traffic Metrics statistics in graphs, or in a table view option.

• Incoming Octets

• Outgoing Octets

• Incoming Packets

• Outgoing Packets

Incoming Octets

This will display the total amount of Octets destine to the Gateway.

Outgoing Octets

This will display the total amount of Octets sent out from Gateway.

Page 136: EMS User's Guide

6-8 WiChorus Confidential Element Management System (EMS) User’s Guide

Performance Management

Incoming Packets

This will display the total amount of Packets destine into the Gateway.

Outgoing Packets

This will display the total amount of Packets sent out from Gateway.

6.3.1.3 SS Traffic Metrics

You can view current Subscriber Station Traffic Metrics in graphs, or in a table view option format.

• In Octets

• Out Octets

Subscriber Stations Traffic Metrics In Octets

This will display the total amount of Octets received from Subscriber Stations summarized on a per Basestation basis.

Subscriber Stations Traffic Metrics Out Octets

This will display the total number of Octets sent out Subscriber Stations summarized on a per Basestation basis.

6.3.1.4 RRA Metrics (Radio Resource Allocation)

You can view current RRA Metrics statistics data in graphs, or in a table view option.

• DLink Resource Availability

• ULink Resource Availability

DLink Resource Availability

This will display the Downlink Capacity for every Basestation that is available as a percentage.

ULink Resource Availability

This will display the Uplink Resource available per Basestation as a percentage.

6.3.1.5 Control IP Statistics

You can view Control IP Statistics data in graphs, or in a table view option.

• TCP Statistics

• UDP Statistics

• ICMP Statistics

Page 137: EMS User's Guide

ASNGW Metrics

Element Management System (EMS) User’s Guide WiChorus Confidential 6-9

TCP Statistics

This will display the total number of TCP control packets received at the Gateway.

• Segments Received

• Segments in Error

• Segments Transmitted

UDP Statistics

This will display the total number of UDP control packets received at the Gateway.

• Datagrams in Error

• Datagrams Transmitted

• Datagrams Received

ICMP Statistics

This will display the total number of ICMP packets received at the Gateway.

• Outgoing ICMP Errors

• Outgoing ICMP Messages

• Incoming ICMP Errors

• Incoming ICMP Messages

6.3.1.6 Ethernet Statistics

You can view current Ethernet Statistics data in graphs, or in a table view option.

• Frames Dropped

Frames Dropped

This will display the number of Frames Dropped for all Gigabit ports.

6.3.1.7 Paging Metrics

You can view current Paging Metrics statistics data in graphs, or in a table view option.

• No of total requests

• No of successful paging requests

• No of total responses

• No of failed paging requests

Page 138: EMS User's Guide

6-10 WiChorus Confidential Element Management System (EMS) User’s Guide

Performance Management

6.3.1.8 Handover Metrics

You can view current Handover Metrics statistics data in graphs, or in a table view option.

• Inter ASN Completed

• Intra ASN Dropped

• Intra ASN Completed

• Inter ASN Dropped

Inter ASN Completed

This will display the number of Subscriber Stations could not be handed over from one Basestation to another Basestation - where the Basestations are being managed by different ASNGW(s) i.e. Inter ASN Handover.

Intra ASN Dropped

This will display the number of Subscriber Stations handover from one Basestation to another Basestations - where the Basestations are being managed by the same ASNGW i.e. Intra ASN Dropped Metrics.

Intra ASN Completed

This will display the number of Subscriber Stations handover from one Basestation to another Basestations - where the Basestations are being managed by the same ASNGW i.e. Intra ASN Handover.

Inter ASN Dropped

This will display the number of Subscriber Stations could not be handed over from one Basestation to another Basestation - where the Basestations are being managed by different ASNGW(s) i.e. Inter ASN Dropped Metrics.

Page 139: EMS User's Guide

JVM Monitoring Details

Element Management System (EMS) User’s Guide WiChorus Confidential 6-11

6.4 JVM Monitoring Details

EMS JVM Monitoring consists of three units: Monitoring, Management and Maintenance

• Monitoring enables EMS to monitor the memory usage and thread count of the system.

• Management involves taking actions such as sending email notification, dumping thread details and invoking the garbage collector in case of abnormality.

• As part of effective Maintenance, EMS is integrated with third-party software.

6.4.1 Monitoring and Management

Monitoring of JVM parameters such as Memory Usage and Thread count is an important process using which of the JVM performance can be improved and problems such as JVM crash could be prevented.

EMS uses the SNMP mode to store historic information about the EMS JVM parameters so that administrators can monitor the condition of the EMS JVM memory usage at any point of time.

6.4.1.1 BE Server

The process defined in EMS takes care of the following functions:

• Monitors memory usage of the BE Server.

• Monitors JVM resource usage of the BE Server periodically.

• Monitors JVM resource usage of the FE Server JVM periodically. The BE Server starts monitoring the FE server JVM as and when a FE gets connected to the BE.

• Triggers email notification when memory usage of BE or Client exceeds the configured threshold limit.

Table 6-1 BE Server Arguments

Argument Purpose Possible Value Default Value

aries.wichorus.com_BE_16500_MonitorMemoryDetermines whether the memory usage of the BE server is to be monitored or not.

true or false true

aries.wichorus.com_BE_16500_MonitorThread

Indicates the threshold value of memory usage of BE Server. When the memory usage exceeds this value, actions such as email notification, thread dump generation and garbage collection are triggered.

Within the range 0.1 and 1.0 0.7

Page 140: EMS User's Guide

6-12 WiChorus Confidential Element Management System (EMS) User’s Guide

Performance Management

6.4.1.2 Client

The Client monitors its own memory usage. If the memory usage exceeds the configured threshold limit, it automatically generates thread dumps in the client logs, and runs the garbage collector (if configured). Parameters for Client monitoring are available in the clientparameters.conf file and can be configured according to the requirement. Table 6-2 lists down the parameters and their usage:

6.4.2 Viewing JVM Monitoring Details

To view the JVM Monitoring Details, perform the following:

1. Connect to the Client.

2. Click Tools > JVM Monitoring Details to bring up the EMS JVM Monitoring UI.

3. Select one of the memory monitoring details from the drop-down selection.

4. Select one of the Date Range Settings (i.e., Last 24 hrs, Today, Last one week, and Custom).

5. The collected memory and thread information of the EMS JVM can be viewed in the following formats: Line Chart, Bar Chart, Area Chart, Scatter Chart, XY Step Chart, and Table as shown in Figure 6-4 below.

6. To save the JVM Monitoring plotted graph information, click on the Save icon. You can clear the JVM Monitoring information by clicking on the Clear button. This will clear the monitoring screen and allow you to select a different type of monitoring detail.

Table 6-2 Client Parameters

Argument Purpose Possible Value Default Value

aries.wichorus.com_CLIENT_14500_MonitorMemory

Determines whether the memory usage of the Client server is to be monitored or not.

true or false true

aries.wichorus.com_CLIENT_14500_MonitorThread

Indicates the threshold value of memory usage of FE Server. When the memory usage exceeds this value, actions such as email notification, thread dump generation and garbage collection are triggered.

Within the range 0.1 and 1.0 0.7

Page 141: EMS User's Guide

JVM Monitoring Details

Element Management System (EMS) User’s Guide WiChorus Confidential 6-13

Figure 6-4 JVM Monitoring Details - Tabular View

Page 142: EMS User's Guide

6-14 WiChorus Confidential Element Management System (EMS) User’s Guide

Performance Management

- This page intentionally left blank -

Page 143: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential 7-1

Chapter 7 Fault Management

This chapter describes how the EMS provides advanced fault management capabilities for proactive monitoring of network reliability and availability. The detection of fault is a process that gives indication of malfunctioning. Fault detection and notification are two functional areas which should identify problems and effectively inform the system administrator. The EMS offers simple integration of events from diverse servers, and provides ways to process, correlate, and present alarms and events based on domain-specific requirements.

