Professional Documents
Culture Documents
Oxe12.1 SD Maintenance 8AL91011USAG 1 en
Oxe12.1 SD Maintenance 8AL91011USAG 1 en
Communication Server
Maintenance
Disclaimer
While efforts were made to verify the completeness and accuracy of the information contained in this
documentation, this document is provided “as is”. To get more accurate content concerning Cross
Compatibilities, Product Limits, Software Policy and Feature Lists, please refer to the accurate
documents published on the Business Partner Web Site.
In the interest of continued product development, ALE International reserves the right to make
improvements to this documentation and the products it describes at any time, without notice or
obligation.
The CE mark indicates that this product conforms to the following Council Directives:
• 2014/53/EU for radio equipment
• 2014/35/EU and 2014/30/EU for non radio equipment (including wired Telecom Terminal
Equipment)
• 2014/34/EU for ATEX equipment
• 2011/65/EU (RoHS)
Table of
contents Maintenance
Chapter 1
Reference documents
Chapter 2
Maintenance Commands
2.1 account................................................................................................................................................ 18
2.1.1 Operation................................................................................................................................................ 18
2.2 accreport............................................................................................................................................ 24
2.2.1 Operation................................................................................................................................................ 24
2.3 accreset...............................................................................................................................................24
2.3.1 Operation................................................................................................................................................ 24
2.4 accview................................................................................................................................................ 26
2.4.1 Operation................................................................................................................................................ 26
2.5 alarmrel................................................................................................................................................34
2.5.1 Operation................................................................................................................................................ 34
2.6 alarmrel-off.......................................................................................................................................34
2.6.1 Operation................................................................................................................................................ 34
2.7 calledfilt...............................................................................................................................................35
2.7.1 Operation................................................................................................................................................ 35
2.8 cleanbroad........................................................................................................................................36
2.8.1 Operation................................................................................................................................................ 36
2.9 cplalrm..................................................................................................................................................36
2.9.1 Operation................................................................................................................................................ 36
2.10 domstat................................................................................................................................................37
2.10.1 Operation................................................................................................................................................ 37
2.11 eaccclt...................................................................................................................................................39
2.11.1 Operation................................................................................................................................................ 39
2.12 excvisu................................................................................................................................................. 43
2.12.1 Operation................................................................................................................................................ 43
2.13 inccpt..................................................................................................................................................... 44
2.13.1 Operation................................................................................................................................................ 44
2.14 incinfo................................................................................................................................................... 44
2.14.1 Operation................................................................................................................................................ 44
2.15 inconf.....................................................................................................................................................45
2.15.1 Operation................................................................................................................................................ 45
2.16 incout.....................................................................................................................................................47
2.16.1 Operation................................................................................................................................................ 47
2.17 increset................................................................................................................................................ 47
2.17.1 Operation................................................................................................................................................ 47
2.18 incstart................................................................................................................................................. 48
2.18.1 Operation................................................................................................................................................ 48
2.19 incstop..................................................................................................................................................48
2.19.1 Operation................................................................................................................................................ 48
2.20 incvisu.................................................................................................................................................. 48
2.20.1 Operation................................................................................................................................................ 48
2.21 intipstat................................................................................................................................................50
2.21.1 Operation................................................................................................................................................ 50
2.22 ippstat................................................................................................................................................... 53
2.22.1 Operation................................................................................................................................................ 53
2.23 lanpbxbuild...................................................................................................................................... 57
2.23.1 Operation................................................................................................................................................ 57
2.24 lookars..................................................................................................................................................61
2.24.1 Operation................................................................................................................................................ 61
2.25 mao.......................................................................................................................................................... 63
2.25.1 Operation................................................................................................................................................ 63
2.26 maoview..............................................................................................................................................65
2.26.1 Operation................................................................................................................................................ 65
2.27 multitool..............................................................................................................................................68
2.27.1 Operation................................................................................................................................................ 68
2.28 netvisu..................................................................................................................................................74
2.28.1 Operation................................................................................................................................................ 74
2.29 prog-diff...............................................................................................................................................75
2.29.1 Operation................................................................................................................................................ 75
2.30 setshutdelay................................................................................................................................... 77
2.30.1 Overview..................................................................................................................................................77
2.30.2 Viewing delay........................................................................................................................................ 77
2.30.3 Modifying the delay............................................................................................................................ 77
2.31 shutdown........................................................................................................................................... 77
2.31.1 Overview..................................................................................................................................................77
2.31.2 Command settings..............................................................................................................................77
2.31.3 Delayed shutdown.............................................................................................................................. 77
2.32 tabranfilt..............................................................................................................................................78
2.32.1 Operation................................................................................................................................................ 78
2.33 tcalledfilt............................................................................................................................................. 79
2.33.1 Operation................................................................................................................................................ 79
2.34 utadown...............................................................................................................................................79
2.34.1 Operation................................................................................................................................................ 79
Chapter 3
netadmin
3.1 Overview.............................................................................................................................................81
3.1.1 Overview..................................................................................................................................................81
3.2 Detailed description................................................................................................................ 81
3.2.1 Command Overview.......................................................................................................................... 81
3.2.2 Start-up Options...................................................................................................................................82
3.2.3 The netadmin Command................................................................................................................. 83
3.3 Operation........................................................................................................................................... 83
3.3.1 Installation...............................................................................................................................................84
3.3.2 Show Current Configuration.......................................................................................................... 87
Chapter 4
Communication Server Stop/Restart Procedure
4.1 Introduction...................................................................................................................................107
4.2 Connecting a system console.....................................................................................107
4.3 Call Server embedded on a CS board in controller position........ 108
4.3.1 Overview................................................................................................................................................108
4.3.2 CS board stop procedure.............................................................................................................. 110
4.3.3 Procedure for restarting the CS board.................................................................................... 111
4.4 Call Server embedded on a CS board in applicative position..... 111
4.4.1 Overview................................................................................................................................................ 111
4.4.2 CS board stop procedure.............................................................................................................. 112
4.4.3 Procedure for restarting the CS board....................................................................................114
Chapter 5
Swinst
Chapter 6
Management of Incidents and Alarms
6.1 Overview...........................................................................................................................................134
6.1.1 Overview................................................................................................................................................134
6.1.2 Incident identification.......................................................................................................................135
6.1.3 Organization of incident files....................................................................................................... 136
6.1.4 Alarm relay........................................................................................................................................... 138
6.1.5 Network incidents..............................................................................................................................138
6.1.6 External alarms.................................................................................................................................. 138
Chapter 7
SNMP Management
7.1 Overview...........................................................................................................................................145
7.1.1 Overview................................................................................................................................................145
7.2 Detailed description.............................................................................................................. 145
7.2.1 Com Server SNMP Implementation.........................................................................................145
7.2.2 TRAP Processing..............................................................................................................................146
7.2.3 TSC-IP & e-Reflexes SNMP Implementation......................................................................146
7.2.4 SNMP Versions..................................................................................................................................146
7.2.5 ALE International Proprietary MIB Properties.....................................................................147
7.2.6 SNMP Agents and SNMP Versions Compatibilities.........................................................151
7.3 Configuration procedure..................................................................................................151
7.3.1 Management Principle....................................................................................................................151
7.3.2 Declaring SNMPv3 Users (If SNMPv3 is Selected).........................................................152
7.3.3 Configuring SNMP Parameters..................................................................................................152
7.3.4 Configuring Incident Filter Default Settings..........................................................................153
7.3.5 Managing Individual Incident Filters........................................................................................ 154
7.3.6 Declaring Supervisors.....................................................................................................................154
7.3.7 Declaring SNMP Agent Running on the Communication Server.............................. 154
7.3.8 Additional Management................................................................................................................. 156
Chapter 8
RMA
8.1 Overview...........................................................................................................................................177
8.1.1 Overview................................................................................................................................................177
8.1.2 Related Modules................................................................................................................................177
8.2 Glossary............................................................................................................................................178
8.2.1 Glossary.................................................................................................................................................178
8.3 Detailed description.............................................................................................................. 179
8.3.1 Overview................................................................................................................................................179
8.3.2 Architecture of the RMA System............................................................................................... 180
8.3.3 Software Architecture......................................................................................................................183
8.3.4 Configuration Example................................................................................................................... 184
8.3.5 Monitoring............................................................................................................................................. 184
8.4 Installation procedure......................................................................................................... 190
8.4.1 S-type Rack......................................................................................................................................... 190
8.4.2 M2/M3 Cabinet................................................................................................................................... 195
Chapter 9
e.RMA
9.1 Overview...........................................................................................................................................227
9.1.1 Overview................................................................................................................................................227
9.1.2 Detailed description of operation...............................................................................................227
9.1.3 Related modules................................................................................................................................229
9.2 Configuration procedure..................................................................................................229
9.2.1 Remote Connection......................................................................................................................... 229
Chapter 10
Alarm Sets
1 Reference documents
The OmniPCX Enterprise documentation includes the documents listed in the following table:
In the present document, cross-references are identified by the number in the first column of the above
table.
Part numbers are given in the last column, where xx corresponds to the language code of the
document, and yy to the incremented edition of the document.
2 Maintenance Commands
2.1 account
2.1.1 Operation
2.1.1.1 “account” Commands
2.1.1.1.1 Overview
The account command allows the different options to be viewed.
(0)a4400a> account
Use : account [option]
ascii
Accounting files.
compress
To run a compression.
counters
account counters for more details.
dbaccess
Return the data base access right.
duration
Duration accounting metering.
external
External accounting traces via CMIS/CMIP.
freport
Financial report traces.
help
This help.
mao
Management files.
off
Disable database access for accounting.
on
Enable database access for accounting.
save
To save the tickets in files/database.
(0)a4400a>
Options available:
• ascii: gives traces of compressed files generated for external accounting (see “account ascii''
Command on page 19),
• compress: includes the 'save' option and forces compression of the current ascii file (see “account
compress” Command on page 19),
• counters: gives the charge units of user counters in memory (see "account counters" Command on
page 19), and allows itemized consultation of counters and also allows them to be reset,
• dbaccess: gives the state ("on'' or “off'') of access rights to hard disk backup for accounting (see
“account dbaccess” Command on page 22),
• duration: measures units used for a call or series of calls by using call parameters (called number,
call date and duration) and by using the duration accounting algorithm. This application allows a
client's call to be cut off (in the case of the hotel application) as soon as the amount of his/her
deposit becomes zero.
• freport: gives daily traces of financial report operations (see "account freport" Command on page
23),
• help: gives the different “account'' command options (screen above),
• mao: allows management files over the last 90 days to be displayed. Each file is completed with:
• file date,
• file name,
• the date of the first and last ticket stored in the file,
• the number of tickets stored in the file.
• off: denies (bars) access to the accounting data base (see "account off'' Command on page 23),
• on: authorizes access to the accounting data base (see "account on" Command on page 23),
• save: allows internal accounting tickets contained in the buffer to be backed up on the hard disk
(see "account save" Command on page 23).
Note:
The "account" command only requires the initial letter of the following option(s). If several options have the same
initial, you must specify enough initial letters to differentiate them. If there is any ambiguity, the "help" menu is
displayed. Thus, 3 letters are necessary to distinguish between the 'counters' and 'compress' options.
2.1.1.1.2 “account ascii'' Command
The “ascii account'' command allows information on the last compressed 2160 files generated (3
months) to be displayed for the external accounting application.
(0)a4400a> account ascii
-------------------------------------------------------------------------------
| | | | |Number |Charge|
|Date |File name |First ticket date|Last ticket date |tickets|units |
-------------------------------------------------------------------------------
|95/06/23 18:58|TAXAAAAA.DAT|95/06/23 18:55:40|95/06/23 19:01:13| 5 | 3 |
|95/06/23 19:01|TAXAAAAB.DAT|95/06/23 19:01:36|95/06/23 19:03:13| 10 | 10 |
|95/06/23 19:03|TAXAAAAC.DAT|95/06/23 19:03:24|95/06/23 19:05:04| 10 | 10 |
|95/06/23 19:05|TAXAAAAD.DAT|95/06/23 19:05:15|95/06/23 19:06:59| 10 | 10 |
|95/06/23 19:07|TAXAAAAE.DAT|95/06/23 19:07:10|95/06/23 19:09:44| 15 | 15 |
|95/06/23 19:09|TAXAAAAF.DAT|95/06/23 19:09:55|95/06/23 19:11:33| 10 | 10 |
|95/06/23 19:11|TAXAAAAG.DAT|95/06/23 19:11:44|95/06/23 19:13:56| 13 | 13 |
|95/06/23 19:13|TAXAAAAH.DAT|95/06/23 19:14:19|95/06/23 19:15:02| 5 | 5 |
|95/06/23 19:25|TAXAAAAI.DAT|95/06/23 19:26:21|95/06/23 19:28:14| 20 | 20 |
|95/06/23 19:28|TAXAAAAJ.DAT|95/06/23 19:28:20|95/06/23 19:30:16| 20 | 20 |
-------------------------------------------------------------------------------
(0)a4400a>
Information described:
• Date: date and time of creation of the compressed file,
• File name : name of the compressed file,
• First and last ticket dates : the date of the first and last ticket stored in the file,
• Number tickets: the number of tickets stored in the file,
• Charge Units: total number of charge units concerning all tickets in the file.
Note:
The “account ascii file'' command only take files on the hard disk into account.
2.1.1.1.3 “account compress” Command
This option includes the "save" option and forces compression of the current ascii file. You must wait a
few seconds for compression to finish. This command is only valid on the main CPU but the backup
CPU is updated anyway.
2.1.1.1.4 "account counters" Command
This command allows:
• subscriber counters to be listed,
• one, several or even all subscriber counters to be reset.
The syntax is as follows:
(0)a4400a> account counters
Use :
action
list display the subscribers counters.
reset delete the administrative subscribers counters.
range
all all the subscribers.
number number can be a subscriber number.
number can be an imcomplete subscriber number
containing wildcards (*, ?).
In this case, number must be surrounded by
the characters ' or ".
others options available if action = list:
admin list all the administrative subscribers counters.
room list all the room subscribers counters.
client list all the client subscribers counters.
booth list all the booth subscribers counters.
Example
(0)a4400a>
Only the initial letter of fields is required. Thus 'l', 'li' and 'lis' will always be interpreted as the "list"
option.
2.1.1.1.4.1 "action" Field
An action can be either display of a list of, or reset of, all subscriber counters.
A counter reset can only apply to administrative subscribers.
In the case of list display, the number of screen lines may be less than number of lines to be displayed.
In this case, use '|pg', which acts as 'more' but also allows backward scrolling. In the same way, typing
'h' followed by 'return' in the help menu allows the results to be printed out without it being necessary
to hit a key at each page change (there is no default page mode).
2.1.1.1.4.2 "range" Field
The "range" field defines the action's target, i.e. the set of subscribers which the action specified in the
"action" field will bear on.
The "all" option (range = all), shows that the action is performed on all subscribers.
If "range" is a given MCDU number, the action will only bear on the corresponding subscriber.
The use of jokers (* or ?) is allowed. These allow selection of a relevant group of subscribers. The '*'
symbol is used to designate any character string and ' ? ' can be substituted for any character. Jokers
in the "range" field must be preceded and followed by double or single inverted commas (" " or ' '). So
'*' designates all subscribers.
The "admin", "room", "client " and "booth" options are only usable with the "list" action and display all
subscriber counters corresponding to the "range" field.
2.1.1.1.4.3 Examples
Account Counters Reset
The "account counters reset all" command must be used instead of "account counters reset '*' ".
(0)a4400a> account counters reset '30*'
(0)a4400a>
(0)a4400a>
Account Counters List
The "account counters list" command displays the subscriber category, phone number, total number
of calls, total number of charge units (there are three accounting levels for a hotel), cost incurred and
date of the last reset performed on a counter. This command can also be used on the backup CPU.
• all: displays a summary for each type of subscriber (administrative, room, client and booth) and is
as shown in the following example. This example shows a situation where there are 5 administrative
subscribers, 5 room subscribers and no client subscribers. The date on the administrative line is the
date of the last overall reset. This can also be performed from the attendant set.
(0)a4400a> account count list all
------------------------------------------------------------------------
|SUBSCRIBERS|NUMBERS| CALLS|CH. UNITS| COST| RESET DATE|
-----------------------------------------------------------------------
| Admin. | 5| 10| 10 | 7.40 |1996/05/02 15:21:16|
------------------------------------------------------------------------
| Room | 5| 4 | 4 | 22.00| |
| | | | 6 | | |
| | | | 2 | | |
------------------------------------------------------------------------
| Client| 0 | 0 | 0 | 0.00| |
| | | | 0| | |
| | | | 0| | |
------------------------------------------------------------------------
| Booth| 3| 1 | 2| 2.00| |
| | | | 0| | |
| | | | 0| | |
------------------------------------------------------------------------
(0)a4400a>
• admin/room/client/booth. The "admin" option displays a report comprising all administrative
subscribers.
An "admin " subscriber counter can be reset with the "account counters reset " command or from
the attendant set.
For a room or client subscriber ("room" or "client"), the last reset date is that of his/her check-in.
For booth sets, the reset date is that of the last ticket allocated to a client or a room. If booth set
communications, "booth", are correctly managed, their counters should be at zero, otherwise this
means that some tickets have not been allocated to a client or room subscriber .
(0)a4400a> account counters list booth
------------------------------------------------------------------------
|SUBSCRIBERS|NUMBERS| CALLS|CH. UNITS| COST| RESET DATE|
-----------------------------------------------------------------------
| Booth| 3| 1 | 2| 2.00| |
| | | | 0| | |
| | | | 0| | |
| 31021 | 1| 1 | 2| 2.00|1996/04/29 12:06:16|
| | | | 0| | |
| | | | 0| | |
------------------------------------------------------------------------
(0)a4400a> account counters list admin
------------------------------------------------------------------------
|SUBSCRIBERS|NUMBERS| CALLS|CH. UNITS| COST| RESET DATE|
-----------------------------------------------------------------------
| Admin | 2| 4 | 4 | 2.96 |1996/05/02 15:21:16|
| 3000 | 1| 2 | 2 | 1.48 |1996/05/02 15:21:57|
| 3001 | 1| 2 | 2 | 1.48 |1996/05/02 15:21:44|
------------------------------------------------------------------------
(0)a4400a>
• Jokers: The following example shows how to get all subscribers whose numbers correspond to the
string '3*1', which designates all those starting with a '3' and ending with a '1'.
(0)a4400a> account coun list '3*1'
-----------------------------------------------------------------------
|SUBSCRIBERS|NUMBERS| CALLS|CH. UNITS| COST| RESET DATE|
-----------------------------------------------------------------------
| Admin | 2| 2 | 2 | 1.48|1996/05/02 15:21:16|
| 3000 | 1| 2 | 2 | 1.48|1996/05/02 15:21:57|
| 30011 | 1| 0 | 0 | 0.00|1996/05/02 15:21:44|
------------------------------------------------------------------------
| Room | 2| 1 | 1 | 5.00| |
| | | | 2 | | |
| | | | 0 | | |
| 31001| 1| 1 | 1 | 5.00|1996/04/29 12:01:13|
| | | | 2 | | |
| | | | 0 | | |
| 31011| 1| 0 | 0 | 0.00|1996/04/29 11:25:37|
| | | | 0 | | |
| | | | 0 | | |
------------------------------------------------------------------------
| Booth| 1| 1| 2 | 2.00| |
| | | | 0 | | |
| | | | 0 | | |
| 31021 | 1| 1| 2 | 2.00|1996/04/29 12:06:46|
| | | | 0 | | |
| | | | 0 | | |
------------------------------------------------------------------------
(0)a4400a>
(0)a4400a>
2.1.1.1.6 "account freport" Command
The "account freport'' command displays information on the last 90 daily financial reports made
(corresponds to the last 3 months).
(0)a4400a> account freport
------------------------------------------------------------------------------
| |First |Periodticket|Day ticket|Charge|
|Date |Period |execut. |read |del |read |del |Units|
------------------------------------------------------------------------------
|95/07/18 01:32:20|95/07/01 95/08/01|95/07/01| 250| 245| 50| 45| 120|
|95/07/19 01:31:21|95/07/01 95/08/01|95/07/01| 350| 345| 150| 100| 247|
|95/07/20 01:33:43|95/07/01 95/08/01|95/07/01| 500| 485| 150| 140| 328|
------------------------------------------------------------------------------
(0)a4400a>
Information described:
• Date: date and time the financial report was executed,
• Period: current financial report period,
• First execution: date of the first operation,
• Period tickets: number of tickets read and deleted for the current period of the financial report,
• Day ticket: number of tickets read and deleted on execution for the day,
• Charge Units: number of charge units concerning deleted tickets for the day.
2.1.1.1.7 "account off'' Command
The "account off'' command denies access to the data base for accounting ticket backup for the
system. In this case, the tickets are stored in the accounting buffer until it is full. After this, new tickets
are lost.
This command is to be used with care and in highly specific conditions. It must be rapidly followed by
the "account on'' command as tickets could be lost at storing.
(0)a4400a> account off
ACCOUNTING was on - > ACCOUNTING is off.
(0)a4400a>
2.1.1.1.8 "account on" Command
The "account on'' command authorizes access to the data base for accounting ticket backup for the
system.
(0)a4400a> account on
ACCOUNTING was off - > ACCOUNTING is on.
(0)a4400a>
2.1.1.1.9 "account save" Command
The "account save '' command forces emptying of the accounting application backup buffer if ticket
backup on disk is available.
2.1.1.1.10 "account -e'' Command
The "account -e" command displays VoIP tickets sent on IP.
2.1.1.1.11 "account -r'' Command
The "account -r" command displays VoIP tickets received from the IP devices.
2.1.1.1.12 "account ipticket <number of tickets> <delay>'' Command
The "account ipticket <number of tickets> <delay>" command generates and sends VoIP tickets to
an external application.
2.2 accreport
2.2.1 Operation
2.2.1.1 “accreport” command
This tool allows the last financial report or the current financial report to be printed out.
The menus for this tool are taken from the accreset tool.
The menu is defined below.The sequences in brackets are the paths in absolute mode for each menu.
Previous Period Printout (/1)
Screen (/1/1)
Printer (/1/2)
Current Period (/2)
Status (/2/1)
Printout (/2/2)
2.3 accreset
2.3.1 Operation
2.3.1.1 “accreset” command
2.3.1.1.1 Overview
This tool allows the financial report and the transfer files to be managed for the external accounting
application.
This command also allows all accounting tickets in the SQL database, the current financial report
cumulative files and the compressed files to be deleted for external accounting. For each deletion
operation security is enabled (it is not necessary to lock ticket storage with the "account off'' command).
Consulting deleted tickets (traces) is also possible.
2.3.1.1.2 Description of the menu
The menu is defined below. The sequences in brackets correspond to the paths to be given to reach
these menus.
Information (/1)
Partition (/2)
State (/2/1)
Database (/2/2)
Financial Report (/2/3)
Accounting Files (/2/4)
Management files (/2/5)
All files (/2/6)
Database (/3)
Reset (/3/1)
Financial Report (/4)
Previous Period Printout (/4/1)
Screen (4//1/1)
Printer (/4/1/2)
2.4 accview
2.4.1 Operation
2.4.1.1 “accview” command
2.4.1.1.1 Overview
This tool is useful for analysing the contents of tickets in the accounting compressed files.
Several options are offered :
(0)a4400a> accview
accview -[abdefhlmpstvwV]
-a attribute_number sets
the list of the attributes to print (use -h to print the attribute numbers).
Each attribute number is separated by a space character.
-b number prints
the n first tickets (see also option -e).
-d [display] sets
the number of attributes/line to display, 1 or 2 (default is 2).
-e number prints
the n last tickets (see also option -b).
-f [file] file
is the file to be read. If the file doesn't exist in the current directory
and in the /DHS3dyn/account directory, an error is returned. If filename is
empty, a list of the current files is displayed.
-h prints the ticket header for
the given file.
-help this help.
-l prints the defined meanings of
the enumerated and bitstring attributes.
-m uses more to print the results
(when more is running, press h for help).
