iManager U2000 Unified NMS Product Description-(V100R002C01_05).pdf

March 29, 2018 | Author: Wandeto Anthony | Category: Technological Convergence, Multiprotocol Label Switching, Computer Network, Trademark, Databases


Comments



Description

iManager U2000 Unified Network ManagementSystem V100R002C01 Product Description Issue 05 Date 2010-11-19 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2010. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: http://www.huawei.com Email: [email protected] Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. i iManager U2000 Unified Network Management System Product Description About This Document About This Document Intended Audience The iManager U2000 Product Description describes the position, functional characteristics, system architecture and networking mode of the U2000, appended with standards that the U2000 complies with, and performance indexes. This document provides guides for getting the features and functionalities of the U2000. The intended audiences of this document are: l Network Planning Engineer l Data Configuration Engineer l System Maintenance Engineer Change History Updates between document issues are cumulative. Therefore, the latest document issue contains all updates made in previous issues. Changes in Issue 05 (2010-11-19) The fifth release. The fifth release has the following changes: 17.3.19 Manageable OP-Bypass Equipment is added.. Changes in Issue 04 (2010-09-24) The fourth release. The third release has the following changes: This chapter is optimized: 5.2 Security Management. Changes in Issue 03 (2010-08-16) The third release. The second release has the following changes: 3 Configuration Requirements This chapter is added to describes the software and hardware configuration requirements of the U2000. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iii iManager U2000 Unified Network Management System Product Description About This Document Changes in Issue 02 (2010-07-30) The second release. Optimize all of this document. Changes in Issue 01 (2010-03-30) Initial release. iv Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) .....................................iManager U2000 Unified Network Management System Product Description Contents Contents About This Document................. Ltd..........2 SBI..............................................2-5 2....................................2 External Interfaces...................2-1 2............................................................1 Software Structure.1 Deployment Mode.....................3-5 4 Networking and Application...........................................4-3 4............................1-6 2 System Architecture................................................................................................1 Unified Management of Network Products..............................................................2-3 2.................................................................1-1 1............................................................................................2-4 2.........................1..............................................................................................................................................4-5 4..........................................................................................................................................................3 Manageable Equipment.................................................................1 Software Structure of the U2000 Single-Server System................................................................................................................................................................................................................................4-7 4...........2 Centralized Deployment of an HA System...........................1-2 1.....................................4-12 4......................................................................................................................... v .......4 Single Backbone Solution...3-1 3...........1-3 1.....................2..3 Single Backhaul Solution..............................2 Software Configuration of the U2000 Server...1....3-3 3..........3-2 3..................................................1 Network Position.....................................4-6 4...................................................................3 Configuration of the U2000 Client................................................................................................................................3..........2-2 2......................................................................................................................................3 Application Scenarios of U2000 Management.........................................................................1-2 1.2................1-2 1.............................1................................................................................................................................................................................1 NBI.........................................................1 Hardware Configuration of the U2000 Server................................4-3 4..........4-18 Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co........................2 Single Metro Solution...........................................4-16 4..............................................iii 1 Positioning and Benefits....5 Single FAN Solution.4-4 4..............1...............................................................................3.................................2...2 Outband Networking Mode.....................................................................................1 Inband Networking Mode......2-13 3 Configuration Requirements..............................................................................................2 Product Orientation................................4-9 4.1 Network Management Trend.......................................................................................4-2 4...................2-2 2...................................................4-4 4...............................................1..................................3............................2 Product Characteristics..........................................3................................................. 4-1 4...............................................................................................2 Software Structure of the U2000 HA System (Veritas Hot Standby).................................................................................2 Networking Mode Between the U2000 and NEs...................................................................................2.......................1..........................3...1 Centralized Deployment of a Single-Server System.......................................................... ........................5-36 5......................................................................................................3 E2E MSTP Management..........................3 Topology Management.......................................................1 PTN NE Management.......................................................................10-6 10..............10-7 10.......................................................................................................................................................................................4 SDH ASON Management...................6-16 7 WDM Network Feature Management............9-19 10 Router Feature and Switch Feature Management..............................5-39 5.............................2 RTN Protection Subnet Management......2 Router V8 Management...............................................................................................................................................................................1 MSTP NE Management.......12 Report Management................................................................................................................................................................................................................................................2 E2E PTN Management.................................................................10-13 10......................................................................10-8 10.....................8-2 8....................................................................................................................................................................................................5-41 5.............................5 WDM ASON Management...............................................................10-14 10..2 Security Management...................................2 MSTP Protection Subnet Management.................................................................................................................5-42 5................................................................................7-1 7.................................................................................6 Diagnosis Management.. Ltd...................................................................................5-29 5.........6-2 6................10 DCN Management.......7-20 7............................... 5-9 5.................................................................................................................................5-42 5....1 Overview of Functions and Features...........................................................5-3 5...........3 WDM Protection Subnet Management......................... 7-2 7.10-16 vi Huawei Proprietary and Confidential Copyright © Huawei Technologies Co...................................7 Cluster Management................................................................................................................8 Database Management......................................................................................................................8-10 8...............................1 RTN NE Management.........................................................................................................................................................4 End-to-End WDM Management..................................11 NE Software Management.............................................................................Contents iManager U2000 Unified Network Management System Product Description 5 Basic Functions.............6 Inventory Management............................................................................................................5-43 5....................................................................5 Performance Management..................................................................... Issue 05 (2010-11-19) ...........................................................................................................................................5-1 5.....................................2 WDM NA NE Management..................................................6-1 6.........................................8-11 9 PTN Network Feature Management............9 NE Communication Parameter Management......8-1 8.................5-46 6 MSTP Network Feature Management............................................................................................5-34 5.............3 Automatic NE Configuration Management...............................................................10-3 10.....................................................6-11 6............................................................5-15 5.............................................................1 WDM NE Management..........................................................6-10 6....................................4 Alarm Management.7-11 7...................................................7-24 8 RTN Network Feature Management..........3 End-to-End RTN Management........................................................................................................................5-4 5............................................................................................................1 Router Management.......................................................................................................................................................................................4 Switch Management...................................................................9-1 9....................................................................................................................10-1 10..7 Log Management.......................................................................................................................7-21 7......................................................5 Template Management..........................................................................................................................................................................................................9-2 9...........................................................13 System Monitoring......... ...............................................10-18 10.......................................3 HA System.................................................................................................................................................................................................5.....................................11-5 11..........................................................................17-9 17........................4 Report Subsystem Management.....................................................................9 Report Subsystem Management.....................17-15 Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co...........5 Mapping Service...11-3 11..............................................................................................................4 Policy Resource Configuration................................................3 Centralized Security Policy Configuration.2 Equivalent NEs in the IP Domain..................................................................... Ltd......................................17-6 17...........................................1 Reliability Design...........................................15-4 15....3 Manageable Equipment..................15-5 16 Performance Indicators.....................8 Node Redounded Management......11-2 11.1 Equivalent NEs in the Transport Domain......11-7 11..............................................................................................................................................................................................................................................................................3.................................1 Policy Package Management.........................................................................................................................................13-2 14 DSLAM Network Feature Management...................................................................................................1 NE Equivalent Coefficient........................................17-3 