Fault management capabilities include:

• Network Event/trap processing

• Color-coded alarm severity views

• Alarm drill down categorized by severity, managed resource type, time of day, and alarm messaging

• Fault remedy work flow management – Categorize alarms

This chapter contains the following sections:

• Overview

• Network Events

• Viewing Network Events

• Alarm Management

Page 144: EMS User's Guide

7-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

7.1 Overview

The EMS includes an advanced, integrated fault management solution, with real-time site and network element alarm summaries, as well as effective detailed alarm/event viewing and tracking capabilities. Fault management is provided via a full set of alarm monitoring tools. Convenient color-coded alarm banners are provided for individual severity classes. Threshold parameters are used for proactive network management with trigger actions. Alarm correlation tools are available to assist with fault investigations and analysis.

Alarm summary views track and count alarms by site and severity. This allows managers and executive team members, who routinely need to see network status at a glance. The EMS also consists of alarm summary views that offer technicians an avenue to navigate quickly to the most severe problems in the network. The detailed alarm/event browser provides full visibility to all alarm and event attributes and includes interactive features such as alarm acknowledgement, audible alarms, event history, event notes, and viewing the configuration and status of alarmed resources.

EMS users can easily apply any of the built-in alarm/event filters and event browser layouts to create their own personal view. The EMS also allows users to define their own alarm/event filters. These features foster flexible partitioning of work, based on product type, technology, skill level, or geographic domain, as well as a high degree of personal productivity. Users can attach notes to an event or alarm, which helps to track progress toward problem resolution. Notes and acknowledgements are immediately tagged by user ID and time stamp and made available for viewing by all users in the active events/alarms browser. They are also stored in the event history database for future reference.

Page 145: EMS User's Guide

Network Events

Element Management System (EMS) User’s Guide WiChorus Confidential 7-3

7.2 Network Events

The Network Events application opens from the EMS and allows viewing the status of these groups. Users can add, modify, and delete event parsers, and setup custom event filters.

Event groups can be any combination of objects derived from the EMS managed object class. These groups are set up using queries which can be configured to match your requirements. For example, you could choose to monitor a particular device, specify a date and time period, and choose to look at events which have severity level of warning or critical. You define a query so that the network event only includes the events which meet the criteria you define.

As soon as the group is created it starts monitoring against the criteria specified in the event query setup. Event groups created in the Event Groups application are persistent, they are not cleared when the application is closed.

The Network Events application also enables you to view the events associated with an event group in a scoreboard format. This displays the overall status of the event group as a pie chart, with the associated severity color coding. A scoreboard also shows the total number of events which have entered the event group and the highest severity of the events in the group. An icon is displayed when a running notification has been set up for the event group.

The Network Events enables you to sort the events reported by the system according to event severity, event time, event message and element. In addition, events can be filtered according to time period and severity level.

The Events displays the following information:

• Event severity level (Critical, Major, Minor, Warning, and Clear).

• Date and time of the event.

• Text message describing the event.

You can view all alarms generated by the EMS application by using the EMS Network Events. The EMS Network Events allows you to view all events generated by EMS.

You can complete the following procedures when viewing Network Events:

• Viewing Network Events

• Viewing Event Details

• Viewing Related Alarms

• Saving Events

• Exporting Events

• Printing Events

Page 146: EMS User's Guide

7-4 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

7.2.1 Viewing Network Events

To view network events, perform the following:

1. Open the EMS application.

2. Click Network Events node in the tree.

The network events are displayed in an Network Events screen (see Figure 7-1).

Figure 7-1 Network Events Screen

7.2.2 Viewing Event Details

Event details provide information on each of the properties of an event. Figure 7-2 shows the Event Details screen. Table 7-1 describes the Event Details screen properties.

To view event details, perform the following:

1. Open the Network Events.

2. Click a row in the table and from View menu, choose Details or

3. Click the right mouse button on a row in the table and choose Details or

4. Click a row in the table and press Alt+D or

5. Double-click a row in the table.

Page 147: EMS User's Guide

Network Events

Element Management System (EMS) User’s Guide WiChorus Confidential 7-5

Figure 7-2 Viewing Network Event Details

Table 7-1 Event Details Properties

Property DescriptionIndex Specifies a unique ID created for each of the events that are generated.

Severity Specifies the severity of the event, such as Critical, Major, Minor, Clear, Warning, Info.

Message Specifies the message associated with the event.

Category Specifies the category to which the event belongs. Example: Topology.

Domain Specifies the domain-specific information which is based on physical location, functional categorization, or logical categorization of the source of the event.

Network Specifies the network to which the event belongs to.

Node Specifies the node to which the event belongs to. For example, if the event is for an interface, the node value is specified as interface parent node.

Failure Object Specifies the specific entity (in the source) that has failed and is primarily responsible for the event.

Source Specifies the exact source (network, node, interface) of the event.

Help URL Specifies the URL for locating the help documentation on clicking the Help button in the same dialog box.

Date/Time Specifies the date and time when the event was generated.

GroupName Specifies the group name to which the event belongs.

EMS Element Management System.

Page 148: EMS User's Guide

7-6 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

7.2.3 Viewing Related Alarms

Events are converted to alarms (based on their significance), which are messages that require administrator's/operator's attention. From the Event Viewer, you can view the alarm that has been created for an event.

To view related alarms, perform the following:

1. Open the Network Events.

2. Click a row whereby you select an event.

3. From View menu, choose Alarms or

4. Click the right mouse button on the row and choose Alarms or

5. Press Ctrl+L keys simultaneously.

Alarm Viewer with only the alarms related to the selected event is displayed.

7.2.4 Saving Events

The Save option can be used to save the current range of events displayed in the Event Viewer. For example, if the current table in the Event Viewer displays 200 events, then this range can be saved to a file.

To save the events, perform the following:

1. Open the Network Events.

2. From Actions menu, choose Save To File or

3. From the toolbar, click Save or

4. Press Ctrl+I keys simultaneously.

5. The Properties dialog box is displayed.

6. Enter the file name in File Name field.

7. Click Save File. A status message is displayed.

7.2.5 Exporting Events

The Export Events option can be used to save the Event Custom View data as a CSV (comma-separated values) file in the EMS server. Option is provided to export the entire Custom View data or only the data that is currently displayed in the Custom View.

To export the events, perform the following:

1. Open the Network Events.

2. From Actions menu, choose Export Events or

3. Press Ctrl+Shift+E keys simultaneously. The Export Data dialog box is displayed as shown in Figure 7-3.

4. Choose the desired option from the radio buttons Export Entire Custom View Data or Export Displayed Data

Page 149: EMS User's Guide

Network Events

Element Management System (EMS) User’s Guide WiChorus Confidential 7-7

5. Enter the file name in File name field.

6. Click Export. A status message is displayed.

7. The exported custom view data file will be saved.

7.2.6 Printing Events

The Print option can be used to print the current range of events displayed in the Event Viewer.

To print events, perform the following:

1. Open the Network Events

2. From Actions menu, choose Print or

3. From the toolbar, click Print button or

4. Press Ctrl+P keys simultaneously.

The current range of events in the Event Viewer is printed.

You can customize the Network Events by adding or removing columns using the custom view options, order the events by sorting, or by creating new custom views. After customization, use the print option to get a printed version of your customized view.

Page 150: EMS User's Guide

7-8 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

7.3 Alarm Management

Events are correlated into alarms. They represent the current status of the various problems in the network. An Alarm Filter executes certain corrective actions whenever alarms are received with configurable matching criteria, such as suppressing multiple alerts in a given interval, running shell commands on the server system, sending e-mails, sending traps, and executing custom code to filter alerts (see Table 7-2).

Custom code may be needed in cases where any additional data has to be retrieved, or specific rules are to be applied in processing the alarm. Custom code is also the appropriate mechanism to configure alarm grouping, because it usually requires user or domain-specific rules.

The processed alarms are stored in the database and made available in the Alarms Viewer. The Alarm Viewer is asynchronously notified, as soon as the processing of an alert is finished.

You can configure an Alarm Filter using the Alert Filter Configuration. You can use the properties of the alert object in some of the fields, such as to Suppress Action, Run Command Action, Send Trap Action, and Send E-mail Action.

A custom Filter can be configured to enable more effective event correlation and fault management by adding application-specific rules when processing events and alarms. However, this should be done by a developer and not by an administrator.

7.3.1 Alarm Operations

Alarms are generated when a failure or fault is detected in the network devices. The events generated are converted to alarms based on its significance and they are simply messages calling for operator's/administrator's attention.

