Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 67

Security Level:

Basic Training on I2000V3


Network Management (Dh
version)ISSUE 2.1

www.huawei.com

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential


Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Client

Chapter 3 Maintenance Tools of I2000 V3

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 2


Hierarchical Management

Service NM , i.e. I2000


Application in IN, RBT and Mobile Data, etc. IN service management solution

Host, database and middleware, etc. AMOS

AMOS control solution

Equipment room, temperature, access


control and moisture, etc. RMU
Environmental control

Telecom Overall Huawei Management Solutions


System

Based
Basedon
oncomplicated
complicatednetwork
networkintegrating
integratingtelecommunication
telecommunicationand
andIT,
IT,Huawei
Huawei
iManager
iManagerI2000
I2000provides
providesmultilayer
multilayersolutions
solutionstotomeet
meetcustomers’
customers’requirements.
requirements.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 3


I2000 NM Location
CC&CRM

Billing
Service Provision
SML Integrated Management Platform Custom information mgt

NML RMS, comprehensive faults……

Operation tool, product engineering

EML I2000 service subsystem I2000 AMOS subsystem I2000 RMU subsystem

Configuration
console ICD Data…
LMT Maintenance
Networking device Temperature, moisture,
and Test smoke, intrusion, etc
console
NEL SMSC IN RBT Host/database/middleware

Note: NML is network management system of Mobile company, for example, Yiyang NMS.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 4


OM Solution


Maintenance Tools

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 5


IN NM Solutions

NM
Center Upper-layer
comprehensive NM
system

Database + alarm real-time forwarding interface

MML MML MML

Local
Maintenance
center

Reference: support website: Documentation > Application and Software Product Line >
Service and Software Public > I2000 > Function and Feature > Training Document > Advanced
Training> A&S public - Advanced Training on I2000 IN Uniform Monitor

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 6


OCS NM Solution

Upper-layer NM

I2000 system
Server MML USAU
MML Client
OAM
Server
BAM

MML SNMP SNMP MML MML SNMP

UOA UOA
OAMAgent Agent Agent iMonitor

SCP CBP BMP RBI FEP host, database

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 7


SMC NM Solutions
Upper-layer NM

Server
Client

I2000 system
MML

MT
Server
MML MML

Local
maintenance Local
SMSC maintenance infoX

Reference: support website: Documentation > Application and Software Product Line > Se
rvice and Software Public > I2000 > Function and Feature > Training Document > Advance
d Training > 《业软公共 提高培训 I2000 短消息集中监控培训胶片》

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 8


Data Service NM Solutions
Upper-layer NM

Server
Client
I2000 system

SNMP SNMP SNMP

MMSC …
WAPGW MDSP

Reference: support website: Documentation > Application and Software Product Line >
Service and Software Public > I2000 > Function and Feature > Training Document > Advanced
Training> A&S public - Advanced Training on I2000 Data Service Uniform Monitor

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 9


RBT NM Solutions (old)
VRS
I2000 Client
MML
I2000 Server MML

Upper-layer NM
I2000 DB MML AIP

OAS Server
OAS DB

icdcomm

icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm


OMD OMD OMD OMD OMD OMD OMD OMD OMD

FE CTI UIScript VP Portal WEB DB File
P Server Server Server Server Server
Reference : support website : Documentation > Application and Software Product Line > Servi
ce and Software Public > I2000 > Function and Feature > Training Document > Advanced Trainin
g> A&S public - Advanced Training on I2000 RBT Uniform Monitor

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 10


RBT NM Solutions (new)
Upper-layer NM

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 11


CC&CRM NM Solutions (old)
I2000 Client MML

Upper-layer NM I2000 Server


AIP
MML

OAS Server
OAS DB
icdcomm

OMD OMD OMD OMD OMD OMD OMD OMD OMD

CCS, FP,
APLOGIC
CTI CTI UIScript VP IVR WEB DB File …
Server LIN Server Server Server Server
K
Note: The I2000 cannot monitor customer service system of earlier versions. Therefore, only
the CTI platform and AIP NEs are shown in the figure above.
Reference : support website : Documentation > Application and Software Product Line
> Service and Software Public > I2000 > Function and Feature > Training Document > Adv
anced Training> A&S public - Advanced Training on I2000 CC&CRM Uniform Monitor

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 12


CC&CRM NM Solutions (new)

Upper-layer NM

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 13


Monitoring of the RBT Customer Service
System with Multiple Call Planes
I2000 Client

I2000 Server
Upper-layer NM

MML MML

Call plane 1 AIP Call plane 2 AIP Management plane AIP


OAS Server OAS Server OAS Server

Management
Call Plane 1 Call Plane 2 Call Plane n...