-p delete|disable|read|save
delete deletes the current profile. disable disables the current profile
for the current execution. read prints the content of the current profile.
save deletes the current profile and saves the current options. Only the first
option letters are needed.
-s prints statistics about an accounting
file.
-t prints the contents of the tickets.
-v prints the values of the attributes
(default is meanings of the attributes).
-w sets the width of one line (default
is 80 characters).
-V prints the version.
(0)a4400a>
Note:
This command is independent of the accounting ticket version and PBX software version (release). It can therefore
be applied to any accounting file in any PBX release.
2.4.1.1.2 ''accview -tf'' command
This command gives an overview of commands using "accview":
• -f gives the installation's compressed files available table,
• -t outputs the contents of a selected file.
(0)a4400a> accview -tf
(0)a4400a>
• attribute number,
• attribute name,
• attribute value for the ticket printed out (numeric or string for attributes numbers 9, 10, 18, 20, 21,
22, 25, 26, 31, 32, 33 and 34).
Note:
The screens shown in the rest of the document are given only as examples and the number of
attributes may be subject to modification.
The -f option can be followed by the names of a file list if these are known. A file is declared as
unknown if it is not present in the current directory or in the /DHS3dyn/account directory.
If no filename is present, a list of filenames is suggested. It corresponds to the list of compressed files
currently stored on the system disk.
Example:
(0)a4400a>
In this screen, attribute numbers 11, 2, 3 and 1 are printed in that order for all tickets in the selected
TAXAAAIM.DAT file.
This command can be combined with "-h'' ("accview -a 11 2 3 1 -h”) or "-tf filename'' ("accview -a 11 2 3
1 -tf TAXAAAIM.DAT'').
2.4.1.1.4 "accview -b number'' command
This command allows the contents (all attributes) of the first n tickets of a selected file to be printed out.
This command can be combined with "-e'' (last n tickets of a selected file). In this case, only tickets with
contents common to both requests are printed out (if any).
2.4.1.1.5 "accview -d number'' command
This command allows the number of attributes per line to be displayed on-screen to be selected.
Possible choices 1 or 2 (2 by default). It is used with "-a".
(0)a4400a> accview -d 1 -a 11 2 3 1 -tf
(0)a4400a>
2.4.1.1.6 "accview -e number'' command
This command allows the contents (all attributes) of the last n tickets of a selected file to be printed out.
It can be combined with "-b'' (see "accview -b number'' command).
2.4.1.1.7 "accview -f'' command
This command lists all the installation's compressed files available.
(0)a4400a> accview -f
(0)a4400a>
________________________________________________________________________________
CallType PublicNetworkOutgoingCall (0)
PublicNetworkOutgoingCallThroughPrivateNetwork (1)
PrivateNetworkCall (2)
LocalCall (3)
PublicNetworkIncomingCall (4)
PublicNetworkIncomingCallThroughPrivateNetwork (5)
Unspecified (6)
PrivateNetworkOutgoingCallToPublicNetwork (7)
PrivateNetworkOutgoingCallToPrivateNetwork (8)
PublicNetworkIncomingCallToPrivateNetwork (9)
PrivateNetworkIncomingCallToPrivateNetwork (10)
PublicOrPrivateNetworkOutgoingCallThroughPrivateNetwor(11)
PublicOrPrivateNetworkIncomingCallThroughPrivateNetwork(12)
PrivateNetworkIncomingCall (13)
________________________________________________________________________________
SpecificChargeInfo SIOPriorityTrunkGroup (0)
ReversedCharging (1)
PBXGeneratedChargeUnits (2)
AnalogWithoutChargeUnits (3)
Transcom (4)
AccurateDuration (5)
Transgroup (6)
________________________________________________________________________________
ComType Unspecified (0)
Voice (1)
Data (2)
FacilityActivation (3)
FacilityDeactivation (4)
________________________________________________________________________________
Carrier Unspecified (0)
BT (1)
Mercury (2)
(0)a4400a>
2.4.1.1.11 "accview -m'' command
This command when used with another allows page by page screen display (more). This command is
useful for long printouts (type in "accview -l -m" for example).
2.4.1.1.12 "accview -p delete|disable|read|save'' command
This command allows a profile to be managed (list with several options). Each time the "accview'' tool
is invoked the current profile is added to the list of accview command options. This avoids having to
type the same options when using the accview tool repeatedly.
Managing this option :
• deleting : "accview -p delete'' : deletes the current command profile,
• disabling : "accview -p disable'' : disables the current command profile for the operation in progress.
The commands taken into account are those of the "accview" tool,
• current command profile: "accview -p read'' : displays the current command profile,
• saving : "accview -p save'': erases the current command profile and confirms the "accview" tool
options.
(0)a4400a> accview -p re
(0)a4400> accview -p re
(0)a4400a> accview -a 11 2 3 1
The files stored in the system are the following ones:
--------------------------------------------------------------------------------
| | | | |Number |Charge|
|Date |File name |First ticket date|Last ticket date |tickets|units |
--------------------------------------------------------------------------------
|95/05/04 18:08|TAXAABLJ.DAT|95/05/04 16:14:15|95/05/04 16:14:15| 1 | 0|
--------------------------------------------------------------------------------
Please, which file (Return to Quit) : TAXAABLJ.DAT
(00a4400> accview -p re
(0)a4400a>
Note:
Only the initial letters can be entered (see previous example).
2.4.1.1.13 "accview -s'' command
This command allows storage statistics for a selected file to be displayed.
(0)a4400a> accview -sf
----------------------[File /DHS3dyn/account/TAXAAAIL.DAT]----------------------
Number of attributes = 35
Number of tickets = 2
File size = 804bytes
Length of one uncompressed ticket = 325bytes
Length of one compressed ticket = 178.36bytes
Compression rate = 1.82
--------------------------------------------------------------------------------
(0)a4400a>
(0)a4400a>
(0)a4400a>
2.5 alarmrel
2.5.1 Operation
2.5.1.1 alarmrel command
Syntax: alarmrel
The alarmrel command is used to:
• activate or deactivate alarm relays,
• view or delete the relay state change history log,
• view current relay state.
Caution:
It is highly advisable to check the reasons for alarms before deactivating the relay.
Menu for use of the alarmrel command
(1)pabx56> alarmrel
MAIN MENU
0: desactiv relay
1: activ relay
2: display the review of alarm relay states
3: display alarm state
4: delete the review of alarm relay states
q: quit
Your choice :
2.6 alarmrel-off
2.6.1 Operation
2.6.1.1 alarmrel off command
Syntax: alarmrel off
This command is used to open the alarm relay (and thereby stop the alarm). It is highly recommended
to check the reasons for alarms before running this command.
To view incidents that caused alarms, type the alarmrel command, then select section 2: display the
review of alarm relay states.
2.7 calledfilt
2.7.1 Operation
2.7.1.1 “calledfilt" filtered call command
Command "calledfilt followed by the Filtered called party No." gives the characteristics of the filtered
call.
(0)a4400a> calledfilt 36000
+---------------------------------------------------------------------+
| Dir Number : 36000 | Lognum : 0 |
+---------------------------------------------------------------------+
| COMMON'S DATA |
| ------------- |
+---------------------------------------------------------------------+
| Entity 0 | Public rerout [F] |
+---------------------------------------------------------------------+
| FILTERING DATA |
| -------------- |
+---------------------------------------------------------------------+
| teleservice : Phone |
+---------------------------------------------------------------------+
| Night --> Index : 1 | Overflow No : 3010 |
+---------------------------------------------------------------------+
| Day --> Index : 0 | Overflow No : 3010 |
+---------------------------------------------------------------------+
| Renv1 --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Renv2 --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| teleservice : Data |
+---------------------------------------------------------------------+
| Night --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Day --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Renv1 --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Renv2 --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| teleservice : Fax group 3 |
+---------------------------------------------------------------------+
| Night --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Day --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Renv1 --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Renv2 --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| teleservice : Fax group 4 |
+---------------------------------------------------------------------+
| Night --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Day --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Renv1 --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| Renv2 --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
| teleservice : Other |
+---------------------------------------------------------------------+
| Night --> Index : -1 | Overflow No : |
+---------------------------------------------------------------------+
The following information is given concerning the filtered called party number:
• the logical number,
• the directory number,
• the entity number,
• for each statues and each teleservice defined:
• l'the filtering index
• the overflow number.
2.8 cleanbroad
2.8.1 Operation
2.8.1.1 Cleanbroad tool
“cleanbroad ” tool is used to restart the reinitialised broadcast. All the broadcast files are deleted and
the sequence numbers are reset to 0.
Activated on a node of the network, it is automatically applied to all the nodes of the network (as of
R3).
2.9 cplalrm
2.9.1 Operation
2.9.1.1 cplalrm command
Syntax : cplalrm < Crystal number><board position>
The cplalrm command is used to output the board alarm counters.
cplalrm command example
(1)pabx56> cplalrm
select pour cr 0 cpl 0
• counter 4 : FEC
• counter 5 : TE
• counter 6 : ATD
Alarm counters for a PCM type board :
• counter 6 : AMTD
• counter 8 : PVMT
• counter 9 : SIA64K
• counter 11 : ATD
• counter 12 : TE
• counter 13 : PVT
• counter 14 : SIA2M
• counter 15 : MS
2.10 domstat
2.10.1 Operation
2.10.1.1 domstat command
The “domstat” command enables the manger to view PBX IP telephony domain status.
2.10.1.1.1 Main menu
> domstat
+—---+----+----+------------------+------------------+-----------------+----+----+
| Id.|Dom.|Type| Low IP Address | High IP Address | IP Net Mask | H D|H SN|
+—---+----+----+------------------+------------------+-----------------+----+----+
| 1 | 1 | IP | 192.180.170.0 | 192.180.170.255 | 255.255.255.0 | — | - |
+—---+----+----+------------------+------------------+-----------------+----+----+
| 2 | 1 | IP | 192.168.150.0 | 192.168.150.255 | 255.255.255.0 | — | - |
+—---+----+----+------------------+------------------+-----------------+----+----+
return to menu : press ENTER
Id.: identifier,
Dom.: domain number,
Type: type of domain,
Low / High IP Address: low and high addresses in the range,
IP Net Mask: IP mask of the range,
H D and H SN : values reserved for Alcatel-Lucent maintenance.
2.10.1.1.4 Displaying the Hash coding table
This data is reserved for Alcatel-Lucent maintenance.
2.10.1.1.5 Displaying devices in one or several domains
Options 8 and 9 of the main menu show the devices present in one or several domains.
Options 10 and 11 of the main menu show the devices in service in one or several domains.
Enter your choice : 8
Enter Domain Id:0
-------------IP couplers defined in domain 0 DEFAULT_DOM-----------
+--------+--------+-------+-----------------------+-----------------+
| Type | Cr/Cpl | Neqt | Mac Address | Ip Address |
+--------+--------+-------+-----------------------+-----------------+
| GD| 1/ 0 | 30139 | 00:80:9f:2e:16:72 | 192.168.201.083 |
+--------+--------+-------+-----------------------+-----------------+
| INTIPA| 19/ 1 | 30137 | Unused | 192.168.201.080 |
+--------+--------+-------+-----------------------+-----------------+
No. of IP couplers
defined in the Domain 0 is: 1
+-------+----------------+----------------------+---+-------+-----------------+
No. of IP terminals
connected to the domain 0 is: 2
2.11 eaccclt
2.11.1 Operation
2.11.1.1 “eaccclt” Command
2.11.1.1.1 Overview
This command allows the accounting, VoIP and management tickets generated in other nodes to be
downloaded and printed out on the same terminal via Ethernet links.
(0)a4400a> eaccclt
-a attribute number
list of attributes to print.
-ascii
one ticket per line and ascii printing.
-help
this help.
-l
meanings of the enumerated and bitstring attributes.
-v
prints the values of the attributes (default is meaning)
(0)a4400a>
The options may be entered in any order. The initial letter is enough to identify an option. If two options
have the same initial letter, the first option is performed.
2.11.1.1.2 "eaccclt -a Attribute Number" Command
This command displays the list of attributes specified after "-a". It is meaningless without the "-cpu"
option.
cmdev12> eaccclt -a 1 2 3 4 -cpu valmy10
connected to valmy10
---[valmy10:1]----------------------------------------------
TicketVersion = ED4.8
CalledNumber = --------------------
ChargedNumber = 65967
ChargedUserName = TREFCON MICHEL
---[valmy10:2]----------------------------------------------
TicketVersion = ED4.8
CalledNumber = --------------------
ChargedNumber = 65477
ChargedUserName = ACCUEIL
2.11.1.1.3 "eaaccclt -ascii" Command
This command prints out the tickets as soon as they are received. It is meaningless without the "-cpu"
option. Adding option "-a" has no effect.
cmdev12> eaccclt -ascii -cpu valmy10
connected to valmy10
---[valmy10:1]----------------------------------------------
ED4.8-------------------- 65967 TREFCON MICHEL 633
1 3019961224 12:27:50 0 0 0 74 130
12 00000002 1 0
010000000000000000000000000000000000000000000000000000000000000010000000000000000
53 0 0 01 0 0 0 0 00
2.11.1.1.4 "eaccclt -cpu hostname|IP address" Command
This command allows connection via Ethernet to the charged node, and displays the tickets received.
For each ticket, the IP address and name of the node are specified.
cmdev12> eaccclt -cpu cmv10 dhs3p4 -t 1 -w 10 -a 1
2 3 4 11
connected to cmv10
trying connection to dhs3p4 (155.132.44.26, port = 2533)
---[cmv10:1]------------------------------------------------
CalledNumber = 5770
ChargedNumber = 9778
ChargedUserName = OPE-IND-ND7 OPEM
ChargedCostCenter = 255
EndDateTime = 19961224 13:26:46
---[cmv10:2]------------------------------------------------
CalledNumber = 5703
ChargedNumber = 9777
ChargedUserName = OPE-SBC-IND SBCN
ChargedCostCenter = 255
EndDateTime = 19961224 13:27:35
trying connection to dhs3p4 (155.132.44.26, port = 2533)
trying connection to dhs3p4 (155.132.44.26, port = 2533)
PublicOrPrivateNetworkOutgoingCallThroughPrivateNetwork (11)
PublicOrPrivateNetworkIncomingCallThroughPrivateNetwork (12)
PrivateNetworkIncomingCall (13)
__________________________________________________
CostType Unspecified (0)
AnalogTrunkCall (1)
ISDNCircuitSwitchedCall (2)
ISDNPacketCallX25-BChannel (3)
ISDNPacketCallX25-DChannel (4)
X25 (5)
DigitalNonISDN (6)
__________________________________________________
PersonalOrBusiness Personal (0)
Business (1)
Normal (2)
__________________________________________________
X25OutgoingFlowRate = 0
Carrier = 0
InitialDialledNumber =
WaitingDuration = 0
EffectiveCallDuration= 0
RedirectedCallIndicator= 0
2.11.1.1.10 "eaccclt -waiting Waiting Time" Command
This command allows the time between two connection attempts to be set (when it is not established).
This time is set in seconds (30 s by default). This option is meaningless without the "-cpu" option.
2.12 excvisu
2.12.1 Operation
2.12.1.1 Overview
Use the excvisu command to view the incidents that occurred due to software errors in telephone
applications (TEL, ABCA, MAO...). These incidents are called “backtraces”.
The command gives the address and name of the code functions concerned by the incident and its
timestamp.
Depending on the application generating it, a backtrace can be associated with a 1721 incident that
can be retrieved with the incvisu command.
Backtraces do not necessarily indicate incorrect system operation, but if this is the case they must be
noted and sent to an anomaly report file for R&D use.
As of R9.1, the backtraces registered in the PCX are extended to the last 10 PCX shutdowns (3
previously).
2.12.1.2 Use
Command excvisu can be used without an option, or with an option –x (value between 1 and 10) to
get backtraces previous to the last x shutdowns (e.g. excvisu -5).
(1)pabx> excvisu
There is a new exception. Its address is : 0X0048B579. Monitel time
: 210124. Date : Thu May 31 11:55:10 2001
Application-exception no 5,thd 95,PC=0x0048b579:04765049, eqt=2635,
serv=0 --> equip_tes0
Eqt type=POS_NUM, cr=2, cpl=18, der_us=0, term=0, subtype = GAP_HANDSET
* Backtrace: 0x0009ae60:00634464 --> set_is_poste
* Backtrace: 0x005d1819:06101017 --> sonneur_en_secret
* Backtrace: 0x005d1969:06101353 --> init_nom_appelant
* Backtrace: 0x005d1b47:06101831 --> init_message_super
* Backtrace: 0x005d36e7:06108903 --> send_visitor_to_home
* Backtrace: 0x005d4b61:06114145 --> su_multi_dect_visitor
* Backtrace: 0x005d4d87:06114695 --> su_multi
* Backtrace: 0x005e5bb1:06183857 --> netoitouche
* Backtrace: 0x00561a42:05642818 --> tandem_second_inter
* Backtrace: 0x0055b08f:05615759 --> prise_normale
* Backtrace: 0x0055b2bf:05616319 --> prisecorr
* Backtrace: 0x0055c60e:05621262 --> decsonmmcdu
* Backtrace: 0x001b9931:01808689 --> real_main
* Backtrace: 0x001b52d5:01790677 --> start_thread_delayed
2.13 inccpt
2.13.1 Operation
2.13.1.1 inccpt command
Syntax : inccpt ((to obtain the value of the counters since the last boot).
inccpt -1 (to obtain the value of the counters before the last boot).
The inccpt command is used to know the number of incidents output per severity level. It is also used
to know, for a given incident, how many times it has been output.
inccpt command example
(1)pabx56> inccpt
Since 06/04/00 at 20:10:54
2.14 incinfo
2.14.1 Operation
2.14.1.1 incinfo command
Syntax : incinfo <number of the incident whose definition is required>
The incinfo command is used to obtain the complete definition of an incident whose number is known.
The example here is for incident 2140 :
(1) pabx56> incinfo
Choose language (help to list languages):GEA
Decompressing /tmpd/incid_FR0.txt
2.15 inconf
2.15.1 Operation
2.15.1.1 Command inconf
Use the inconf command to modify the following default parameter values of the incident
management system:
• logrotate size and logrotate count (size and number of files in the main or outfall rotating queue),
• Crontab delay between logrotate calls,
• number of incidents in the session start file,
• number of backup sessions,
• thresholds of the incident flow redirection.
Note:
If you have a standby CPU, the parameters are modified at the same time.
The default parameter values that you can modify using the inconf command, have specific values as
shown in the following table.
Lower Threshold of the Incident Flow Redi- From 2 to 200 incidents per second
rection
Default value: 20 incidents per second
Upper Threshold of the Incident Flow Redi- From 5 to 500 incidents per second
rection
Default value: 50 incidents per second
-s value Changes the input value of the logrotate size rule of the main and
outfall queue files
-c value Changes the input value of the logrotate count rule of the main and
outfall queue files
-b value Changes the backup session number of the session start file and the
main queue incident file
-i value Changes the maximum incident number of the session start file
-u value Changes the upper threshold value of the hysteresis function used to
redirect the incident flow to the outfall queue
-l value Changes the lower threshold value of the hysteresis function used to
redirect the incident flow to the main queue
You can use the inconf command with several different optional parameters.
Examples:
• inconf -s 100 replaces the present logrotate size value by a new one: 100 kbytes,
• inconf -i 200 replaces the present maximum number of incidents in the session start file by a
new one: 200.
2.16 incout
2.16.1 Operation
2.16.1.1 Commande incout
Syntax: incout <number of the V24 port to which the incidents are to be directed>.
This command is used to select the port on which the incidents are output in real-time.
The "/dev/null" option is used to direct the incidents to no V24 port, for cases where they are not to be
viewed.
The "stdout" option corresponds to the output to the peripheral device on which the telephone was
started. In most cases this is the console.
Example:
(1)pabx56> incout
Usage: incout [port number|port full path]
2.17 increset
2.17.1 Operation
2.17.1.1 Commande increset
Syntax: increset <file before reset> <file after reset counter> <file alarm> <file backtrace file> <context
file>.
Specify the number associated with the file to be reset.
Example:
(1)pabx56> increset
FILES LIST
1 incidents of the previous RUNTEL
2 incidents of the present RUNTEL
3 counters of incidents
4 alarms on incidents
5 backtraces
6 telephonic contexts before backtraces
Enter the number of files to reset (blank spaces separated)
Your choice -> 1 2
(1)pabx56>
2.18 incstart
2.18.1 Operation
2.18.1.1 incstart command
Syntax: incstart
The incstart command is used to start real-time incidents.
Example:
(1)pabx56> incstart
2.19 incstop
2.19.1 Operation
2.19.1.1 incstop command
Syntax: incstop
The incstop command is used to stop real-time incidents.
Example:
(1)pabx56> incstop
2.20 incvisu
2.20.1 Operation
2.20.1.1 Command incvisu
Use the incvisu command to display the main queue or outfall queue incidents (errors) saved in local
mode on the management console.
By default, the incvisu command displays the incidents transmitted since the last system restart.
Syntax:
incvisu -b n Displays the incidents preceding the last "n" session restarts
Time
The following table gives the options that can be used with the incvisu command and their meaning.
(no parameter) Displays the incidents of the starting phase and the main queue
when neither "-s" nor "-o" options are used
• incvisu -t 100 edits the last 100 starting phase and/or main
queue incidents of the current session
-r Displays incidents in reverse order, i.e. from the most recent ones to
the oldest ones
Example:
incvisu -r displays all the incidents in reverse order, from the most
recent ones to the oldest ones
You can use command incvisu with several different optional parameters.
Examples:
• incvisu -b 1 -t 100 -r -e "out of service" displays the last 100 incidents of the last
session with the character string "out of service" in reverse order,
• incvisu -b 1 -s edits the session start file incidents of the last backup session,
• incvisu -t 100 -o displays only the outfall queue incidents.
The results obtained with the command can be sent to a file, using the following command, for
example: incvisu > incident.txt. The generated file can then be transferred and used as a text
file.
The”grep” option may be used with the incvisu command as follows:
• incvisu | grep US to display incidents with the character string “US”,
• incvisu | grep 2064 to display incidents with the character string “2064”.
Example of use of the incvisu command:
(1)pabx56> incvisu —T 10
06/03/00 15:34:53
— — — — — — — — —
— — — — — — — — — —
— — — — — — — — — —
11/03/00 08:34:29 M|0/11/0/000|=4:2523=La version de boot de ce coupleur est incorrecte
11/03/00 08:34:29 M|0/11/0/254|=2:3747=Timeslot inconnu
11/03/00 08:34:29 M|0/11/0/254|=2:3756=Message perdu
11/03/00 08:34:33 M|0/11/0/001|=2:2151=Subdevice V24 present non declare
11/03/00 08:34:34 M|0/11/0/000|=2:2151=Subdevice MAC/PC present non declare
11/03/00 08:34:34 M|0/11/0/001|=2:2151=Subdevice MAC/PC present non declare
11/03/00 08:34:34 M|0/11/0/004|=2:2151=Subdevice MAC/PC present non declare
11/03/00 08:34:35 M|0/11/0/001|=2:2151=Subdevice AOM40 present non declare
11/03/00 08:34:40 M|-/——/-/———|=5:2141=Qte
ressources SET normale
11/03/00 08:35:30 M|0/11/0/254|=5:2019=Mise en service d'un coupleur UA
2.21 intipstat
2.21.1 Operation
2.21.1.1 “intipstat” command
This command is used to check the status of inter-ACT connections via INT-IP.
2.22 ippstat
2.22.1 Operation
2.22.1.1 Running the ippstat Command
The ippstat command is used to view IP phone data.
The "ippstat d numann" command is used to view data for the IP phone with directory number
"numann". The result is identical to item 2 in the following menu.