The administrative tasks that you can perform are:

• Viewing Alarms

• Sorting Alarms

• Searching Alarms

• Printing Alarms

Table 7-2 Alarm Color Codes

Alarm Type Severity Color DescriptionCritical Red

Major Gold

Minor Yellow

Warning Blue

Clear Green

Page 151: EMS User's Guide

Alarm Management

Element Management System (EMS) User’s Guide WiChorus Confidential 7-9

7.3.2 Viewing Alarms

To view the Alarms view, perform the following:

1. Click the Fault Management module tab in the EMS application. By default the Events view is displayed.

2. Click Alarms under Fault Management.

The Alarms view is displayed on the right-side frame in a table format. This table format is called Alarms.

Customizing Alarms Per Page Count

By default, 25 alarms are shown per page in the Alarms List View.

To view more alarms per page

– In the Alarms List View, choose a value from entries per page combo box.

Browsing the Alarms

To browse through the list of alarms, use the First, Previous, Next, and Last navigation facility placed above the Alarms List View. Clicking navigation icons display the desired page, such as the first page, previous page, next page, and the last page of Alarms List View.

Alarm Summary

To view the total number of alarms generated in the EMS, Alarm Summary is provided at the bottom left corner in the EMS application page. It is a table listing the total alarm count on module/category basis. Refer to Section 7.3.7 , "Alarm Summary View" on page 7-11 for more information on Alarm Summary.

Customizing the Columns

The alarms's properties are displayed as columns in the Alarms List View. You can add more columns or remove existing columns using the Customize Columns option.

7.3.3 Sorting Alarms

By default, in the Alarms List View, the alarms are displayed in the order of precedence based on time and in descending order. This order can be changed using the Sorting option.

To sort alarms, perform the following:

1. From the Alarms List View, click the column header.

2. When you click the column header for the first time, the column is sorted in ascending order. Clicking the same column header again sorts the column in descending order and represent ascending and descending order respectively.

Page 152: EMS User's Guide

7-10 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

For example, if you need to sort the alarms based on their status, click the Status column header. This sorts the alarms based on its status and the default order of precedence is Critical, Major, Minor, Warning, and Clear. For descending order of the same column, click the Status column header again.

7.3.4 Searching Alarms

The Search option in the EMS application facilitates searching for one or more alarms. The search operation is performed on the entire database and is not restricted to the displayed page alone. You can search for a required alarm based on a general condition or a unique criterion.

7.3.5 Exporting Alerts

The alarms that are generated in the network can be exported.

To export the alerts, perform the following:

1. Select Fault Management > Alarms.

2. From Actions menu, choose Export Alerts or

3. Press Ctrl+Shift+E keys simultaneously. The Export Data dialog box is displayed as shown in Figure 7-3 below.

4. Choose the desired option from the radio buttons Export Entire Custom View Data or Export Displayed Data

5. Enter the file name in File name field.

6. Click Export. A status message is displayed.

7. The exported custom view data file will be saved.

Figure 7-3 Exporting Data

7.3.6 Printing Alarms

By default, the print option for Events and Alarms in the EMS application is not configured. To enable printing, configuration has to be done. Please see your system administrator for further instructions.

Page 153: EMS User's Guide

Alarm Management

Element Management System (EMS) User’s Guide WiChorus Confidential 7-11

7.3.7 Alarm Summary View

You can perform the following functions within the Alarm Summary View.

• Viewing Alarms

• Viewing Alarm Details

• Viewing Related Events

• Picking Up / Unpicking an Alarm

• Adding Comments to an Alarm

• Viewing Alarm History

• Viewing Both Annotation and History of an Alarm

• Saving Alarms

• Exporting Alarms

• Printing Alarms

7.3.7.1 Viewing Alarms

The alarms are displayed in Alarm Summary View.

The Alarm Summary View is displayed below the tree which enables you to view a summary of all the alarms generated by the EMS. The summary gives the number of alarms that are generated under various categories and severity levels. This panel is automatically refreshed every 30 seconds. The three different views provided are:

• Tabular View

• Graphical View - Bar Graph

• Pie Chart

Note:All alarms are displayed in the Alarms window in a table format where each row depicts an alarm.

Page 154: EMS User's Guide

7-12 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

Tabular View

Figure 7-4 shows the tabular view of an alarm summary.

Figure 7-4 Alarm Summary Tabular View

The Alarm Count panel is presented in a tabular format where each row corresponds to a specific category of alarms. The number of rows correspond to the number of alarm categories. The last row provides the total number of alarms for each severity level. An alarm can have the severity levels - Critical Alarms, Major Alarms, Minor Alarms, Warning Alarms, and Clear Alarms.

The Alarm count is based on the severity. When a new alarm is generated, the count is updated automatically and under appropriate severity column.

You can view all the alarms under a specific severity or for a specific category:

1. Viewing all alarms with a specific severity.

From the Alarm Count panel, click the count in the Total row that corresponds to the specific severity of the alarms you want to view. For example, if you want to view all the critical alarms, click the total count in the first (red) column.

2. Viewing all the alarms for a specific category.

From the Alarm Count panel, click the category name of the alarms you want to view. For example, if you want to view all the alarms in the topology category, click Topology in the Category column.

3. Viewing all the alarms with a specific severity level for a specific category.

From the Alarm Count panel, click the count corresponding to the specific severity and category of the alarms you want to view. For example, if you want to view all the critical alarms for the topology category, click the count in the first (red) column and in the Topology row.

Page 155: EMS User's Guide

Alarm Management

Element Management System (EMS) User’s Guide WiChorus Confidential 7-13

Graphical View - Bar Graph

The bar graph depicts the Critical, Major, Minor, and Warning severity information. For each of the category, a separate set of bar graph is created (see Figure 7-5). Clicking a severity bar on the graph (for example, Major), displays all the alarms of that severity on the Alarm Viewer.

Figure 7-5 Graphical View - Bar Graph

Pie Chart

The Pie Chart of the Alarm Summary View displays all the severity. Each severity on the pie chart is depicted with its count. Clicking on a severity (for example, Critical), displays all the alarms of that severity on the Alarm Viewer (see Figure 7-6).

Figure 7-6 Pie Chart Alarm Summary View

Page 156: EMS User's Guide

7-14 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

7.3.7.2 Viewing Alarm Details

Alarm details provide information on each of the properties of an alarm.

To view alarm details, perform the following:

1. Click a row in the table and from View menu, choose Details or

2. Click the right mouse button on a row in the table and choose Details or

3. Click a row in the table and press Alt+D keys simultaneously or

4. Double-click a row in the table.

5. The Alarm details for <source> dialog box is displayed as shown in Figure 7-7 below.

Figure 7-7 Alarm Details

6. Click Refresh button in the Alarm details for <source> dialog box to update the alarm details instantly.

Page 157: EMS User's Guide

Alarm Management

Element Management System (EMS) User’s Guide WiChorus Confidential 7-15

7.3.7.3 Viewing Related Events

To view related events, perform the following:

1. Open the Alarm Summary View.

2. Click a row whereby you select an alarm.

3. From View menu, choose Events or

4. Click the right mouse button on the row and choose Events or

5. Press Ctrl+E keys simultaneously.

This will display only those alarms related to the selected event is displayed.

7.3.7.4 Picking Up / Unpicking an Alarm

Pick Up is a mechanism that helps in assigning a particular alarm/fault of a device to a work group or user. This ensures that all problems are picked up and work is not duplicated. It is also possible to Unpick an Alarm which has already been assigned to a user or work group.

An alarm annotation entry is entered with the name of the user who has picked up/unpicked the alarm and the time it was performed.

The procedures to pick up alarms, and unpick alarms are outlined below.