Plane …

Note: New versions of the CTI platform can also be accessed in the I2000 through the UOA, that i
s, an OASserver connects to a UOA, and the UOA connects to the I2000 through SNMP. Multiple
OASservers can connect to only one UOA and one OASserver can connect to multiple UOAs.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 14


Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Client

Chapter 3 Maintenance Tools of I2000 V3

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 15


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 16


Alarm Management-Basic Concept
Basic concept
 Fault alarm
It is, reflected as an error, a physical or logical factor causing failur
e of system running.
• Current fault alarm : It is the fault alarm not recovered or conf
irmed. User should pay attention and handle this alarm.
• History fault alarm : It is the fault alarm recovered and confir
med.
 Event alarm
It is notification without any impact on services. Some event ala
rms are sent regularly and there are no corresponding recovery
operation.
HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 17
Scenario 1: How to monitor alarms of all
network devices Contents and
Choose: Alarms > Current Fault Alarms Overall alarm monitorin
sequence of g (device alarms, QoS
columns are alarms, process error al
configurable. arms, communication al
arms, and environment
Centered alarms)

monitoring of all
device alarms

Detailed alarm recovery


recommendations

If selected, alarms
are displayed in
real time.

Detailed
alarm
information

Note: Alarm contents and handling suggestions are defined on each NE.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 18


Scenario 2: How to focus on uncleared alarms
Choose: Alarms > Browse Current Fault Alarms By Status Browsing
Browsingand
andoperating
operatingalarms
alarms
based
basedon
onalarm
alarmstatuses
statuses

Unacknowledged and
uncleared alarms Unacknowledged
and cleared alarms

Acknowledged and
Acknowledged and cleared alarms
uncleared alarms

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 19


Scenario 3: How to automatically acknowledge
cleared alarms
Choose : Set
Settotoenable
enableautomatic
automatic
Alarms > Settings> Automatic Acknowledgement Rules acknowledgement
acknowledgement

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 20


Scenarios 4: How to shield unimportant alarms
Choose: Alarms > Settings>Alarm Filter Rule
Set
Set alarm shieldrules
alarm shield rules to
to shield
shield
alarms
alarms

You can shield ala


rms of specified n
ames or NEs

Note: Shielded alarms are discarded, rather than stored in the database.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 21


Scenario 5: How to redefine the level of an alarm

Alarm
Alarmprocessing
processingpolicies
policiesvary
varywith
withalarm
alarmlevels.
levels.Users
Userscancanadjust
adjustan
analarm
alarm
level by redefining the level to meet the requirements for operation and
level by redefining the level to meet the requirements for operation and
maintenance,
maintenance,andandalarm
alarmprocessing.
processing.

Choose: Alarms > Settings > Alarm Redefine

Original alarm Redefined


levels alarm levels

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 22


Scenario 6: How can I be notified of alarms when I a
m away
Choose: Alarms > Settings > Remote NotificationMaintenance engineers can learn
Maintenance engineers can learn
Step1:Configuring the
notification
thealarm
alarmsituation
situationofofthe
theentire
entire
network
networkininreal
realtime.
time.
conditions

Step2:Configurin
g the notification
time

Step3:Configurin
g the notification
Reference documents: mode
1. Commissioning Guide
2. Knowledge Base > Service and Software > Service and Softwar
e Public > I2000 > Technical Application Reference > Commissi
oning of the Alarm-To-SM Function of the I2000

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 23


Scenario 7: How to record and query alarm handling
experience
Maintenance
Maintenance
Choose: Alarms > Settings > Explain and Experience Experience
ExperienceShare
Share