+----+--------------------+-+-----+--------+-----------+---------------+----+
|Indx| Mac Address | |Neqt | QMCDU | Name | Ip Address |Type|
+----+--------------------+-+-----+--------+-----------+---------------+----+
|0001|00:80:9f:56:06:a2:00|V|00270|13005 |NOE |192.168.004.055| Ipt|
|Sign| 19/ 1 | |NoCnx| ON CPL | | | |
+----+--------------------+-+-----+--------+-----------+---------------+----+
Ip domain is : 2
(survivability mode -> none)
Ip Voice Coding is IntraDom G723 : ExtraDom G723
QOS parameters for category 0:
DSCP diffserv : 0
802.1Q used No
Vlan Identifier (Vid) : 0
User priority (8021Q pri.) : 7
Firmware version is 4.20.60
on a Giga hardware
Firmware version Data : 4.20.60
Bootloader version : 4.20.60
Gigabit set : Yes
Extended edition : Yes
Support G722 : Yes
SIP version : 1.10.91
IP Touch ram size : 16 Mb
IP Touch rom size : 16 Mb
IP Touch reset cause : 1
Encryption : No
The first part is similar to the results obtained with the tradna or tradeq commands. However, note
that the IP phone is attached to Shelf 19 Coupler 1. This is a virtual coupler declared to simplify IP
phone management.
=====================
neqph & Registered Equipment: set virtual equipment numbers
nulog: set logical number
ipp: IP phone status
Cristal Number : 19
Coupler Number : 1
Coupler INTIPA cr 19, cpl 1, Ghost Eqt 28857
IP Address : 192.168.4.52
Netmask : 255.255.255.0
Gateway Address : 0.0.0.0
Mac Address : Unused
Sign. Ip Term. Load : 1
Sign. IRC. Load : 2
Domain IP : 0
Local IP Version : IPV4
IP QoS Category : 0
Embedded Ethernet : NO
Security Module Addr : 192.168.201.89
Sign. Ip Term. Load: number of signaling links between this coupler and the IP phones.
Operational IP phones and IP phones with initialization in progress have active signaling with their
"host" coupler.
Sign. IRC. Load: number of inter-shelf links supported by the board.
4) usage
0) previous menu
Choice:
Select 1, 2 or 3, then enter an address or directory number or expression, using the following syntax:
• ? to replace any character, * to replace a series of characters.
• Use [xx] to search for addresses or numbers containing the characters xx.
• Use xx* to search for addresses or numbers starting with xx.
• Use *xx to search for addresses or numbers ending with xx.
Note:
The * symbol must not be combined with digits in the same address field.
2.23 lanpbxbuild
2.23.1 Operation
2.23.1.1 Overview
The lanpbxbuild command is used to create, modify or delete the lanpbx.cfg file and the
lanpbx_mipt.cfg file.
The lanpbx.cfg file contains a list of PCX IP addresses on which IP equipment is declared.
As of R6.2, when the IP Touch Security service operates on one or several PCXs, the lanpbx.cfg file
also contains:
• The list of the SSM (Server Security Module) IP addresses which protect the concerned PCXs
• A security line which indicates the PCXs security mode
Note:
At file creation, a security line is automatically integrated by the PCX on which the lanpbxbuild command is run.
This file is used for IP equipment initialization. During its initialization, the IP device sends a request to
the TFTP server to download the lanpbx.cfg file. This request is sent to the TFTP server address,
which is either registered in the IP equipment parameters (static initialization), or given by the DHCP
server (dynamic initialization).
Once the lanpbx.cfg file is downloaded, the IP device first sends a request to the PCX registered in
its flash memory. If the PCX does not respond (or is not stored), the IP device sends a request to the
first PCX listed in the lanpbx.cfg file (if different from the PCX stored in flash memory). If this PCX
does not respond, the IP device sends a request to the second PCX listed in the file and so on. As
soon as a PCX (on which some IP devices are declared) replies, the IP device downloads the
corresponding binaries from this PCX.
The IP device can be a Media Gateway controller board (INT-IP B or GD board) or an IP phone.
Notes:
• As of R6.1, static GD board initialization does not request the lanpbx.cfg file.
• As of R6.1, there are two files: the lanpbx.cfg file, created on the local Com Server and the
lanpbxtwin.cfg file, downloaded on the twin Com Server. In a duplicated Com Server configuration
where the two Com Servers are on different IP subnetworks, the Download IP address entered for the local
Com Server in the lanpbx.cfg file corresponds to the Download IP RD address in the lanpbxtwin.cfg
file (and vice-versa).
• As of R6.2, when the IP Touch Security service operates on the PCX(s), three files are created:
• The lanpbx.cfg file
• The lanpbx_sec.cfg file, which describes the PCX when secured
• The lanpbx_nosec.cfg file, which describes the PCX when not secured
In a duplicated Com Server configuration, the lanpbx.cfg is created on the main Com Server and automatically
copied on the stand-by Com Server. The lanpbxtwin.cfg is not created anymore.
For more information about the IP Touch Security service, see: Hotel/Hospital - Overview.
• As of R7.0, the lanpbxbuild tool can be used to create the lanpbx_mipt file. With the lanpbxbuild tool, the
lanpbx_mipt.cfg file is a copy of the lanpbx.cfg file.
Caution:
The lanpbx_mipt.cfg file can be accepted by the MIPT sets only when its size is below 1Ko. When the
lanpbx.cfg file (and its copy lanpbx_mipt.cfg) is too large, the lanpbxmipt tool must be used.
1. View
2. Add
3. Delete
4. Modify
5. Move
6. Apply changes
7. Copy lanpbx to lanpbx-mipt
0. Quit
3. Select 2. Add.
==> 2
1. View all lines
2. Download IP (TFTP Server) address ( required )
3. Download IP RD(TFTP Server) address ( none )
4. Alternate TFTP port ( none )
The Com Server is not duplicated Com Server main IP address (or Com Server
physical address if no main IP address is config-
ured)
Duplicated Com Server configuration where the Com Server main IP address
two Com Servers are on the same IP subnet-
work
Duplicated Com Server configuration where the First Com Server main IP address
two Com Servers are on different IP subnet-
Note:
works
The main IP address of the Com Server where the
lanpbxbuild command is launched must be declared in
this field.
5. In a duplicated Com Server configuration where the two Com Servers are on different IP
subnetworks, select 3. Download IP RD (TFTP Server) address, then enter the second Com
Server main IP address.
6. Select 5. CPU 1 IP address, then enter the first Com Server physical IP address
Note:
The physical IP address of the Com Server where the lanpbxbuild command is launched must be declared in
this field.
7. Select 6. CPU 2 IP address, then enter the second Com Server physical IP address
8. Select 7. SSM 1 IP address, then enter the SSM IP address, which protects the first Com Server
(only If the IP Touch Security service operates on the PCX)
Note:
The SSM which protects the Com Server where the lanpbxbuild command is launched must be declared in this
field.
9. Select 8. SSM 2 IP address, then enter the SSM IP address, which protects the second Com
Server (only if the IP Touch Security service operates on the PCX)
10.Select 9. Bin Download IP (BIN TFTP Server) address
11.Select d. dot1x Certificate Server address, then enter the IP address of the machine on which
certificates are located. This field is mandatory and must be an IP address, as there is no DNS for
IP Touch sets. For more information on 802.1x Authentication, see: IP-PCX Networks - 802.1
Authentication - Overview.
12.Select e. dot1x Certificate Server port, then enter the port number to use (optional, 80 is used as
default port number)
13.Select f. dot1x Certificate Server path, then enter the directory where certificates are located
14.Select g. Application type of NOE mode IPTouch phones, then select NOE (NOE-SIP is not
supported)
1. View
2. Add
3. Delete
4. Modify
5. Move
6. Apply changes
7. Copy lanpbx to lanpbx-mipt
0. Quit
3. Select: 7. Copy lanpbx to lanpbx-mipt
Caution:
To be used, the lanpbx_mipt.cfg file must have a size lower than 1Ko.
1. View
2. Add
3. Delete
4. Modify
5. Move
6. Apply changes
0. Quit
3. Select: 2. Add
==> 2
1. View all lines
2. Download IP (TFTP Server) address ( required )
3. Download IP RD(TFTP Server) address ( none )
4. Alternate TFTP port ( none )
5. CPU 1 IP address ( none )
6. CPU 2 IP address ( none )
7. SSM 1 IP address ( none )
2.24 lookars
2.24.1 Operation
2.24.1.1 Lookars command
2.24.1.1.1 Overview
The lookars maintenance command is used to check the declaration of the ARS routing tables. It
offers:
• display of the content of the routing table associated with a public network translator entry,
• display of the content of a specific routing table,
• display of the content of all the declared routing tables.
2.24.1.1.2 Content of the public translator routing tables
To display the content of the routing table assigned to a public translator entry, enter the command
lookars i <public no>
(3)bsbmrp03> lookars i 02
====================================================================
| P T T T R A N S L A T O R |
====================================================================
| |
| Ok after digit 1 |
| |
| Area : 1 |
| Nbr of digits : 10 |
| ARS Rln : 0 |
| Tonal : 0 |
====================================================================
==========================================================================
| A R S R O U T E L I S T No 0 |
==========================================================================
| |
| 1) trk_grp = 1 dialing_table = 0 |
| nb_deleted_digits = 0 inserted_digits = |
| WaitingCostLimit = 0 StoppingCostLimit = 0 vpnCostLimit = 0 |
| |
| --> trk_grp 1 remote TG nname : Res-Public |
| type : T0 variante : T2 |
| node_number = 4 network_number = 1 |
| fais_suiv = -1 |
-------------------------------------------------------------------------|
2.24.1.1.3 Content of a routing table
To display the content of a specific routing table, enter the command lookars r <table no>
(3)bsbmrp03> lookars r 0
=======================================================================
| A R S R O U T E L I S T No 0 |
=======================================================================
| |
| 1) trk_grp = 1 dialing_table = 0 |
| nb_deleted_digits = 0 inserted_digits = |
| WaitingCostLimit = 0 StoppingCostLimit = 0 vpnCostLimit = 0 |
| |
| --> trk_grp 1 remote TG nname : Res-Public |
| type : T0 variante : T2 |
| node_number = 4 network_number = 1 |
| fais_suiv = -1 |
-----------------------------------------------------------------------
2.24.1.1.4 Content of all the routing tables
To display the content of all the declared routing tables, enter the command lookars r a .
(3)bsbmrp03> lookars r all
========================================================================
| A R S R O U T E L I S T No 0 |
========================================================================
| |
| 1) trk_grp = 1 dialing_table = 0 |
| nb_deleted_digits = 0 inserted_digits = |
| WaitingCostLimit = 0 StoppingCostLimit = 0 vpnCostLimit = 0 |
| |
| --> trk_grp 1 remote TG nname : Res-Public |
| type : T0 variante : T2 |
| node_number = 4 network_number = 1 |
| fais_suiv = -1 |
------------------------------------------------------------------------
2.24.1.1.5 Using the interactive mode (from R3)
The lookars i command is used to find out, at the moment the command is actived, which translator
and routing table are used for a calling set and a given calling number as well as the selected list of the
time base routes.
lookars i
• ars prefix = 0
• Directory number = set number
• External number= 0155665555
• command.
Example :
(4)xb000004> lookars i
ARS Prefix : 0
Directory No : 34001
External No : 0155666193
Date : 17/09/1998
Time : 12:17
Command : C/R
Result of the command
==========================================================================|
| P U B L I C E X C H A N G E T R A N S L A T O R |
==========================================================================|
| Prefix number : 0 Discri Log Id : 0 |
| Dir. number : 34001 Entity : 4 Discri Real Id : 0 |
| Route List No : 0 Scheduler No : 1 |
==========================================================================|
| A R S R O U T E S L I S T No 0 |
--------------------------------------------------------------------------|
| ROUTE DEFINITION |
--------------------------------------------------------------------------|
| 1) trk_grp = -1 dialing_table = 0 |
| nb_deleted_digits = 5 inserted_digits = |
| vpnCostLimit = 0 |
| --> Network Route |
| Route usefull for : SPEECH |
---------------------------------------------------------------------------
| 2) trk_grp = 80 dialing_table = 0 |
| nb_deleted_digits = 9 inserted_digits = 015566619 |
| vpnCostLimit = 0 |
| --> trk_grp 80 local TG name : FT_T2 state
:OOS |
| type : T2 variante : T2 |
| fais_suiv = -1 category = 0 nbjonc = 0 |
| vpnRate = 50 vpnCostLimit = 0 |
| Route usefull for : SPEECH |
---------------------------------------------------------------------------
2.25 mao
2.25.1 Operation
2.25.1.1 Mao command
2.25.1.1.1 General
The "mao " tool is used, among other functions, to activate / deactivate the broadcast and consult the
content of the broadcast files.
2.25.1.1.2 Broadcast commands
"mao " is used to consult the information relating to the options for this command (help).
"mao +br ", ("mao -br ") is used to activate or deactivate the network broadcast.
"mao -a " is used to find out which options are in progress on the management mechanisms.
Example:
>mao -a
BROADCAST is OFF The broadcast mechanism is not valid
CMIS running process 0
MAO is on
Trace is OFF The management is available
Trace on BROADCAST is off
Synchronisation 4400-47xx is off
>
log seq idx : sequence number of the file received from the node correspponding to idx.
IPName X00004_tun X25Name 4588 : IP name and X25 address used by the broadcast.
rem : sequence number of the change of office files.
Node param -v : indicates that the node is acknowledged in the local broadcast process.
Node param -d : indicates that the node is connected to the local node by a dynamic link.
dynamic timer : indicates the time elapsed since the last broadcast on dynamic link.
step : used to measure the validity of the area parameter (notably in the case of the exit of a node from
the area).
2.26 maoview
2.26.1 Operation
2.26.1.1 “maoview” command
2.26.1.1.1 Overview
This tool is used for analysing the content of the management tickets archived in compressed files.
This tool is located in the /DHS3bin/oneshot/mtcl directory and the mtcl user can use it.
The command options are described below:
(1)pabx56> maoview
maoview -[abdefhlmpstvwV]
-a attribute_number
sets the list of the attributes to print (use -h to print the
attribute numbers). Each attribute number is separated by a space
character.
-b number
prints the n first tickets (see also option -e).
-d [display]
sets the number of attributes/line to display, 1 or 2 (default is
2).
-e number
prints the n last tickets (see also option -b).
-f [file]
file is the file to be read. If the file doesn't exist in the
current directory and in the /DHS3dyn/account directory, an error
is returned. If filename is empty, a list of the current files is
displayed. Wild cards are supported.
-h prints the ticket header for the given file.
-help this help.
-l prints the defined meanings of the enumerated and bitstring
attributes.
-m uses more to print the results (when more is running, press h for
help).
-p delete|disable|read|save
delete deletes the current profile. disable disables the current
profile for the current execution. read prints the content of the
current profile. save deletes the current profile and saves the
current options. Only the first option letters are needed.
-s prints statistics about an accounting file.
-t prints the contents of the tickets.
-v prints the values of the attributes (default is meanings of the
attributes).
-w sets the width of one line (default is 80 characters).
-V prints the version.
(1)pabx56>
This tool has the same features as the accview tool, thus the common commands refer to accview.
2.26.1.1.2 maoview -a attribute_numbrer
See Operation on page 26
2.26.1.1.3 maoview -b number
See Operation on page 26
2.26.1.1.4 maoview -d [number]
See Operation on page 26
2.26.1.1.5 maoview -e number
See Operation on page 26
2.26.1.1.6 maoview -f [file]
This command selects the file to be analysed.
This command can only be used with the following options: “-h”, “-s” or “-t”.
If the file does not exist in the current directory, it is searched for in the /DHS3dy/account directory.
If no file is entered, a list of management files is displayed. This list is identical to that obtained with the
account mao command. If there is no management file in the /DHS3dyn/account directory, searching
for the MAO*.DAT type files will display a list of files from the current directory.
An error message is displayed if no file is found.
The file can be a management file compressed or not. If the first character of the file is ”#”, then the file
is compressed.
(1) pabx56> maoview —t —f
The files stored in the system are the following ones:
--------------------------------------------------------------------------------
| | | | |Number |
|Date |File name |First ticket date|Last ticket date |tickets |
--------------------------------------------------------------------------------
|99/03/11 08:02|MAOAOONG.DAT|99/03/11 07:02:04|99/03/11 08:02:06| 9842 |
|99/03/11 09:02|MAOAOONH.DAT|99/03/11 08:02:06|99/03/11 09:02:09| 9848 |
|99/03/11 09:40|MAOAOONI.DAT|99/03/11 09:02:09|99/03/11 09:39:33| 6211 |
|99/03/11 11:29|MAOAOONJ.DAT|99/03/11 09:45:48|99/03/11 09:47:46| 3 |
|99/03/17 09:44|MAOAOONK.DAT|99/03/17 09:42:30|99/03/17 09:44:10| 2 |
|99/03/18 14:47|MAOAOONL.DAT|99/03/18 14:39:01|99/03/18 14:47:08| 1350 |
|99/03/18 15:15|MAOAOONM.DAT|99/03/18 14:47:08|99/03/18 15:15:01| 7 |
|99/03/18 16:00|MAOAOONN.DAT|99/03/18 15:15:02|99/03/18 15:59:33| 7543 |
--------------------------------------------------------------------------------
Please, which file (Return to Quit) : MAOAOONK.DAT
Please, which file (Return to Quit) :
(1) pabx56>
2.26.1.1.7 maoview -h
maoview -h is used to print out the management ticket header of a given file. Each management ticket
contains a header that describes the ticket format.
This command must be used with the “-f ” option
--------------------------------------------------------
|Attribute | Name |Length |
--------------------------------------------------------
| 1 | TicketVersion | 5 |
| 2 | ManagedObject | 6 |
| 3 | Date | 17 |
| 4 | Operation | 1 |
| 5 | DirectoryNumber | 8 |
| 6 | NetworkNodeNumber | 6 |
| 7 | DisplayName | 16 |
| 8 | Name | 20 |
| 9 | FirstName | 20 |
| 10 | CostCenterName | 10 |
| 11 | PIN | 8 |
| 12 | StationType | 3 |
| 13 | VoiceMailNumber | 8 |
| 14 | VoiceMailType | 1 |
| 15 | FacilityCategory | 2 |
| 16 | PublicNetworkCategory | 2 |
| 17 | MultilineFlag | 1 |
| 18 | AttendantStationType | 2 |
| 19 | TrunkGroupNumber | 4 |
| 20 | TrunkGroupName | 10 |
| 21 | CompressedFlag | 1 |
| 22 | SharedFlag | 1 |
| 23 | PriorityFlag | 1 |
| 24 | CostCenterNumber | 4 |
| 25 | ProjectAccountCodeId | 4 |
| 26 | ProjectAccountCode | 12 |
| 27 | DidFlag | 1 |
--------------------------------------------------------
(1) pabx56>
2.26.1.1.8 maoview -help
See Operation on page 26
2.26.1.1.9 maoview -l
maoview -l is used to print out the list (enumerated) and boolean values attributes.
2.26.1.1.10 maoview -m
See Operation on page 26
2.26.1.1.11 maoview -p delete|disable|read|save
See Operation on page 26
2.26.1.1.12 maoview -s
See Operation on page 26
2.26.1.1.13 maoview -t
See Operation on page 26
2.26.1.1.14 maoview -v
See Operation on page 26
2.26.1.1.15 maoview -w
See Operation on page 26
2.26.1.1.16 maoview -V
See Operation on page 26
2.27 multitool
2.27.1 Operation
This command is used to consult the configuration of:
• multi-line sets,
• manager/assistant group,
• supervisions,
• multi QMCDU multi-line sets,
• A-MLA sets (as of R4.1.1).
CHOICE ?
Sub-menu:
+------- [ Consult Boss/Secretary ] -------+
[ 0] - Father Menu
[ 1] - Consult All <Boss> Sets
[ 2] - Consult All <Secretary> Sets
[ 3] - Consult All <Routing Secretary> Sets
CHOICE?
2.27.1.3.1 Consultation of all manager sets
CHOICE? 1
+------- [ Consult All <Boss> Sets ] -------+
Nulog Secr | Numan Secr | Key Secret | Dom. Secre | Boss Mcdu | Key
Boss | Dom. Boss
25 | 3403 | 7 | 0 | 3402 | 7
| 0
--No more--
Nulog Boss | Numan Boss | Key Boss | Dom. Boss | Secretary | Key
Secret | Dom. Secre
24 | 3402 | 7 | 0 | 3403 | 7
| 0
--No more--
Nulog Rout | Numan Rout | Key Rout. | Dom. Rout. | Boss Mcdu | Dom.
Boss
22 | 3400 | 5 | 0 | 3402 | 0
--No more--
--No more--
Sub-menu:
+------- [ Consult Directory Number Supervision ] -------+
[ 0] - Father Menu
[ 1] - Consult All <Supervised> Directory Number
[ 2] - Consult All <Supervisor> Of a Directory Number
[ 3] - Consult All <Supervisor>
CHOICE?
2.27.1.6.1 Consultation of all supervised numbers
This option displays the list of supervised numbers.
CHOICE ? 1
+------- [ Consult All <Supervised> Directory Number ] -------+
Spvised Nu | Dom. Spvis | Spvised Nu | Dom. Spvis
3400 | 0 |
3401 | 0 |
ooo Number of <Supervised> Number = 2
--No more--
Key_Id | Spervised
11 | 3401
--No more--
Sub-menu:
+------- [ Consult Supervised Trunks and Keys ] -------+
[ 0] - Father Menu
[ 1] - Consult from a Trunk Group Number
[ 2] - Consult from a Trunk Number
CHOICE?
2.27.1.10.1 Consultation from a trunk group number
CHOICE? 1
+------- [ Consult from a Trunk Group Number ] -------+
| | | 3| 6| 5792|
| | | | 7| 5763|
| | | | 9| 5763|
| 20| 5764| | 1| 5764|
| | | | 3| 5764|
----------------------------------------------------
16 Multiline Keys
Sub-menu:
+------- [ Multiple_Line_Appearance sets With Their MLA Keys ] -------+
[0]-Father Menu
[1]+Consult All Secondary MLA keys
[2]-Consult All Secondary MLA keys Of a Directory Number
CHOICE?
2.27.1.12.1 Consultation of all A-MLA groups
CHOICE? 1
Sub-menu:
+------- [ Consult All Secondary MLA Keys ] -------+
[0]-Father Menu
[1]-From Database
[2]-From Memory
CHOICE?
2.28 netvisu
2.28.1 Operation
2.28.1.1 Command netvisu
Use the netvisu command to view the incidents generated by the different network nodes.
The following table gives the options that can be used with the netvisu command and their meaning.
(no parameter) Displays the incidents of the main queue when the "-s" option is not
used
-r Displays incidents in reverse order, i.e. from the most recent ones to
the oldest ones
Example:
netvisu -r displays all the incidents in reverse order, from the most
recent ones to the oldest ones
You can use command netvisu with several different optional parameters.
Example:
netvisu -b 1 -s edits the session start file incidents of the last backup session.
Example of use of netvisu command:
(1)pabx56> netvisu —T10
11/00/00 08:43:26 04Iù0/11/0/002ù=2:2151
11/00/00 08:43:26 04Iù0/11/0/000ù=2:2151
11/00/00 08:43:27 04Iù0/11/0/002ù=2:2151
11/00/00 08:37:51 02Iù0/11/0/002ù=2:2140
11/03/00 08:34:29 Mù0/11/0/254ù=2:3756=Message perdu
11/03/00 08:34:33 Mù0/11/0/001ù=2:2151=Subdevice V24
present non declare
11/03/00 08:34:34 Mù0/11/0/000ù=2:2151=Subdevice MAC/PC
present non declare
11/03/00 08:34:34 Mù0/11/0/001ù=2:2151=Subdevice MAC/PC
present non declare
11/03/00 08:34:34 Mù0/11/0/004ù=2:2151=Subdevice MAC/PC
present non declare
11/03/00 08:34:35 Mù0/11/0/001ù=2:2151=Subdevice AOM40
present non declare
(1)pabx56>
2.29 prog-diff
2.29.1 Operation
2.29.1.1 Prog_diff command
2.29.1.1.1 General
The “prog_diff ” tool is used to carry out the following operations relating to the broadcast:
• display the content of the broadcast files,
• consult the status of the nodes in relation to the broadcast.