Pick Up Alarm

To pick up an alarm, perform the following:

1. Open the Alarm Summary View.

2. Click a row whereby you select an alarm.

3. From View menu, choose Details or

4. Press Alt+D keys simultaneously. The Alarms details for <source> dialog box is displayed as shown in Figure 7-7.

5. Click Pick Up button. The date and time and who picked-up the alarm is displayed.

UnPick Alarm

To unpick an alarm, perform the following:

1. Open the Alarm Summary View.

2. Click a row whereby you select an alarm. Ensure that you select an alarm that has already been picked.

3. From View menu, choose Details or

4. Press Alt+D keys simultaneously. The Alarm details for <source> dialog box is displayed as shown in Figure 7-7.

5. Click UnPick.

Page 158: EMS User's Guide

7-16 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

7.3.7.5 Adding Comments to an Alarm

It is important to track any action you have taken to fix an alarm or any new information you have gathered about the alarm. Annotate option can be used to add notes to the alarm for future reference. For example, the solution for a problem resolved by you can be entered by using the Annotate option. This enables other users to solve the same problem with less effort, by just reading the annotation.

To add comments to alarm, perform the following:

1. Open the Alarm Summary View.

2. Click a row whereby you select an alarm. Ensure that you select an alarm that has already been picked.

3. From View menu, choose Details or

4. Press Alt+D keys simultaneously. The Alarm details for <source> dialog box is displayed.

5. Click Annotate button. The Add Notes Dialog dialog box is displayed.

6. Enter your comments in the Message field.

7. Click Update.

You can view the annotation in the non-editable Annotations for this alarm field in Alarm details for <source> dialog box.

7.3.7.6 Viewing Alarm History

The history of the alarms gives the complete information on the status of the alarms, such as when they are added / updated. For example, when a critical alarm is generated, the Alarms Viewer displays the current status of the alarm. If the problem has been fixed, an alarm with clear severity updates the one with critical severity.

To view history of an alarm, perform the following:

1. Open the Alarm Summary View.

2. Click a row whereby you select an alarm. Ensure that you select an alarm that has already been picked.

3. From View menu, choose Details or

4. Press Alt+D keys simultaneously. The Alarm details for <source> dialog box is displayed.

5. Click View history button. The bottom portion of the Alarms Details screen will change to History for this alarm with a history of this particular alarm summary.

The Alarm details for <source> dialog box displays a field History for this alarm (on hiding Annotations for this alarm field). This field displays the history of that alarm, from first to the last alarm, i.e., the time at which the problem occurred, the fix time, and severity change.

To view the annotations, click View Annotation button.

Page 159: EMS User's Guide

Alarm Management

Element Management System (EMS) User’s Guide WiChorus Confidential 7-17

7.3.7.7 Viewing Both Annotation and History of an Alarm

To view both annotation and history of an alarm, perform the following:

1. Open the Alarm Summary View.

2. Click a row whereby you select an alarm. Ensure that you select an alarm that has already been picked.

3. From View menu, choose Details or

4. Press Alt+D keys simultaneously. The Alarm details for <source> dialog box is displayed.

5. Click Merge. The Alarm details for <source> dialog box displays a field Merged history and annotations for this alarm (on hiding Annotations for this alarm field). This field displays the merged history and annotations of that alarm, from first to the last alarm, i.e., the time at which the problem occurred, the fix time, when alarms where merged, and severity change.

7.3.7.8 Saving Alarms

The procedure to save alarms is the same as explained in Section 7.2.4 , "Saving Events" on page 7-6.

7.3.7.9 Exporting Alarms

The procedure to export alarms is the same as explained in Section 7.2.5 , "Exporting Events" on page 7-6.

7.3.7.10 Printing Alarms

The procedure to print alarms is the same as explained in Section 7.2.6 , "Printing Events" on page 7-7.

Page 160: EMS User's Guide

7-18 WiChorus Confidential Element Management System (EMS) User’s Guide

Fault Management

- This page intentionally left blank -

Page 161: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential 8-1

Chapter 8 Administration

This chapter describes how to manage system security for the Element Management System (EMS).

This chapter contains the following sections:

• Overview

• Runtime Administration

• Security Administration

• Image Management

Page 162: EMS User's Guide

8-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.1 Overview

The EMS application provides administrative tools and security features for users and groups. Currently, the EMS application does not provide security directly for elements, but it does provide security indirectly to devices as members of groups.

The EMS application lets an administrator provide security for the network by:

• Determining how users are authenticated, either locally or through a server

• Assigning passwords and privilege levels to users

• Choosing a remote login method for users

• Creating access lists for groups

Page 163: EMS User's Guide

Runtime Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-3

8.2 Runtime Administration

The Runtime Administration helps the System Administrator with various modules of the EMS at runtime. Making configurations at runtime using this tool avoids the hassles of restarting the EMS application every time a configuration is made.

To open the Runtime Administration, perform the following:

1. Open the EMS application.

2. From the Tools menu, choose Runtime Administration or

3. Press Alt+R keys simultaneously. The Runtime Administration screen is displayed as shown in Figure 8-1 below.

4. Choose the required module's tool from the Categories drop-down box or tree.

Figure 8-1 Runtime Administration

The various Runtime Administrative categories include the following:

• Configuring Log Settings

Page 164: EMS User's Guide

8-4 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.2.1 Configuring Log Settings

The Logging Service comes in handy for various purposes, such as pinpointing bugs, configuration errors, performance blockades, creating audit logs, and tracking various actions in the server.

All messages are stored in log files in the form of Text files (.txt).

You can configure the logging by editing the logging_parameters.conf file using the Runtime Administration tool. Using this tool updates the file at runtime and therefore you do not have to restart the EMS Server after configuration. But if you have edited the file directly through an editor, ensure to restart the Server.

The Runtime Administration Tool can be used to configure the Server-related log messages only. To configure Client-related logs, manually configure the logging_paramenters.conf file.

The following topics will be covered in this section:

• Opening Log File Configuration Tool

• Adding Log Files

• Viewing Details of Log Files

• Modifying Log Files

8.2.1.1 Opening Log File Configuration Tool

To open the Log File Configuration tool, perform the following:

1. In the EMS, from Tools menu, click Runtime Administration or

2. Press Alt+R keys simultaneously. The Runtime Administration tool is displayed.

3. From Categories drop-down box or tree, choose Miscellaneous > Log Settings. The Logging Configuration screen is displayed as shown in Figure 8-2 below. The table lists the existing log file names, the directory where it is located, maximum lines that the file can hold, and the file count.

Page 165: EMS User's Guide

Runtime Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-5

Figure 8-2 Logging Configuration

8.2.1.2 Adding Log Files

To add a new log file, perform the following:

1. In the Log File Configuration tool, click Add. The Logging Configuration dialog box is displayed as shown in Figure 8-3 below.

Figure 8-3 Adding Log Settings Information

Page 166: EMS User's Guide

8-6 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

2. Specify the name of the log file in the Log File Name field.

Only the file names that are compatible with an OS are supported. | Specify extension as .txt | Avoid numbers.

3. Specify the directory where the log file has to be stored in the Logging Directory field.

4. Specify the number of lines to be written in the log file in the Maximum Number of Lines Per File field. This is an optional field. When no value is specified, the default value of 10000 lines is set.

5. When the log file exceeds the maximum number of lines specified, it is carried forward to another new file that is created with similar name. For example, when newfile.txt reaches 10000 lines, then a new file newfile1.txt is created and the logging continues. The number of files that can be created in such cases can be specified in the Maximum Number of Files field. This is an optional field. When no value is specified, the default value of 10 is set.

6. You can configure the maximum number of lines to be kept in memory before writing them to a log file by specifying the value in the Maximum Lines Cached field. For example, if the value is set as 50, the first 50 lines are kept or cached in memory. On reaching the 50th line, all the 50 lines are written to the log file. Then, the second round of writing would happen after caching 50 more lines and so on. This parameter avoids the overhead of frequent writings into the log file for each line.

7. If you require the time stamp along with the log messages, select the Use Time Stamp? field.

8. Click Next. The second Add Log File screen will display as shown in Figure 8-4 below.

Figure 8-4 Add Log Settings Information (continued)

9. Specify the unique key name in the Key Name field. This serves as the key with which EMS differentiates between modules to log module-specific log messages and to identify the type of message, i.e. output or error message.

10. Specify the module-specific name that is to be prefixed with the log message in the log file in the Display Name field.

Page 167: EMS User's Guide

Runtime Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-7

11. Click Add.

12. Choose the log level from the Log Level drop-down box. If you choose to record the messages belonging to certain level, the messages with levels lower than and equal to the level chosen will be recorded. For example, if you choose Intermediate, then all the log messages belonging to the Summary and Intermediate will be recorded.