With the alarm knowledge


library and explanation
library, maintenance
engineers can accumulate
the experience in clearing
alarms, and share the
experience with others.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 24


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 25


Performance Management
 I2000 performance management provides performance statisti
cs data and display it in the following modes:
• Data browsing
• Data monitoring
• Performance reports

 I2000 principle on collecting performance data:


• MML interface: NE device makes a statistics and packets data to I2000 actively in pe
riodical time.
• SNMP interface: I2000 periodically queries corresponding statistics data from NE sid
e.
• NEs accessed through UOA: NE collects performance statistics and reports the data
to the UOA. The UOA periodically sends the data to the I2000 server through FTP.
• I2000 principle on collecting RBI data (applied only to IN):
RBI data is periodically reported to /usr/omc/data of the I2000 through FTP and the I
2000 imports the data to the I2000 database at 12:00 every day.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 26


Scenario 1: How to view results of a statistics task

The
TheDH04SPC006
DH04SPC006version
versionallows
allowsyou
youtotodirectly
directlyview
viewand
andexport
exportresults
resultsofofaastatistics
statistics
task
taskon
onthe
theuser
userinterface
interfaceofofthe
theI2000
I2000client.
client.

Display of statistics results

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 27


Entry 1: Choose Statistics Tasks, right-click a task, and choose

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 28


Entry 2: Choose Performance > Browse Data. Select an NE and choose
Query

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 29


Scenario 2: How to monitor the variation of key performance
indexes in real time during service peak hours
Performance
Performancemonitoring
monitoring
Choose: Performance > Performance Monitoring

Step2: View monitoring


Step1: Create a results displayed in
monitoring task of up to histograms and line
256 indexes charts

Double-click
histograms or line
charts to view data
tables

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 30


Scenario 3: How to know abnormal performance
indexes at the earliest time
You
Youcan
canset
setalarm
alarmconditions
conditionsfor
foreach
eachperformance
performanceindex.
index.When
Whenthe thealarm
alarmconditions
conditionsofof
an
anindex
indexare
aremet,
met,the
theI2000
I2000generates
generatesananalarm
alarmtotonotify
notifyyou
youofofthe
theabnormal
abnormalindex.
index.
Step 1: Set alarm conditions for an index by choosing Performance > Performance Alarms

Set alarm details

Set the measurement object

Select Set alarm generation and recover


NEs conditions (new function)

Set the valid time


segment

Click to add

Set the reason


and suggestion

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 31


Step 2: Create a statistics task for the index by choosing Performance > Statistics Tasks

Sele
ct Set statistics
NEs parameters

Click to
create

Note:
1. If the statistics task already exists, skip this step.
2. If the statistics task does not exist, it can be automatically created in the Dho4 version and
later. This step is required in the DH04 version and earlier.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 32


Step 3: View alarm information by choosing Alarms > Current Fault Alarms

When the alarms conditions are met, the alarm is displayed.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 33


Scenario 4: How to analyze the variation of a
performance index in a time period
Report
Reportsystem
system
• The report system is an optional value-added peripheral compon
ent of the I2000.
• Not all types of NEs provide report template, for example, SNMP
NEs.
• The report system is installed with the I2000 server on the same h
ost.

To use the report system:


• Step 1: Create a statistics task.
• Step 2: Generate real-time or periodical reports.
For details, see the commissioning guide.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 34


Scenario 5: What statistics task needs to be created to
commission a report template
View the statistics task matching each report template by selecting a
report template and clicking

Note: This method applies to Dh04SPC006 and later. In the earlier versions, install the webtools.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 35


Scenario 6: How to diagnose the problem that a report
has no data or incomplete data
In
InDH04SPC006,
DH04SPC006,the
thereport
reportsystem
systemprovides
providesthe
thedata
data
diagnosis
diagnosisfunction
function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 36


Click Data Diagnosis, use the following functions:
 View diagnosis results to known the causes and solutions