2.29.1.1.2 Execution
The "prog_diff " tool is run by the following commands:
prog_diff -l GEA : runs the tool in Generic English of Alcatel,
prog_diff -l FR0 : runs the tool in French,
prog_diff : runs the tool in the language of the last user,
prog_diff -c: is used to limit the display to ASCII characters only, if the terminals do not have the
accented character display,
prog_diff -f ERRLOG.Nd.Seq : runs prog_diff with direct access to the designated file.
General menu:
0 - Exit (Exit the tool)
Althought its mnemonic does not indicate this, this menu may be used to consult any LOG file on the
whole network.
2.29.1.1.2.2 State of nodes
Command 2 “State of nodes" is used to find out the situation of the consulted node in relation to the
broadcast application. For each node consulted, it is possible to know whether the broadcast is
activated and to find out the last ten sequence numbers of the broadcast files received from the other
nodes.
Example:
State of nodes
1 - x00003_tun
2 - x00004_tun List of nodes that can be selected
3 - x00005_tun
2.30 setshutdelay
2.30.1 Overview
This command is used to set the timeout before system shutdown following a power supply alarm
(PSAL). The machine must be rebooted for modifications to be taken into account.
2.31 shutdown
2.31.1 Overview
This command is used to reset the CPU of the PABX that the command is performed on.
This command resets and reboots the CPU after a fixed 30-second timeout.
(0)A4400a>shutdown —i
This command resets and reboots the CPU immediately (i stands for “immediately”).
(0)A4400a>shutdown —h
This command shuts down the CPU (h stands for “halt”). The CPU is not reset and rebooted until a key
is pressed.
(0)A4400a>shutdown —p
This command simulates a power supply alarm (loss of PSAL) with a fixed delay of 1 second (this can
be programmed with the “setshutdelay” command).
The job with the reference “981669600.a” will be run at 22h 00.
To view the list of waiting “jobs”:
(0)A4400a>at —l
981669600.a Thu Feb 8 22:00:00 2001
2.32 tabranfilt
2.32.1 Operation
2.32.1.1 The "tabranfilt" filtering index command
The tabranfilt command is used to display the routing number for a given abbreviated number and
filtering index.
Syntax is as follows: tabranfilt “Range no.” “Order no. in the range” “filtering index”
Example:
(0)a4400a> tabranfilt 1 5 400
+---------------------------------------------------------------------+
| Abbreviated number : 1004 |
+---------------------------------------------------------------------+
| Index : 1 | Routing : 3002 |
+---------------------------------------------------------------------+
+---------------------------------------------------------------------+
| Index : 0 | Routing : 3001 |
+---------------------------------------------------------------------+
| Abbreviated number : 1004 |
+---------------------------------------------------------------------+
| Index : 1 | Routing : 3002 |
+---------------------------------------------------------------------+
| Abbreviated number : 1005 |
+---------------------------------------------------------------------+
| Index : 0 | Routing : 3001 |
+---------------------------------------------------------------------+
| Abbreviated number : 1005 |
+---------------------------------------------------------------------+
| Index : 1 | Routing : 3002 |
+---------------------------------------------------------------------+
2.33 tcalledfilt
2.33.1 Operation
2.33.1.1 calledfilt" filtered call command
The “tcalledfilt” command displays the list of called numbers filtered as defined on the PBX.
(0)a4400a> tcalledfilt
+-------------------------------------+
| Lognum | Direc Number | Entity |
+-------------------------------------+
| 101 | 36001 | 1 |
| 102 | 36002 | 1 |
| 103 | 36003 | 1 |
+-------------------------------------+
2.34 utadown
2.34.1 Operation
2.34.1.1 utadown tool
utadown <[-list] | [-l] | [list] | [l]>
utadown <[-all] | [-a] | [all] | [a]>
utadown <n> <equipement number>
utadown <d> <directory number>
utadown <p> <ACT number> <cpl number> <[behind us] | [access number]> <[user number] | [a]>
“utadown” tool display data relative to the current code downloaded on the UTA boxex (local and
remote) compared to the firmware file existing on the system under the subdirectory /DHS3data/
he_download/ U-TA/LU-TA/binluta (for local UTA firmware) and /DHS3data/ he_download/U-TA/LU-TA/
binruta (for remote firmware).
The different options of this command will allow its operation to be controled:
• <list> : the command will display the numerical UA sets which need to be downloaded but no
dowmload action will be done on their UTA boxes.
• <all> : the command wil display the UA set with UTA boxes which have to be downloaded and will
start the download of these boxes in all the system.
• <n> : by mean of any of the usual option to specify an equipement number (directory, physical
adress or equipement), this command will be use to force the local, remote or both UTA boxes of a
specific UA set
Example:
(0)A4400a> utadown
Usage : utadown <-all | -a | all | a>
to
compare the version and revison number
of
all the UTA boxes in the system with the
the
file code on the disk (binluta, binruta)
and
start the download if necessary
or
Usage : utadown <-list | -l | list | l>
to
compare the version and revison number
of
all the UTA boxes in the system with the
the
file code on the disk (binluta, binruta)
and
display the neqt requiring a download
or
Usage : utadown <n neqt-number (0-4471)> ou
<d
directory-number [1..8]> ou bien
<p
crist-nb cpl-nb acces|us-nb term-nb>
<p
crist-nb cpl-nb acces|us-nb a for all
to
force the dowmload of the local,remote
or
both UTA boxes of a specific UA set
Example:
or Both (B/b) ? :l
3 netadmin
3.1 Overview
3.1.1 Overview
Netadmin is used to define the IP addressing plan for Communication Servers, PPP serial links,
security, etc.
-p yes/no -p/yes imposes default addressing, -p /no does not impose default addressing.
-v netadmin version.
Note:
The most frequently used netadmin options are:
• netadmin (for a new installation),
• netadmin -m (read, modification of the configuration).
3.3 Operation
The netadmin -m command provides access to a general menu: Alcatel e-Mediate IP Network
Administration:
Alcatel-Lucent e-Mediate IP Network Administration
================================================
1. 'Installation'
2. 'Show current configuration'
3. 'Local Ethernet interface'
4. 'CPU redundancy'
5. 'Role addressing'
6. 'Serial links (PPP)'
7. 'Tunnel'
8. 'Routing'
9. 'Host names and addresses'
10. 'Copy setup'
11. 'Security'
3.3.1 Installation
Section 1. 'Installation' can also be accessed directly by using the netadmin command.
As of R6.1, in a duplicated Communication Server configuration, the two Communication Servers can
be on different subnetworks. When this is the case, R6.1 nodes must be connected via an IP/X25
tunnel.
Note:
To configure security, you must log on the root account.
Use IP/X25? No
Node Name? 3
If stand-alone CPU
1
Twin CPU Ethernet Interface:
-Name, IP @ and Mask 7
-Name and Address when CPU is Main (Duplicated Call Servers)
Data Saved 10
End
Figure 3.1: NETADMIN Installation Flowchart
must be different from the physical name of the two Communication Servers. It is configured as an
alias in the hosts file.
Note:
If the two Communication Servers are located on the same subnetwork, ALE International recommends to use
the same main name and same address for the two Communication Servers.
Node: Hera
Request Network
= Zeus
Router
Communication Communication
Server Server
Main Stand by
Router
Node: Zeus
Communication Communication
Router Router Server Server
Main Stand by
Communication Communication
Server Server
Main Stand by
4. Activating the internal name resolver. This is mandatory for SIP end points.
5. Choosing the position of the local Communication Server a, b, or n, answer:
• n if the Communication Server is unique; the system then considers that the Communication
Server is not duplicated.
• a, the name of the Communication Server is in xa.
• b, the name of the Communication Server is in xb.
Depending on the answer, the Ethernet interface configuration of the duplicated Communication
Server will or will not be subsequently requested. It will only be requested if the Communication
Server is not a single CPU, i.e. if an a or b position was given in reply to the position selection
question.
Note:
If the Communication Server is duplicated
• Be careful not to declare the two Servers in a or in b.
• After installation, you must specify role addressing.
Note:
The two Communication Servers can be on different subnetworks. Although this is not mandatory, when the
two Communication Servers are on the same subnetwork, ALE International recommends using the same role
address for both Communication Servers.
6. Defining:
• The name, IP address, and the subnetwork mask of the Ethernet interface of the local
Communication Server
• The name and address of this Communication Server when it is the Main Communication Server
7. If necessary, declaring a twin Communication Server, specifying its name, IP address and mask in
the same conditions as the local Communication Server. The twin Communication Server is defined
only when an a or b position was assigned to the local Communication Server.
There is no request to enter the stand-by Communication Server role address. As of R6.1, you do
not need a stand-by address anymore. The local Communication Server Main role address is the
twin Communication Server address when it is switched to Main Communication Server.
Role addresses must be entered. By default, the Main role address for both local and twin
Communication Server is 10.R.N.3.
8. Defining (if necessary) the IP address and name of the default router.
In a duplicated Communication Server configuration where the two Communication Servers are on
the same subnetwork, netadmin requests information on one router only. If on a different
subnetwork, information must be provided for the two routers.
9. This menu is shown only when the Ethernet interface has previously been isolated. There are
several ways to isolate the Ethernet interface:
• Selecting the trusted hosts/TCP wrapper (Level 2 or Level 3) option during the step Security
Setting of the Communication Server Installation process (refer to the chapter on
Communication Server installation in [28])
• Using the Security menu of the netadmin tool see: Isolate Ethernet Interface and TCP Accesses
on page 95
When the PCX has been isolated, you are prompted to define trusted hosts. You must be logged on
the root account. The trusted host declaration is performed as described in Restricted Ethernet
Access on page 95.
10.When the user has answered all the questions, the data provided is automatically applied and the
local database updated.
netmask: 255.255.0.0
=================================================================
| Machine type |Local interface |Name |Address |
=================================================================
| local | Ethernet | xa004007 | 10.4.7.1 |
| local main | Ethernet | xma004007 | 10.4.7.3 |
netmask: 255.255.0.0
=========================================================
| Machine type | Local interface | Name | Address |
=========================================================
| local | Ethernet | xb004007 | 10.4.8.1 |
| local main | Ethernet | xmb004007| 10.4.8.3 |
| router | Ethernet | router_A | 10.4.8.254|
=========================================================
With this section, you can move the Communication Server to another subnetwork. If the
Communication Server is moved to another subnetwork, netadmin warns to update the default
router address, static routes and trusted hosts:
WARNING: You have changed subnets, please update your default router,
static routes and trusted hosts if necessary.
• Section 4.1"View" is used to view the parameters of the duplicated Communication Server, name
and address by interface when it exists.
Example:
netmask : 255.255.255.0
==============================================================
| Machine type | Local interface | Name | Address |
==============================================================
| twin | Ethernet | cpu_B | 192.40.20.1 |
| local main | Ethernet | smb001001 | 192.40.20.2 |
| router | Ethernet | router_B | 192.40.20.254 |
==============================================================
• Section 4.2 "Add" is used to add a duplicated Communication Server. Position "a" or "b", IP
address, name of the Ethernet interface and subnetwork mask must be specified.
When the twin Communication Server is on a different subnetwork, the user is invited to update
default router(s), static routes, and trusted hosts:
WARNING: Local and Twin CPU are not on the same subnet, please update your
default router(s), static routes and trusted hosts, if necessary.
Example:
CPU redundancy setup
====================
When the twin Communication Server and the local Communication Server are on the same
subnetwork, it is not mandatory to define a default router. To define a default router, see Routing on
page 92.
• Section 4.3 "Update" is used to change the position, the name, the IP address and the subnetwork
mask of the duplicated Communication Server.
When the new twin Communication Server is on a different subnetwork, the user is invited to update
the default router, static routes and trusted hosts (see: Routing on page 92 and Security on page
95).
Example:
Update the twin CPU Internet parameters
=======================================
Warning: Local and Twin CPU are not on the same subnet,
please update your default(s) router(s), Static routes and
Trusted hosts if necessary
• Section 4.4 "Delete" is used to delete the duplicated Communication Server.
Example:
=====================================================================
| Machine type | Local interface | Name | Address |
=====================================================================
| local Main | Ethernet | xma001001 | 130.24.11.2 |
| twin Main | Ethernet | xmb001001 | 192.40.20.2 |
=====================================================================
• Section 5.2 "Add" is used to configure role addressing.
In a duplicated Communication Server configuration, where the two Communication Servers are on
different subnetworks, the twin Communication Server requires a name and a main role address.
Subnetwork masks are determined by the netadmin basic configuration.
Adding main role addresses and names for the two Communication Servers updates the hosts file.
When the two Communication Servers are on the same subnetwork, the same name and main role
address must be used for the two Communication Servers.
Example:
Name used when the local CPU role is Main (default is xma001001) ?
Address used when the local CPU role is Main (default is 10.1.1.3) ? 130.24.10.2
Name used when the twin CPU role is Main (default is xmb001001) ?
Address used when the twin CPU role is Main ? 192.14.20.3
• Section 5.3 "Update" is used to modify role addressing.
This also applies to the local and twin Communication Server names and role address(es), in case
of duplicated Communication Servers on a different subnetwork.
Example:
What is your choice ? 3
Name used when the local CPU role is MAIN (default is xma001001) ?
Address used when the local CPU role is MAIN (default is 130.24.10.2) ?
Name used when the twin CPU role is MAIN (default is xmb001001) ?
Address used when the twin CPU role is MAIN (default is 192.40.20.2) ?
• Section 5.4 "Delete" is used to delete the configuration and role addressing.
Note:
A main role CPU address can be assigned even if the CPU is not duplicated.
• Section 6.2 'Add' is used to add a new PPP serial link configuration.
Add a serial link for Internet Protocol over V24 (PPP)
===========================================================
Which device do you want to use for this connection (e.g. /dev/ttyS1,
'q' to cancel this setup) ? /dev/ttyef
To answer the following question, indicate the name of the port of the MOXA unit: In the above
example, ttyef refers to the first port of the first MOXA unit ("ttyef" is the term used at the time of
writing).
WARNING: You should declare a login with mgr (or ttyconf) for this
device. Do you really want to add this device (y/n)? y
Peer interface Internet address (default is 10.253.253.143) ?
Local interface Internet address (default is 10.253.253.142) ? 10.253.253.140
Speed (default is 9600) ?
Do you use a modem (y/n) ? n
Compression (default is y) ?
Do you want to use authentication with CHAP protocol (default is n)
Note:
Local and remote PPP addresses cannot be managed, they are automatically determined by netadmin.
Note:
If the manager chooses to activate CHAP security, he must have previously specified authorized users in the
CHAP menu. Otherwise, the following message is displayed:
"If you want to use authentication, first you must add a CHAP configuration".
Note:
No PPP on console port.
• Section 6.3 'Update' is used to modify the configuration of a serial link of a given port.
• Section 6.4 'Delete' is used to delete the configuration of a serial link.
3.3.7 Tunnel
Section 7. 'Tunnel configuration' is used to access the standard sections (view, add, modify, delete)
for the IP/X25 tunnel.
Note:
If the tunnel was not declared at installation, it cannot be added.
IP/X25 tunnel configuration
====================================
1. Show local tunnel setup
2. Create/update local Tunnel setup
3. Delete local tunnel setup
0. Previous menu
• Section 7.1 'Show local tunnel setup' is used to view the current configuration.
Example:
IP/X25 tunnel setup
=======================
name : x004007_tun
address: 172.30.4.7
netmask: 255.255.0.0
• Section 7.2 'Create/update local Tunnel setup' is used to define/modify the parameters of the
local IP/X25 interface: configure IP address, name. The value of the mask is always 255.255.0.0.
Rarely used: IP/X25 interface addressing must be modified only if it conflicts with client addressing.
The modification must be applied to all network nodes.
• Section 7.3 'Delete local tunnel setup' is used to delete the IP/X25 tunnel interface configuration.
3.3.8 Routing
Section 8. 'Routing' is used to access the standard sections (view, add, modify, delete) for the "default
router" and "static routes".
1. Default router setup
1. View
2. Add/Update
3. Delete
0. Previous menu
2. Static routes
1. View
2. Add/Update
3. Delete
0. Previous menu
Section 8.2.2. 'Add/Update' is used to add or to modify the declaration of a static route.
Example:
8.2 Static routes
========================
1. View
2. Add /Update
3. Delete
0. Previous menu
What is your choice ? 2
Static route setup
==================
It is recommended to modify the /etc/hosts file via Netadmin, since other system files are
simultaneously updated: thus, the user does not have to do this manually.
Viewing hosts (example): the main name appears in the second column, the aliases in the following
columns.
Host name or address (default is all):
127.0.0.1 loopback
10.4.4.40 xa004007 localhost
255.255.255.0 subnetmask
255.255.255.255 broadcastall
10.4.4.45 eva
10.4.4.41 xb004007 twincpu_eth twincpu_best
192.168.2.118 pc118
Section 9.2. 'Aliases' is used to access the standard sections (view, add, modify, delete) for aliases.
Via this section, you can assign an alias to one of the devices belonging to the list of identified devices.
Example:
Alias | Host name | Host address
=======================================
floch | PC118 | 192.168.2.118
In the second case, if the modifications have just been made on the Communication Server currently in
service, the copy will actually be made only after the modifications have been applied. The system
manages this condition and a dialog box ("you have made a modification, please apply") allows the
user who wants to make a copy to apply the modifications made if this has not already been done.
Modifications are immediately applied on the Communication Server.
In the case of a copy from the duplicated Communication Server to the local Communication Server,
the configuration copied is applied only after the "Apply" command is run by the user. The user can
thus modify the configuration copied before applying it.
Caution:
Before making a copy, check that:
• Duplication and role addressing are managed in the same way on both Communication Servers.
• netadmin is not running on the duplicated Communication Server at the time of the transfer.
3.3.11 Security
Important:
To access netadmin security menus, you must be connected to the console port with the "root" account.
Do not access these menus via telnet: the connection will be lost when isolation is activated.
Two examples of security management are described in the chapter on configuration in [14].
• By IP address range: this is particularly useful for IP-Phones if certain address ranges are reserved
for them, see Add/Update a Range of Trusted Hosts on page 97.
• Indirectly, via the DHCP server: the addresses declared on the OmniPCX Enterprise DHCP server
are automatically copied to the trusted hosts, see the chapter on DHCP Server in [7].
• Automatically: the default router declared in menu 1. 'Installation' or 8. 'Routing' is automatically
added to the list of trusted hosts with a 'router' profile.
For addresses that do not belong to the same IP network/subnetwork as the Communication Server,
the router that allows them to be reached must be in the list of trusted hosts. If this is a different router
to the default router, it must therefore be declared.
11.2.Restricted access
======================
1. 'View trusted hosts'
2. 'View associated services'
3. 'Add/Update a trusted host'
4. 'Add/Update a range of trusted hosts'
5. 'Update type of a trusted host'
6. 'Remove trusted hosts'
0. 'Previous menu'
3.3.11.2.1 View Trusted Hosts
Menu 11.2.1 'View trusted hosts' is used to view:
• The stations authorized to connect (via the Ethernet link) that were declared individually.
• IP address ranges.
• The IP addresses free to be assigned, declared on the OmniPCX Enterprise DHCP server.
Example:
IP name | IP address | Gateway IP Name | Type of host
==================================================================
carteGD | 192.168.4.53 | localhost | IP-equipment
ip55 | 192.168.4.55 | localhost | IP-equipment
pabx56 | 192.168.4.56 | localhost | CPU
pcconfig | 192.168.4.29 | localhost | 47xx
<return> to continue.
Range of trusted hosts
First IP address | Last IP address | Gateway IP Name | Type of host
====================================================================
150.122.26.20 | 150.122.26.29 | routeur | IP-equipment
WARNING : the following trusted hosts are DHCP addresses declared by MAO,
they cannot be modified by netadmin.
Range of trusted hosts
First IP address | Last IP address | Gateway IP Name | Type of host
====================================================================
192.168.4.20 | 192.168.4.29 | localhost | IP-equipment
192.168.4.50 | (null) | localhost | IP-equipment
In a duplicated Communication Server configuration, where the two Communication Servers are on
different subnetworks, information about twin Communication Server is also displayed.
Example:
IP name | IP address | Gateway IP Name | Type of host|
==================================================================
router-52 | 192.40.52.254 | localhost | Router |
cb100s025 | 155.132.48.51 | router-52 | CPU |
twin gateway | twindefaultrouter | |
cb100s004 | 155.132.44.24 | router-52 | CPU |
twin gateway | twindefaultrouter | |
3.3.11.2.2 View Associated Services
Menu 11.2.2 'View associated services' is used to view services according to each predefined profile:
• Basic represent available services whatever the security configuration
• SSH disabled indicates available services when SSH is disabled
• SSH enabled indicates available services when SSH is enabled
Select 0 for routers and all external applications that do not correspond the other available profiles
(PRS, OTUC, CC, VMU, and others)
Available services depend on trusted host type. For details of this available services, see [14].
2. Enter the name of the trusted host:
Trusted host's IP name ? pcinstall
3. If the name entered is not in the Communication Server hosts file (see Host Names and Addresses
on page 94), the IP address must be entered:
The name you gave isn't in our hosts database.
Do you want to add it and so give the corresponding address (y/n default is 'n') ? y
Trusted host's IP address ? 192.168.4.29
4. If the IP addresses belong to a different subnetwork than the Communication Server, the name of
the router allowing this subnetwork to be reached must be specified. From R5.1, the default router is
offered as router.
Gateway's IP name ? routeur
Note:
This router must be in the list of trusted hosts, otherwise it will fail to be declared.
5. In a duplicated Communication Server configuration, when the two Communication Servers are on
different subnetworks, a router for the twin Communication Server must be specified.
Example:
Updating a trusted host in a duplicated Communication Server configuration, where one Communication Server is
moved to another subnetwork
Enter the type of the trusted host(s) :
0. Router, SIP gateway, other applications
1. CPU
2. 47xx (management machines)
3. IP equipments (IP-Phone, INTIPA/INTIPB, GD, LIOE...)
4. PC Installer
What is your choice ? 1
Trusted host's IP name ? nemesis
Trusted host's IP address (default is 155.132.20.11?
Gateway's IP name (default is router_A) ? router-supp
Internet address for this name (default is 192.40.20.253) ?
Twin Gateway's IP name (default is router_B) ? router-Twin2
Internet address for this name (default is 130.24.11.254) ?
3.3.11.2.4 Add/Update a Range of Trusted Hosts
Menu 11.2.4 'Add/Update a range of trusted hosts' is used to declare an entire range of IP
addresses as trusted hosts. This may be useful for the IP-Phones if certain address ranges are
reserved for them.
They are declared as follows:
1. Select the type of station according to available profiles:
Enter the type of the trusted host(s) :
0. Router, SIP gateway, other applications
1. CPU
Select 0 for routers and all external applications that do not correspond the other available profiles
(PRS, OTUC, CC, VMU, and others)
2. Enter the first address in the range:
Enter the first address of the range ? 192.168.4.60
3. Enter the last address in the range:
Enter the last address of the range ? 192.168.4.69
4. If the IP address range belongs to a different subnetwork than the Communication Server, the name
of the router allowing this subnetwork to be reached must be specified.
Gateway's IP name ? routeur
Note:
This router must be in the list of trusted hosts, otherwise it will fail to be declared.
5. In a duplicated Communication Server configuration, when the two Communication Servers are on
different subnetworks, a router for the twin Communication Server must be specified.
Twin Gateway's IP name (default is router_B)?
193.122.26.1 | All
193.122.29.165 | Shell Login
193.122.26.233 | FTP Telnet
Menus 11.3.2 'View associated services', 11.3.3 'add a trusted host', 11.3.4 'update type of a
trusted host' and 11.3.5 'remove a trusted host' are identical to those in menu 11.2 'restricted
Ethernet access'. A range of IP addresses cannot be declared. However, menu 2 'add a trusted host'
allows a set of addresses to be declared by entering an incomplete address ending with a period in
“x.y.z.” format.