17................................2 Single-Point Web Configuration for Security Devices.............................................................................1 Manageable MSTP Series Equipment...............................................................................................................17-14 17......................................17-2 17..16-1 17 Management Capability.....1 OLT Management............................11-1 11..........................................................................................3......11-2 11......................................1............................10-20 11 Feature Management for Security Devices ...................................................................3 Equivalent NEs in the Access Domain.............................................................. vii .........15-3 15...............................10-18 10...............................................................................................................................................11 Tunnel Service Management..........................................................................10-17 10..........................................15-2 15................................3..............................................................................1 IPSec End-to-End Service.................11-7 12 FTTx Network Feature Management.......................................11-5 11...................................15-1 15................................3 Attack Defense Configuration.....................................2 Reliability Indicator................................................................1.........................................5 VPN Service Management.....14-1 14....1......................2 Remote Access Service......................................................................................................iManager U2000 Unified Network Management System Product Description Contents 10......................................................................11-4 11...................17-10 17...................11-4 11..............................1 DSLAM Management.....................................................................................................2 ONU Management...............................................2 Management Capabilities of the U2000 on Different Hardware Platforms........................................1 MSAN Management...................................15-5 15.11-6 11...................3........................................................................4 DCN Protection..................5 Disk Mirroring......................2 Security Policy Configuration.......................................................................................5............................................13-1 13.................................................11-6 11................................................................................................................................................................17-1 17......................12-12 13 MSAN Network Feature Management......1 Security Device Management........................3.................................................................................................................................................6 Data Backup.....10 VPN Service Management...........................................................................14-2 15 Reliability...............................12-1 12..................................................................................................................................................................................................11-6 11..................15-3 15.............................................12-2 12............................................................................................3........................................................................................................................ .......8 Manageable MSAN Series Equipment..3.......3..................................3....................................3........................17-19 17.......................................................3...3........................17-26 17................................................................3......Contents iManager U2000 Unified Network Management System Product Description 17.........17-27 17...3..........................................14 Manageable VoIP Gateway Equipment........................................17-20 17.........16 Manageable Firewall Series Equipment.........17-16 17............................................................3...............................................................................6 Manageable PTN Series Equipment.........................3.............17-24 17..........................12 Manageable Metro Service Platform Equipment....17-32 18 Standards Compliance............................................17 Manageable DPI Equipment.......................................................................................................17-23 17..............................................................................11 Manageable Switch Series Equipment.3.........................3............................................................................................18 Manageable SVN Series Equipment.....2 Manageable WDM Series Equipment........17-26 17.......17-31 17.........13 Manageable Broadband Access Series Equipment.........................3............. Ltd..........................................3........17-19 17......................................................................................................7 Manageable FTTx Series Equipment....9 Manageable DSLAM Series Equipment............4 Manageable Submarine Line Equipment..............................17-32 17.............................................................A-1 viii Huawei Proprietary and Confidential Copyright © Huawei Technologies Co................................................................................3 Manageable NA WDM Series Equipment......................................................................................................................17-26 17.......5 Manageable RTN Series Equipment..................................3.............3..10 Manageable Router Series Equipment................17-23 17..............17-18 17.....................................17-19 17.............3.................17-27 17........................................................................................................15 Manageable WLAN Series equipment......................17-22 17...........19 Manageable OP-Bypass Equipment...3.................. Issue 05 (2010-11-19) .........................................18-1 A Glossary and Abbreviations............................................................................ ....................................................5-14 Figure 5-10 Relationships between alarm states.............................................. 1-4 Figure 2-1 U2000 software structure....................4-10 Figure 4-7 SingleBackhaul solution...................4-19 Figure 4-10 FTTx predeployment flow......................................................................................................................................5-13 Figure 5-9 Clock view and its functions....................................................................................................................................................................................................4-5 Figure 4-4 Example network in outband networking mode....................................................................................................5-18 Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co..................................................................... Ltd................................................................................................................................................4-17 Figure 4-9 Networking application of the FTTx access network management.............................................................................2-4 Figure 2-4 Functions of external interfaces.......................................4-4 Figure 4-3 Example network in inband networking mode.....................................................................................................................................................................1-3 Figure 1-2 Centralized network management................5-8 Figure 5-5 LDAP user authentication..........4-25 Figure 5-1 Basic functions of the U2000.............................. 5-1 Figure 5-2 Security management overview........................................................................................2-5 Figure 4-1 Centralized deployment of the single-server system....................................................................................................................................................................................................................4-22 Figure 4-13 PnP function of the MDU after replacement................................................................................................................4-6 Figure 4-5 Unified management of network products...................................... 5-5 Figure 5-4 RADIUS-based user authentication...................................4-3 Figure 4-2 Centralized deployment of the HA system................ 4-8 Figure 4-6 Network management solution for a single metro network....................................................iManager U2000 Unified Network Management System Product Description Figures Figures Figure 1-1 Position of the U2000 in the TMN hierarchy.................................5-17 Figure 5-12 Alarm panel.........................2-2 Figure 2-2 Veritas hot standby HA system (Solaris) software structure..............................................5-12 Figure 5-8 Illustration of automatic topology discovery...............................................................................................................5-10 Figure 5-7 Alarm display in the topology view....................................................................................................................................................4-24 Figure 4-15 Implementation of the fast service cutover................................................4-13 Figure 4-8 Network management solution for a single backbone network............................................................................................................................................................................................................................................................................................................................................................................................................................... ix ............................................ 5-9 Figure 5-6 Topology view and its functions.........................................................................................................................................................................5-17 Figure 5-11 Alarm reporting and handling flowchart............4-20 Figure 4-11 FTTx fault diagnosis (1)...................................................................................................................................4-24 Figure 4-14 Implementation of the dual homing protection................................................4-22 Figure 4-12 FTTx fault diagnosis (2)................................................................................5-4 Figure 5-3 Right..................................................2-3 Figure 2-3 Veritas hot standby HA system (Windows) software structure................................................................. ................................................................................9-14 Figure 9-4 E-Line Service.......................................................................................................................................................5-29 Figure 5-22 Performance management process.................iManager U2000 Unified Network Management System Product Description Figures Figure 5-13 Alarm bar chart.........................................................................5-40 Figure 5-28 Diagram of the NE resource report.....................9-17 Figure 10-1 Cluster topology.................5-27 Figure 5-19 Various alarm notification means.................................................................. and a task.......................................................................... an instance...........10-16 Figure 10-2 Navigation path to cluster functions......................................................................................................................................9-16 Figure 9-7 E-LAN service ......................................................................................................................9-15 Figure 9-5 E-AGGR service scenario 1.....5-35 Figure 5-25 Log management window and functions.............................................................................5-32 Figure 5-24 Inventory management window and its functions........................................................................................................................................................5-38 Figure 5-27 NMS database management..................................5-46 Figure 5-30 System monitoring processes.5-26 Figure 5-18 Difference between alarm masking and alarm suppression............................................................................................................. Ltd..................................................................................................................................5-37 Figure 5-26 Window and functions of dumping and exporting logs.................................................................................................................5-47 Figure 5-31 System monitoring information..................................................5-45 Figure 5-29 Diagram of the network resource report........................................................10-17 Figure 15-1 Switchover between active and standby sites in HA system..................................5-23 Figure 5-16 Relationships between a root alarm and its correlative alarms...................................................................................................................................................................................................................................................................................................................................................................................................5-24 Figure 5-17 Alarm synchronization..........................15-4 x Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.............5-28 Figure 5-21 Alarm maintenance experience base........................................................................5-19 Figure 5-14 Viewing alarms........... Issue 05 (2010-11-19) .........9-16 Figure 9-6 E-AGGR service scenario 2.........5-27 Figure 5-20 Alarm association..........................................................................................................................................................9-11 Figure 9-2 CES service application model.................................................................................5-31 Figure 5-23 Relationships between a template..............................5-20 Figure 5-15 Alarm correlation analysis.............................................5-48 Figure 9-1 Unicast MPLS tunnel ..................................................................................9-13 Figure 9-3 ATM service application model...................................................................................................................................................................................................................................................................................................................................................................................................................................................... ................................................................................2-7 Table 3-1 Configuration requirements of the U2000 servers that manage networks of different scales ................................................................................................................................................9-3 Table 15-1 Reliability indicators of the U2000...........................................................................................................................................................................................................................3-5 Table 3-6 Hardware and software configuration requirements of the U2000 client..............................................................................................................17-18 Table 17-8 Manageable submarine line equipment.....................16-1 Table 16-2 DCN bandwidth requirements.....................5-15 Table 5-3 Alarm display functions..............................................................................................iManager U2000 Unified Network Management System Product Description Tables Tables Table 2-1 NBI functions supported by transport equipment..................... xi ......3-3 Table 3-4 High availability software..........................................................................4-23 Table 5-1 Overview of functions and features of the U2000......................................................................................................................................................................... 5-3 Table 5-2 Alarm severity....................................................................................5-20 Table 5-5 Performance monitoring templates............................................17-20 Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co........................................17-3 Table 17-2 Management capabilities of the U2000 on different IP NE Equivalents............................................................................................. 4-2 Table 4-2 Relationships between faults and their causes that are identified by means of the alarm-based root cause identification.................................................................................................................................................................................................................................................................................................................17-10 Table 17-4 Management capabilities of the U2000 on different hardware platforms.....................................................17-19 Table 17-10 Manageable PTN series equipment................................................................................................................................5-35 Table 5-7 Resource Report............................................................................................................................................................................................................................................................................17-15 Table 17-6 Manageable WDM equipment.....................3-5 Table 4-1 Deployment modes of the U2000...............17-17 Table 17-7 Manageable NA WDM equipment........17-19 Table 17-9 Manageable RTN equipment........15-3 Table 15-2 Data backup.......................17-11 Table 17-5 Manageable MSTP series equipment..........................................................................................................................................................................5-44 Table 9-1 Types of PTN service interfaces...................................................................................................................................................................................16-2 Table 17-1 Management capabilities of the U2000 on different OptiX NE Equivalents......3-2 Table 3-3 System software of the U2000... 3-2 Table 3-2 Recommended configurations of the disk array......................................................................... Ltd..........................2-6 Table 2-2 NBI functions supported by access equipment.3-4 Table 3-5 Software Configurations of the U2000........................................5-31 Table 5-6 Statistical items for resource inventory management.....2-6 Table 2-3 NBI functions supported by IP equipment........................................................................5-19 Table 5-4 Alarm function.................................................................................................................................................................................................................................................17-6 Table 17-3 Management capabilities of the U2000 on different access NE Equivalents....................................................................15-5 Table 16-1 Performance indicators.......................................................................................... ........................................................................................................................................17-20 Table 17-12 Manageable MSAN series equipment...............17-32 Table 17-22 Manageable SVN series equipment.....................17-22 Table 17-13 Manageable DSLAM series equipment................................................................18-2 xii Huawei Proprietary and Confidential Copyright © Huawei Technologies Co..................................................17-23 Table 17-14 Manageable router series equipment..........................................17-32 Table 17-23 Manageable OP-Bypass equipment.................................17-26 Table 17-17 Manageable broadband access series equipment..................................................................................................................................................................................................17-27 Table 17-19 Manageable WLAN series equipment.........................................................................................................17-24 Table 17-15 Manageable switch series equipment.............................................................................................................................................................................................Tables iManager U2000 Unified Network Management System Product Description Table 17-11 Manageable FTTx series equipment...17-27 Table 17-20 Manageable firewall series equipment...... Issue 05 (2010-11-19) ................17-32 Table 18-1 Details of the Standards and Protocols............................17-26 Table 17-18 Manageable VoIP gateway equipment................................17-27 Table 17-21 Manageable DPI equipment.......................................................................................................17-24 Table 17-16 Manageable Metro service platform equipment................................................................................................. Ltd......................................................................................................................... 1. scalability. 1. and the equipment that the U2000 can manage.1 Network Position This topic provides information about the development trend of network management and the position of the U2000 in the TMN hierarchy. 1. Ltd. and ease of use to construct a customer-centered and future-oriented NMS of a new generation.2 Product Characteristics The U2000 improves the capability of managing converged networks.iManager U2000 Unified Network Management System Product Description 1 1 Positioning and Benefits Positioning and Benefits About This Chapter This topic describes the position of the iManager U2000 unified network management system (hereinafter referred to as U2000) in the telecommunications management network (TMN). the product characteristics. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 1-1 .3 Manageable Equipment This topic provides information about the equipment that the U2000 V100R002C01SPC003 can manage.. l The U2000 is a unified network management system (NMS) of multiple domains and it aims to minimize operation and maintenance (O&M) costs for customers and to bring more network benefits. the telecommunications industry has witnessed tremendous changes. and consumer electronic industries. which bring changes in the market orientation and business modes of carriers. In the TMN hierarchy. the U2000 combines all-IP and FMC and manages bearer and access equipment in a centralized manner. which bring changes in the market orientation and business modes of carriers. 1. and supports all functions of the element and network management layers. the telecommunications industry has witnessed tremendous changes. 1. media.2 Product Orientation The U2000 is the equipment management system developed by Huawei and is also the major and future-oriented network management product and solution.2 Product Orientation The U2000 is the equipment management system developed by Huawei and is also the major and future-oriented network management product and solution.1. l The U2000 can perform not only integrated management of multi-domain equipment but also integrated management at the element and network management layers.1. l Network convergence requires network management to be consolidated. 1. lowering operation expenditure (OPEX).1.1. To be oriented to the future network development trend. Ltd. Figure 1-1 shows the position of the U2000 in the TMN hierarchy. Broadband services and mobile services have become the mainstream services on telecommunications networks and convergence of networks is being implemented widely. IT. media. l The development of the all-IP architecture is a leading factor in the transition from the existing vertical network that is divided by technology and service to the flattened horizontal network.. Broadband services and mobile services have become the mainstream services on telecommunications networks and convergence of networks is being implemented widely. and improving efficiency are the driving forces for fixed-mobile convergence (FMC).1 Network Position This topic provides information about the development trend of network management and the position of the U2000 in the TMN hierarchy.iManager U2000 Unified Network Management System Product Description 1 Positioning and Benefits 1. IT. 1. The U2000 has revolutionized the layer-based management mode to meet the management requirements in the transition from the existing vertical network to the flattened horizontal network. l Improving user experience.1 Network Management Trend With the development of IT and IP technologies and the convergence of telecommunications. 1-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1 Network Management Trend With the development of IT and IP technologies and the convergence of telecommunications. the U2000 is located at the element management layer and network management layer. and consumer electronic industries. Issue 05 (2010-11-19) . scalability. and PTN equipment. access equipment. the U2000 manages end-to-end (E2E) services across domains in access and bearer networks. PTN. In addition. it manages Huawei products and services of the products. microwave. The services include SDH. firewall services. switches. routers. WDM. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and switch services.iManager U2000 Unified Network Management System Product Description 1 Positioning and Benefits Figure 1-1 Position of the U2000 in the TMN hierarchy 1. Ltd. the services include FTTx.2 Product Characteristics The U2000 improves the capability of managing converged networks. WDM. DSLAMs. OTN. packet.. MSANs. Centralized Network Management The U2000 manages transport equipment. The products include MSTP. microwave. 1-3 . and ease of use to construct a customer-centered and future-oriented NMS of a new generation. CX. as shown in Figure 1-2. Specifically. and IP equipment in a centralized manner. modularized. the U2000 supports smooth online increase in management capability from a single domain to multiple domains. The U2000 provides high-end solutions for largescale networks and low-cost solutions for small. In this way. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and componentized architecture design. multiprocessing. the U2000 supports distributed and hierarchical database system. and client application system and it also supports concurrent operations of multiple clients. thereby decreasing the degree of the coupling of NE management components. and Solaris.. service processing system. Windowsoperating systems (OSs).and medium-scale networks. l The loose coupling framework supports the independent upgrade and maintenance of subsystems. Issue 05 (2010-11-19) . Sybase databases. Modularized architecture is scalable so that the U2000 meets the management requirements of complex and large-scale networks. It supports Sun workstations. it is compatible with multiple OSs. Leading Scalable NMS Architecture By adopting the mature and widely-used client/server (C/S) architecture. PC servers. SQL Server databases. Ltd. Hence. 1-4 l The U2000 uses an object-oriented. l The U2000 has the capability of flexibly integrating NBIs.iManager U2000 Unified Network Management System Product Description 1 Positioning and Benefits Figure 1-2 Centralized network management Multiple Operating Systems The U2000 is developed based on the integrated management application platform (iMAP) of Huawei. The U2000 is a stand-alone application that can be installed on different OSs and databases. and SDH clock) and addition of the clocks to the clock topology view. which speeds up network deployment and service provisioning of a large number of microwave services. synchronous Ethernet clock.. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and trend analysis in the GUI. – Provides the unified topology view of network-wide clocks and refreshes the tracking relationships and synchronization status of the clocks when faults occur in networks. l Service deployment: – Provides templates to set service-related parameters once instead of setting parameters repeatedly. – Calculates static routes and allocates labels automatically. Cross-Domain E2E Service Provisioning l Supports E2E TDM service provisioning and management across traditional microwave and MSTP networks. l Supports E2E packet service provisioning and management across IP microwave and PTN/ Hybrid MSTP networks. – Provides bearer relationships to quickly locate and rectify faults.iManager U2000 Unified Network Management System Product Description 1 Positioning and Benefits Visualized Management l Service supervision: – Supports service-centered visualized supervision and the function of querying affected services by alarm. Hierarchical object relationships represent the bearer relationships explicitly. 1-5 . l Object relationship: – Associates services with tunnels and tunnels with routes. increasing the configuration efficiency. – Provides abundant detection and diagnosis methods based on services to quickly check service connectivity and locate faults. l Network-wide clock: – Supports the automatic discovery of clocks (1588 clock. Ltd. threshold pre-warning. tracking relationships. – Supports service-based performance query. without manual intervention. – Monitors clock status and displays clock alarms. – Supports bulk deployment of services. and protection status in real time. which accelerates service provisioning in an IP network. SW. and ATM) provisioning across PTN and CX networks. and supports E2E management of MPLS tunnels and PWs. CES. CES. Issue 05 (2010-11-19) . 1. which push the mobile market towards FMC.3 Manageable Equipment This topic provides information about the equipment that the U2000 V100R002C01SPC003 can manage. Ltd.iManager U2000 Unified Network Management System Product Description 1 Positioning and Benefits l Supports Ethernet. MSTP. and ATM service management for PTN. RTN. l Supports E2E service (Ethernet. For information about the equipment of specific types that the U2000 V100R002C01SPC003 can manage. which push the fixed market towards fixed-mobile convergence (FMC). see the following topics: 1-6 l Manageable MSTP Series Equipment l Manageable WDM Equipment l Manageable NA WDM Equipment l Manageable Submarine Line Equipment l Manageable RTN Equipment l Manageable PTN Equipment l Manageable FTTx Access Series Devices l Manageable MSAN Series Devices l Manageable DSLAM Series Devices l Manageable Router Series Devices l Manageable Switch Series Devices l Manageable Metro Service Platform Devices l Manageable Broadband Access Series Devices l Manageable VoIP Gateway Devices l Manageable WLAN Series Devices l Manageable Firewall Series Devices l Manageable DPI Equipment l Manageable SVN Series Devices l Manageable OP-Bypass Equipment Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and NE40 devices.. and supports E2E management of MPLS tunnels and PWs. 2-1 . fast integration between OSS and the U2000.iManager U2000 Unified Network Management System Product Description 2 System Architecture 2 System Architecture About This Chapter The U2000 provides solutions to single-layer management for small. NBIs jointly developed by Huawei and mainstream OSS vendors are widely used by 72% of the top 50 carriers worldwide. the U2000 provides standard external interfaces. In addition.. 2. Currently. through which the U2000 is interconnected with an upper layer management system to form a hierarchical management network. Ltd.2 External Interfaces The U2000 offers abundant northbound interfaces (NBIs) that help to achieve unified management of transport. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and better quality of customer service. IP. and access equipment. The U2000 assists the system at the network management layer and the system at the service management layer to manage large-scale networks. 2.1 Software Structure This topic describes the software structure of the U2000 single-server system and U2000 HA system.and medium-scale networks. 2 Software Structure of the U2000 HA System (Veritas Hot Standby) This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).1 Software Structure of the U2000 Single-Server System This topic describes the software structure of the U2000 single-server system. Issue 05 (2010-11-19) .iManager U2000 Unified Network Management System Product Description 2 System Architecture 2. In the U2000 single-server system. there is only one U2000 server but multiple U2000 clients. The clients can gain access to the server at the same time. 2.. 2.1.1 Software Structure of the U2000 Single-Server System This topic describes the software structure of the U2000 single-server system.1. Ltd.1. 2. Figure 2-1 shows the structural relationships between main modules of the U2000 single-server system.1 Software Structure This topic describes the software structure of the U2000 single-server system and U2000 HA system. Figure 2-1 U2000 software structure 2-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. 2-3 . Figure 2-2 Veritas hot standby HA system (Solaris) software structure Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.2 Software Structure of the U2000 HA System (Veritas Hot Standby) This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).iManager U2000 Unified Network Management System Product Description 2 System Architecture 2..1. The U2000 HA system (Veritas Hot Standby) applies to geographic redundancy of an HA system. Figure 2-2 and Figure 2-3 show the software structure. The U2000 HA system (Veritas Hot Standby) supports the Solaris and Windows. and better quality of customer service. and diagnosis test.. Figure 2-4 shows the functions of external interfaces. NBIs jointly developed by Huawei and mainstream OSS vendors are widely used by 72% of the top 50 carriers worldwide. Issue 05 (2010-11-19) . CORBA. the U2000 can integrate with the OSS in a fast and holistic manner. In addition to conventional NBIs such as SNMP. and TL1 NBIs.2 External Interfaces The U2000 offers abundant northbound interfaces (NBIs) that help to achieve unified management of transport. and access equipment. IP. service provisioning. the U2000 offers the XML NBI that is based on the MTOSI 2. Ltd. including alarm management. The XML NBI provides multiple extensible functions.iManager U2000 Unified Network Management System Product Description 2 System Architecture Figure 2-3 Veritas hot standby HA system (Windows) software structure l The Veritas volume replicator (VVR) is used to duplicate the U2000 data on the primary site to the secondary site so that data is synchronized between the primary and secondary sites in real time. the VCS restarts or stops the application service.0 standards. inventory management. l The Veritas volume manager (VxVM) is used to manage the disks and data volumes of servers. l The Veritas cluster server (VCS) is used to monitor the system and application service in real time. 2-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. fast integration between OSS and the U2000. By using these interfaces. Currently. 2. performance management. When a fault occurs in hardware or software. 2. The NBIs support network management functions.1 NBI The U2000 offers extensive network monitoring information. the U2000 can connect to NEs and manage them. SSH.1 NBI The U2000 offers extensive network monitoring information. Ltd. for OSSs through northbound interfaces (NBIs).2. The NBIs support network management functions. such as alarms. performance statistics.2 SBI Using the southbound interface (SBI). performance statistics. such as service provisioning and diagnosis test. 2. and inventory information.iManager U2000 Unified Network Management System Product Description 2 System Architecture Figure 2-4 Functions of external interfaces 2. and Telnet SBIs. 2-5 . for OSSs through northbound interfaces (NBIs). such as service provisioning and diagnosis test. and inventory information. Through the NBIs. Qx.2.. NOTE Supported Issue 05 (2010-11-19) ■ Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the U2000 can integrate with different OSSs flexibly. Through the NBIs. such as alarms. 2. The U2000 supports the following SBIs: SNMP. the U2000 can integrate with different OSSs flexibly. CLI. For details. Ltd. see the following tables.iManager U2000 Unified Network Management System Product Description 2 System Architecture Not supported □ The equipment of each product domain supports different NBI functions. Issue 05 (2010-11-19) . Table 2-1 NBI functions supported by transport equipment Interfa ce Feature MSTP Hybir d MSTP WDM OTN TDM RTN Packet RTN Marin e XML Alarm ■ ■ ■ ■ ■ ■ ■ Performa nce ■ □ ■ ■ □ □ □ Inventory ■ □ ■ ■ □ □ □ Service provisioni ng □ □ □ □ □ □ □ Alarm ■ ■ ■ ■ ■ ■ ■ Performa nce ■ □ ■ ■ ■ □ □ Inventory ■ □ ■ ■ ■ □ □ Service provisioni ng ■ □ ■ ■ ■ □ □ SNMP Alarm ■ ■ ■ ■ ■ ■ ■ FTP Performa nce ■ ■ ■ ■ ■ ■ ■ TL1 Inventory □ □ □ □ □ □ □ Service provisioni ng □ □ □ □ □ □ □ Diagnosis test □ □ □ □ □ □ □ CORB A Custom er OSS Test Table 2-2 NBI functions supported by access equipment 2-6 Interface Feature DSLAM GPON/FTTx XML Alarm ■ ■ Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. iManager U2000 Unified Network Management System Product Description Interface 2 System Architecture Feature DSLAM GPON/FTTx Performance □ □ Inventory ■ ■ Service provisioning □ ■ Alarm ■ ■ Performance □ □ Inventory □ □ Service provisioning □ □ SNMP Alarm ■ ■ FTP Performance ■ ■ TL1 Inventory ■ ■ Service provisioning ■ ■ Diagnosis test ■ ■ CORBA Customer OSS Test Table 2-3 NBI functions supported by IP equipment Interface Feature NE CX Switch PTN XML Alarm ■ ■ ■ ■ Performance ■ ■ ■ ■ Inventory ■ ■ ■ ■ Service provisioning ■ ■ ■ ■ Alarm ■ ■ ■ ■ Performance □ □ □ ■ Inventory □ □ □ ■ Service provisioning □ □ □ ■ SNMP Alarm ■ ■ ■ ■ FTP Performance ■ ■ ■ ■ TL1 Inventory □ □ □ □ Service provisioning □ □ □ □ CORBA Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. 2-7 .. the XML NBI enables the U2000 to provide unified alarm. such as logical ports. performance. such as NEs. tunnels. performance. inventory. fibers or cables. and physical ports – Query of logical inventory. The XML NBI supports the following functions: l Alarm management – Alarm reporting – Synchronization of active alarms – Alarm acknowledgment – Alarm unacknowledgment – Collection of alarm statistics l Performance management – Query of history performance data – Query of current performance data – Reporting of performance threshold-crossing events – Query of performance threshold-crossing events l Inventory management – Query of physical inventory.. SHDSL ports. Ltd. and service provisioning management on access equipment for OSSs. inventory. Issue 05 (2010-11-19) . and service provisioning management on transport equipment for OSSs. boards.iManager U2000 Unified Network Management System Product Description 2 System Architecture Interface Feature NE CX Switch PTN Customer OSS Test Diagnosis test □ □ □ □ XML NBI (Transport) Complying with the TMF MTOSI 2. shelves. The XML NBI supports the following functions: l Alarm management – Alarm reporting – Synchronization of active alarms – Alarm acknowledgment – Alarm unacknowledgment – Collection of alarm statistics l Inventory management – Query of IP DSLAM inventory (ADSL ports. and services – Export of inventory data and reporting of changes in inventory XML NBI (Access) Complying with the TMF MTOSI 2. slots.0 series standards. and templates) 2-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the XML NBI enables the U2000 to provide unified alarm.0 series standards. and physical ports – Query of logical inventory.5 series standards. such as NEs. boards. performance. the XML NBI enables the U2000 to provide unified alarm.0 series standards. fibers or cables. performance.. shelves. inventory. Ethernet PWE3. the CORBA NBI enables the U2000 to provide unified alarm management and inventory management. and diagnosis test management for transport equipment. Ltd. and services – Export of inventory data and reporting of changes in inventory – QoS management l Service provisioning management – Provisioning of route and MAN tunnel resources (MPLS tunnels and IP tunnels) – Provisioning of route and MAN service resources (ATM PWE3. and service provisioning management on IP equipment for OSSs. 2-9 . such as logical ports. slots. The CORBA NBI supports the following functions: l Alarm management – Alarm reporting – Synchronization of active alarms – Alarm acknowledgment – Alarm unacknowledgment Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The XML NBI supports the following functions: l Alarm management – Alarm reporting – Synchronization of active alarms – Alarm acknowledgment – Alarm unacknowledgment – Collection of alarm statistics l Performance management – Query of history performance data – Query of current performance data – Reporting of performance threshold-crossing events – Query of performance threshold-crossing events l Inventory management – Query of physical inventory.iManager U2000 Unified Network Management System Product Description l 2 System Architecture Service provisioning management – Provisioning of FTTH services (GPON) XML NBI (IP) Complying with the TMF MTOSI 2. and L3VPN) – ANCP service management CORBA NBI (Transport) Complying with the TMF MTNM V3. CES PWE3. The CORBA NBI also enables the U2000 to provide service provisioning. tunnels. VPLS. the CORBA NBI enables the U2000 to provide unified alarm management. the CORBA NBI enables the U2000 to provide unified alarm management. fibers or cables. and LT tests – 2M pseudo random binary sequence (PRBS) tests – OAM management on MPLS LSP. and MSTP) in the transport domain l Diagnosis test management – Port loopback and alarm insertion – Ethernet CC. PWE3 and VPLS services CORBA NBI (Access) Complying with the TMF MTNM V3. The CORBA NBI supports the following functions: l Alarm management – Alarm reporting – Synchronization of active alarms – Alarm acknowledgment – Alarm unacknowledgment – Collection of alarm statistics CORBA NBI (IP) Complying with the TMF MTNM V3. shelves. slots.5 series standards. the CORBA NBI enables the U2000 to provide service provisioning and performance management for metropolitan area network (MAN) equipment. such as NEs. and physical ports – Query of logical inventory.5 series standards. OTN. OTN.. LB. The CORBA NBI supports the following functions: l Alarm management – Alarm reporting – Synchronization of active alarms – Alarm acknowledgment 2-10 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In addition. and RTN) in the transport domain – Provisioning of per-NE services (SDH.iManager U2000 Unified Network Management System Product Description 2 System Architecture – Collection of alarm statistics l Performance management – Query of history performance data – Query of current performance data – Reporting of performance threshold-crossing events – Query of performance