– Summary: Important messages

– Intermediate Messages: Frequently generated log messages

– Verbose: Detailed/Error messages

– Debug: Composite of above levels and more information for debugging purposes

13. To enable the logging in this new log file, select the Enable Logging? field. If the log file is created with this option not selected, then the log file will be created in the configured directory, but the logging will not take place.

14. Click Finish.

15. Click Apply to effect changes on the server-side logging_parameters.conf file. The success or failure of writing to server-side file is displayed in the Runtime Administration tool status bar.

8.2.1.3 Viewing Details of Log Files

To view log file details, perform the following:

1. In the Log File Configuration tool, select the log file from the table.

2. Click View Details or double-click on anyone of the listed log files. The Log Details dialog box is displayed as shown in Figure 8-5.

Figure 8-5 Viewing Log Details

Page 168: EMS User's Guide

8-8 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.2.1.4 Modifying Log Files

To modify log file details, perform the following:

1. In the Log File Configuration tool, select the log file to be modified from the table.

2. Click Modify. The Logging Configuration Log Settings dialog box is displayed as shown in Figure 8-6.

3. Click Next. The second Log Configuration Log Settings screen is displayed as shown in Figure 8-7.

4. Make necessary changes in the two screens and Click Finish when done.

Figure 8-6 Modifying Log Detail Information

Page 169: EMS User's Guide

Runtime Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-9

Figure 8-7 Modifying Log Detail Information (continued)

Page 170: EMS User's Guide

8-10 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.3 Security Administration

The EMS Security Administration option allows system administrators to set up security levels, operations, and audit trails for individual Groups and Users. Individual Groups and/or Users are given specific privileges that are set up by the administrator.

The access level is set up to allow or restrict user access to features within EMS. For example, an administrator could set up a user to have access only to those parts of EMS which are relevant to their specific tasks. A user would only be aware of their own access to the system and the use of their password.

The following Security Administration tasks are explained in this section:

• Security Levels

• Adding Users

• Changing User Profile

• Assigning Groups to Users

• Changing User Password

• Managing Audit Trails

• Deleting Users

• Managing Operations

8.3.1 Security Levels

EMS Security also enables administrators to define security levels for specific managed object attributes. This is key to restricting access to sensitive or critical parameters of managed equipment. A user with access may be able to apply a new configuration to that piece of equipment, but they may not be able to modify its IP address, as this could invalidate normal management of the device. Control of the IP address may be the specific responsibility of the network topology manager.

8.3.1.1 User Access Levels

There are two types of user access (Permission) levels available. They are:

• Excluded (basic level)—useful for a new user finding their way around the EMS system. The system administrator can set up the permissions tree hiearchy for users who have limited access.

• Included (administration level)—used by an administrator who can access all features at all times. The system administrator can set up the permissions tree hiearchy for administrative level user capabilities.

Page 171: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-11

8.3.2 Adding Users

You can add a user whenever you need to provide access to the EMS Client. By default, the new user has login permission only. You provide access to various modules by making the user a member of pre-configured groups or by directly assigning permissions to the user.

You can add a new user, perform the following:

1. In the Application Client, select Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously. The Security Administration window is displayed as shown in Figure 8-8 below.

3. In Security Administration window, select File menu, choose New > AddUser or

4. Press Ctrl+Shift+U keys simultaneously.

5. Click AddUser or

6. Click the right mouse button on the Users node within the Security tree (located at the left side of Security Administration window) and click AddUser.

Figure 8-8 Security Administration

7. The User Administration window is displayed as shown in Figure 8-9 below.

Page 172: EMS User's Guide

8-12 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

Figure 8-9 User Administration

8. Type the user name and password in appropriate fields and click Next. If no password is specified, the user name is set as the password.

9. Click Next. The User account expiry and Password expiry screen displays as shown in Figure 8-10.

Figure 8-10 User Account and Password Expiry

10. Complete one of the following steps:

By default, the user account never expires.

• If you are providing access for a limited number of days, type the number of days in which the account expires in the Day(s) field.

• If the account has no expiration, check the Account never expires check box.

Page 173: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-13

In the User Account and Password expiry section, complete one of the following steps:

By default, the user account never expires.

• If the password has an expiration time period, type the number of days in which the password expires in the Day(s) field.

• If the password has no expiration, check the Password never expires check box.

Here user account expires and password expires are two different entities. You can give user name and password expiry separately. Password expiry is checked only when the user tries to login. Whereas the user account expiry check is done at a regular time interval. This time interval check works only if time_interval_for_security_scheduler_in_ms parameter in NmsProcessesBE.conf file is configured (in milliseconds). By default, the value is set as '0' whereby scheduler will not be started and the user expiration check will not be done.

Click Next.

11. If you are associating the user with an existing group, complete the following (see Figure 8-11):

• Check the Group based permissions check box to enter a new group name in the dialog box. Click Add Group.

• Check the Direct assignment check box to assign permissions directly from the Permissions Tree.

• In Assign groups for the user, click on the check boxes next to the groups to which you want to assign groups for the user. Select either User or Admin.

Figure 8-11 Assigning Groups for Users

Page 174: EMS User's Guide

8-14 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

12. Click the right-arrow next to the Group Name(s) selected (e.g., Users for Admin). A pop-up window displaying the corresponding permissions for the group. Based on the permissions you can assign groups to the user. For this example the Permissions for Groups: Users screen is displayed in Figure 8-12.

Figure 8-12 Permission for Groups: Users

If you want to create a new group to which you want to associate the user, complete the following steps:

1. In the Enter the new group name field, type a name for the new group.

2. Click Add Group.

3. The Assign Permissions dialog box is displayed.

To directly assign permissions to the user, complete the following:

1. Check the Direct assignment check box.

2. Click the Permissions button.

3. The Assign Permissions dialog box is displayed.

The operations assigned to the user are specific to that particular user alone.

4. When you have finished assigning permissions to the user, click the Finish button.

Page 175: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-15

8.3.3 Changing User Profile

You can change a user’s profile when necessary. You might want to change a profile to change the expiration of an account or password.

To change a user profile, perform the following:

1. In the Application Client, select the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously.

3. The Security Administration window is displayed.

4. In the Security Administration window, click the user whose profile you need to change on the Security tree. The Security Administration tabs are displayed on the right-side.

5. Click User Profile tab.

6. Click Setting Profile, The User Profile dialog box is displayed as shown in Figure 8-13 below.

Figure 8-13 Changing User Profile

7. To enable or disable the user, uncheck No change in status check box and from the drop-down box, choose enable or disable as appropriate.

8. Make changes to account and user expiry as appropriate.

9. Click Ok.

The Security Administration window displays a Security tree Groups and Users nodes on the left side. The various types of icons displayed under the Users node provide immediate information about the status of a specific user.

Page 176: EMS User's Guide

8-16 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.3.4 Assigning Groups to Users

You can assign the users that you have created to already existing groups.

To assign groups to users, perform the following:

1. In the Application Client, select the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously. The Security Administration window is displayed.

3. In Security Administration window, click the user whose profile you need to change on the Security tree. The Security Administration tabs are displayed on the right-side.

4. Click Member Of tab.

5. Click Setting Groups The Select Groups window is displayed as shown in Figure 8-14.

Figure 8-14 Select Groups

6. To assign a group to the user, click a group in All Groups list and click the > button. For assigning more than one group, do a multiple selection using Shift or Ctrl buttons.

7. To unassign a group, click the groups in Selected Groups list and click the < button.

8. Click Ok.

The groups assigned to the user are displayed in Groups for list in Member Of tab.

Page 177: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-17

8.3.5 Changing User Password

To change a user password, perform the following:

1. In the Application Client, select the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously.

3. The Security Administration window is displayed.

4. In Security Administration window, click the user whose password you need to change on the Security tree. The Security Administration tabs are displayed on the right-side.

5. From Edit menu, choose Change Password or

6. Press Ctrl+Shift+C or

7. Click the right mouse button on the user node on the Security tree and click Change Password.

8. The Change Password dialog box is displayed.

9. Enter the new password in the fields and click Ok.

10. The new password is saved to the EMS Server.

8.3.6 Managing Audit Trails

Audit trails enable you to view the operations that have been performed by a user. The audit trail identifies all operations that have been performed, the time, whether it was successful, category, and audited object. You should periodically clear the trails after they have been reviewed.