Diagnosis results

Possible causes

Solution

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 37


 View statistics task information
Statistics tasks for
this report

Information about the created statistics task

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 38


 View the data sources of each report field and the table structure

Click to view the table


structure

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 39


Scenario 7: How to make sure the completeness of
reported performance data

Requirement
Requirement11: :The
Theperformance
performancedata’s
data’sreal
realtime
timeand
andcompleteness
completeness isisvery
veryi i
mportant.
mportant.IfIfthe
thedata
dataisisincomplete,
incomplete,we
wecan
canknow
knowititimmediately
immediatelyand
anduse
usethe
theman
man
ual
ualsupplement
supplementfunction
functionor
orother
othermethod
methodtotocomplete
completethe
thedata.
data.
.. Scheme
Scheme: :When
Whensystem
systemdetect
detectthe
theincompleteness,
incompleteness,ititcan
canauto
autosupply
supplythe
thelost
lostdd
ata
atafirstly.
firstly.Then
Thenififthe
thedata
dataisisstill
stillincomplete,
incomplete,alarm
alarmwill
willappear
appeartotonotify
notifythe
theuser
user
using
usingthe
themanual
manualsupplement
supplementfunction
functionor
orother
othermethod
methodtotocomplete
completethethedata.
data.

Step1 : Modify the configuration file in the I2000 server. ( If I2000


version is V300R001C02B280 or higher version, you can pass t
his step. )
Modify the following parameter of this file : $I2000_ROOT/etc/conf/PerfPara_svc_
ex.xml
<param name=“DataMissAlarmRepeat”>0</param> -- Change “0” to “1”

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 40


Step2 : To set supplement policies, choose: Performance > Data Integ
rity > Set Policy

This is the default policy after the syst


em is installed. That is system will det
ect the completeness of all the task’s
performance data 72 hours before 3:0
0 at 3:15 every day(period:24h) 。

If the performance data of


If you need to realize the following function you some tasks need to be re
must choose both: when system detect the inco al time and complete, you
mpleteness, it can auto supply the lost data first can add the policy for the
ly. Then if the data is still incomplete, alarm will se tasks.
appear
The setting in the picture me
ans the system will detect the
completeness of all the task’s
performance data 1 hour bef
ore 11:00(that is 10~11:00) fr
om 11:47. Later do the same
thing per hour.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 41


You can verify the
When you get the alarm of “Performance correction of the a
data is incomplete”, you can right click to larm in the data br
choose “Lost information” and you can ower page: no dat
see the data incompleteness duration and
a from 10:00 to 11:
collection percentage in the collect
scope. 00

Manual suppl
ement

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 42


Requirement
Requirement2: 2:The
Theperformance
performancedata
dataneed
needtotobe
becomplete.
complete.But
Butneed
neednot
nottotobe
bereal
real
time
timecomplete.
complete.
Scheme:
Scheme:When
Whensystem
systemdetect
detectthe
theincompleteness,
incompleteness,ititcan
canauto
autosupply
supplythe
thelost
lostdata.
data.TT
hen
henyou
youneed
needtotocheck
checkthe
thecompleteness
completenessmanually
manuallyatatregular
regularintervals.
intervals.IfIfyou
youfind
findthe
the
data
datalost
lostyou
youcan
canuse
usethe
themanual
manualsupplement
supplementfunction
functionor
orother
othermethod
methodtotocomplete
completethth
eedata.
data.

Step1 : To set supplement policies, choose: Performance > Data Integrity


> Set Policy. The method is the same as the step2 of requirement 1. The
only difference is no need to choose “Send alarm when data lost”.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 43


Step2 : To query data completeness, choose: Performance > Data Inte
grity > Recollect Data
2: Select a
time period

4: View results

5: Manual supplem
1: Select ent
an NE

3: Query

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 44


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 45


Topology Management Basics
The I2000 provides three topology views:
1. Service view (called physical view in Dh version and earlier)
 This view displays the network structure by function entity.
 The I2000 supports most of A&S products.
 To create a service NE, see the matching NE guide.

2. Physical view (called machine view in Dh version and earlier)


 This view displays the network structure by hardware device.
 The I2000 supports devices in the list of A&S purchased devices.
 To create a purchased device NE, see the iMonitor documents.