threshold-crossing events l Inventory management – Query of physical inventory. such as logical ports. MSTP. WDM. WDM. Ltd. Issue 05 (2010-11-19) . PW. ASON. boards. and trails l Service provisioning management – Provisioning of end-to-end (E2E) services (SDH. Ltd. slots. such as NEs. 2-11 . fibers or cables. The TL1 NBI supports the following functions: l Service provisioning management for access equipment – Provisioning of xDSL (ADSL.. CES PWE3. broadband. shelves. and VDSL2) services – Provisioning of xPON (GPON and EPON) services – Provisioning of multicast services – Provisioning of voice services – Provisioning of services for the BRAS – Management of service virtual ports and PVCs – Management of VLANs – Management of Ethernet ports Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. SHDSL. and trails – QoS management and protection management l Service provisioning management for MAN equipment – Provisioning of services for MAN tunnels (MPLS tunnels and IP tunnels) – Provisioning of MAN services (ATM PWE3. inventory query. and physical ports – Query of logical inventory. such as logical ports. Ethernet PWE3. the SNMP NBI enables the U2000 to provide unified alarm management for OSSs. The SNMP NBI supports the following functions: l Alarm reporting l Synchronization of active alarms l Alarm acknowledgment l Alarm unacknowledgment l Heartbeat alarm reporting l Setting of alarm filter criteria TL1 NBI Complying with the GR 831 standard.iManager U2000 Unified Network Management System Product Description 2 System Architecture – Alarm unacknowledgment – Collection of alarm statistics l Performance management for MAN equipment – Query of history performance data – Query of current performance data – Reporting of performance threshold-crossing events – Query of performance threshold-crossing events l Inventory management for MAN equipment – Query of physical inventory. and narrowband services). and VPLS) SNMP NBI Complying with the SNMP v1/v2c/v3 standard. the TL1 NBI enables the U2000 to provide service provisioning (xDSL. and inventory provisioning in the access domain for OSSs. boards. xPON. daughter boards. Issue 05 (2010-11-19) . The U2000 exports performance statistics to a specified FTP server for analysis purposes. and captures and releases ADSL lines. Narrowband line test NBI tests narrowband access devices (lines and terminals). boards. shelves. and service ports – Notification of resource changes – Management and maintenance of resources FTP Performance NBI The FTP performance NBI enables the U2000 to provide performance statistics export for OSSs. such as equipment. Ltd. The FTP performance NBI supports the following functions: l Setting of the following conditions for exporting performance statistics: – Monitoring period of performance events – Monitoring indicator of performance events – Export period of performance statistics l Export of performance statistics to a specified FTP server Customer OSS Test NBI The customer OSS test NBI includes two types of NBI: narrowband line test NBI and ADSL line test NBI. ADSL line test NBI queries ADSL ports. The customer OSS test NBI supports the following functions: l Narrowband line test NBI: – Dial tone test for POTS users – Feed voltage test for POTS users – Loop current test for POTS users – Line test for POTS users – Ringing test for POTS users – DTMF or pulse test for POTS users – Howler tone test for POTS users – Circuit test for ISDN user – Line test for ISDN users – NT1 terminal test for ISDN users – Narrowband line capture test – Narrowband line release test – Ringing current voltage test – Stopping a test l ADSL line test NBI: – Query of the information about an ADSL user port – Controlling of the DSLAM test bus 2-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 2 System Architecture – Management of ACL and QoS l Inventory management for access equipment – Query of resources. ports.. iManager U2000 Unified Network Management System Product Description 2 System Architecture – Loopback diagnosis test performed at the central office end on the user port – OAM test 2. The Telnet protocol transmits communication data in plain text. The SSH protocol ensures the security of network communications by means of authentication. Qx interfaces are classified into Qx4 interfaces and Qx5 interfaces (Qx4 is the earlier version). l Similar to Telnet. switches. the SSH protocol encrypts data at the application layer. and security equipment. Qx interfaces support data transmission over media such as in-band DCCs or ECCs and out-of-band channels. WDM. The SSH protocol supports authentication by password and RSA. and OTN equipment. Secure Shell (SSH) is also a TCP/IP-based network management protocol at the application layer. SSH. such as MSTP. and authorization. featuring low overheads. Through the SNMP SBI. Using the TCP protocol at the transmission layer. the U2000 can be connected to Huawei routers. the Telnet protocol provides services for network communication. The U2000 uses Qx interfaces to connect and manage transport equipment. The Telnet and STelnet SBIs compensate the disadvantages of the SNMP SBI and allow the U2000 to perform more management functions. SNMP uses the UDP protocol at the transmission layer. encryption. transmits encrypted data. Through the Telnet and STelnet SBIs. the U2000 can connect to NEs and manage them. Ltd. Using the TCP protocol at the transmission layer. RTN. The U2000 supports the following SBIs: SNMP. Qx. and high efficiency. however. and Telnet SBIs. and security access equipment. which speeds up the transmission. standard structures. Through the Telnet SBI. The SSH protocol. Qx5 interfaces are used for managing transport equipment later than the OptiX 2500+. SNMP is a TCP/IP-based network management protocol at the application layer. you can log in to an NE in the CLI and run commands directly in the CLI to maintain and configure the NE. The U2000 supports the SNMP SBI that complies with the SNMP v1/v2c/v3 standard. CLI.2 SBI Using the southbound interface (SBI). In addition. the SSH protocol transmits compressed data. 2-13 . Through the SNMP SBI. The U2000 can adapt to various protocols. PTN.2. the U2000 can be connected to Huawei routers. which is not secure. l Telnet is a TCP/IP-based network management protocol at the application layer.. the U2000 can manage the network equipment that supports proxy processes. Qx interfaces use a protocol based on standard TCP/IP packets. switches. Qx4 interfaces are used for managing the OptiX 2500+ and earlier transport equipment. They are used for private communications. Telnet/SSH Telnet (STelnet) SBI The Telnet and STelnet SBIs are a basic type of interface used for remote login to and management of NEs. Qx Interface Qx interfaces are simplified interfaces based on the Q3 interfaces defined in ITU-T recommendations. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. SNMP SBI The SNMP SBI is used to connect and manage SNMP equipment. TFTP. l SSH FTP (SFTP) uses the SSH protocol to provide secure file transfer and processing. FTP. FTP. The TFTP protocol does not support password configuration and transfers file contents in plain text. l File Transfer Protocol (FTP) is a set of standard protocols used for transferring files on networks. upgrading NE software. as compared with FTP and SFTP.iManager U2000 Unified Network Management System Product Description 2 System Architecture TFTP/FTP/SFTP SBI The TFTP. With the Syslog SBI. and loading patches. Syslog SBI The Syslog SBI serves as an interface for the U2000 to receive system logs from NEs. l Trivial File Transfer Protocol (TFTP) is a basic and standard protocol that requires least extra overheads. the U2000 can manage NE logs. Issue 05 (2010-11-19) . to upload and download files. and SFTP are TCP/IP-based network management protocols at the application layer and are dependent on the UDP protocol. Ltd. 2-14 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. passwords and data are encrypted during transmission. and SFTP SBIs are used for backing up NE data. The FTP protocol transfers passwords and file contents in plain text. For data backup using the SFTP protocol. 3-1 .2 Software Configuration of the U2000 Server This topic describes the software that can be configured for the NMS server.3 Configuration of the U2000 Client This topic describes the requirements on software and hardware configuration when the U2000 client runs on the Windows and Solaris OSs. 3.iManager U2000 Unified Network Management System Product Description 3 3 Configuration Requirements Configuration Requirements About This Chapter This topic describes the software and hardware configuration requirements of the U2000 server and client. 3. 3. Ltd. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. including system software and NMS software.1 Hardware Configuration of the U2000 Server This topic describes the hardware configuration requirement of the U2000 server. memory: 8 GB.2 GHz. Issue 05 (2010-11-19) .13 GHz or later. l If multiple configuration schemes can meet the requirements of the current network scale. hard disk: 6 x 146 GB) Sun M4000 (CPU: 4 CPU x 2.iManager U2000 Unified Network Management System Product Description 3 Configuration Requirements 3.4 GHz. 3-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1 Hardware Configuration of the U2000 Server This topic describes the hardware configuration requirement of the U2000 server.0 GHz or later. Configuration Principles l Select proper hardware configurations according to the network scale. memory: 16 GB.53 GHz (quatri-core). memory: 32 GB. hard disk: 4 x 146 GB) - Server (Solaris) Sun T5220 (CPU: 4C x 1. hard disk: 5 x 146 GB) HP DL580G5 (CPU: 4 x Xeon quatri-core 2. hard disk: 6 x 146 GB) Sun T5220 (CPU: 8C x 1. hard disk: 2 x 146 GB) + disk array Server Type Table 3-2 Recommended configurations of the disk array Hardware Configuration Item Capacity OceanStor S2600 6 x 300 GB You need to determine hardware configurations according to the network scales and the management capacities of the NMSs based on different hardware platforms. memory: 16 GB. determine the specific hardware configurations according to the requirements of customers. memory: 32 GB. Configuration Requirements Table 3-1 Configuration requirements of the U2000 servers that manage networks of different scales Network Scale Small-scale network: less than 2000 equivalent NEs Medium-scale network: 2000-6000 equivalent NEs Large-scale network: 6000-15000 equivalent NEs PC Server (Windows) HP DL380G6 (CPU: 2 x Xeon quatri-core 2.. Ltd. Configuration Principles The software for the U2000 server is as follows: l System software: It includes the operating system software and database software. Solaris. Configuration Requirements The U2000 can run on multiple OSs.0. l High availability software: It refers to the Veritas software that is applicable to only the high availability system.3 with EBF16476 + EBF16548 OS Windows Server 2003 Standard Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. see 3. including Windows. English 3-3 . Ltd.iManager U2000 Unified Network Management System Product Description 3 Configuration Requirements NOTE If the HA system is applied. l NMS software: It refers to the software developed by Huawei. The NMS software in this document refers to the U2000 software. you need to multiply the hardware quantity by 2. To select the required system software. the following hardware requirements need to be met: l Two M4000s and two OceanStor S2600s.2 Software Configuration of the U2000 Server This topic describes the software that can be configured for the NMS server.. For example. if the current large-scale network applies the HA system.0. Table 3-3 lists the configuration standards of the system software. including system software and NMS software. Table 3-3 System software of the U2000 Item Software Platform Software Type Version Supported OS Language Delivered software platform x86 (Windows 32 bit) OS Windows Server 2003 R2 Enterprise +SP2 Chinese SPARC (Solaris 64 bit) Compatible software platform Issue 05 (2010-11-19) x86 Windows (32 bit) Database SQL Server 2000 Standard + SP4 OS Solaris 10 (10/08) + Huawei Patch 9.1 Database Sybase 15. 3.1 Hardware Configuration of the U2000 Server. 0 and earlier versions + Watchman scheme Windows Delivered configurations: Veritas 5. Table 3-4 shows the Veritas software versions in each platform. Ltd.1 l Configurations no longer supported: Veritas 4..5 x86 Windows (32 bit) OS Windows 2000 Server Database MS SQL Server 7. can be installed through the installation DVD or the installation package.1 l Compatible configurations: Veritas 5. the U2000 server software.iManager U2000 Unified Network Management System Product Description 3 Configuration Requirements Item Software Platform Software platform no longer supported Software Type Version Database SQL Server 2000 Standard SPARC (Solaris 64 bit) OS Solaris 10 Database Sybase 12. Solaris OSs with the high availability software being Veritas. namely.0MP3+RP2 and Veritas 4.1 Software Configurations of the U2000 The NMS software.0 or SQL Server 2000 OS Solaris 8 Database Sybase 12. Table 3-4 High availability software Platform High Availability Software Solaris l Delivered configurations: Veritas 5.0 SPARC (Solaris 32 bit) Supported OS Language High Availability Software The high availability system of the U2000 can be deployed on the Windows. Issue 05 (2010-11-19) . 3-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 3. memory (2 GB or greater) Recommended OS: l Lowest configuration: Intel E2140 (dual-core) (1..0. Currently. memory (2 GB or greater) l Windows Vista Business with SP1 Sun T5220 Solaris 10 (10/08) with Huawei Patch 9. Table 3-6 Hardware and software configuration requirements of the U2000 client Platform Hardware Configuration Software Configuration Windows l Recommended configuration: Intel E5200 (dual-core) (2.1 Solaris Issue 05 (2010-11-19) l Windows XP Professional SP3 Compatible OS: l Windows XP Professional SP3 l Windows 7 Ultimate (64-bit version) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Table 3-6 shows the hardware configuration and software configuration. prepare a proper software package according to the components to be installed.iManager U2000 Unified Network Management System Product Description 3 Configuration Requirements Table 3-5 Software Configurations of the U2000 Configurat ion Item Typical Configuration U2000 software Installation DVD or installation software package NOTE If you install the server software through the software package.5 GHz or greater).6 GHz or greater). it cannot be installed on SUSE Linux. 3-5 . Ltd. It is recommended that the U2000 client is installed on Windows.3 Configuration of the U2000 Client This topic describes the requirements on software and hardware configuration when the U2000 client runs on the Windows and Solaris OSs. The U2000 client can be installed on both Windows and Solaris. . the client and the server communicate through the LAN or wide area network (WAN). Ltd. 4. thereby meeting the management requirements of large-scale networks. and IP networks. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 4 4 Networking and Application Networking and Application About This Chapter The U2000 provides a centralized network-wide management solution to transport. 4-1 . access. In such architecture. In addition. the U2000 provides standard external interfaces to integrate with the operations support system (OSS). 4. 4..3 Application Scenarios of U2000 Management This topic describes typical application scenarios of U2000 management.2 Networking Mode Between the U2000 and NEs The U2000 adopts the widely used C/S architecture.1 Deployment Mode You can select a proper deployment mode according to the network scale and deployment requirements. The U2000 server communicates with its managed NEs in inband or outband networking mode. there is only one U2000 server on which all processes run. Ltd.1. applications are switched to the server at the secondary site automatically to continue monitoring networks and ensure system running without interruption.1 Deployment Mode You can select a proper deployment mode according to the network scale and deployment requirements. l The Solaris-based system supports an ultra-largescale network (15.000 equivalent NEs).1 Centralized Deployment of a Single-Server System In the centralized deployment mode of a single-server system.000 to 20. The U2000 server supports communication with and operations on multiple clients.2 Centralized Deployment of an HA System In the centralized deployment mode of an HA system. When the server at the primary site is faulty. the servers at the primary and secondary sites form an HA system and the data is synchronized in real time between the servers.1.000 to 6.iManager U2000 Unified Network Management System Product Description 4 Networking and Application 4.000 equivalent NEs). 4-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Centralized deployment scheme for an HA system l Windo ws High Simple l Solaris l The Windows-based system supports a medium-scale network (2000 to 6000 equivalent NEs). l Solaris l The Solaris-based system supports an ultra-largescale network (15..000 equivalent NEs). Centralized deployment is applicable to small. The U2000 supports the HA system (Veritas hot standby) to ensure the high availability (HA) of the system.000 to 20. Table 4-1 provides information about the deployment modes of the U2000. Issue 05 (2010-11-19) . Table 4-1 Deployment modes of the U2000 NMS Deployment Solution Supporte d Platform Requirem ent on Disaster Recovery Networki ng Complexi ty Maximum Network Scale Centralized deployment scheme for a single-server system l Windo ws Low Simple l The Windows-based system supports a medium-scale network (2. 4.and medium-scale networks because the deployment scheme is simple and requires low costs. 4. the clients and the server are connected through LAN or WAN. Centralized deployment is applicable to small. The centralized HA system can be deployed on the Windows or Solaris platform.. The single-server system is deployed on Windows or Solaris.. NMS Server 4. 4-3 .and medium-scale networks because the deployment scheme is simple and requires low costs. The U2000 server supports communication with and operations on multiple clients.2 Centralized Deployment of an HA System In the centralized deployment mode of an HA system.. there is only one U2000 server on which all processes run..iManager U2000 Unified Network Management System Product Description 4 Networking and Application 4..1 Centralized Deployment of a Single-Server System In the centralized deployment mode of a single-server system.. There is only one server at each of the primary and secondary sites.1. Figure 4-1 Centralized deployment of the single-server system NMS Client n NMS Client .. . Figure 4-2 shows an example network.1. and supports the networking scheme of a single server and multiple clients.. When the server at the primary site is faulty. the servers at the primary and secondary sites form an HA system and the data is synchronized in real time between the servers.. applications are switched to the server at the secondary site automatically to continue monitoring networks and ensure system running without interruption.. Ltd. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. as shown in Figure 4-1. Generally. the U2000 uses the communication channels that are provided by the equipment other than the managed equipment to transmit messages for network management and manage the network. The U2000 server communicates with its managed NEs in inband or outband networking mode. the management interface on the control card of the managed equipment functions as the access interface.2 Networking Mode Between the U2000 and NEs The U2000 adopts the widely used C/S architecture. 4. In such architecture. the U2000 uses the service channels that are provided by the managed equipment to transmit messages for network management and manage the network.2. 4.2.. the U2000 uses the service channels that are provided by the managed equipment to transmit messages for network management and manage the network. 4.1 Inband Networking Mode In inband networking mode. Figure 4-3 shows an example network in inband networking mode.iManager U2000 Unified Network Management System Product Description 4 Networking and Application Figure 4-2 Centralized deployment of the HA system Primary Site Ethernet Port Secondary Site Diskarray (Optional) Diskarray (Optional) Router Router Switch Ethernet Port Switch DCN GNE NMS Client 4. Ltd.2. The messages are transmitted between the U2000 and the equipment through the service channels of the managed equipment. Issue 05 (2010-11-19) .2 Outband Networking Mode In outband networking mode. the client and the server communicate through the LAN or wide area network (WAN). The messages are transmitted between the U2000 and the equipment through the service channels of the managed equipment. 4-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1 Inband Networking Mode In inband networking mode. The way of connecting the U2000 with the managed network depends on the distance between the U2000 and its nearby equipment. l Networking advantages: The inband networking mode is flexible and cost-effective. As a result. In this case. you can connect them in private line mode.iManager U2000 Unified Network Management System Product Description 4 Networking and Application Figure 4-3 Example network in inband networking mode Networking Description The equipment managed by the U2000 is all connected to the managed network. Figure 4-4 shows an example network in outband networking mode. you can connect them in LAN mode.2. The U2000 needs to be connected to only the nearby equipment on the managed network. If the U2000 and its nearby equipment are in the same telecommunications room. the U2000 can be connected to the managed equipment in multiple ways. the communication channel between the U2000 and its managed network is broken. 4-5 . the management interface on the control card of the managed equipment functions as the access interface. you cannot maintain the managed network on the U2000. l Networking disadvantages: When a fault occurs in the network. For example. It does not need extra equipment. the private line mode is similar to the outband networking mode. This topic considers the DCN as an example to describe how the U2000 manages equipment. Generally. Ltd. E1 lines. If the U2000 and its nearby equipment are far from each other. In outband networking mode. or routers. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the U2000 uses the communication channels that are provided by the equipment other than the managed equipment to transmit messages for network management and manage the network. you can manage all the equipment on the network.2 Outband Networking Mode In outband networking mode. 4. the U2000 can be connected to the managed equipment through the data communication network (DCN). After configuring the related routes.. The U2000 connects with the equipment on the managed network through the DCN that is made up of other equipment. 4-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Networking disadvantages: In outband networking mode. 4. that is. Issue 05 (2010-11-19) . the cost of constructing the network is high. 4.. the U2000 is not connected to its managed equipment directly but is connected to its managed equipment through other equipment. 4. this mode provides more reliable equipment management channels.3 Application Scenarios of U2000 Management This topic describes typical application scenarios of U2000 management. you need to construct a network that is made up of extra equipment. When managed equipment is faulty. typical solutions provided by the U2000.1 Unified Management of Network Products This topic describes the application of the U2000 for unified management of network products. To provide such a maintenance channel.4 Networking and Application iManager U2000 Unified Network Management System Product Description Figure 4-4 Example network in outband networking mode Networking description The equipment managed by the U2000 is all connected to the managed network. Thus.3. Ltd. l Networking advantages: In outband networking mode. the U2000 locates information about the faulty equipment in a timely manner and monitors the equipment in real time. the U2000 manages equipment through a maintenance channel that is independent of the service channel. In this manner.3. Compared with the inband networking mode.2 Single Metro Solution The U2000 provides perfect solutions for single metro networks in terms of network deployment. service deployment. the U2000 manages the network and equipment. and service assurance. l The U2000 follows the network convergence trend and provides management solutions for various networking scenarios. thereby reducing the workload of OSS integration. Ltd. administration. and ONT in a centralized manner. the U2000 supports right. In addition.. flexible and various services and to provide fault monitoring means. It supports unified management of equipment across domains and also revolutionizes the vertical management mode to support unified management at the element and network management layers. With the development of all-IP networks and mobile data services. service deployment. Highly effective service monitoring and service assurance ensure good user experience and cut the network O&M cost effectively. Therefore. and maintenance (OAM) system must be improved with proper OPEX to support the configuration of more complex. The U2000 provides a comprehensive solution for FTTx access devices to manage and maintain the OLT.3 Single Backhaul Solution All-IP networks become a trend in telecommunications and various mobile data services sprout out everywhere. CBU. typical solutions provided by the U2000.3. The U2000 has a uniform GUI style.and domain-based management. SBU. networks become complex to maintain because devices are in a huge number and of various types and are widely used. the operation. This feature enables the U2000 to manage the equipment in each domain respectively to meet the requirements for managing different networks and departments without interference. 4.3. and service assurance. transport. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l The U2000 provides unified northbound interfaces (NBIs).3.iManager U2000 Unified Network Management System Product Description 4 Networking and Application 4.5 Single FAN Solution The single FAN Solution is the optical access solution that supports a large capacity of subscribers and long-distance transmission and provides high bandwidth. l The U2000 is the platform for managing access.4 Single Backbone Solution The U2000 provides perfect solutions for single backbone networks in terms of network deployment. which is simple and convenient for service provisioning. that is. 4. 4-7 . and datacom equipment. 4. ONU.1 Unified Management of Network Products This topic describes the application of the U2000 for unified management of network products.3. RTN. and supports E2E management of MPLS tunnels and PWs. which push the fixed market towards fixed-mobile convergence (FMC). This function ensures that new services can be provisioned quickly. and NE40 devices. In this manner. SW. l Automatic discovery of end-to-end services. – Supports Ethernet. the HA system monitors the U2000 and automatically implements data protection in real time. Specifically. which ensures system security.and domain-based management By controlling the rights of NMS users. – Supports E2E packet service provisioning and management across IP microwave and PTN/Hybrid MSTP networks. the U2000 assigns different management rights to different users and specifies the objects that can be managed by the users. which speeds up network deployment and service provisioning of a large number of microwave services. – Supports E2E TDM service provisioning and management across traditional microwave and MSTP networks. and ATM service management for PTN. MSTP. CES. Ltd. which accelerates service provisioning in an IP network. l Provisioning of end-to-end services across domains. Service Provisioning The U2000 automatically creates a service after you click the source and sink. l High availability solution The U2000 supports the high availability (HA) feature.iManager U2000 Unified Network Management System Product Description 4 Networking and Application Figure 4-5 Unified management of network products Network Deployment l Centralized deployment and right.. Issue 05 (2010-11-19) . 4-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the time required for provisioning services decreases from minutes to seconds and the efficiency of the configuration on a per-NE basis is improved by 90%. CES. You can directly locate the equipment that a fiber is connected to according to an alarm generated on the fiber. service deployment. l Service-oriented alarm management helps to directly locate the base station that is affected by an alarm and thus the efficiency of rectifying faults is improved by 50%. Ltd.3. 4. and operators tend to act as all-service operators.2 Single Metro Solution The U2000 provides perfect solutions for single metro networks in terms of network deployment. IPTV. An integrated super-broadband bearer network helps to quickly and flexibly deploy all services and greatly reduce the TCO of the network. l Unified fiber management enables the U2000 to clearly display the fiber connections of network-wide equipment. and ATM) provisioning across PTN and CX networks.iManager U2000 Unified Network Management System Product Description 4 Networking and Application – Supports E2E service (Ethernet. which greatly improves the efficiency of rectifying faults and ensures normal running of services. Networking Diagram Under the trend of all-service and super-broadband. Services such as the high-speed internet (HSI). l Multiple network management systems (NMSs) and teams are combined into one NMS and one team. l Network-wide equipment is monitored in a centralized manner and the number of alarms decreases greatly. Service Assurance The U2000 supports cross-domain fault location. Carrying multiple services is one of the most distinctive features of the Metro Ethernet. thereby greatly improving the efficiency of rectifying faults. and voice over IP (VoIP) services must be established on logical channels. l Alarm correlation and intelligent analysis help to accurately locate faults. 