You can:

• View the audit trail details of all the users or a single user.

• Sort the details by user, operation, time, status, category, and audited object by clicking the appropriate column heading.

• Search for audit details based on the properties.

• Clear the audit trails when you no longer need to manage them.

The topics covered in this section are:

• Viewing Audit Trails of All Users

• Viewing Audit Trails of a Single User

• Sorting Audit Trails

• Searching the Audit Trails

Page 178: EMS User's Guide

8-18 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.3.6.1 Viewing Audit Trails of All Users

To view audit trails of all users, perform the following:

1. In the Application Client, select the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously.

3. The Security Administration window is displayed.

4. In Security Administration window, select View menu, choose AuditTrails or

5. Press Ctrl+Shift+A keys simultaneously or

6. Click AuditTrails.

7. The Auth Audit Screen is displayed as shown in Figure 8-15.

Various operations performed by the users along with the status of whether the operation was a success or failure are displayed. The operation category such as Fault, Topo, Provisioning, Configuration, or DEFAULT is also displayed. In the case of operation that involves any object, such as "Add Node" operation where the object is added, then the object detail is displayed.

Figure 8-15 Auth Audit

8. To sort the list, click the appropriate column heading.

9. To clear an audit trail, click the audit and click Clear.

To select a single audit trail, click it, for contiguous audit trails, press and hold the Shift key while clicking the appropriate trails, and to select non-contiguous audit trails, press and hold the Ctrl key while clicking the appropriate audit trails.

Page 179: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-19

8.3.6.2 Viewing Audit Trails of a Single User

To view audit trails for a single user, perform the following:

1. In the Application Client, select the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously. The Security Administration window is displayed.

3. In the Security tree, click the desired user under Users node.

4. Click Audit Trails in the right click menu. To clear an audit trail, click the audit and click Clear Trails.

8.3.6.3 Sorting Audit Trails

To perform client side sorting where the audit trails details in that particular page will be sorted.

1. Invoke the Auth Audit screen.

2. Click on the column header of the property on which the Audit trails have to be sorted holding down the Ctrl button.

To perform server side sorting where the audit trails details in the database will be sorted and displayed in the UI.

1. Invoke the Auth Audit screen.

2. Click on the column header of the property on which the Audit trails have to be sorted.

8.3.6.4 Searching the Audit Trails

To search the audit trails, perform the following:

1. Invoke the Auth Audit screen.

2. Press Ctrl+S keys simultaneously.

3. Select the property on which the search has to be performed from the combo box.

4. Select the condition from the combo box.

5. Specify the value in the text box.

6. Click the Search button to search the Audit Trails screen.

After viewing the audit details based on the Search results, you can view all the details again in the same page by clicking on the Show All button in the top right corner of the Auth Audit screen.

Page 180: EMS User's Guide

8-20 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.3.7 Deleting Users

You can delete a user when you no longer want to provide access to the EMS Clients.

To delete users, perform the following:

1. In the Application Client, select Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously. The Security Administration window is displayed.

3. In the Security tree, click the desired user under Users node and perform the following:

4. From Edit menu, choose Delete or

5. Press Alt+D keys simultaneously or

6. Click the right mouse button on the user node on the tree and click Delete.

7. A confirmation to delete the user is asked. Click Yes to delete the user.

8.3.8 Managing Operations

The Operations Tree contains a list of operations (also referred to as permissions) that is provided by default in the EMS. The operations are logically arranged in a tree structure with parent and child operations. You can add new operations when they are needed and delete obsolete operations.

The topics covered in this section are:

• Understanding Default Operations

• Assigning Operations

• Adding Operations

• Deleting Operations

• Security Management: An Example

8.3.8.1 Understanding Default Operations

The Operations Tree contains a list of operations that is provided by default in the EMS. Assigning different operations to different users is an administrative function (see Figure 8-16).

• Administrative Operation

• Events

• Topology

• Policy

• User Administration

• Trap Parsers and Filters

• Alerts

• Configuration

• Maps

• Polling Units

Page 181: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-21

• Polling Object

• Threshold Object

• Poll Filters

• Provisioning

Figure 8-16 Operation Tree Configuration

Administrative Operation

Table 8-1 Administrative Operation

Operation Description

Shutdown Web EMS Server Disabling this operation prevents the user from shutting down the EMS Server. This is applicable to both the Application Client and the Web Client.

Configure Log Levels Disabling this operation prevents the user from configuring the log levels (applicable only to Web Client).

Runtime Administration Disabling this operation prevents the user from working on the Runtime Administration Tool. For more information on Runtime Administration Tool.

Security Administration

The Security Administration node provides the following security-related operations that can be configured. You can provide permission for users only for certain security operations and restrict the others. For instance, you can provide permission for a user to create a new group but he might not have the option to delete the same. See Table 8-2 on page 8-22

Services See Table 8-3 on page 8-22.

Page 182: EMS User's Guide

8-22 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

Security Administration

The Security Administration node provides the following security-related operations that can be configured. You can provide permission for users only for certain security operations and restrict the others. For instance, you can provide permission for a user to create a new group but the user might not have the option to delete the same. Table 8-2 describes the Security Administration operations within the Operations Tree.

Services

Events

Table 8-2 Security Administration

Operation Description

Group Operations

Add Group Disabling this operation prevents the user from adding a new group.

Remove Group Disabling this operation prevents the user from removing a group.

Set Group Permission Disabling this operation prevents the user from setting permissions or operations to groups.

Operation SettingsAdd Operation Disabling this operation prevents the user from creating new operations in the

Operations UI.

Remove Operation Disabling this operation prevents the user from removing existing operations from the Operations tree.

Scope SettingsCreate Scope for Group Disabling this operation prevents the user from adding a new scope or setting

the properties of a scope.

Modify Group Scope Relation Disabling this operation prevents the user from assigning a scope to a group in the Custom View Scope for Group UI.

Table 8-3 Services

Operation Description

Clear Discovery

The discovery process may be stopped due to some unforeseen problems. The Clear Discovery operation is used to resume the discovery process.Disabling this option prevents the user from resuming the discovery process from the EMS Client.

Start BackupThis operation is to start the EMS backup process. This operation suspends all the EMS Scheduler.Disabling this operation prevents the user from starting the backup process.

Resume EMS This operation is performed to resume all EMS Scheduler if the backup process has some errors.

Table 8-4 Events

Operation Description

Event Filters and Parsers

Get Event Parsers Disabling this operation prevents the user from viewing the existing event parsers in EMS Server.

Set Event Parsers Disabling this operation prevents the user from modifying or adding a new event parser.

Get Event Filters Disabling this operation prevents the user from viewing the existing event filters in the EMS Server.

Set Event Filters Disabling this operation prevents the user from modifying or adding a new event filter.

Event User OperationsSave Events to File Disabling this operation prevents the user from saving the events in file.

Print Event View Disabling this operation prevents the user from printing the list of events.

Page 183: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-23

Topology

Policy

User Administration

Table 8-5 Topology

Operation Description

Add Network Disabling this operation prevents the user from adding a new network manually.

Add Node Disabling this operation prevents the user from adding a new node in the network manually.

Delete Object Disabling this operation prevents the user from deleting an object or a network element.

Modify ObjectStart and Stop Discovery Disabling this operation prevents the user from starting or stopping the

discovery process of the EMS Server.

Manage and Unmanage Objects

Disabling this operation prevents the user from managing or unmanaging an object or a network element.

Refresh Node Disabling this operation prevents the user from refreshing a node.

Table 8-6 Policy

Operation DescriptionAdd Policy Disabling this operation prevents the user from adding a new policy.

Update Policy Disabling this operation prevents the user from updating an existing policy.

Delete Policy Disabling this operation prevents the user from deleting an existing policy.

Table 8-7 User Administration

Operation Description

User Configuration Disabling this operation prevents the user from accessing User Configuration link in EMS Client.

Add Users Disabling this operation prevents the user from adding new users. This is applicable to both the Application Client and the EMS Client.

Assign User to Groups Disabling this operation prevents the user from assigning a user to a group. This is applicable to both the Application Client and the EMS Client.