3. Customized view (called logical view in Dh version and earlier)


 This view can be customized as required by creating logical subnets
and adding NEs to logical subnets.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 46


Scenario 1: Suppose the I2000 accesses multiple service
systems including IN, RBT, and customer service. How can I
manage only IN NEs Create a physical subnet or
Create a physical subnet or
customized
customized view
view
Method 1:
Step 1: Right-click a blank area of the service view, choose New > Create
Physical Subnet. In the Objects Selection window, select NEs that you
want to manage, set their information, and finish creating the subnet.
Step 2: Right-click the created subnet and select Setup to Startup Subnet or
Setup to My Topology.
Then, after you re-log in to the I2000 client, only the NEs in the created
subnet are displayed in the service view.
Method 2:
Choose Topology > New > Custom View. Add NEs that you want to
manage to the customized view.
Then, the customized view is displayed, consisting of the added NEs.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 47


Scenario 2: After finding that an NE reports an alarm in the I2000,
how can I directly log in to the NE through Telnet to rectify the
fault

After
Afterperforming
performingthe
thefollowing
followingconfiguration
configurationininthe
theI2000,
I2000,you
youcan
can
log
login
into
toan
anNE
NEdirectly
directlyin
inthe
theI2000
I2000without
withoutlogin
loginauthentication.
authentication.

Do as follows:
Step 1: Create an NE user.
Step 2: Bind the NE user to an I2000 user.
Step 3: Click the NE icon and select Telnet to check whether you can log in to the NE.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 48


Scenario 3: How to find an NE quickly in a
complicated topology structure

Press
PressCtrl+F
Ctrl+Ffor
forsearch
searchby
byIP
IPaddress
addressor
orNE
NEname.
name.

Scenario 4: How to discard alarms of an NE that are generat


ed during the upgrade of the NE?

Right-click
Right-clickthe
theNE
NEand
andclick
clickBlock.
Block.After
Afterthe
theupgrade
upgradeis
iscomplete,
complete,
right-click
right-clickthe
theNE
NEand
andclick
clickUnblock.
Unblock.This
Thisis
isaanew
newfunction
functionof
ofthe
the
Dh
Dhversion.
version.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 49


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 50


Configuration Management Basics
This is the old configuration management GUI,
where the configuration data read from NEs is
displayed. You cannot deliver configuration data to
NEs (except SMS debugging workstation). The
displayed configuration data is synchronized with
NE every 12 hours.

This is the new configuration management GUI, which is app


lied to new products and solutions, such as OCS, NGIN,
convergent messaging, DLSC, IPTV. The iCnfg uses the B/S ar
chitecture and can be deployed independently or with the I
2000. If the iCnfg is installed with the I2000, you can ch
oose this menu to start the iCnfg in the I2000. The iCnfg
can both read and write NE configuration data, which is of
ten used for NE deployment.

Note:
 Only Resource Manager and Resource Configuration in Equipment Configuration are
commonly used. Customers are recommended not to use Maintenance and Operation.
 This slide does not describe the iCnfg.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 51


Configuration Management---Resource
Management
For most of NE types, you can query and export their configuration information on the
following GUI

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 52


Configuration Management---Resource
Configuration
This GUI is used to record some office information that cannot be read
from NEs but are required for creating statistics reports and statistics
tasks.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 53


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 54


Function Collection of Safety Management
Users’ certification,
authorization, and use Log query, export,
of terminal printing, statistics
and log dump.
Access control
Log management

I2000 self safety management


User monitoring Safety alarm
Multiply attempts to configure password
System administrator monitors
operations of current users.
Password strategy Cannot access?

Password length, complication and encryption for saving

illegal login

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 55


Scenario 1: SOX has strict requirements for account
and password security
I2000
I2000meets
meetsSOX
SOXrequirements
requirements

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 56


Scenario 2: The carrier requires different department to have different rights to use the I2000

I2000
I2000can
cancontrol
controlaccount
accountby
byright
rightand
andarea
area
Step Operation Description
1 Set the IP addresses or network segment Confirm the settings with the carrier.
that can access the I2000.
2 Plan user group names, management area, Divide I2000 users into several groups by device or operation right.
and operation rights

3 Create I2000 user groups. Grouping users simplifies the management of users.

3.1 Set the management area for each I2000 Set the area that an I2000 user group can manage.
user group.
3.2 Set operation rights for each I2000 user The operation rights include the rights for operating the I2000 and NEs.
group.
3.3 Set the new device right for each I2000 user With the new device right, users can manage newly added devices.
group.
4 Create I2000 user accounts.
4.1 Add users to I2000 user group. Add a user to a user group so that the user has the rights of the user group.