3.3.11.3.1 Declaring a Device that Can Be Reached by Static Route as Trusted Host
Perform the following steps in the sequence shown:
1. Declare the router for the static route in menu 8.2. 'Static routes'.
2. Declare the router in menu 11.2 'Restricted Ethernet access'.
3. Declare the device to be reached in menu 11.3 'Restricted accesses (Except Ethernet)'.
• Section 11.4.1 "view" is used to view the users authorized to connect via the PPP serial link and
their corresponding password.
A password (maximum length 100 characters) must be associated with each user name.
Example:
Client name | Secret
=========================
DUPOND | lundi
MARTIN | mardi
• Section 11.4.2 "Add/Update" is used to add users to the list.
The questions asked are:
Enter a client name ?
This option has been added due to routing problems being experienced on some systems.
Problem encountered: the Communication Server cannot reach certain remote devices (located on
another IP network).
Enter lowest allowed port (3000 <= port < 32639, default is 10000):: 10000
Enter highest allowed port (10128 < port <= 32767, default is 10499): 10359
The VLAN number must be specified in agreement with the client network administrator.
This VLAN number applies to the virtual INT-IP A boards in the hybrid shelf (19).
For GD and INT-IP B boards, the VLAN number is managed directly on the boards before start-up.
Note:
If 802.1q is used with a VLAN number equal to 0, ensure that the switches do not un-tag datagrams with a VLAN
equal to 0.
For more information on VLAN management, see the chapter on 802.1p/Q and VLAN in [7].
If the license file (*.swk) does not include a CC-suite-ID, you can use the menu 1 to enter the
corresponding CC-suite-ID (for example: 1496B-6F423-302A3-28C85).
If your choice is 2, you can perform FTR to the CCI:
Example:
================== TERMS AND CONDITIONS ==================
I do accept ALE Cloud Connect Terms & Conditions
"(www.enterprise.alcatel-lucent.com/Terms&Conditions) and
commit to inform my customer (y/n).y
Launching FTR ...
FTR Done Successfully
WARNING: Credentials to connect to CCI are not synchronized automatically with TWIN CPU.
Manual synchronization is mandatory for proper functioning of system when CPU changed
ftrtool
has been exited
FTR Details
===========
FTR Status:Registered
Last FTR operation: Success
If your choice is 4, you can perform FTR with a PIN code, which completely resets Cloud Connect
configuration and parameters while the system is still running. This operation can only be performed if
the RTR and FTR services are running on the Communication Server.
Please enter the 6-digit pincode to perform FTR or press 'q' to exit 123456
Launching FTR ...
FTR Done Successfully
WARNING: Credentials to connect to CCI are not synchronized automatically with TWIN CPU.
Maunal Synchronization is mandatory for proper functioning of system when CPU Role is
changed
ftrtool has been exited.
FTR Details
===========
FTR Status: Registered
Last FTR operation: Success
Opening a session results in the creation of a history file. In order to restrict the number of files created,
all management operations for all sessions opened on a given day are recorded in a single file. If a
sessions lasts for more than one day, a new file will not be created: all the operations that result from
the session will be recorded in a single, unique file.
4.1 Introduction
This module exclusively describes the deliberate stop/restart procedure of a Call Server for external
operations (maintenance, etc.).
Note:
the procedure does not take into account any interruption of a Call Server following a power failure, etc.
This procedure is somewhat different depending on the hardware configuration of the site, i.e.:
1. whether the Call Server is located on an Appliance Server (PC type server) or on a CS board,
2. and in this case, whether the CS board is applicative in the Media Gateway or is a controller in the S
rack.
Thus there are three variants:
• the Call Server is embedded on a CS board in a controller position in the S rack. In this case, refer
to Call Server embedded on a CS board in controller position on page 108,
• the Call Server is embedded on a CS board placed in an applicative position in the Media Gateway.
In this case, refer to Call Server embedded on a CS board in applicative position on page 111.
• the Call Server is embedded on an Appliance Server. In this case, refer to Call Server embedded on
an Appliance Server on page 114.
Some of these variants recommend to connect a system console to the CS board or to the Appliance
Server in order to implement them. For this purpose and before initiating any stop procedure of the Call
Server, refer to Connecting a system console on page 107.
CS Board
Appliance Server
System console
VT100 or PC (Hyper Terminal)
S Rack
Media Gateway
(L Rack)
GD
LANX CS
IP Link
CS Board
On/Off button
UNIT 1 UNIT 2 UNIT 3 UP-LINK UNIT 1 UNIT 2 UNIT 3 UP-LINK CPU
Procedure:
1. From the system console, log onto the mtcl account and type shutdown -h now. The -h option
stops the Call Server.
⇒ the board's “Power” LED remains lighted steady green.
⇒ the “CPU” LED flashes 500ms ON / 500ms OFF.
2. Wait until the following message is displayed on the system console's screen: Press any key
to reboot.
⇒ the board's “Power” LED still remains lighted steady green.
⇒ the “CPU” LED flashes 500ms ON / 2s OFF.
3. Press the on/off button of the board (set to off).
⇒ the board's “Power” LED switches to steady red.
4. (if necessary): Remove the cables connected to the front face of the board.
5. (if necessary): Unscrew the board and remove it from the rack.
Remark:
pressing the on/off button before the Any key to reboot message is displayed (during step 2) has no
impact on the Call Server's stop procedure.
Before initiating a CS board stop procedure, check the state of the Call Server. This state is
indicated by the "CPU" LED on the front face of the CS board.
If the Call Server's state is "Main", its interruption will trigger an automatic switch on the Call
Server to "Stand-by" (if this state is present). In this case, see the chapter on Communica-
tion Server duplication in document [1].
.
Procedure:
1. Press the on/off button of the board (set to off).
⇒ the board's “Power” LED switches from steady green to flashing red.
⇒ the “CPU” LED flashes 500ms ON / 500ms OFF.
2. Wait until the following message is displayed on the system console's screen: Press any key
to reboot.
⇒ the “CPU” LED flashes 500ms ON / 2s OFF.
3. (if necessary): Remove the cables connected to the front face of the board.
4. (if necessary): Unscrew the board and remove it from the rack.
Remark:
pressing the Call Server's on/off button during step 2 (before the Any key to reboot message is
displayed) has no impact on the Call Server's stop procedure.
Media Gateway
(L Rack)
LANX CS
CS board concerned by the stop/restart procedure
Board in applicative position
To the customer LAN
CS Board
On/Off button
UNIT 1 UNIT 2 UNIT 3 UP-LINK UNIT 1 UNIT 2 UNIT 3 UP-LINK CPU
Reminder:
throughout the stop phase of the Call Server, take into account the fact that the "Power" LED remains off and that
only the "CPU" LED is significant.
Procedure:
1. From the system console, log onto the mtcl account and type shutdown -h now. The -h option
stops the Call Server.
2. Wait until the following message is displayed on the system console's screen: Press any key
to reboot.
⇒ the “CPU” LED flashes 500ms ON / 500ms OFF.
3. Press the on/off button of the board (set to off).
4. (if necessary): Remove the cables connected to the front face of the board.
5. (if necessary): Unscrew the board and remove it from the rack.
Remark:
pressing the on/off button before the Any key to reboot message is displayed (during step 2) has no
impact on the Call Server's stop procedure.
If the Call Server's state is "Main", its interruption will trigger an automatic switch on the Call
Server to "Stand-by" (if this state is present). In this case, see the chapter on Communica-
tion Server duplication in document [1].
Procedure:
1. Press the on/off button of the board (set to off).
⇒ the “CPU” LED flashes 500ms ON / 500ms OFF.
2. Wait until the following message is displayed on the system console's screen: Press any key
to reboot.
⇒ the “CPU” LED flashes 500ms ON / 2s OFF.
3. (if necessary): Remove the cables connected to the front face of the board.
4. (if necessary): Unscrew the board and remove it from the rack.
Remark:
pressing the on/off button before the Any key to reboot message is displayed (during step 2) has no
impact on the Call Server's stop procedure.
Appliance Server
Media Gateway
(L Rack)
GD
LANX
IP Link
• Check first that the system console is connected to the Appliance Server.
• All throughout the stop phase of the Call Server, take into account the fact that no LED signals the progress;
thus it is important to monitor the Call Server stop procedure from the system console.
Procedure:
1. From the system console, log onto the mtcl account and type shutdown -h now. The -h option
stops the Call Server.
2. Wait until the following message is displayed on the system console's screen: Any key to
reboot.
3. Press the off/on button of the Appliance Server (set to off).
4. (if necessary): Remove the cables connected to the Appliance Server.
5. (if necessary): Unscrew the Appliance Server, then remove it from the rack.
5 Swinst
5.2 Operation
Access and Navigation
On a PC connected to the Communication Server by V24 or IP link, open a session (log on) using the
mtcl account, then enter "swinst", before entering the required password.
Navigation is performed using the keyboard. The desired option is accessed by pressing the keys
shown on screen.
When swinst asks a question, there is no timer for automatic selection of the default option.
When swinst indicates that an item is selected by default, it is not necessary to enter the item.
To stop a current process (scrolling of a file list for example) press Q.
Option 1 Install package from server is reserved for ALE International (as is option 3
Install Linux patch from server).
Option 2 Display package is used to check installation of a specific file.
Example:
Enter the name of the package (return for all) -> swinst
Name : swinst Relocations: (not relocateable)
Version : 2.24.0 Vendor : Alcatel-Lucent
Release : 3oxe Build Date: Wed Jan 30
07:02:39 2008
Install date: Mon Apr 28 10:22:26 2008 Build Host: csbu064
Group : Applications/System Source RPM: swinst-2.50.0-3oxe.src.rpm
Size : 805829 License: Alcatel-Lucent
Packager : xxx.xxxxxxx@col.bsf.alcatel-lucent.fr
Summary : The SoftWare INSTallation package for Alcatel-Lucent
OmniPCX Enterprise
Description : Swinst package is mainly intended for delivery installation, backup
of databases and system maintenance.
Select option 1 Install delivery from server, before entering the address (or name) of the
server and confirming the installation request.
Note:
For server name to be recognized, it must have been previously configured in netadmin.
Caution:
This operation may take some time.
For installation on the active version, the tool offers to "back up" the system, i.e. make a copy of the
binary files used before the installation operation. The resulting backup files can be restored via the
Restore operations menu.
Option 2 About last install deliveries operations gives details about the:
• Last installation of a dynamic patch
• Last installation of a static patch
• Last full installation delivery
(list of files)
Linux and packages are duplicated
Duplicating the network configuration
Duplicate the network configuration in the second Linux version.
Confirm (y/n, default is y):(N4G-apply):
The network configuration is duplicated
Duplicating the Linux data
Building list of files...
Deleting the old files on inactive version...
Duplicating data on inactive version...
(list of files)
The Linux data are duplicated
Duplicating the timezone
Updating timezone ...
The timezone is duplicated
Press return
Note:
This operation can be performed with the telephone running.
Important:
When the switch has been performed, you must log on again with the swinst account before restarting the
telephone.
Select option 3 Cloning & duplicate operations, then option 3 Switch on inactive
version.
The operator must confirm the operation:
Please confirm switching on the inactive version (y/n, default y)
If no Linux has been installed on the "inactive" version, the operation stops. If a telephone application is
installed on the active and "inactive" version, the tool displays the current status of autostart mode:
Before the switch autostart mode is :
Autostart is [not] set
The operator can duplicate this autostart mode on the "inactive" version:
Do you want to keep this autostart mode after switching (y/n, default
y)
Autostart is [not] set on inactive version
When the system is running on the new version and a shutdown occurs before a specified delay, the
system can reboot on the same version or go back to the previous one:
Do you want to switch back to the previous version if system resets
(y/n, default n): y
Enter the delay (1..7 days, q to quit): 1
This feature allows the operator to register a switch at an appointed time in the next 24 hours. The
operator can register a switch, check if a switch is registered or discard a registered switch.
Note:
The Linux data and database are automatically duplicated just before the switch.
Option 1 Backup mao, voice guides and accounting data triggers mao, voice guide and
accounting backup (mao, vg and acc files)
Note:
Dynamic voice messages are automatically backed up, the tool also offers to back up specific voice messages
(custom directory). However, generic and standard voice messages (available on the voice guide CD-ROM) are
not backed up.
Option 3 Backup accounting data, triggers an accounting data backup operation (acc file).
Option 6 Backup traffic history, triggers a traffic analysis backup operation (obstraf file).
Option 7 Backup Acd config & statistic data, triggers a traffic analysis backup operation
(acd file).
Option 8 Backup 4645 data, triggers a 4645 voice mail data backup operation - messages,
mailboxes and greetings (eva-msg file).
Option 9 Backup 4645 data without messages, triggers a 4645 voice mail data backup
operation - except for received messages - (eva file).
Option 11 Backup linux ( unix ) site specifics data, triggers a backup operation of the
cho-dat file (system-specific Linux data).
Note:
OPS file backup operations are managed from option: OPS Configuration on page 124.
5.2.4.1.2 Immediate Backup on Network
Select the data to backup (see: Immediate Backup on CPU Disk on page 120).
Enter the name of the remote Communication Server.
If this name is not declared in the Communication Server host file, enter the IP address of the remote
Communication Server.
When a "backup on network" has been saved, for any new backup of this type, the application offers
the last used address as the default setting.
Example:
Backup on network
your choice ==> 3
Name of remote host (default 192.168.4.52) ->
Name of user on 192.168.4.52 (default swinst) ->
Name of remote file (full path) -> /usr4/BACKUP/save2604
your choice ==>
Starting immediate backup on network
Building list of files...
Stopping the none process...
Backing up of obstraf files...
Example:
Accessing periodic backups
A periodic backup is registered
1 Periodic backup on cpu disk
2 Cancel periodic backup operation
3 List periodic operations
4 About last backup
Q Go back to previous menu
Your choice [1..4, Q] ?
5.2.4.2.1 Periodic Backup on CPU Disk
This option performs periodic backups of the local OmniPCX Enterprise on the local disk.
Select the data to backup and the time for backup operations.
Example:
Space used on cpu disk: 3%
1 Backup mao data for rebuild and
Backup Linux (Unix) site specific data
Q Go back to previous menu
Your choices [1..1, Q] ?
One choice per line and just press "return" to end the selection
your choice ==>1
your choice ==>
Computing the best time for the backup operation (between 0-6 AM)...
The time proposed by the system is 5 hour 45 min
Do you agree with it (y/n, default y): n
At which time do you want to execute the save operation ?
1 - Hours ( between 0-23 ) : 1
2 - Minutes ( between 0-59 ) : 0
***************************************
* Your request is registered
***************************************
Press return
5.2.4.2.2 Canceling Periodic Backup
This option cancels periodic backup operation.
Example:
***************************************
* Your periodic backup is canceled
***************************************
Press return
5.2.4.2.3 List Periodic Backup Operations
This option displays information on periodic backups.
Example:
Hour : 5 Minute : 45
Day of the month : all
Month of the year : all
Day of the week (0=Sunday) : all
executed command : /DHS3bin/soft_install/bin/bck -save 1>/dev/null 2>&1
Backup of "Linux data" performed on "cpu disk"
Backup of "MAO data only" performed on "cpu disk"
Press return
5.2.4.2.4 About Last Backup
This option gives details on the last backup operation (whether immediate or periodic).
Example:
**************************************************
* Last backup operation
**************************************************
For client : For CPU : oxe
backup of Linux-data
for Linux data
to LOC_ARCHIVE
data version : F1.600
in date of Wed Jun 16 15:13:54 CEST 2004
local cpu : oxe
twin cpu : unknown
Periodic backup performed on cpu disk
**************************************************
--------------------------------------------------
Pre backup operation
--------------------------------------------------
Building list of files...
Stopping the none process...
(list of files)
Backup completed
--------------------------------------------------
Post backup operation
--------------------------------------------------
End of backup operation
--------------------------------------------------
Note:
This option can also be accessed from the previous menu.
Depending on the backup operations performed, select a restore operation from the network or the
local hard disk.
5.2.4.3.1 Restore from CPU Disk
The available backups are displayed.
Example:
Space used on cpu disk: 3%
1 Restore from IMMEDIATE backup
2 Restore from FEB 18 backup
3 Restore from FEB 17 backup
4 Restore from FEB 16 backup
5 Restore from FEB 15 backup
6 Restore from FEB 14 backup
7 Restore from FEB 13 backup
Q Go back to previous menu
Your choice [1..7, Q] ?
(list of files)
Archive of old files is created
Restoring data...
(list of files)
Restoration completed
End of restoring data
Do you wish to clean up the archive : get rid of old files (y/n): y
********************************************************
* The restore operation for traffic history, all files
* is completed
********************************************************
Press return
5.2.4.3.3 Clean Immediate Backups on CPU Disk
Select the data to be cleaned.
Clean IMMEDIATE backups Installation FACILITIES 2.36.0
If you make a mistake, enter n (for no) before pressing the "Return" key.
5.2.6.1.3 NTP server management
The NTP server allows to synchronize time with a reference clock. For more information on NTP
configuration, see Configuration procedure section on Network Time Protocol (NTP) in document [7].
If autostart is enabled (set to "Yes") then, in the case of a duplicated Communication Server, it is also set to "Yes"
(automatically) on the Stand-by Communication Server. However if set to "No" on the Main Communication Server,
it has to be manually disabled on the Stand-by Communication Server.
If you want to correct the delay, enter n (for "No") and repeat the actions.
For more information on Communication Server startup and shutdown, see the Communication Server
Stop/Restart Procedure on page 107.
• direct: the link between the CPU and the console is a simple V24 cable.
• modem: the console is far away from the CPU, the serial link is transmitted via a commutated line
with modem. Kernel messages are transmitted to the console.
• ppp: instead of character, the modem line, linked to the console with a modem, transmits data
packets. Kernel messages are not transmitted to the console.
• ups: the serial port is used to drive an UPS system.
• ?: provides help about the configuration.
(1) This line gives the main UPS status: start or stop.
5.2.6.5.2 Start UPS on USB
This option starts a UPS monitoring process via a USB port.
The UPS device must allow USB connections. For UPS configuration, see the UPS manufacturer
documentation.
Caution:
To take into account this new configuration (port COM to port USB), reboot the Communication Server and
the UPS:
1. Stop the Appliance Server
2. Stop UPS with the front panel ON/OFF button
3. Disconnect the UPS from the mains supply
4. Wait for the fan to stop
5. Connect the UPS to the mains supply
6. Restart the UPS with the front panel ON/OFF button
7. Restart the Appliance Server
5.2.6.5.3 Stop UPS
This option stops the UPS monitoring process.
5.2.6.5.4 UPS Status
This option checks the connection between the Appliance Server and UPS and details UPS status.
Example:
battery.charge: 100 (1)
battery.runtime: 13524 (2)
battery.voltage: 2.3 (3)
driver.name: hidups (4)
driver.parameter.port: /dev/usb/hiddev0 (5)
driver.version: 2.0.0 (6)
ups.load: 14 (7)
ups. MGE UPS SYSTEMS (8)
ups.model: EXtreme (9)
Press return
Note:
Prior to R11.2, the minimum length for shared secret was 8 characters. As of R11.2, the minimum length for
shared secret is changed to 4 characters. If users prefer a shared secret with length less than 8 characters,
a warning message is displayed:
Less than 8 characters for shared secret is not compliant with security
standards. Manufacturer disclaims all liabilities in case of misuses
due to low level of security. Do you really want to continue? (y/n,
default y): y
If users accept the warning message, the shared secret is accepted.
The timeout feature checks responses to the Radius requests. When the timer expires, the
Radius server is declared not reachable.
If the server is being modified, the default value is set to the current one. The current value of the
shared secret is not displayed for security reasons. The shared secret must be entered each
time a modification is performed.
c. Delete RADIUS server : allows to delete a Radius server.
d. View RADIUS users: displays the corporate login list
Example:
Login: john Account: mtcl
Login: william Account: root
Press return
In this example, user john can open a session with mtcl rights.
e. Add/Modify RADIUS user: allows to create or modify a corporate login
Example:
Enter the RADIUS user (eg: Peter SMITH): tom
Enter the system user (root, swinst, mtcl, adfexc, client): mtcl
Note : If primary and secondary RADIUS servers are unreachable for any
reason, it can be allowed to the administrator to access the system and
modify the configuration if this is the origin of the problem. Default
behavior is to forbid local database authentication.
Note:
Creation of a new database may take some time.
Restart the Communication Server after this operation (and before restarting the telephone).
Option 1 System release identity gives the Linux version used by the system.
Option 2 Application software identity gives the telephone version used by the system.
Option 3 Delivery status gives the version of software firmware and modules.
Option 4 Component status gives the version of a module found by performing a search on a
keyword.
Example:
Enter the component name : bios
bios_cpu5 from /twdhs3/col_int/ws/r_bios_cpu5_4.0_3BA20032ADAB01 delivered
in e2.400
bios_cpu5d from /twdhs3/col_int/ws/r_bios_cpu5_4.0_3BA20032ADAB01 delivered
in e2.400
bios_cpu6 from /twdhs3/col_int/ws/r_bios_cpu6_2.4_3BA24084AAAA04 delivered
in d1.305
bios_cpu6d from /twdhs3/col_int/ws/r_bios_cpu6_2.4_3BA24084AAAA04 delivered
in d1.305
new bios_cpu6s2 from /twdhs3/sxb_int/ws/r_bios_cpu6s2_3BA24095AAAB03_4.6
bios_cpu7 from /twdhs3/sxb_int/ws/r_bios_cpu7_3BA24115AAAA13_2.16 delivered
in f2.500
new ch_cpbios from /twdhs3/col_int/ws/r_f3.301
Press return
Option 5 System release validity checking checks package versions (no CRC check). Some
packages are only loaded on certain CPUs. The results of the command specify which packages are
not installed.
Option 6 Application software validity checking checks telephone version by size and
checksum.
Note:
This operation may take some time (a few minutes).
Note:
Although some files can be modified, neither binaries nor executables should be modified.
Example:
Your choice [1..6, Q] ? 6
Please wait ..
Checking mode : 1=size & sum 2=size only (default is 1) 1
Checking size and sum of all files , please wait ...
file modified (authorized) : /DHS3data/afe/params.cfg checksum is not correct :
The application software is correct
Press return
6.1 Overview
6.1.1 Overview
The incident and alarm management service is activated at the OmniPCX Enterprise PCX startup.
The incident management service consists of:
• Collecting and saving a large number of incidents on the CPU hard drive,
• Displaying incidents on a screen or a printer,
• Reporting incidents to the RMA system,
• Transmitting incidents to one or more supervisors in the form of SNMP traps (see the Overview on
page 145),
• Centralizing incidents on a master node (when appropriate).
An alarm can be associated with an RMA operation or the ringing of an alarm station. One or more
analog sensors (dry contact type) can be connected to analog devices, thus allowing events external to
the PCX to be detected (for example, a fire).
The incident and alarm management service helps to perform a diagnosis and determine the actions
necessary to restore maximum OmniPCX Enterprise performance.
The following figure illustrates the incident and alarm management service.
External
Alarms
Alcatel-Lucent OmniPCX Z
Enterprise Communication
Server
OmniPCX 4400
Process call, Internal devices
External alarms
IO1,
CPL,... Z or UA Alarm set
fault
Systen
CPU alarm relay management
terminal
Potential
incident
Automatic
RMA call Modem
Public
network
Supervisor
Information text
Incident number
Level of severity
Equipment number
US=1, other=0
Board position
Crystal number
M: incident from the main CPU
S: incident from the back-up CPU
I: incident from the local CPU, whose
function has not yet been detected.
N : number of the source node of the incident (on 6 digits)
Incident time (hh=hour, mn=minute, ss=second)
Note:
The incident storage is the same locally as at the network level, except for the outfall queue which is not
implemented for the network incidents.
The following figure illustrates how incidents are managed.
Session
Start
file
Main queue
Incident
Incidents
dispatch
Outfall queue
To manage the incident management system, you need to configure the following parameters, using
the inconf command:
• logrotate size and logrotate count,
• crontab delay between two logrotate calls,
• number of incidents in the session start file,
• number of backup sessions,
• thresholds of the incident flow redirection.
For more information on how to configure the parameter values of the incident management system
with the inconf command, see Operation on page 45.
For more information on how to view incidents with the incvisu command, see Operation on page 48.