Remove Users Disabling this operation prevents the user from removing a user. This is applicable to both the Application Client and the EMS Client.

Remove User from Group Disabling this operation prevents the user from removing a user from a group. This is applicable to both the Application Client and the EMS Client.

Change Password Disabling this operation prevents the user from changing the password of a user. This is applicable to both the Application Client and the EMS Client.

Get List of Users Disabling this operation prevents the user from viewing the list of users added. This is applicable only to EMS Client (the link to access the list if disabled).

Set User Permission Disabling this operation prevents the user from setting operations or permissions for existing users. This is applicable to both the Application Client and the EMS Client.

Set User Profile Disabling this operation prevents the user from setting profiles for existing users. This is applicable to both the Application Client and the EMS Client.

Clear Audit Trails Disabling this operation prevents the user from clearing audit trails in Application Client.

Page 184: EMS User's Guide

8-24 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

Trap Parsers and Filters

Alerts

Configuration

Maps

Table 8-8 Trap Parsers and Filters

Operation Description

Get Trap Filters Disabling this operation prevents the user from viewing the existing trap filters using Runtime Administration Tool.

Set Trap Filters Disabling this operation prevents the user from setting new trap filters using Runtime Administration Tool.

Reload Trap Filters Disabling this operation prevents the user from reloading the trap filters using Runtime Administration Tool.

Get Trap Parsers Disabling this operation prevents the user from viewing the existing trap parsers.

Set Trap Parsers Disabling this operation prevents the user from setting new trap parsers.

Table 8-9 Alerts

Operation Description

Alert FiltersGet Alert Filters Disabling this operation prevents the user from viewing existing alert filters.

Set Alert Filters Disabling this operation prevents the user from setting new alert filters.

Alert User Operations

Set Alert Annotation Disabling this operation prevents the user from annotating an alarm.

Get Alert Details Disabling this operation prevents the user from viewing the details of an alarm.

Save Alerts to File Disabling this operation prevents the user from saving the list of alarms in a file.

Print Alert View Disabling this operation prevents the user from printing the alarms.

Clear Alerts Disabling this operation prevents the user from clearing the alarms.

Get Alert Annotation Disabling this operation prevents the user from viewing the annotation of an alarm.

Get Alert History Disabling this operation prevents the user from viewing the history of an alarm.

Alert Pickup Disabling this operation prevents the user from picking up an alarm.

Delete Alerts Disabling this operation prevents the user from deleting an alarm.

Table 8-10 Configuration

Operation DescriptionCreate Task Disabling this operation prevents the user from creating new tasks.

Execute Task Disabling this operation prevents the user from executing tasks.

Table 8-11 Maps

Operation Description

Map Editing Operations Disabling this operation prevents the user from adding or deleting symbols, links, and containers, grouping symbols, clearing or deleting alarms, and configuring nodes in a map.

Page 185: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-25

Polling Units

Polling Object

Threshold Object

Poll Filters

Provisioning

Table 8-12 Polling Units

Operation DescriptionAdd Polling Units Disabling this operation prevents the user from adding polling units or statistics.

Remove Polling Units Disabling this operation prevents the user from removing an existing polling unit or statistic.

Modify Polling Units Disabling this operation prevents the user from modifying an existing polling unit or statistic.

Get Polling Units Disabling this operation prevents the user from viewing the details of the polling unit or statistic.

Table 8-13 Polling Object

Operation DescriptionAdd Polling Object Disabling this operation prevents the user from adding new polling objects.

Modify Polling Object Disabling this operation prevents the user from modifying existing polling objects.

Delete Polling Object Disabling this operation prevents the user from deleting polling objects.

Change Polling Object Status Disabling this operation prevents the user from changing the status of a polling object.

Get Polling Objects Disabling this operation prevents the user from viewing the existing polling objects.

Table 8-14 Threshold Object

Operation DescriptionAdd Threshold Object Disabling this operation prevents the user from adding new threshold objects.

Modify Threshold Object Disabling this operation prevents the user from modifying existing threshold objects.

Delete Threshold Object Disabling this operation prevents the user from removing threshold objects.

Get Threshold Objects Disabling this operation prevents the user from viewing the available threshold objects.

Table 8-15 Poll Filters

Operation Description

Get Poll Filters Disabling this operation prevents the user from viewing the existing poll filters in Runtime Administration Tool.

Update Poll Filters Disabling this operation prevents the user from updating existing poll filters using Runtime Administration Tool.

Reload Poll Filters Disabling this operation prevents the user from reloading the poll filters using Runtime Administration UI.

Table 8-16 Provisioning

Operation Description

View TemplateResult Disabling this operation prevents the user from viewing the results of a provisioning operation in ActivityList view.

Page 186: EMS User's Guide

8-26 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.3.8.2 Assigning Operations

You can assign operations (include or exclude privileges) for a particular user.

Assigning Operations for a User

To assign operations for a user, perform the following:

1. In the Application Client, select the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously. The Security Administration window is displayed.

3. From the Security tree, click the user for whom you need to assign operations.

4. Click the Permitted Operations for User tab displayed (see Figure 8-17) on the right side. All operations included or excluded for that group are displayed in the Permissions For User list.

Figure 8-17 Permitted Operations for User

5. Click Set Permissions. The Assign Permissions window is displayed as shown in Figure 8-18.

Page 187: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-27

Figure 8-18 Assign Permissions

6. To grant the appropriate permissions, complete the following steps:

• To include the permissions you want to grant to the group, select the appropriate check boxes.

• To prevent specific permissions from being granted to the group, click the check box until an x is displayed in the box.

Leaving the check box empty for an operation will not be accounted as an authorized operation and it inherits its immediate parent operation permission. For information on each of the operations.

7. To cancel the changes before closing the window, click Reset. Click Done.

8.3.8.3 Adding Operations

You can add new operations to the EMS Clients. For example, as new sub-applications are added, you might find that the current operations are not adequate for your needs; you can add operations that apply to the new sub-application.

1. In the Application Client, select the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously. The Security Administration window is displayed.

3. In Security Administration window, select the File menu, choose New > AddOperations or

4. Press Ctrl+Shift+O keys simultaneously or

5. Click AddOperation. The Operations window is displayed.

Page 188: EMS User's Guide

8-28 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

6. Click the parent operation under which you need to add a new operation. For example, Events. This will display information on the default operation.

7. In the empty field given below the tree, type a name for the operation and click Add. The operation is added to the tree under the selected parent node. Repeat this step to add more operations.

8. Click Ok.

8.3.8.4 Deleting Operations

1. In the Application Client, select the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously. The Security Administration window is displayed.

3. In Security Administration window, select the File menu, choose New > AddOperations or

4. Press Ctrl+Shift+O keys simultaneously or

5. Click AddOperation.

6. The Operations window is displayed.

7. Click the operation you need to delete from the Operation Tree.

8. Click Remove. To confirm deletion, click Yes.

8.3.8.5 Security Management: An Example

This example helps you in fulfilling the following hypothetical case.

1. A new group EMSGroup is created.

2. The EMSGroup has the privilege to do all operations in the following modules:

• Events

• Topology

• Maps

3. The EMSGroup does not have the privilege to perform the following operations:

• Stop the EMS server

• Configure the security

4. A new user EMSUser is created.

5. The EMSUser is assigned to the EMSGroup.

6. The EMS User can view details of NODE1 only in the Application Client.

Follow the steps to achieve the above listed criteria.

Page 189: EMS User's Guide

Security Administration

Element Management System (EMS) User’s Guide WiChorus Confidential 8-29

Adding the "EMSGroup" Group

To add the EMSGroup group, perform the following:

1. From the Tools menu, choose Security Administration or

2. Press Alt+S keys simultaneously. The Security Administration window is displayed.

1. In Security Administration window, from the File menu, choose New > AddGroup. The Groups Wizard is displayed.

2. Type the group name as EMSGroup and click Next. The Operations Tree Root is displayed. No entries required in this window. We will perform it later.