4.2 Set the management area for each I2000 A user can manage both the areas that are specified for the user and the areas that
user are specified for the user group that the user belongs to.
4.3 Set operation rights for each I2000 user. A user has both the operation rights assigned for the user and the operation rights
assigned for the user group that the user belongs to.
4.4 Specify the IP address or network segment Perform this step to ensure the I2000 security.
from which an I2000 user can log in.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 57


Operation Guide
1. Log in to the I2000 client as the Administrator user.
2. Create the following user group:
• Name: XX operator group
• Management area: Part of NEs in the experiment environment
• Operation rights: rights to acknowledge fault alarms and browse statistics tasks.
3. Create the following user:
• Name: first letter of the name + work ID
• Set the login time segment.
• Set the allowed login IP address.
• Set that the user needs to change the password after initial login.
• Set the password reservation time to 60 days.
• Add the user to the user group created in the previous step.
4. Log out, and then log in again as the created user.
5. Check the user rights:
• You can view the NEs of the specified management areas in the service view and physical vie
w.
• You can only acknowledge alarms. Other operations are unavailable.
• You can only query statistics tasks. Other operations such as create and delete area unavailabl
e.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 58


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 59


Common Functions
Self management:
 Managing I2000 services, disks, and databases
Choose System > System Monitoring
 Monitoring I2000 databases
Choose System > System Monitoring > Browse > Database Monitoring and right-cli
ck a database
 Managing I2000 data
Choose Tools > Data Management
NE management:
 Managing access packages
Choose Tools > Access Package Management
Application: When the alarms or performance indexes of an NE are changed after t
he NE is upgraded, you need to load the matching access package the NE in the I20
00 so that the I2000 supports the new alarms and performance indexes.
For details, see the I2000 Help.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 60


Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Foreground

Chapter 3 Maintenance Tools of I2000 V3

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 61


I2000 Operation and Maintenance Tool

Problems
 There is not dedicated or skillful I2000 maintenance engineers.
 Engineers are not familiar with I2000 commands.
 Engineers cannot solve some common I2000 problems on their own.
 Some I2000 offices are out of maintenance for a long time. System faults
are found a time long after they occur.

To solve the problems, we provide:


 I2000 Troubleshooting Guide
 Breeze MainAst
 Breeze iCheck (with I2000 inspection package)

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 62


1 I2000 Troubleshooting Guide
This
Thisdocument providestroubleshooting
documentprovides troubleshootingfor
forthe
theI2000.
I2000.

Main contents:
Basic knowledge about I2000 modules
Troubleshooting
Case studies
Path:
Support website: Software Center > Version Software > Application and
Software > Service and Software Public > iManager I2000 > iManager
I2000 V300R001 >

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 63


2 Breeze MainAst
The
TheBreeze
BreezeMainAst
MainAstisisaagraphic
graphicWindows-based
Windows-basedtool
toolfor
formaintaining
maintainingthe
theI2000.
I2000.

Functions:
Running basic I2000 server command
Collecting operating system information
Collecting logs
Performing common database operations
The Breeze MainAst will provide more and better functions.

Path:
iManager I2000 Troubleshooting Guide

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 64


GUI of the Breeze MainAst

Step 1: Add the


device and
import the device
package

Step2: Double-click
the execute and
view results

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 65


3 Breeze iCheck
The
TheBreeze
BreezeiCheck
iCheckisisan
aninspection
inspectionframework
frameworkused
usedininA&S.
A&S.The
TheI2000
I2000also
alsoprovides
provides
the I2000 inspection package based on the Breeze iCheck.
the I2000 inspection package based on the Breeze iCheck.

Step 2: Start
inspection

Step1: Add the


device and
import the
inspection
package

For details, see the I2000 Inspection Guide in the following path:
Support website: Knowledge Center > Application and Software >
Service and Software Public > I2000 > Technical Guides > Quality Check

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 66


Thank You

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 67

You might also like