Statistics (number of incidents by severity level and by type of incident) are saved in the files
counter.txt and counters1.txt. These two files concern incidents sent since the last reset and
incidents sent between the reset before last and the last reset respectively. These counters can be
viewed using the inccpt command (see Operation on page 44).
Indeterminate
Critical
Major The first counters indicate the number of incidents for
Minor each severity level
Warning
Cleared
V24 No. : Enter the number of the port for real-time display.
Remark:
Port number can be temporarily modified using the incout
command but this command does not modify the value managed
in MAO.
RMA Network : Yes: network incidents are sent to the local RMA (or e-
RMA).
Display Severity : Minimum severity from which incidents are displayed in re-
al-time:
• None (no incidents are displayed)
• Critical
• Major
• Minor
• Informational
• Indeterminate
• Clear (all incidents are displayed)
Storage Severity : Minimum severity from which incidents are stored on the
CPU hard drive.
Network Severity : Minimum severity from which incidents are reported to the
main node (to be managed on supervised nodes).
Network Incident Display Se- : Minimum severity from which incidents from other network
verity nodes are displayed in real time (to be managed on the
main node).
Network Incident Storage Se- : Minimum severity from which incidents from other network
verity nodes are stored on the CPU hard drive (to be managed on
the main node).
Topological Incident Display : Yes: local and network topological animation incidents are
displayed.
Topological Incident Storage : Yes: local and network topological animation incidents are
stored.
Topological Network : Yes: local topological incidents are reported to the main
node (to be managed on supervised nodes).
For each of these incidents, configuring (setting) the default RMA results in creation of an instance of
the Incident Filter object with the following attribute settings:
The list of incidents to be reported via the network by default is activated when the empty database is
created. To deactivate it, select Delete Network incident Default. To reactivate it, select Set Network
incident Default.
The incidents concerned are:
275 276 310 311 1099 1100 1302 1307 1510 1521
1522 1542 1650 1651 1660 1661 1662 1663 1721 1722
2009 2011 2017 2019 2042 2043 2048 2049 2059 2071
2073 2081 2112 2119 2140 2141 2167 2168 2170 2463
2464 2465 2466 2467 2468 2470 2471 2472 2473 2474
2615 2663 2665 2666 2680 2681 2682 2700 2826 2827
3714 3768 4017 4018 4019 4023 4115 4116 4117
For each incident in the list, activating the list results in creation of an instance of the Incident Filter
object with the Network Incident attribute set to "Yes".
Filter ID
Network Number :
Node No. :
ACT shelf Number : These attributes identify the origin of the incident (en-
Board Number : ter -1 for parameters that must not be used).
Behind US :
Set Address :
Disk Storage : Yes: the incident is saved on the CPU hard drive.
Set Type : Select: Analog. The "dry contact" sensor replace a stand-
ard analog set.
Routing Table : Depending on the severity you want to assign to the inci-
dent transmitted, select the corresponding value, N. N
must be selected from the following ranges:
• 1 to 24, severity level: Warning.
• 25 to 49, severity level: Minor.
• 50 to 74, severity level: Major.
• 75 to 100, severity level: Critical.
Remark:
The number of the incident transmitted is 1100 + N.
6.3 Operation
6.3.1 Incident management service operation
Incident management service features can be accessed from the system terminal (VT100) under the
mtcl account, via a certain number of commands.
The commands are as follows:
• cplalrm: allows network board (PRA, BPRA, etc.) alarm counters to be output (see Operation on
page 36),
• inccpt: allows the number of incidents output by level of severity to be obtained (see Operation on
page 44),
• increset: allows the incident files to be reset (see Operation on page 47) ,
• incvisu: allows stored local node incidents to be displayed (see Operation on page 48),
• netvisu: allows incidents on different network nodes, stored in the main node, to be displayed (see
Operation on page 74),
• excvisu : allows backtraces to be displayed (see Operation on page 43),
• alarmrel: allows alarm relay status and history log of incidents that modified relay status to be
displayed; allows the alarm relay to be activated or deactivated (see Operation on page 34),
• alarmrel off: allows the alarm relay to be deactivated (see Operation on page 34),
• inconf: allows default incident management parameter values to be modified (see Operation on
page 45),
• incout: allows the port on which incidents are edited on-line to be selected (see Operation on page
47),
• incinfo: allows a full definition and description of an incident to be obtained (see Operation on page
44),
• incstop: allows incident on-line output to be stopped (see Operation on page 48),
• incstart: allows incident on-line output to be restarted (see Operation on page 48).
7 SNMP Management
7.1 Overview
7.1.1 Overview
The standard SNMP (Simple Network Management Protocol) allows the OmniPCX Enterprise to be
supervised by a network management platform, referred to as the SNMP supervisor in this document.
The OmniPCX Enterprise and e-Reflexes sets are compatible with the SNMP protocol.
TSC-IP and e-Reflexes set host an SNMP agent that returns the phone IP configuration.
The Com Server also hosts an SNMP agent and can process SNMP TRAPS to the SNMP supervisor
to alert the network manager.
SNMP exchanges are performed on the UDP ports 161 and 162 of the IP piece of equipment.
• As of R7.1, the community names "public" and "private" are forbidden when the SNMP version of the PCX
SNMP agent is SNMPv2c (see: Declaring SNMP Agent Running on the Com Server on page 154).
• The community name is not used when the SNMP version of the PCX SNMP agent is SNMPv3.
• Access
Only read accesses are allowed (Get and Get-next requests). No write access can be performed
(Set request).
• 802.1 p/q VLAN tagging is enabled on Com Server
SNMP requests may be tagged or not. Current VLAN value is used. Null priority (low priority) is
always used in 802.1 tags for outgoing SNMP packets.
• Provide an encryption process for SNMP PDUs (Protocol Data Unit) (see RFC 3412). To cipher the
SNMP PDUs, SNMP supervisors must have a SNMPv3 passphrase declared in OmniPCX
Enterprise configuration (see: Declaring Supervisors on page 154) as well as the SNMP agent (see:
Declaring SNMP Agent Running on the Com Server on page 154)
Within the OmniPCX Enterprise, the SNMPv3 use is incompatible with versions SNMPv1 and
SNMPv2c. The OmniPCX Enterprise cannot restrict access to a range of specific MIB information. This
implies that all MIB information must be restricted in the OmniPCX Enterprise environment. Only one
SNMP version is available on the OmniPCX Enterprise at the same time (for SNMP agents and SNMP
traps sending).
Note:
The MIB information which can be queried and set by SNMP supervisors are described in MIB-II (Management
Information Base Version 2) defined in RFC 1213. There is no additional MIB information available (neither VoIP
specific nor proprietary variables) in SNMP agents running in TSC-IP or e-Reflexes sets.
root
iso (1)
org (3)
dod (6)
internet (1)
Standard Branch
alcatel (637)
pbxState (2) Indicates the highest severity level of the incidents registered in
the OmniPCX Enterprise. Available values are:
• INDETERMINATE (0)
• CRITICAL (1)
• MAJOR (2)
• MINOR (3)
• WARNING (4)
• NORMAL (5)
Note:
The SNMP Trap licensing lock is required to retrieve values from an
external application.
pbxRole (4) Indicates the PCX role. Available values are: INDETERMINATE
(0), MAIN (1), STAND-BY (2), ACTIVE_PCS (3) or INAC-
TIVE_PCS (4) where:
• MAIN and STAND-BY values are used to indicate the Com
Server role
• ACTIVE_PCS and INACTIVE_PCS values are used to indicate
the Passive Communication Server (PCS) status
Note:
The INDETERMINATE value is not sent in response to an SNMP request
when the corresponding SNMP agent is not started
sipRegSets (5) Indicates the number of SIP terminals registered in the PCX, as
well as SIP terminals not defined in PCX configuration (provided
that authentication is not required for SIP terminal registration)
sipUnregSets (6) Indicates the number of SIP terminals not registered in the PCX.
This counter is equal to the number of SIP terminals configured in
the PCX minus the number of SIP terminals registered in the PCX.
If authentication is not required for SIP terminal registration, this
counter may be negative (when there are more self registered SIP
terminals than SIP terminals configured in the PCX).
confAvailable (2) (1) Indicates the number of available conference circuits (in service
and not busy)
confOutOfOrder (4) (1) Indicates the number of conference circuits out of service
dspRessAvailable (5) Indicates the number of available DSP resources (i.e. compres-
(2) sors)
dspRessOverrun (8) (2) Indicates the number of unsuccessful requests for free compres-
sors due to insufficient PCX resources. Every time a compressor
cannot be provided by the PCX (for lack of resource), this counter
increases by 1.
On Com Server start-up or when a Com Server switchover occurs,
this counter is reset to 0.
CacOverrun (11) (2) Indicates the number of Call Admission Control (CAC) overrun: ev-
ery time a communication is not allowed by CAC counters, this
counter increases by 1.
On Com Server start-up or when a Com Server switchover occurs,
this counter is reset to 0.
This counter is not configured if the number of allowed external
communications is unlimited (no control, value: -1)
(1):These parameters take into account all conferences (regardless of their type and size) but not
three-party conferences
(2):
These parameters can also be checked from the cnx dom command used to display information
on IP telephony domains, with the following correspondences:
CacAllowed allowed
CacUsed used
These additional objects are only available when the Com Server takes the Main role. When a Stand-
by Com Server or Passive Communication Server (PCS) take over, the only available object (as soon
as the SNMP agent is started) is: pbxRole
When a Com Server receives a request from an external application for one of these additional objects:
• If the request applies to the pbxRole object, the Com Server answers the request
• If the request applies to another additional objects, the Com Server only answers when it takes the
Main role. A Com Server being started (telephone feature not started), or Stand-by Com Server and
PCS (in active or inactive mode) cannot provide information on these objects
SNMPv2c Yes No No
SNMPv3 Yes No No
• Of the Communication Server, see: Declaring SNMP Agent Running on the Communication
Server on page 154
• Of e-Reflexes sets: a contact number can be entered in e-Reflexes set domain parameters, see:
Configuring Contact Directory Numbers of SNMP Agents Running on e-Reflexes Sets on page
156
Note:
The SNMP Engine ID that must be used for SNMP supervisor configuration is given: Declaring SNMP Agent
Running on the Communication Server on page 154.
SNMPv3 User name Enter the SNMP agent login name required for authen-
tication with an SNMP supervisor (this attribute is not
mandatory). The length of this value cannot exceed 64
characters
SNMPv3 User password Enter the SNMP agent password required for authenti-
cation with a SNMP supervisor (this attribute is manda-
tory). The length of this value must be higher or equal
to 8 characters and cannot exceed 64 characters.
Caution:
It is recommended to enter a minimum of 16 characters.
SNMPv3 Cypher Passphrase Enter the passphrase required for SNMP PDUs en-
cryption (this attribute is mandatory). The length of this
value must be higher or equal to 8 characters and can-
not exceed 64 characters
3. Confirm your entries
SNMP
Severity Select the level of severity from which local node inci-
dents are transmitted as SNMP traps.
To deactivate (or activate) the list, select Applications > Incident manager, then:
• For SNMP Incident, select Delete SNMP Default (or Set SNMP Default)
• For Network Incident, select Delete Network incident Default (or Set Network incident Default)
For each incident in the list, activating the list results in creation of an instance of the Incident Filter
object with the SNMP Incident attribute and/or Network Incident attribute set to "Yes".
Language Select:
• United Kingdom (English)
• France (French)
3. Confirm your entries
SNMP Version Select the SNMP version used by the SNMP agent
among:
• V1: corresponds to the SNMPv1 version
• V2: corresponds to the SNMPv2c version (default
version)
• V3: corresponds to the SNMPv3 (available as of
R7.1)
Note:
The default version is SNMPv2c to avoid problems with the
SNMP supervisors already configured in previous releases.
If the default version had been SNMPv3, existing SNMP
supervisors would not be operational for the SNMP service
anymore.
SNMP Agent
Start SNMP agent Select Enable (or Disable) to activate (or deactivate)
the SNMP agent
engine ID built from The engine ID is processed either from the Node
name or from Custom data read from the field en-
gine ID custom data
engine ID custom data If Custom Data is selecte above, this indicate a string
value to build the engine ID
3. Confirm your entries
New parameters are displayed when the Start SNMP agent attribute is set to Enable:
Severity
7.3.8.2 Configuring Contact Directory Numbers of SNMP Agents Running on e-Reflexes Sets
The IP domain fields have a Contact Number field. This number is sent to the e-Reflexes sets in the
domain to be saved in their MIB at the location system.sysContact.0. The system.sysContact.
0 field is located in system entries of their MIB (see: ).
1. Select: IP > IP Domain
2. Review/modify the following attributes:
Contact Number The directory number entered is sent to e-Reflexes sets and allows
the SNMP field system.sysContact.0 of their MIB to be comple-
ted
3. Confirm your entries
7.4 Operation
7.4.1 snmpget Tool
This tool can be used to query any SNMP device reachable by the Com Server to retrieve information
on a specific MIB object.
Syntax: snmpget <SNMP version> <hostname> <community> <access path to the
object to monitor>
Example:
Chorus> snmpget –v2c localhost public system.sysContact.0
system.sysContact.0 = "Me mail:Someone@Somewhere.net tel:(+33)
00.00.00.00.00"
OID : nmcProxyAgent.cmipEventArg.objectClass.baseClass.0
value : 23
The value 89 of rdnl.classIdl corresponds to an OmniPCX Enterprise node, rdln.rdnValue1 gives its
name “node2”.
OID : nmcProxyAgent.cmipEventArg.objectInstance.rdnValues.rdn2.classId2.0
value: 29
OID : nmcProxyAgent.cmipEventArg.objectInstance.rdnValues.rdn2.rdnValue2.0
value: “0”
The value 29 of rdn2.classId2 correspond to an OmniPCX Enterprise board shelf which has a
number rdn2.rdnValue2=0.
OID : nmcProxyAgent.cmipEventArg.objectInstance.rdnValues.rdn3.classId3.0
value: 23
OID : nmcProxyAgent.cmipEventArg.objectInstance.rdnValues.rdn3.rdnValue3.0
value : ”9”
The value 23 of the rdn3.classld3 index which is at the end of OID corresponds to an OmniPCX
Enterprise board which has a number rdn3.rdnValue3=9.
• eventTime
OID : nmcProxyAgent.cmipEventArg.eventTime.0
value : ”19971014102633”
The date at which the alarm is detected on the managed node is October 14th 1997 at 10h26mn.
33s.
• eventType
OID : nmcProxyAgent.cmipEventArg.eventType.0
value : 4
OID : nmcProxyAgent.cmipEventArg.notificationId.0
value : 2042
mib-2
mib-2.system
mib-2.interfaces
mib-2.at
mib-2.ip
mib-2.icmp
mib-2.tcp
mib-2.udp
mib-2.transmission
mib-2.snmp
mib-2.host
system
system.sysDescr
system.sysUpTime
system.sysContact
system.sysName
system.sysLocation
system.sysServices
system.sysORLastChange
system.sysORTable
system.sysORTable.sysOREntry
system.sysORTable.sysOREntry.sysORID
system.sysORTable.sysOREntry.sysORDescr
system.sysORTable.sysOREntry.sysORUpTime
interfaces
interfaces.ifNumber
interfaces.ifTable
interfaces.ifTable.ifEntry
interfaces.ifTable.ifEntry.ifIndex
interfaces.ifTable.ifEntry.ifDescr
interfaces.ifTable.ifEntry.ifType
interfaces.ifTable.ifEntry.ifMtu
interfaces.ifTable.ifEntry.ifSpeed
interfaces.ifTable.ifEntry.ifPhysAddress
interfaces.ifTable.ifEntry.ifAdminStatus
interfaces.ifTable.ifEntry.ifOperStatus
interfaces.ifTable.ifEntry.ifInOctets
interfaces.ifTable.ifEntry.ifInUcastPkts
interfaces.ifTable.ifEntry.ifInErrors
interfaces.ifTable.ifEntry.ifOutOctets
interfaces.ifTable.ifEntry.ifOutUcastPkts
interfaces.ifTable.ifEntry.ifOutDiscards
interfaces.ifTable.ifEntry.ifOutErrors
interfaces.ifTable.ifEntry.ifOutQLen
interfaces.ifTable.ifEntry.ifSpecific
7.6.3.3 AT Entries
at
at.atTable
at.atTable.atEntry
at.atTable.atEntry.atIfIndex
at.atTable.atEntry.atPhysAddress
at.atTable.atEntry.atNetAddress
7.6.3.4 IP Entries
ip
ip.ipForwarding
ip.ipDefaultTTL
ip.ipInReceives
ip.ipInHdrErrors
ip.ipInAddrErrors
ip.ipForwDatagrams
ip.ipInUnknownProtos
ip.ipInDiscards
ip.ipInDelivers
ip.ipOutRequests
ip.ipOutDiscards
ip.ipOutNoRoutes
ip.ipReasmTimeout
ip.ipReasmReqds
ip.ipReasmOKs
ip.ipReasmFails
ip.ipFragOKs
ip.ipFragFails
ip.ipFragCreates
ip.ipAddrTable
ip.ipAddrTable.ipAddrEntry
ip.ipAddrTable.ipAddrEntry.ipAdEntAddr
ip.ipAddrTable.ipAddrEntry.ipAdEntIfIndex
ip.ipAddrTable.ipAddrEntry.ipAdEntNetMask
ip.ipAddrTable.ipAddrEntry.ipAdEntBcastAddr
ip.ipRouteTable
ip.ipRouteTable.ipRouteEntry
ip.ipRouteTable.ipRouteEntry.ipRouteDest
ip.ipRouteTable.ipRouteEntry.ipRouteIfIndex
ip.ipRouteTable.ipRouteEntry.ipRouteMetric1
ip.ipRouteTable.ipRouteEntry.ipRouteNextHop
ip.ipRouteTable.ipRouteEntry.ipRouteType
ip.ipRouteTable.ipRouteEntry.ipRouteProto
ip.ipRouteTable.ipRouteEntry.ipRouteMask
ip.ipRouteTable.ipRouteEntry.ipRouteInfo
ip.ipNetToMediaTable
ip.ipNetToMediaTable.ipNetToMediaEntry
ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaIfIndex
ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaPhysAddress
ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaNetAddress
ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaType
ip.ipRoutingDiscards
icmp
icmp.icmpInMsgs
icmp.icmpInErrors
icmp.icmpInDestUnreachs
icmp.icmpInTimeExcds
icmp.icmpInParmProbs
icmp.icmpInSrcQuenchs
icmp.icmpInRedirects
icmp.icmpInEchos
icmp.icmpInEchoReps
icmp.icmpInTimestamps
icmp.icmpInTimestampReps
icmp.icmpInAddrMasks
icmp.icmpInAddrMaskReps
icmp.icmpOutMsgs
icmp.icmpOutErrors
icmp.icmpOutDestUnreachs
icmp.icmpOutTimeExcds
icmp.icmpOutParmProbs
icmp.icmpOutSrcQuenchs
icmp.icmpOutRedirects
icmp.icmpOutEchos
icmp.icmpOutEchosReps
icmp.icmpOutTimestamps
icmp.icmpOutTimestampsReps
icmp.icmpOutAddrMask
icmp.icmpOutAddrMaskReps
tcp
tcp.tcpRtoAlgorithm
tcp.tcpRtoMin
tcp.tcpRtoMax
tcp.tcpMaxConn
tcp.tcpActiveOpens
tcp.tcpPassiveOpens
tcp.tcpAttemptFails
tcp.tcpEstabResets
tcp.tcpCurrEstab
tcp.tcpInSegs
tcp.tcpOutSegs
tcp.tcpRetransSegs
tcp.tcpConnTable
tcp.tcpConnTable.tcpConnEntry
tcp.tcpConnTable.tcpConnEntry.tcpConnState
tcp.tcpConnTable.tcpConnEntry.tcpConnLocalAddress
tcp.tcpConnTable.tcpConnEntry.tcpConnLocalPort
tcp.tcpConnTable.tcpConnEntry.tcpConnRemAddress
tcp.tcpConnTable.tcpConnEntry.tcpConnRemPort
tcp.tcpInErrs
tcp.tcpoutRsts
udp
udp.udpInDatagrams
udp.udpNoPorts
udp.udpInErrors
udp.udpOutDatagrams
udp.udpTable
udp.udpTable.udpEntry
udp.udpTable.udpEntry.udpLocalAddress
udp.udpTable.udpEntry.udpLocalPort
transmission
snmp
snmp.snmpInPkts
snmp.snmpOutPkts
snmp.snmpInBadVersions
snmp.snmpInBadCommunityNames
snmp.snmpInBadCommunityUses
snmp.snmpInASNParseErrs
snmp.snmpInTooBigs
snmp.snmpInNoSuchNames
snmp.snmpInBadValues
snmp.snmpInReadOnlys
snmp.snmpInGenErrs
snmp.snmpInTotalReqVars
snmp.snmpInTotalSetVars
snmp.snmpInGetRequests
snmp.snmpInGetNexts
snmp.snmpInSetRequests
snmp.snmpInGetResponses
snmp.snmpInTraps
snmp.snmpOutTooBigs
snmp.snmpOutNoSuchNames
snmp.snmpOutBadValues
snmp.snmpOutGenErrs
snmp.snmpOutGetRequests
snmp.snmpOutGetNexts
snmp.snmpOutSetRequests
snmp.snmpOutGetResponses
snmp.snmpOutTraps
snmp.snmpEnableAuthenTraps
host
host.hrSystem
host.hrSystem.hrSystemUptime
host.hrSystem.hrSystemDate
host.hrSystem.hrSystemInitialLoadDevice
host.hrSystem.hrSystemInitialLoadParameters
host.hrSystem.hrSystemNumUsers
host.hrSystem.hrSystemProcesses
host.hrSystem.hrSystemMaxProcesses
host.hrStorage
host.hrStorage.hrMemorySize
host.hrStorage.hrStorageTable
host.hrStorage.hrStorageTable.hrStorageEntry
host.hrStorage.hrStorageTable.hrStorageEntry.hrStorageIndex
host.hrStorage.hrStorageTable.hrStorageEntry.hrStorageType
host.hrStorage.hrStorageTable.hrStorageEntry.hrStorageDescr
host.hrStorage.hrStorageTable.hrStorageEntry.hrStorageAllocationUnits
host.hrStorage.hrStorageTable.hrStorageEntry.hrStorageSize
host.hrStorage.hrStorageTable.hrStorageEntry.hrStorageUsed
host.hrStorage.hrStorageTable.hrStorageEntry.hrStorageAllocation
Failures
host.hrDevice
host.hrDevice.hrDeviceTypes
host.hrDevice.hrDeviceTable
host.hrDevice.hrDeviceTable.hrDeviceEntry
host.hrDevice.hrDeviceTable.hrDeviceEntry.hrDeviceIndex
host.hrDevice.hrDeviceTable.hrDeviceEntry.hrDeviceType
host.hrDevice.hrDeviceTable.hrDeviceEntry.hrDeviceDescr
host.hrDevice.hrDeviceTable.hrDeviceEntry.hrDeviceID
host.hrDevice.hrProcessorTable
host.hrDevice.hrProcessorTable.hrProcessorEntry
host.hrDevice.hrProcessorTable.hrProcessorEntry.hrProcessorFrwID
host.hrDevice.hrProcessorTable.hrProcessorEntry.hrProcessorLoad
host.hrDevice.hrNetworkTable
host.hrDevice.hrNetworkTable.hrNetworkEntry
host.hrDevice.hrNetworkTable.hrNetworkEntry.hrNetworkIfIndex
host.hrDevice.hrDiskStorageTable
host.hrDevice.hrDiskStorageTable.hrDiskStorageEntry
host.hrDevice.hrDiskStorageTable.hrDiskStorageEntry.hrDisk
StorageAccess
host.hrDevice.hrDiskStorageTable.hrDiskStorageEntry.hrDisk
StorageMedia
host.hrDevice.hrDiskStorageTable.hrDiskStorageEntry.hrDisk
StorageRemovable
host.hrDevice.hrDiskStorageTable.hrDiskStorageEntry.hrDisk
StorageCapacity
host.hrDevice.hrPartitionTable
host.hrDevice.hrPartitionTable.hrPartitionEntry
host.hrDevice.hrPartitionTable.hrPartitionEntry.hrPartitionIndex
host.hrDevice.hrPartitionTable.hrPartitionEntry.hrPartitionLabel
host.hrDevice.hrPartitionTable.hrPartitionEntry.hrPartitionID
host.hrDevice.hrPartitionTable.hrPartitionEntry.hrPartitionSize
host.hrDevice.hrPartitionTable.hrPartitionEntry.hrPartitionFSIndex
host.hrDevice.hrFSTable
host.hrDevice.hrFSTable.hrFSEntry
host.hrDevice.hrFSTable.hrFSEntry.hrFSIndex
host.hrDevice.hrFSTable.hrFSEntry.hrFSMountPoint
host.hrDevice.hrFSTable.hrFSEntry.hrFSRemoteMountPoint
host.hrDevice.hrFSTable.hrFSEntry.hrFSType
host.hrDevice.hrFSTable.hrFSEntry.hrFSAccess
host.hrDevice.hrFSTable.hrFSEntry.hrFSBootable
host.hrDevice.hrFSTable.hrFSEntry.hrFSStorageIndex
host.hrDevice.hrFSTable.hrFSEntry.hrFSLastFullBackupDate
host.hrDevice.hrFSTable.hrFSEntry.hrFSLastPartialBackupDate
host.hrSWRun.hrSWRunTable
host.hrSWRun.hrSWRunTable.hrSWRunEntry
host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunIndex
host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName
host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunID
host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunPath
host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunParameters
host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunType
host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunStatus
host.hrSWRunPerf.hrSWRunPerfTable
host.hrSWRunPerf.hrSWRunPerfTable.hrSWRunPerfEntry
host.hrSWRunPerf.hrSWRunPerfTable.hrSWRunPerfEntry.hrSWRunPerfCPU
host.hrSWRunPerf.hrSWRunPerfTable.hrSWRunPerfEntry.hrSWRunPerfMem
Note:
Host is normally not supported with ucd-snmp 4.2.4. Implementation added by ALE International.