3. Click Finish. The EMSGroup is created and you can view it on the Security tree under Groups.

Configuring Custom View Scope for "EMS Test" Group

To configure custom view scope for EMS Test group, perform the following:

1. Click the Custom View Scope for Group tab.

2. From the Custom View Scope for Group drop-down box, choose Events.

3. Click Add AuthorizedScope. The Scope Settings dialog box is displayed.

4. Type the scope name as EventTest.

5. From Name drop-down box, choose source.

6. Type Value as NODE_0*.

7. Click Add.

8. Click Ok.

Repeat steps 14 to 20 for other modules, such as Network Database, Alerts, Maps, Stats Admin, and Provisioning (available in Custom View Scope Name drop-down box).

Adding the "EMSUser" User

To add the EMSUser user, perform the following:

1. From the File menu, choose New > Add NewUser. The User Administration wizard is displayed.

2. Type the user name and password as EMSUser.

3. Click Next.

4. Click Next.

5. From Assign groups for the user select EMSGroup.

6. Click Finish. All the operations configured for EMSGroup are now available to this user.

Now log on to the Application Client with user name and password as EMSUser. Only information related to NODE_0 is displayed in all modules of the Application Client.

Page 190: EMS User's Guide

8-30 WiChorus Confidential Element Management System (EMS) User’s Guide

Administration

8.4 Image Management

Image Management is used to import and distribute update software images within the EMS application to be used when building network infrastructure.

To import, distribute, delete, and view images, perform the following:

1. Select Administration > Image Management from the Administration tree.

2. The Image Management screen will display as shown in Figure 8-19 below.

Figure 8-19 Image Management

3. The Image Management screen has two parts. The first is the Available Images that are available in the EMS database. These images can be Imported, Distributed across Gateways, and Deleted by selecting the corresponding buttons. Once the image has been imported it will display in the available images portion of the screen showing the Image Name, Upload Date, and Description.

4. The second part of the screen, Distribution List displays the images that where distributed across the Gateways. It will display the Gateway Name, Image Name, Download Date, and Status.

5. The Refresh button refreshes the screen with current information.

Page 191: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential A-1

Appendix A Glossary

Alarm

Alarm results from correlation of events and represents failure or fault in a network element that may need immediate attention.

Container

This is the interface for grouping together and managing a set of managed objects, using the containment relationship model.

Link

A link is a diagrammatical representation of the connection between two symbols.

Managed Object

A Managed object holds information about a network entity. The network entity can be a network device, such as computer, printer, router or a component of the device like port, card, slot, interface etc.

Map Symbol

Diagrammatical representation of objects in a map are called Map Symbols. For example, a Gateway Map depicts gateways as images which are called the Map Symbol.

Network Events

Event is the basic unit of management information that is complete in itself and relates to an occurrence, such as discovery of an element, status update of an element or failure in an element. Events form a repository of information for all the occurrences in the system.

Object

Refer to Managed Object.

Polled Data

Basic object used for data collection. It contains the details such as which device has to be contacted, what data needs to be collected, in what time interval etc. This does not store the collected data. Poll engine reads PolledData definition and according collects data from the network device. Also termed Statistics.

Page 192: EMS User's Guide

A-2 WiChorus Confidential Element Management System (EMS) User’s Guide

Polling

Process of contacting the device agent and collecting the data for the specified OID. PolledData will contain the OID details.

Statistics

Also termed Polled Data.

Status Polling

Process of pinging the device and determining its state such as up/down at regular intervals. If Status Polling yields negative results, i.e. if the device is not responding, provisions are made to report the condition, which requires attention.

Threshold

It is a value that determines the minimum and maximum limit for the collected data. If the collected data violates the threshold then it indicates some severe fault in the device which requires attention.

Page 193: EMS User's Guide

Element Management System (EMS) User’s Guide WiChorus Confidential Index-1

00Index

AAAA Server 3-6Accessing Help 2-8Add a AAA Server to a CSN 3-6Adding Comments to an Alarm 7-16Adding Log Files 8-5Administration 1-4Administrator 2-5Alarm Management 7-8Alarm Operations 7-8Alarm Summary 7-9Alarm Summary View 2-15, 7-11Application Work Area Components 2-10Assigning Groups to Users 8-16Authenticator Parameter Configuration 3-16

BBenefits 1-4Broadcast a Message 2-21Browsing the Alarms 7-9

CChanging User Profile 8-15Closing Windows 2-8Configuration Details 3-13Configuration Management 1-2Configure Load Balancing Profile 3-20Configured AAA Servers 3-43Configured Link State Database 3-48Configured RIP Interface Statistics 3-50Configured RIP Peers 3-51Configured Signal Optimization 3-22Configured Virtual Neighbors 3-47Configuring an ASN Gateway 3-11Configuring Log Settings 8-4Create a Basestation - ASN 3-52Create a Core Service Network (CSN) 3-4Create a Top-Level Gateway - ASN 3-9Create a Top-Level Group - CSN 3-4Creating Access Service Network (ASN) 3-8Customizing Alarms Per Page Count 7-9Customizing the Columns 7-9

DDetaching a Frame from a Window 2-8DHCP Configuration 3-17DHCP Lease Table 3-45DHCP Server Statistics 3-44Display Panel 2-15DNS Settings 3-38

EEMS Application Overview 1-2EMS Navigation Tools 2-6Exiting the Application 2-5Exporting Alarms 7-17Exporting Alerts 7-10Exporting Events 7-6

FFault Management 1-3Filter Neighbors by Basestation 4-8

GGlobal Configuration 3-15

IInstalled Routes 3-37

MManaged Basestations 3-40Mobile IP FA 3-18Mobile IP Proxy Client 3-19Modifying Log Files 8-8

NNeighbor ASN Gateways 3-41NTP Servers 3-39

OOpening a Basestation List 4-7Opening Log File Configuration Tool 8-4OSPF Area Aggregates 3-27

Page 194: EMS User's Guide

Index-2 WiChorus Confidential Element Management System (EMS) User’s Guide

OSPF Areas 3-26OSPF General Group Configuration 3-23, 3-46OSPF Interface Metrics 3-28OSPF Interfaces 3-24OSPF Virtual Interfaces 3-29Overview 5-2

PPaging 3-42Performance Management 1-3Performance Manager 6-3Performance Summary View 2-15Performing Network Map Operations 4-3Picking Up / Unpicking an Alarm 7-15Printing Alarms 7-10, 7-17Printing Events 7-7

RRedistribute OSPF Routes 3-32RIP Global Configuration Details 3-49Routing Configured RIP Interfaces 3-34Routing Redistribute RIP Routes 3-35Routing RIP Global Configuration Details 3-33Runtime Administration 8-3

SSaving Alarms 7-17Saving Events 7-6Searching Alarms 7-10Security Administration 8-10Security Levels 8-10Security Management 1-3Setting Up Users 8-11Sorting Alarms 7-9Starting the EMS Application 2-3State 3-40Static Routes 3-36Status Bar 2-15Subscriber Station Handover Configuration 3-21

TTo Assign a Candidate Basestation to Mobility Neighbors 3-54To Create a Paging Group 3-56Tree 2-15

UUnderstanding the User Interface 2-10User Access Levels 8-10Using Pop-Up Menus 2-14Using Shortcut Keys 2-7Using the EMS Application 2-3Using the Mouse 2-6Using the Navigation Toolbar 2-13Using the Topology Toolbar 2-13

VViewing AAA Server 4-4Viewing Alarm Details 7-14Viewing Alarm History 7-16Viewing Alarms 4-6, 7-9, 7-11Viewing Both Annotation and History of an Alarm 7-17Viewing Chassis Information 4-13Viewing Configured ASNs and ASN Gateways 5-2Viewing Configured Basestation(s) 5-2Viewing Configured CSNs 5-2Viewing Configured Network 5-2Viewing Details of Log Files 8-7Viewing Event Details 7-4Viewing Events 4-5Viewing Events and Alarms for a Particular Gateway 4-6Viewing Home Agents 4-4, 5-6Viewing IPP Card Information 4-15Viewing List of ASNs 4-4Viewing Mobility Neighbors 5-3Viewing MSC Card Information 4-16Viewing Network Events 7-4Viewing Paging Groups 5-5Viewing Performance Data of a Device 4-6Viewing Properties 4-3Viewing Related Alarms 7-6Viewing Related Events 7-15Viewing Subscriber Stations 5-4

WWindow Option 2-8