snmpV2
snmpV2.snmpModules
snmpV2.snmpModules.snmpFrameworkMIB
snmpFrameworkMIB.snmpFrameworkMIBObjects
snmpFrameworkMIB.snmpFrameworkMIBObjects.snmpEngine
snmpFrameworkMIB.snmpFrameworkMIBObjects.snmpEngine.snmpEngineID
snmpFrameworkMIB.snmpFrameworkMIBObjects.snmpEngine.snmpEngineBoots
snmpFrameworkMIB.snmpFrameworkMIBObjects.snmpEngine.snmpEngineTime
snmpFrameworkMIB.snmpFrameworkMIBObjects.snmpEngine.snmpEngineMax
MessageSize
snmpV2.snmpModules.snmpMPDMIB
snmpMPDMIB.snmpMPDMIBObjects
snmpMPDMIB.snmpMPDMIBObjects.snmpMPDStats
snmpMPDMIB.snmpMPDMIBObjects.snmpMPDStats.snmpUnknownSecurityModels
snmpMPDMIB.snmpMPDMIBObjects.snmpMPDStats.snmpInvalidMsgs
snmpMPDMIB.snmpMPDMIBObjects.snmpMPDStats.snmpUnknownPDUHandlers
snmpV2.snmpModules.snmpTargetMIB
snmpTargetMIB.snmpTargetObjects
snmpTargetMIB.snmpTargetObjects.snmpTargetSpinLock
snmpV2.snmpModules.snmpUsmMIB
snmpUsmMIB.usmMIBObjects.usmStats
snmpUsmMIB.usmMIBObjects.usmStats.usmStatsUnsupportedSecLevels
snmpUsmMIB.usmMIBObjects.usmStats.usmStatsNotInTimeWindows
snmpUsmMIB.usmMIBObjects.usmStats.usmStatsUnknownUserNames
snmpUsmMIB.usmMIBObjects.usmStats.usmStatsUnknownEngineIDs
snmpUsmMIB.usmMIBObjects.usmStats.usmStatsWrongDigests
snmpUsmMIB.usmMIBObjects.usmStats.usmStatsDecryptionErrors
snmpUsmMIB.usmMIBObjects.usmUser
snmpUsmMIB.usmMIBObjects.usmUser.usmUserSpinLock
snmpV2.snmpModules.snmpVacmMIB
snmpVacmMIB.vacmMIBObjects.vacmMIBViews.vacmViewSpinLock
ucdavis
ucdavis.prTable
ucdavis.prTable.prEntry
ucdavis.prTable.prEntry.prIndex
ucdavis.prTable.prEntry.prNames
ucdavis.prTable.prEntry.prMin
ucdavis.prTable.prEntry.prMax
ucdavis.prTable.prEntry.prCount
ucdavis.prTable.prEntry.prErrorFlag
ucdavis.prTable.prEntry.prErrMessage
ucdavis.prTable.prEntry.prErrFix
ucdavis.prTable.prEntry.prErrFixCmd
ucdavis.memory
ucdavis.memory.memIndex
ucdavis.memory.memErrorName
ucdavis.memory.memTotalSwap
ucdavis.memory.memAvailSwap
ucdavis.memory.memTotalReal
ucdavis.memory.memAvailReal
ucdavis.memory.memTotalFree
ucdavis.memory.memMinimumSwap
ucdavis.memory.memShared
ucdavis.memory.memBuffer
ucdavis.memory.memCached
ucdavis.memory.memSwapError
ucdavis.memory.memSwapErrorMsg
ucdavis.extTable
ucdavis.extTable.extEntry
ucdavis.extTable.extEntry.extIndex
ucdavis.extTable.extEntry.extNames
ucdavis.extTable.extEntry.extCommand
ucdavis.extTable.extEntry.extResult
ucdavis.extTable.extEntry.extOutput
ucdavis.extTable.extEntry.extErrFix
ucdavis.extTable.extEntry.extErrFixCmd
ucdavis.dskTable
ucdavis.dskTable.dskEntry
ucdavis.dskTable.dskEntry.dskIndex
ucdavis.dskTable.dskEntry.dskPath
ucdavis.dskTable.dskEntry.dskDevice
ucdavis.dskTable.dskEntry.dskMinimum
ucdavis.dskTable.dskEntry.dskMinPercent
ucdavis.dskTable.dskEntry.dskTotal
ucdavis.dskTable.dskEntry.dskAvail
ucdavis.dskTable.dskEntry.dskUsed
ucdavis.dskTable.dskEntry.dskPercent
ucdavis.dskTable.dskEntry.dskPercentNode
ucdavis.dskTable.dskEntry.dskErrorFlag
ucdavis.dskTable.dskEntry.dskErrorMsg
ucdavis.laTable
ucdavis.laTable.laEntry
ucdavis.laTable.laEntry.laIndex
ucdavis.laTable.laEntry.laNames
ucdavis.laTable.laEntry.laLoad
ucdavis.laTable.laEntry.laConfig
ucdavis.laTable.laEntry.laLoadInt
ucdavis.laTable.laEntry.laLoadFloat
ucdavis.laTable.laEntry.laErrorFlag
ucdavis.laTable.laEntry.laErrMessage
ucdavis.systemStats.ssIndex
ucdavis.systemStats.ssErrorName
ucdavis.systemStats.ssSwapIn
ucdavis.systemStats.ssSwapOut
ucdavis.systemStats.ssIOSent
ucdavis.systemStats.ssIOReceive
ucdavis.systemStats.ssSysInterrupts
ucdavis.systemStats.ssSysContext
ucdavis.systemStats.ssCpuUser
ucdavis.systemStats.ssCpuSystem
ucdavis.systemStats.ssCpuIdle
ucdavis.systemStats.ssCpuRawUser
ucdavis.systemStats.ssCpuRawNice
ucdavis.systemStats.ssCpuRawSystem
ucdavis.systemStats.ssCpuRawIdle
ucdavis.version.versionIndex
ucdavis.version.versionTag
ucdavis.version.versionDate
ucdavis.version.versionCDate
ucdavis.version.versionIdent
ucdavis.version.versionConfigureOptions
ucdavis.version.versionClearCache
ucdavis.version.versionUpdateConfig
ucdavis.version.versionRestartAgent
ucdavis.version.versionDoDebugging
ucdavis.snmperrs.snmperrIndex
ucdavis.snmperrs.snmperrNames
ucdavis.snmperrs.snmperrErrorFlag
ucdavis.snmperrs.snmperrErrMessage
ucdavis.mrTable
ucdavis.mrTable.mrEntry
ucdavis.mrTable.mrEntry.mrIndex
ucdavis.mrTable.mrEntry.mrModuleName
Note:
The UCD Davis branch is supported by ucd-snmp agent, but require configuration tool on OmniPCX Enterprise
side, to have these working.
alcatel
alcatel.abs
alcatel.abs.a4400
alcatel.abs.a4400.a4400CPU
alcatel.abs.a4400.a4400CPU.pbxMibVersion
alcatel.abs.a4400.a4400CPU.pbxState
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.ipDomainNumber
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.confAvailable
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.confBusy
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.confOutOfOrder
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.dspRess
Available
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.dspRessBusy
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.dspRess
OutOfOrder
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.dspRessOverrun
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.CacAllowed
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.CacUsed
alcatel.abs.a4400.a4400CPU.ipDomainTable.ipDomainEntry.CacOverrun
alcatel.abs.a4400.a4400CPU.pbxRole
alcatel.abs.a4400.a4400CPU.sipRegSets
alcatel.abs.a4400.a4400CPU.sipUnregSets
alcatel.abs.a4400.a4400CPU.setsInService
alcatel.abs.a4400.a4400CPU.setsOutOfService
8 RMA
8.1 Overview
8.1.1 Overview
The RMA system (Remote Maintenance Access) is an interface used to perform maintenance
operations on a OmniPCX Enterprise. This maintenance is performed by a local or remote operator via
a modem.
The RMA manages the following functions:
• It allows you to access:
• The main and backup Call Servers
• PCX applications
• It reinforces access security
• It allows you to report PCX data to a remote maintenance center
The operator uses a VT100 type or a connected emulation console:
• Locally
• Through an external modem
• Through a TA
The RMA function is supported by the following configurations:
• An RMA board placed in the slot 2 of the S type rack.
• A modem support MODB board, equipped with an On/Off button, placed in the slot 0 of the S type
rack.
• An RMAB board placed in the main ACT shelf,
• An RMAB board placed in an external BRMA unit,
• An SRMA (Small RMA) daughter board, installed either on the MMS board (M2/M3 cabinet or or
WM1 cabinet) or on the connection board (VH cabinet).
Note:
In this document, unless otherwise specified, the term RMA applies to one of the configuration above.
Caution:
When the Call Server is a CS board or an Appliance Server, no alarms are sent from the Call
Server to the RMA system.
Reset commands are not available for an Appliance Server.
8.2 Glossary
8.2.1 Glossary
APA Analog Public Access: used by the internal modem
BRMA Box RMA: external box specific to the RMA, containing the RMAB and PRMA
CBALA Cable ALArm: this cable returns the converter alarm to the SRMA board.
CCPU Cable CPU: connecting the master CPU board and the PRMA board or BRMA.
CMDFRMA Cable Main Distribution Frame RMA : this cable links the PRMA to the MDF.
CRMA Cable RMA : This cable links the PRMA and RMAB boards in the case where the
latter is installed in the PABX.
CSRMA SRMA Cable : this cable connects the PRMA and SRMA boards.
INTCPU INTer CPU : cable connecting the master CPU to the slave CPU .
MODB MODemBoard : modem support board allowing its modem supply as well as the
extraction of CPU alarm signals addressed to the RMA board and the connection
of a debugging console.
PRMA Patch Panel RMA : this board supports all the standard CPU and RMA interfa-
ces. It is installed in the CBRMA or the BRMA.
PSCRMA Power Supply Cable RMA : power cable for the BRMA.
RMAB RMA Board : may be installed either in the PCX or the BRMA.
SRMA Small RMA : daughter board installed on the MMS support board or in the VH
cabinet.
CPU CPUA
EXB/EXC
Access
Modem or TA PSTN Modem or TA
Reset
CPU Access CPUB UA or Z
EXB/EXC
External
V24 commands
RMA Modem or TA
Application
Modem or TA
Modem or TA
Application
EXB/EXC CPUA
CPU Access
PSTN Modem or TA Reset
EXB/EXC CPU Access CPUB
Application
8.3.1.1.2 Actions
• Triggers actions on:
• Receiving an instruction from a local operator
• Receiving an incoming call on the external modem
8.3.1.2 Security
8.3.1.2.1 Access Security
• 16 local or distant logins
• Managing remote login/password with or without callback, with or without a predefined number
• Managing privileges by login (RMA management right, reset, etc.)
• Port management:
• Any operator can manage the protocols
• Interface management on the ports is exclusively reserved to the local console
8.3.1.2.2 History Files
• Alarms log
• Automatic calls log
• PCX connections/disconnections log
• EXB and EXC incoming/outgoing calls log
8.3.1.4 Miscellaneous
• Selecting the languages: English, French, German.
• Recording in the flash memory of the configuration and time in the clock module (RTC).
• Two Reset commands (Call Server Main and Call Server Stand-by).
Reminder:
These commands are available on all boards, but are not available for an Appliance Server.
Other configurations
COM A0 port
Port Config B
Other configurations
RMA
3 6
RXD A/B TXD CPU
6 3
TXD A/B RXD CPU
B
u 8 1
RTS A/B CTS CPU
f
f
e 1 8
CTS A/B RTS CPU
r
RMT-RES 5 4 RMT-RES
(hard reset) (hard reset)
V
2 2 7
DSR 4 DTR CPU
7 2
DTR A/B DSR CPU
GND 4 5
GND
modem or TA
public
Private network
link
external alarm
alarm
reset
A
V24 asynchronous interface
modem
access control or TA
8.3.5 Monitoring
8.3.5.1 Access Security
8.3.5.1.1 Access Security on EXA
If the login or the password is incorrect, other attempts are executed. After five unsuccessful attempts
the connection is blocked. Access remains impossible (even with a correct login-password) for a 15
minute timeout. During this timeout, at each attempt to access, the RMA board asks again for a login
and a password, but user entries are systematically considered incorrect.
8.3.5.1.2 On Incoming Calls (EXB, EXC)
On an incoming call, the interface requests a login and a password.
The operator has 1 minute to enter the login and 30 seconds to enter the password. At the end of
timeout, when the password is entered, the RMA returns to the login entry. At the end of timeout, when
the login is entered, the RMA releases the line.
If the login or the password is incorrect, a second and then a third attempt is executed. After five
unsuccessful attempts, the connection is cut off and a report is generated to the destination 1 (non
modifiable choice). During a 15 minute timeout, at each attempt to access, the RMA board asks again
for a login and a password, but user entries are systematically considered incorrect. After five attempts
the line will be released.
If the analysis is positive, three possibilities are considered according to the data recorded in login
management (see Configuration procedure on page 197):
• The remote end remains connected on the RMA and can execute a command
• The RMA releases the line and calls back the remote end on a preset number
• The RMA waits for the remote end to give the number on which it wishes to be recalled, then it
releases the line and calls back the remote end
After calling back, the RMA requests the login and the password again; if the analysis is positive, the
remote end remains connected on the RMA and can execute a command.
Whether the connection is really set up or not, a ticket is recorded. It specifies the date, the time, the
login, the external number called back and whether there was a failure. At disconnection, the date, the
time, the login and the external number are also recorded.
In case of a failure on recall, the RMA performs no further attempts.
8.3.5.1.3 Outgoing Calls on External or Alarm Connection
Outgoing calls (modem or TA) generate a report with:
• The call origin
• The date and time
• The call destination
If a requested call fails, a message is stored, detailing:
• The type of anomaly
• The date and time
8.3.5.1.4 Outgoing Calls on Alarm or PCX Incident
On an alarm the RMA automatically calls back the number that was preset for this alarm.
The call is made on EXB, EXC by the modem or the TA.
After a connection on the remote center, it indicates:
• The identifier of the calling site
• The date and time
• An RMA alarm in standard format indicating:
site identifier - alarm report
• The cause of the call (list of PCX alarm and incident reports)
Example of an automatic call with 3 reports:
• Report of a PCX incident detected by the RMA
If Unauthorized number = yes, when the number of unsuccessful calls is reached, the number is burnt
and a manual intervention on the RMA configuration (mngt Alarm ) is necessary to validate the
number again.
8.3.5.1.5 Multi-User Access Conflict
The three V 24 EXA, EXB and EXB ports can be connected simultaneously provided that the
commands are not incompatible.
Example:
Note:
An operator cannot force a connection on an access where an alarm report is in progress.
c) Observation on SYA (or SYB)
During a port observation:
• The characters received on SYA (or SYB) are transmitted to the concerned port and the observed
ports
• The characters received on the connected port or the observed ports on SYA (or SYB) are
transmitted to SYA (or SYB)
By echo on the Call Server, all the characters entered by an operator can be viewed by others.
d) Dialog on EXA, EXB, EXC and Debug
During a dialog between two operators (for example: EXA - EXB):
• A flow control is sent to the ports connecting to EXA and EXB
• The EXB-EXA connection is executed
Each operator can break the dialog, using escape sequences. (see Operation on page 207)
8.3.5.1.6 Flow Control
For the flow control to operate in the RMA, the PCX ports must be set up in flow control XON/XOFF.
Example:
Connection of the 2400-Baud EXB V24 channel remote operator to the 9600-Baud V24 SYA channel. The RMA
sends the XON/XOFF to the PCX to manage the flow control in RMA.
Idem for the EXC port when it is directly connected to a voice mail message or a fax server.
8.3.5.2 Incidents
Remark:
If following a reset, the reports have not been executed properly, the automatic call is renewed at start
off.
8.3.5.2.2 Storing Incidents
Incidents
Only RMA internal incidents or events are stored in static memory. A power cut or the down loading of
a new version causes this data to disappear. It is, however, saved in Menu/States/Log_/Resets . (see
Configuration procedure on page 197)
These incidents or events are stored in one of the five queues:
• Alarms queue:
• CPU alarm
• External alarm
• CPU alarm loss of activity (active or standby)
• Reset queue:
• PCX reset
• Connections/disconnections queue:
• Connection to PCX (COM A or COM B)
• Disconnection from PCX (COM A or COM B)
• Incoming/Outgoing calls:
• Incoming call on modem or TA
• End of incoming call on modem or TA
• Outgoing call on modem or TA
• End of outgoing call on modem or TA
• Automatic call in case of alarm
• Start and end lext command
• Output queue of incidents in chronological order:
• All the data of the alarms queue
• All the data of the resets queue
• The data concerning modem connection requests (incoming or outgoing), as well as cut-offs of
these connections
In order to avoid overloading this fifth queue, the following data items are not stored:
• All the data of the connections/disconnections queue
• Data concerning the completion of an auto call (SUCCESSFUL)
• Data concerning the cause of a failed auto call (FAILED)
For all these incidents the RMA stores:
• The date and time
• The type of alarm, alarm in progress or end of alarm in the case of an alarm incident
• The concerned login in the case of a call, a PCX connection or a PCX reset
• In the case of an automatic call failure, the cause is stored: busy, no line.
• The login for any incoming call, whether the password is correct or not
The RMA saves, for each queue, only the 128 last incidents.
EXA EXB EXC EXD AL INT AL EXT AL CPU OFF HK RUN RMA ALARM LINE DEBUG
RMA board
1 2 3
X400
JX400
PWR
The meaning of the LEDs located on the front panel of the RMA board is presented in the table below.
LED Meaning
PWR Supplying the board with +5V via the PS1N power supply of rack 1U.
RJ45 socket
(front panel)
The pin-out of the eight RJ45 connectors on the front panel is presented in the tables below:
8 RTS1 RTS2
LINE
L
E MODEM
D 40V / 9V
s RS232 300 mA
Converter
LEDs
Power
POWER
On/Off key
ON/OFF Switch
FAN PWR
The meaning of the LEDs located on the front panel of the MODB board is presented in the table
below.
LED Meaning
POWER Supplying the board with 40V via the PS1N power supply of rack 1U.
RJ45 socket
(front panel)
The pin-out of the eight RJ45 connectors on the front panel is presented in the tables below:
3 ALARMA_1 ALARMA_2
6 ALARMB_1 ALARMB_2
1 CTS ALARMB2
MOD_EMC
2 DSR ALARMA2
MOD_EMC
7 DTR ALARMB1
MOD_EMC
8 RTS ALARMA1
MOD_EMC
8.4.1.3 Installation
In all cases, the following connectors are available:
• EXA: dedicated to local console
• EXB: dedicated to remote maintenance modem
• EXC: free, this port is available for the management of an application accessible via serial port, for
example 4635 messaging management or access to another PCX
• EXD : dedicated to Call Server alarms and to the debug console (for Alcatel-Lucent support only)
CS 1 CS 2
CONFIG. CONFIG.
1
3
Secondary
Distributor
alarms
3
AUX1-IN AUX2-OUT AUX2-IN AUX2-OUT SYA SYB EXT1 EXT2
MODB RMA
FAN POWER
4 5
PCX
3 TA
1 Crossed USOC cable, 8 wires, RJ45/RJ45, length 3m, reference: 3EU 28000 AAAA
4 T568B straight cable, 8 wires, RJ45/RJ45, length 3m, reference: 3AK 21492 AAAA
8.4.4 VH Cabinet
On VH cabinets, the RMA function is performed via an SRMA daughter board mounted on the cabinet
interface connection board. The following connectors are available:
• EXA: dedicated to local console
• Internal modem telephone jack dedicated to remote maintenance
Caution:
The EXA connector to use is the one on the rack not the one on the patch panel.
RMA
OmniPCX
Media SYA
Gateway EXA
Config
local console
• check the settings of SyA, SyB, ExA, ExB, ExC ports via the access path: menu/states/ports .
If it is incorrect, use the path: menu/management/ports (see Operation on page 207).
• check the connection to the PCX via the access path: menu/connections/SyA or SyB (see
Operation on page 207).
If the connection cannot be established, adapt transmission characteristics between the ports of the
RMA (menu/management/ports) (see Operation on page 207) and of the PCX (ttyconf
command).
Important:
It is recommended to show caution and to exit MGR properly.
RMA
EXA local console
OmniPCX SYA
Media
Gateway
public
public or
Config
private
link
or
EXB MODB private
link
modem
remote console
2 Free
5 Free
6 Free
9 Free
10 Free
11 Free
12 Free
13 Free
14 Free
15 Free
16 Free
RMA
SYA EXA
OmniPCX local console
Media
Gateway
Config SYB EXB MODB
public
or
private
RMA link
EXA
SYA
OmniPCX
Media
Gateway EXB MODB
Config SYB
TA V24
UAI
UA link
OmniPCX VT100 type local console
2
Media
Gateway
Public
link UA link
RMA
UAI ExA
SYA
1
V24 TA
OmniPCX EXC
Media
Gateway
The local console with the data greeting menu will call the set 4035 (1) connected to the RMA to dialog
with the latter.
Data terminal(1)
• Adaptor type: V110
• Type of terminal: VT100
• Hayes Use
• Set-up No: 10
• Flow control No: 0
• Output configuration No: 0
• Input configuration No: 1
• Configuring V24:
• On hook by 108: yes
• On hook by 105: yes
• Intervention 125: yes
• cadence 125: yes
• UA set automatic answer: no
• the "remainder": no
Data terminal(2)
• Adaptor type: V110 + V120 asynchronous
• Type of terminal: VT100
Example:
Note:
The relay of the command 1 can be managed on open or on closed.
In Menu/Management/Automatic call/Destinations/Destination1, you must schedule:
• Phone 1: EXB: 00155660000
• Phone 2: ExC: 00155661111
• Timeout for user connection: 10 s
2. Configuring an external alar.
The UPS alarm will trigger only the automatic call as soon as the alarm appears (via Call: at the
alarm start) and will save it in the log.
Access path: Menu/Management/Alarms/Extern 1
[1] Label
UPS
[2] Used
Yes
[3] Active state
closed
[4] Duration of alarm before action
1 second
Note:
The relay of the command 1 can be managed on open or on closed.
Go to Menu/Management/Relays.
In Menu/Management/Automatic call/Destinations/Destination3 , you must schedule:
Tel 1 , and Timeout for user connection (seeConfiguring a CPU alarm).
8.6 Operation
8.6.1 Connection
To begin a session under the RMA account, you must type the login and the password.
Each section enables you to access a submenu that can also be accessed by any on-line command:
Type ? to display the list of commands.
cnx : connections
state : states
mngt : management
set : session
exit : exit
save : save configuration
pass : password
priv : user rights
Note:
The commands are always in English, whatever the language selected.
[3] Alarms
[4] Relays [1] Alarms
[1] Connections [5] Journal [2] Resets
[6] Report [3] Connections
[1] Destination 1
[2] States [4] Calls
[2] Destination 2
[3] Destination 3 [5] Others
[3] Mangement
[4] Destination 4 [6] All
[4] Session [5] All
Management
[5] Exit
[1] Site
[2] devices
[6] Save
[3] Alarms [1] English
[7] Password [4] PABX incidents
Session [2] Francais
[5] Relays
[8] Privileges [3] Deutsch
[6] Logins [1] Language
[7] Automatic call [2] Keyset
[8] Privileges [3] SIMUL
[1] Ascii
[9] Save [4] LEXT
[2] VT
[5] SAVE
[3] Iso Latin 1
[6] RESTORE
[7] DOWNLOAD
Note:
• With the SRMA board the Ports and Alarms menus are different.
• With an internal PCMCIA modem, there is an additional APA option in the Connections and Ports menus.
[1] Reset
[2] Initialization
[3] Routed call
[4] On hook
[1] Site [1] --> Edit des commands [5] Answer mode
[2] --> Edit state messages [6] Escape sequence
[2] Ports
[3] All [7] Wait dialtone
[3] Alarms [8] Tone dialing
[9] Pause
[4] PABX incidents [A] All
[5] Relays
[1] Command accepted
[6] Logins
[2] Command rejected
[3] Connection
[7] Automatic call
[4] Incoming call
[8] Privileges [5] No line
[6] No answer
[9] Save [7] Occupation
[8] Carrier loss
[9] Delayed number
Management
[A] Unauthorized number
[B] All
[1] Label
[2] Used
[3] Active state
[4] Alarm duration before action
§ 6.3 (*)
[5] Number of alarms before action
[1] CPU [1] None
[6] Time between two actions
[2] Extern 1 [2] Command 1
[7] Enable Command
[3] Extern 2 [3] Command 2
[8] Save
[4] Extern 3
[9] Call
[5] Extern 4
[A] First destination [1] Destination 1
[6] All
[B] Second destination [2] Destination 2
[C] All [3] Destination 3
[4] Destination 4
[1] Action incidents0 [3] First destination [5] All
[1] Site
[2] Action incidents1 [4] Second destination
[2] Ports [3] Action incidents2
[4] Action incidents3 [1] Used
[3] Alarms [5] PCX SyA activity [2] Command activation
[6] PCX SyB activity [3] First destination
[1] Command 1
[4] PCX incidents [7] All [4] Second destination
[2] Command 2
[5] Relays [3] All
[6] Logins
[1] Local Access type
[2] Remote New Login :
[7] Automatic call [3] Basic callback remote Password:
[4] Auto callback remote Password (confirm)
[8] Privileges [6] Free Phone Number
[9] Save
[1] MNGT command (RMA configuration management)
[2] Outgoing calls (via ExB, ExC, APA)
Management
[3] PCX connections (via SyA, SyB)
[4] RMA board reset command
[5] PCX reset command
[6] Download et restore commands
[7] Login and privileges management
[1] Destination 1
[2] Destination 2 [1] Phone 1 : ExB -
[3] Destination 3 [2] Phone 2 : ExB -
[4] Destination 4 [3] Timeout for
user connection
[1] Destinations [5] All
[2] Country
[3] Disable automatic calls [1] Time between two calls
[1] France [2] Duration of pause
[4] Enable utomatic call
[2] Germany [3] Number of calls
[5] All
[3] Other [4] Unauthorized number
[5] All
A phone number is requested if the operator wishes to connect to an access linked to a modem or a
TA. The phone number includes the number itself, to which can be associated the letters: T (waiting for
a Tone) and P (requesting a Pause).
A connection on Exa or Debug allows a remote operator to dialog with a local operator connected on
the same accesses.
In a future version, the indications below will be added to the submenus:
• Connection impossible
• Access unavailable
• Access already used
The user will be able to specify remote connections with phone numbers.
On the ExB, ExC ports, an activity monitoring timeout is used to free automatically idle connections.
This monitoring is initialized at 15 minutes by default and can be set for up to 24 hours, with a
possibility of setting it for an indefinite duration. This timeout, related to the operator session, is the time
during which there is a monitoring to check whether there is an activity on the operator access
(reception of characters). When this timeout expires, the RMA cuts off the connection. At the next
operator session, the timeout will recover its default value.
/Menu/States/Ports
[1] SyA
[2] SyB
[3] ExA
[4] ExB
[5] ExC
[6] Debug
[7] All Sets
These states are backed up in five circular buffers, with 32 lines for resets and 128 lines for the other
ones. The possibility of dumping the Alarms files is offered.
Example:
/Menu/States/Log
[1] Alarms : 000 incident(s)
[2] Resets : 002 incident(s)
[3] Connections : 000 incident(s)
[4] Calls : 000 incident(s)
[5] Other : 000 incident(s)
[6] All
Your choice : 2
/Menu/States/Resets
21/03/96 10:58:45 Login rma - End
of master CPU board reset
21/03/96 10:58:31 Login rma - Reset
of master CPU board
End of list
[1] Destination 1
18 incidents waiting for a report
[2] Destination 2
7 incidents waiting for a report
[3] Destination 3
20 non reported incidents
[4] Destination 4
None incident waiting for a report
[5] All
Your choice: 2
/Menu/States/Destination 2
07/10/97 13:54:48 000001R| |=4:4207=Destination 1 - Call
failure
Your choice:
Enter the number of the concerned section
[1] Client
Enter the client name on 31 characters in total
[2] Address
Enter the client address on 60 characters in total
[3] Telephone
Enter the client's phone number in 10 characters in total in the for-
mat: XX XX XX XX XX.
[4] Language
Select the language in the list. On an RMA reset, the system will
start with the language specified here.
[5] Date
Enter the date in the following order: Day, Month, Year (on 2 char-
acters (for example: 96 for 1996)).
[6] Time
Enter the time in the following order: Hours, Minutes, Seconds.
[7] Network
Enter the network number (default value: 000).
[8] Node
Enter the node number (default value: 001).
[9] RMA name
The name of the RMA will be displayed in front of the prompt.
[A] Automatic time reset
Yes/No: Automatic time reset of the RMA by the PCX.
[B] All
Is used to display all the sections, one by one.
Note:
New data will only be validated after a confirmation request.
Selecting [1] Interface displays the following menu:
/Menu/Management/Ports/SyA/Interface/Configuration
[1] Label
Enter the name in 16 characters max (by default = port name)
[2] Speed
150/300/600/1200/2400/4800/9600/19200 bauds . Select the
desired speed.
[3] Word size
Select the desired word size (7 or 8 bits ).
[4] Parity
Select the desired parity (None/Even/Odd ).
[5] Stop bit
Select the number of stop bits (1 or 2 bits).
[6] Flow control
Select with or without flow control (With or XON/XOFF ).
[7] All
Is used to display all the sections, one by one.
For "ExA", "ExB", "ExC" and "debug" the choice "[3] Real-time output" displays the following
menu :
/Menu/Management/Ports/ExA/Real-time output
[1] Yes
[2] No (default value)
This command is used to validate, port by port, the real-time ouput of RMA incidents.
The incidents that are output in real time are the same as those stored in the chronological incidents
queue
When the real-time output is validated for ExA, it is executed whether an operator is connected or not.
For ExB, ExC, it is executed only when an operator is connected.
For the same ports, the selection [4] Inactivity timeout displays the following menu:
/Menu/Management/Ports/ExA/Inactivity timeout
Default value: 10 minutes
Disconnection after: 10
Note:
No protocol for ports SyA, SyB, ExA and debug
Selecting Transparent enables you to connect a server to ExB or ExC. (In this case, the only
possible operation on these ports is a connection from another port).
Selecting Console enables you to connect a second local terminal.
For other choices, the display runs as follows:
/Menu/Management/Ports/ExB(or ExC)/Protocol
[1] --> Edit commands
[2] --> Edit state messages
[3] All
[1] Reset
ATZ0
[2] Initializing
ATE0Q0S0=2
[3] Routed call
ATD
[4] On-hook
ATH0
[5] Answer mode
[6] Escape sequence
+++
[7] Waiting for a tone
W
[8] Tone dialing
[9] Pause
,
[A] All
The commands above operate at RMA initialization and correspond to the Hayes protocol.
The different possibilities are described in the table below:
MODEM TA
ORDERS
V25 bis HAYES V25 bis HAYES
Pulse/Frequency P P
MODEM TA
ORDERS
V25 bis HAYES V25 bis HAYES
The types of signaling above operate at RMA initialization and correspond to the Hayes protocol.
The different possibilities are described in the table below:
MODEM TA
INDICATIONS
V25 bis HAYES V25 bis HAYES
MODEM TA
INDICATIONS
V25 bis HAYES V25 bis HAYES
[9] Call
No/At the alarm start/At alarm end/ At alarm start and
end: If different from "No", determines the time when the
alarm is taken into account. This time is determined by
the number set in [5] .
[A] First destination
Destination 1/Destination 2/Destination 3/Destination
4/None : Two destinations to call in case of an alarm
(see next note).
[B] Second destination
Destination 1/Destination 2/Destination 3/Destination
4/None :
[C] All
Note:
For each alarm you can chose either to call a single number (in this case, only the first destination is managed), or
to seek to notify two maintenance centers simultaneously (in this case, the two destinations are managed) (see
Automatic Call Submenu on page 221 )
Any alarm lasting a minimum time T1 is counted by the RMA. When the number of alarms reaches N1,
the actions scheduled by the operator are performed and the T2 timeout is armed. During timeout T2,
the RMA only observes the alarm disappearal. At the end of timeout T2, the RMA processes the alarms
display.
Several alarms can trigger the same external command. The first alarm that appears enables the
external command, which remains active if a second alarm appears. The external command is disabled
when all the alarms have disappeared.
[1] Command1
Active state: Open/Closed- Duration: Enter a value between 0 and 255 sec-
onds.
[2] Command2
Active state Open/Closed- Duration: Enter a value between 0 and 255 sec-
onds.
[3] All
Note:
It is recommended to configure the relay in an open active state. Indeed, in an closed active state, a transient
alarm will appear at the RMA reset.
1 Local <default>
2 Free
3 Free
4 Free
5 Free
6 Free
7 Free
8 Free
9 Free
10 Free
11 Free
12 Free
13 Free
14 Free
15 Free
16 Free
Your choice:
If the login access type is local, you can only connect to ExA.
If the login access type is remote, you can only connect to ExB or ExC and also, locally, to ExA.
The Ordinary remote recall" or Auto remote recall logins are used to recall the operator.
The Ordinary remote recall login requires you to enter the operator's modem number.
The Auto remote recall login recalls a pre-recorded number.
For selections [1], [2], [3], [4] the display is the following :
/Menu/Management/Logins/Update
Access type: Local/Remote/Single remote recall/auto. remote
recall
New Login:
Password:
Password (confirmation):
Phone number: (only for selection [4])
List of rights login xxxx
Selecting [1] in the /Menu/Management/Automatic call menu displays the following menu:
/Menu/Management/Automatic call/Destinations
[1] Destination 1
[2] Destination 2
[3] Destination 3
[4] Destination 4
[5] All
This submenu is used to chose the country where the PCX is installed. It helps you to manage the
automatic calls in compliance with the country's standard.
[1] France
[2] Germany
[3] Other
In the first two cases, the timeouts, the number of attempts upon failure, the pause time between two
series of calls and the fact of burning or not the number are coded in the firmware in compliance with
the country's standard.
Selecting [3] displays the following menu:
/Menu/Management/Automatic call/Data
Country timeout [1] (mn) timeout [2] (mn) nb. calls burnt no.
Belgium 15 15 3 no
Netherlands 4 4 14 no
Austria 1 1 12 yes
Australia 1 30 10 no
Switzerland 1 1 5 yes
Selecting [3] in the /Menu/Management/Automatic call menu displays the following menu:
/Menu/Management/Automatic call/Disable automatic calls
Default value: 60 minutes
Automatic call disabling time
During an intervention at a local or a remote site, the operator can disable the reports by specifying a
duration (1 minute to 4 hours).
During this timeout, RMA alarm reports, PCX incident reports and PCX alarm loss of activity reports will
no longer be executed.
The RMA will resume reports at the end of the timeout or upon a "re-enable automatic call" by the
operator or when the operator is disconnected.
The operator can re-run this timeout by entering the "Disable automatic call" command, followed by a
new duration.
This data (enabling and duration) is not saved in the user configuration. After an RMA reset, automatic
calls are still enabled.
When a operator disables automatic calls, the RMA sends a message to "destination 1" indicating that
reports are suspended and specifying the time.
Example:
JJ/MM/AA hh:mm:ss 001001R| |=4:4205=Disable
automatic calls
For a PCX Activity on SyA or SyB, the display of modifiable parameters becomes:
/Menu/Management/PCX Incidents/SyA or (SyB) PCX activity
[1] Used
[2] Enable a command
[3] First destination
[4] Second destination
For each Incident you can chose either to call a single number (in this case, only the first destination is
managed), or to seek to notify two maintenance centers (in this case, the two destinations are
managed).
According to the destination, the following menu is displayed:
/Menu/Management/PCX Incidents/SyB activity PCX/First destination(Second
destination)
[1] Destination 1
[2] Destination 2
[3] Destination 3
[4] Destination 4
[5] None (default value)
PCX incident
An application on OmniPCX Enterprise is used to select the incidents to be processed by the RMA as
well as the associated level of action.
The RMA observes the SyA and SyB ports and reports these incidents.
The calls for the reporting of these incidents are stored in the incoming/outgoing calls file.
The RMA continues to process these incidents, even is a user is connected to OmniPCX Enterprise via
the SyA or SyB ports.
A user connected to the OmniPCX Enterprise does not see these Incident messages in the RMA
format, they are filtered by the RMA.
Message formats OmniPCX Enterprise RMA:
Once monitoring has been enabled on the RMA, the first PCX message is awaited before running a 4-
minute timeout. This timeout is re-run for each activity message. If after this timeout, the RMA has
received no new activity message, you perform the selected actions:
• Reporting to one or two phone numbers an alarm message of the type:
"date/time Port label (SyA or SyB) - Loss of M/S CPU activity on SyA"
• Storing an alarm message.
• Enabling an alarm relay. This alarm relay will be disabled on reception of a new CPU activity
message.
Note:
If an operator connected on SyA or SyB performs CtrlSZ/CtrlQ flow control and remains blocked more than 2
minutes with CtrlS, the RMA will force the transmission to a terminal to unlock the CPU transmission in order to
receive CPU activity messages. (This un-blocks the display on the operator's terminal).
The terminal must be programmed "without flow control management".
Time reset of the RMA by the PCX.
The message sent by the main CPU is followed by the date and the time in the following format:
^RRMA :M :Fri Mar 14 14:45:30 1997^X
The RMA resets on the PCX time every hour (if the automatic time reset parameter is enabled in the
site's RMA configuration).
1 rma 9
2 10
3 11
4 12
5 13
6 14
7 15
8 16
This submenu can also be accessed from the login management. (see: Logins Submenu on page 219)
8.6.7.3 SIMUL
When this command is run, the RMA board simulates one of six alarms (CPU O, 1 or External 1 to 4).
The set of operations programmed with the "ALARM management" command is then performed (relay
command, automatic call, etc.). The operator can simulate the start or end of an alarm as desired. The
operator must always end the simulation with an "end of alarm".
8.6.7.4 LEXT
This command can only be used on the local console. It allows transparent connection to the modem
or a TA to check the commands and signaling in V25bis or Hayes mode depending on the selected
protocol. If there are any differences with respect to the default configuration, the operator can modify
the configuration by using the "PROTOCOL management" command. This command, giving
transparency on the modem, exists as "HAYES" commands may differ according to the model of
modem, so it is necessary to adapt to the associated "black box". This is because HAYES commands
are not completely standardized. This command also allows a remote operator to be called by dialing
according to the protocol used by the modem or TA. Any connection on an external line generates an
incident stored in a file of incoming and outgoing calls.
8.6.7.5 SAVE
see: Save Submenu on page 225
8.6.7.6 RESTORE
This command, after confirmation, restores the factory configuration and performs a full reset of the
RMA board for the changes to be applied. The customer configuration is then lost.
8.6.7.7 DOWNLOAD
This command allows a new RMA binary to be downloaded from the CPU. After entering the
command, the operator must specify the access used for download, namely SyA or SyB. The operator
is then connected to the relevant access and must run the ". rma_download" command under the
"mtch" account. After the message "Ready to send RMA binary", the operator disconnects by pressing
CTRL-A twice.
The RMA then automatically switches to reception mode and download is performed. When download
is complete, the RMA offers to restart the board to apply the new binary.
The operator can interrupt download at any time by pressing CTRL-A.
8.6.8 EXIT
This command is used to exit a session and release the link on an ExB, ExC or APA access.
9 e.RMA
9.1 Overview
9.1.1 Overview
The e-RMA (embedded Remote Maintenance Access) service allows:
• Remote connection. Using e-RMA, a remote manager can control the OmniPCX Enterprise. The
manager then has a VT100 terminal (or emulation) from which he can run all configuration or
maintenance commands. This access is secured (depending on configuration) by a password and
(possibly) a callback procedure.
• Incidents occurring on the Call Server to be reported to an alarm center.
The e-RMA service uses the internal modem of an OmniPCX Media Gateway.
Note:
The e-RMA link is a serial link that can operate with PPP protocol. This PPP protocol allows IP applications to
access the PCX. For example, the 4760 management application can connect via e-RMA, but the authorized bit
rate is low and applications may run slowly.
Remote
manager
Media
VT100
gateway
Internal
modem
Call Server
Modem
e-RMA
IP
PSTN network
There is no mutual assistance between Media Gateways. For incoming calls, only the internal modem
of the Media Gateway receiving the call can be used. For outgoing calls, only the internal modem of the
Media Gateway supporting the designated trunk group can be used.
The e-RMA application must be able to be accessed using a DID number.
The remote manager's modem must operate in V42 mode (mandatory).
1 2 3 4
Connection phases:
1. The call is initiated by the manager. It is directed through the public network to the Media Gateway
using the call number.
2. On arrival, the call is identified as a call for the e-RMA application. The call then undergoes the
following preliminary check:
If the “Circuit Data Security” option is used and if the calling number is transmitted, the calling
number must be included in the list of speed dial numbers.
If the preliminary check is correct, the call is sent to the internal modem of the Media Gateway.
If the preliminary check is incorrect or if the modem is busy, the call is refused.
3. At entry to the e-RMA application, the e-RMA login and password are requested. To deter attacks
on this access, the system systematically refuses identification after a specific number of
unsuccessful connection attempts ((this number can be configured). This identification refusal
concerns all attempts, both correct and incorrect, for a specified time period. According to the type
of account, there are several types of operation (specified in configuration):
• No callback: the remote manager is directly connected to the Main Call server.
• Caller callback: e-RMA breaks off the call and calls back the caller. When the call is re-
established, e-RMA asks for the login and password again and then connects to the Main Call
Server.
• Call back a fixed number: e-RMA breaks off the call and calls the number specified in
configuration. When the call is established, e-RMA asks for the login and password again and
then connects to the Main Call Server.
4. The remote manager is then connected to the Main Call server. The remote manager then opens a
LINUX session by entering login and password (“mtcl” for example). The remote manager can then
use all maintenance and configuration commands as if he were using the system console.
Using several internal modems, several remote managers may connect simultaneously.
(3)
18/06/02 09:57:46 000001R|--/--/-/---|=4:4200= ALCATEL-LUCENT — RMA
call (4)
18/06/02 09:57:46 000001M|--/--/-/---|=5:2019:R0=Mise en service d'un
coupleur Z
18/06/02 09:57:46 000001M|19/01/-/---|=5:2019:R0=Mise en service d'un
coupleur INTIPA
18/06/02 09:57:51 000001M|04/00/-/---|=5:2019:R0=Mise en service d'un
coupleur INTMGD
18/06/02 09:57:52 000001M|04/05/-/---|=5:2019:R0=Mise en service d'un
coupleur NDDI
18/06/02 09:57:52 000001M|04/27/-/---|=5:2019:R0=Mise en service d'un
coupleur GPA
Attributes:
Directory No. : Enter the directory number of the e-RMA application. This number
must be a DID number that is compatible with the dialing plan.
Login attempts : Enter the number of incorrect logins that may be entered before the
procedure to deny connection is started.
Default value: 3
Unreachable delay : Enter the time for which connection will be denied. Units are mi-
nutes.
Default value: 15
Time between two inci- : Enter the maximum time for which incidents can be stored before
dent calls being transmitted. Units are minutes.
Default value: 15
Interface Type : GD
e-RMA feature : Select whether or not the internal modem of this Media Gateway can
be used by the e-RMA.
Circuit Data Security. : Select whether or not preliminary check of the calling number is to
enabled.
Direct Speed Dial No. : Enter any number compatible with the dialing plan.
Prefix
Callback number : Enter the number to be called back (including trunk seize prefix).
This parameter is only used if Call back type is set to Fixed num-
ber.
Caution:
In this case, the ARS prefix cannot be used.
For more information on the Incident Manager, see Configuration procedure on page 139.
Incident Number : Enter the number of the incident the manager wants to be transmit-
ted.
Rma Action : Select the action to be performed when the incident is received.
• None: the incident triggers no action.
• Action 0: action 0, specified below, is performed.
• Action 1: action 1, specified below, is performed.
• Action 2: action 2, specified below, is performed.
• Action 3: action 3, specified below, is performed.
Alarm center number : Enter the number of the alarm center preceded by the trunk group
seize prefix.
Caution:
In this case, the ARS prefix cannot be used.
9.3 Maintenance
9.3.1 The “ermahisto” command
This command is used to obtain a balance sheet (report) for e-RMA connections made since the last
reboot.
(1)PCX2> ermahisto -c
06/25/2002 11:05:26 CallingNumber 0155661235 UsedLogin rma
10 Alarm Sets
Alarm Set Dir. No. Repertory number of the set assigned to this function (previously
declared as user set).
3. Confirm your entries
Remark:
A same set can collect several alarms. For this, create several alarm sets and, each time, use the same directory
number.
Alarms
Memo Redial list
13030 Available Agent
Call Server -> alarm 1
Welcome guide ACR manage.
Delete Scroll
Alarms
Memo Redial list
13030 Available Agent
Incident 701 Gravity 2
Welcome guide ACR manage.
Delete Scroll
The Scroll softkey must be pressed several times to display all incident information.
• To acknowledge the incident, press the Delete softkey.
Remark:
To acknowledge an incident:
• From an Alcatel Mobile Reflexes 100/200 set, press the OK button and select the Delete option menu
• From an Alcatel Reflexes set (i.e. Advanced Reflexes), press the Cancel dynamic key
if the Alcatel-Lucent IP Touch 4068 Phone set is not off hooked, it stops ringing when timer n° 25
elapses and the LED flashing stops. The LED continues to flash if the alarm set is an Alcatel Mobile
Reflexes 100/200 set or an Alcatel Reflexes set.
To view and acknowledge the alarm from the Alcatel-Lucent IP Touch 4068 Phone set in idle state,
press the message fixed key. For the Alcatel Mobile Reflexes 100/200 sets or Alcatel Reflexes sets, the
set feature prefix of Access and Review alarms must be dialled.