4-9 .. the integration of mobile broadband and fixed broadband speeds up. which push the mobile market towards FMC. as shown in Figure 4-6. and service assurance. The construction of such a bearer network becomes a challenge for operators. and supports E2E management of MPLS tunnels and PWs. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Batch deployment: The U2000 supports the ability to deploy services in batches and the deployment efficiency is increased two to three times.. Network Deployment The U2000 must meet the following requirements in the network deployment stage: l Automatic discovery of network-wide equipment The U2000 supports the ability to automatically discover network topologies and links.iManager U2000 Unified Network Management System Product Description 4 Networking and Application Figure 4-6 Network management solution for a single metro network The U2000 provides perfect solutions for single metro networks in terms of network deployment. Issue 05 (2010-11-19) . Service Deployment The Metro Ethernet often carries heavy service traffic. Ltd. l Visualized service deployment – One-stop configuration: The U2000 provides the tunnel template. These templates predefine 80% parameters. To adapt to this feature. l Automatic discovery of existing services The U2000 provides the function of automatically discovering services. L2/L3VPN/VPLS/ PWE3 service template. existing services on the network side can be restored to the U2000 through only two steps. thus reducing the configuration workload. and service assurance. and QoS policy template for you to perform one-stop service configuration. – Automatic computation: The U2000 automatically computes static routes and assigns labels without any manual intervention. the U2000 provides the functions of deploying services in batches and quickly creating end-to-end services to accelerate the deployment process. 4-10 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. With this function. service deployment. l Fault location The U2000 can display network-wide routes and allows you to accurately diagnose service faults layer by layer and hop by hop. After tunnel configuration. l Visualized service monitoring – Supports service-oriented visualized service monitoring so that you can directly query services affected by a specific alarm. and the location duration is reduced from several hours to only several minutes. and verify multicast parameters in batches. and the number of alarms in typical scenarios is reduced by 85%. four technologies are used to reduce the great number of IP alarms. Service faults can be located to specific NEs and protocols. Ltd. 4-11 . generating alerts when performance thresholds are exceeded. – Supports layered management so that you can query the network bearing relation in real time. the U2000 supports automatic assignment of LSP labels. the service can be automatically created. egress. thus freeing you from manually assigning labels. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Provides service-based functions of displaying performance through GUIs. adjust. It can detect network faults or degradation in a timely manner and report end-toend SLA data of the network. – Provides abundant service-based test and diagnosis methods that can be used to quickly check service connectivity and rectify faults. and analyzing the performance trend. an end-to-end tunnel can be automatically created. You can verify the validity of services before deployment and modify services after the logical channels are established. In addition. which facilitates tunnel management. which helps operators to improve the efficiency of IPTV service deployment and helps users to know the running status of multicast services in real time.iManager U2000 Unified Network Management System Product Description l 4 Networking and Application End-to-end service management and deployment The U2000 allows you to quickly establish specific logical channels on physical networks through GUIs. – Creation of an end-to-end tunnel: After you select the ingress. The U2000 supports the ability to create forward and backward tunnels at the same time. and the tunnel that is used to carry an end-to-end service. parameter settings can be instantly deployed and both the primary and bypass hop-byhop tunnels can be displayed in the topology view.. the egress node. l Batch management of multicast parameters The U2000 supports the ability to set. l Visualized object relation – On the U2000. services are associated with tunnels and tunnels are associated with routes so that the network bearing relation can be easily identified. The U2000 provides the following service assurance measures for the broadband bearer network: l Reduction of IP alarms On the U2000. The U2000 can automatically check service configurations and service connectivity. – Creation of an end-to-end service: After you select the ingress node. ensuring that services can be successfully deployed at a time. Service Assurance The U2000 monitors the running status of the network 24 hours a day and 7 days a week in multiple ways. and transit nodes. networks become complex to maintain because devices are in a huge number and of various types and are widely used. l Performance monitoring 24 hours a day and 7 days a week The U2000 regularly collects the traffic data of all the links or some key links on the entire network to provide effective support for network monitoring.3 Single Backhaul Solution All-IP networks become a trend in telecommunications and various mobile data services sprout out everywhere. microwaves. – The iWeb report system provides various reports. l End-to-end SLA monitoring on network nodes The U2000 regularly collects the SLA data between PEs. With these data. The maintenance and management of various types of media challenge carriers. l End-to-end (E2E) service provisioning and QoS assurance: The OAM experience of traditional SDH and MSTP networks must be inherited for the OAM of all-IP bearer networks. – Different network quality is shown in different colors: red. Issue 05 (2010-11-19) . and optimize the network accordingly. you can discover network degradation. including resource reports.. between the local CE and PE. all-IP networks need to be merged with connectionless bearer Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and maintenance (OAM) system must be improved with proper OPEX to support the configuration of more complex. NOTE l PE: Provider Edge l CE: Customer Edge 4. without upgrading any client. – The status of network-wide links can be monitored through only two clicking operations. flexible and various services and to provide fault monitoring means.3. performance reports. – You can use the Internet Explorer to log in to the iWeb report system.iManager U2000 Unified Network Management System Product Description 4 Networking and Application – When a fault occurs. yellow. and green. l Independent Web-based performance report system (iWeb) – You can log in to the iWeb report system anytime. administration. Ltd. copper cables. the U2000 effectively ensures the normal running of the network. you can quickly locate and rectify the fault according to the bearing relation. This helps you to easily find network problems and rectify the problems accordingly. which improves the network check efficiency. and between the PE and remote CE. and Ethernet may function as media to carry services of mobile bearer networks. Therefore. All-IP implementation in the mobile bearer network presents the following challenges to the OAM: 4-12 l Unified management of many types of devices: Fibers. the operation. l Real-time alarm monitoring and notification The U2000 can monitor network faults and the status of equipment and interfaces in real time. and fault reports. any place. l Fast check of network-wide links – The network scanning tool can automatically compute IP links between equipment. In addition. With the development of all-IP networks and mobile data services. By notifying the related personnel of network faults through SMSs or emails. predict the trend of network running. carriers need to improve their capabilities in E2E service management and QoS monitoring. That is.iManager U2000 Unified Network Management System Product Description 4 Networking and Application networks. the CX series equipment carries broadband services and the PTN equipment functions as the mobile access service gateways at the two ends. 4-13 . in mobile bearer networks. and Service Assurance of mobile bearer networks. or FE ports and then carried over E2E PWs. the devices do not require field software commissioning. software commissioning engineers or customer engineers do not need to visit sites and only hardware installation engineers need to visit sites to install devices. Therefore. In addition. 2G and 3G services on the base station (BS) side are transmitted through TDM-E1. fixed networks and mobile networks are merged. In this case. Ltd. Figure 4-7 SingleBackhaul solution The U2000 provides solutions to the Network Deployment. Specifically. Service Provisioning. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Network Deployment One visit to site without field software commissioning l Issue 05 (2010-11-19) The data communication network (DCN) becomes available automatically and the U2000 searches for devices remotely. l As shown in Figure 4-7. IMA-E1.. Wizard-based network adjustment. The U2000 supports one-touch card creation. packet service cutover can efficiently and correctly adjust services to reduce errors and service interruption. Automatic WDM optical power commissioning lowers the skill requirements for deployment engineers and increases the overall deployment efficiency to a great extent. Automatic WDM optical power commissioning. Packet service cutover of PTN equipment. Fast fiber search and creation. the chains. l Wizard-based and step-by-step operations increase the efficiency in network adjustment and lower the skill requirements of OAM engineers. l With an increase in services. packet service cutover can quickly balance the service traffic load between the RNC and base station controllers (BSCs). customer engineers do not need to visit sites for cooperation and the duration of software commissioning is reduced by 50%. PnP function of cards. Issue 05 (2010-11-19) . which helps you modify and maintain NE properties in a unified manner. After a device is connected to a microwave network. such as G. A physical card is automatically displayed when the NE Panel is displayed. cutover tasks are created in batches and service data to be cut over are verified.652. l Multiple types of fibers are supported. intersecting rings. l WDM optical power is automatically adjusted. Ltd. rings. Six steps complete the cutover of packet services. l Mainstream WDM equipment from Huawei and many networking modes are supported. G.655.655. Wizard-based network adjustment simplifies network adjustment. Automatic cutover reduces the workload and increases the efficiency.iManager U2000 Unified Network Management System Product Description 4 Networking and Application l Software commissioning is implemented in the network management center (NMC) in a centralized manner. l To meet the requirements of frequent network adjustment. and the combination of G. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. which simplifies network deployment. In the daytime. Automatic network-side IP address assignment l Automatic IP address assignment on the NE network side: Network-side IP addresses of NEs can be automatically assigned when fibers are created. l The U2000 automatically searches for fibers in a specified range and creates the fibers in the Main Topology. 4-14 l Nodes can be added to a ring or link and the link capacity can be expanded. G. services are automatically cut over. and mesh networks are supported.653.. For example. Hence. all devices on the network are searched out and are displayed in a list. l Centralized management of IP addresses of NEs: A report is provided to collect the IP addresses of all NEs on the entire network. The U2000 supports onetouch device creation. Automatic fiber search helps you create fibers quickly and correctly and facilitates network construction. Auto-discovery of NEs and links l The U2000 automatically searches for all NEs in a specified range and creates the NEs in the Main Topology.652 and G. Plug-and-play (PnP) function of devices. l NEs that are searched out are displayed in a list. At night. Quick. By using this function. sink. 4-15 . Bulk deployment: The U2000 supports the bulk deployment of Metro Ethernet services to better meet the requirements of deploying these services in a large number. In addition. which achieves the fast provisioning of a large number of services. l The network of the PTN equipment and CX equipment is supported. and a comparison report is generated after a successful network expansion. accurate. l The creation and management of E2E services that traverse both microwave and MSTP equipment are supported.iManager U2000 Unified Network Management System Product Description l 4 Networking and Application The entire process of network expansion can be assured. Fast service provisioning: Configuration is applied to NEs quickly after you specify the source. and TE constraints. services are quickly provisioned. and automatic service restoration. l E2E service provisioning on the network of the PTN equipment and CX equipment is supported. Service Assurance Service-based E2E OAM l Issue 05 (2010-11-19) All OAM data are configured based on E2E services and you do not need to configure OAM data for each node on an E2E trail separately. In this case. l Services can be created in batches. As a result. l Visualized protection relationships between tunnels. l Visualized service topologies that can be previewed. an automatic service rollback is triggered upon an expansion failure. Visualized E2E service provisioning l Visualized tunnels. This ensures a high reliability in network expansion and facilitates management. network resources are checked before network expansion. only two steps are required to restore network-side services to the E2E service configuration on the U2000. Bulk deployment speeds up service deployment. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Service Provisioning E2E management and service provisioning l The E2E packet service provisioning and management of the IP microwave and PTN/MSTP devices speeds up service provisioning on the IP network. hops of working and protection trails are displayed in the topology view. service provisioning is efficient and errors are reduced. l The E2E TDM service provisioning and management of the traditional microwave and MSTP devices increases the efficiency in the network deployment and service provisioning of a huge number of microwave devices. l Services are automatically created after you specify the source and sink and select a routing policy. Ltd.. Specifically. l The network of the OptiX RTN 910/950 and PTN equipment is supported and E2E CES service provisioning can be performed on the mixed network. which is unique in the industry. The U2000 provides an automatic service restoration function that is easy to use. l E2E packet service provisioning on the network of the PTN equipment and MSTP equipment is supported. l You can view network-wide alarms on the U2000 client or Web browser after alarms are generated. Carrier-class maintenance must be performed strictly on the IP core network because of its core position on a telecommunications network. l Services affected by alarms can be located by a one-touch operation in the alarm management window. In the topology view. synchronous Ethernet clocks. Server-centered alarm monitoring l Relevant alarms are displayed in the E2E service management window when the network is faulty and affects service provisioning. and clock protection are displayed in real time. l Two sets of equipment are deployed on important nodes for backup. In addition. and SDH clocks can be auto-discovered in the topology view. l The MPLS VPN is planned in a unified manner to perform isolation between users or services. l Dual-homing connections are set up between convergence-layer equipment (PEs) and Ps. l Fault information is collected during a diagnosis. the single backbone network has the following networking features: 4-16 l The core layer uses the dual-plane structure and fully meshed connections are set up between Ps. With the development of carrier-class IP technologies such as MPLS. The fault information helps analyze fault causes quickly. and international gateways. service deployment. Visualized network-wide clock l Clocks such as IEEE 1588v2 clocks. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Service-based fault diagnosis and fast fault locating l E2E service diagnosis is supported and the diagnosis is not required on each node. and service assurance.iManager U2000 Unified Network Management System Product Description 4 Networking and Application l Default parameters are provided and one-touch tunnel configuration is supported. the clock tracing status and clock synchronization status are refreshed in real time when a network fault occurs. This helps to locate a fault quickly. network-wide clocks are displayed in a unified topology view. Internet backbone networks.4 Single Backbone Solution The U2000 provides perfect solutions for single backbone networks in terms of network deployment.. and OAM technologies. 4. The single backbone solution is provided for multi-service core bear networks. l The clock status is monitored in real time and the clock alarm. Ltd. clock tracing status. Wizardbased Ethernet OAM is supported and a remote maintenance endpoint point (MEP) is automatically generated.3. Issue 05 (2010-11-19) . carrier-class network technologies based on the IP backbone network become increasingly mature. As shown in Figure 4-8. VPN. Service Deployment The U2000 provides the following functions to effectively and accurately deploy services: l Issue 05 (2010-11-19) Supports the setup of MPLS tunnels. VRRP. VPN FRR.. and configure BFD. destination IP address. In addition. l End-to-end QoS deployment The U2000 supports QoS deployment in common Diff-Serv mode so that traffic can be classified according to the service priorities of users. l End-to-end reliability The U2000 supports the abilities to manage mainstream routing protocols such as OSPF. complex traffic classification is performed according to the source IP address. links. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. IS-IS. and IP services. and MPLS OAM to ensure service reliability. only simple traffic classification is performed. Ltd. interface. the U2000 supports VPN HQoS deployment to schedule multiple services on a VPN and different VPN traffic on public TE tunnels. configure IGP (OSPF and IS-IS) fast convergence. 4-17 . and VLAN. On a PE. and BGP.iManager U2000 Unified Network Management System Product Description 4 Networking and Application Figure 4-8 Network management solution for a single backbone network Network Deployment The U2000 meets the following requirements in the network deployment stage: l Automatic discovery of topologies and services The U2000 supports the ability to automatically discover network topologies. IP FRR. on a P. . predict the trend of network running. the status and severities of equipment alarms are identified by colors of nodes in the topology view. after the primary LSP is configured with FRR. l Real-time alarm monitoring and notification The U2000 can monitor network faults and the status of equipment and interfaces in real time. and between the PE and remote CE. The switching duration is irrelevant to the number of routes on the private network. you can discover network degradation. the local PE can quickly switch traffic to the remote backup PE in 200 ms. With this mechanism. provides multiple service configuration templates and batch configuration templates. and supports the automatic verification of parameter settings. l Provides simple and user-friendly GUIs to effectively improve service deployment efficiency. traffic is switched back to the primary LSP or a new LSP. when the primary LSP recovers. L3VPN. port. or service) and the causes of the fault for the purpose of troubleshooting. Issue 05 (2010-11-19) . MPLS TE FRR is a temporary local protection mechanism. l Layered fault diagnosis and location After a fault occurs. which quadruples the configuration efficiency. between the local CE and PE. and PWE3 services) that are carried over tunnels. This ensures that traffic can be switched in 50 ms after a fault occurs on a node or link on the network. After a service is created in the topology view. the U2000 ensures the timely processing of network faults. the U2000 immediately displays the creation and deployment results. All parameters can be set in only one GUI. The U2000 provides 4-18 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Protection switchover in less than 200 ms in case of end-to-end faults With VPN FRR deployed.5 Single FAN Solution The single FAN Solution is the optical access solution that supports a large capacity of subscribers and long-distance transmission and provides high bandwidth. the U2000 analyzes the tunnel associated with the specific service and the route associated with the tunnel. By notifying remote users of network faults through SMSs or emails. traffic is quickly switched to the bypass LSP if a link or a set of equipment becomes faulty. and optimize the network accordingly. 4. when a fault occurs on a remote PE.iManager U2000 Unified Network Management System Product Description 4 Networking and Application l Supports the deployment of mainstream services (for example. l End-to-end SLA monitoring on network nodes The U2000 regularly collects the SLA data between PEs. Ltd. l Performance monitoring 24 hours a day and 7 days a week The U2000 periodically collects the key performance indicators of networkwide links or specified links and dynamically displays the network running status. Service Assurance The U2000 provides the following service assurance measures for the single backbone network: l Protection switchover in less than 50 ms in case of local faults You can configure MPLS TE FRR to implement fast route convergence. and then diagnoses the service according to different network layers to accurately locate the faulty point (equipment. L2VPN. providing important references for locating network faults.3. With these data. The U2000 provides support for network monitoring by regularly collecting the traffic data on network-wide links or important links. On the U2000. Maintenance engineers can quickly locate alarm-affected services from specific equipment alarms. On an MPLS TE network. you can import data of NEs to the U2000 in batches. ONU. the network predeployment and device installation can be started at the same time. the U2000 automatically applies the preset configuration to the ONU to complete the service deployment. the U2000 provides the ONU predeployment and remote acceptance functions. and ONT in a centralized manner. and wholesale services. thus installing the devices Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In this way. After you power on the ONU. a single fiber is used to provide voice. create a corresponding virtual NE and configure service data on the U2000. fiber to the building (FTTB). the time required for network construction is reduced by half. CBU. fiber to the home (FTTH). 4-19 . SBU. The FTTx access solution meets the networking requirements for the fiber to the curb (FTTC). data. you can improve the ONU deployment efficiency and reduce the operational expenditure (OPEX). base station transmission. In the FTTx access solution. Figure 4-9 Networking application of the FTTx access network management Network Deployment In an FTTx network. and video services. By using this function. Before powering on an ONU.. l The U2000 provides the ONU predeployment function. IP private line interconnection.iManager U2000 Unified Network Management System Product Description 4 Networking and Application a comprehensive solution for FTTx access devices to manage and maintain the OLT. l The U2000 provides the function of predeploying NEs by means of a sheet. Figure 4-9 shows the networking application of the FTTx access network management. By using the functions. Ltd. Therefore. 2. The plug and display (PnP) feature of the ONU is implemented. Perform offline deployment: Import Excel sheets that contain planned data to the U2000 and complete the offline pre-provisioning of services. Figure 4-10 FTTx predeployment flow 4-20 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the U2000 automatically applies the configuration data of the faulty ONU to the new ONU. This function is applicable to the configuration of a large amount of data. Issue 05 (2010-11-19) . the installation cost is greatly reduced. the U2000 automatically applies the preconfiguration data after the ONU goes online and implement the remote service acceptance. You do not need to re-configure the new ONU. Specifically. Figure 4-10 shows the FTTx predeployment flow. Engineers only need to visit a site once. The U2000 provides a solution to quick ONU deployment. Then. you can easily copy and paste data. l The U2000 provides flexible authentication that works together with the preconfiguration function to implement the PnP of the ONU. l The U2000 provides the remote acceptance function for the ONU. the deployment efficiency is greatly improved. Therefore. Install ONUs on site: Install ONUs without software commissioning on site. The PnP features of the ONUs take effect. Ltd. if you create an acceptance task for the ONU when it is offline. 4. With the solution. Plan data: With the Excel-based plan tool.. and the network construction cost is reduced. 3. engineers only need to visit a site once and complete the ONU deployment in five steps as follows: 1. NEs automatically report acceptance results without manual intervention. In this way. After you replace an ONU with a new one upon a fault. you only need to enter the authentication information. Perform remote acceptance: Engineers do not need to visit the site.iManager U2000 Unified Network Management System Product Description 4 Networking and Application without software commissioning and performing remote acceptance. Instead. Activate services: Power on ONUs. 5. access fault diagnosis becomes more important. In this way. You can customize service provisioning templates for different subscribers. In addition. l FTTx service provisioning template: The U2000 provides templates for provisioning FTTx services. Ltd. Those user interfaces are not integrated and thus you need to frequently switch between the user interfaces.. With this function.iManager U2000 Unified Network Management System Product Description 4 Networking and Application Service Provisioning The U2000 provides the following three convenient and fast service provisioning means. you can implement the one-touch service provisioning. As the FTTx is used more widely. Service Assurance l FTTx fault diagnosis: By using the traditional method. you need to locate faults of different types in different user interfaces for function modules. the U2000 automatically provisions services and thus reduces costs in labor. Figure 4-11 and Figure 4-12 show the fault diagnosis of FTTx services. With such a template. you can fast provision the configuration data of FTTx NEs regardless of whether the OSS is interconnected with the EMS. l Automatic provisioning upon interconnection with the OSS: The U2000 provides standard and open northbound interfaces (NBIs) that implement fast interconnection with the OSS for the FTTx solution. the efficiency and correctness of service provisioning are greatly improved. you only need to enter the object to be diagnosed and then perform one-touch fault diagnosis. 4-21 . l Sheet-based service provisioning: The U2000 provides the convenient and fast predeployment for ONUs and preconfiguration for services in the FTTx solution. With this function. With these means. you need to locate a subscriber fault part by part. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The U2000 provides the FTTx fault diagnosis function. a branch fiber fault.iManager U2000 Unified Network Management System Product Description 4 Networking and Application Figure 4-11 FTTx fault diagnosis (1) Figure 4-12 FTTx fault diagnosis (2) l Root cause identification upon an FTTx alarm: With this function. Ltd. The cause can be identified as a backbone fiber fault. Issue 05 (2010-11-19) . you can quickly and correctly identify the cause why an ONU is unreachable.. or 4-22 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Table 4-2 Relationships between faults and their causes that are identified by means of the alarm-based root cause identification l Cause Alarm Reported From the OLT Alarm Reported From the ONU U2000 Alarm Backbone fiber cut LOS alarm without the ONU ID None When the OLT reports the LOS alarm for the PON port. the U2000 determines that the ONU is powered off. 4-23 .Table 4-2 shows how to identify the cause of a fault by means of the alarm-based root cause identification. It is time consuming to locate and troubleshoot an internal fault in the MDU. Branch fiber cut LOSi alarm with the ONU ID None When the OLT reports the LOSi alarm with the ONU ID. ONU power-off Power-off alarm with the ONU ID Dying gasp alarm When the OLT reports the poweroff alarm with the ONU ID. you need to locate the fault and recover services quickly. you only need to rebind the MAC address or SN of the MDU on the U2000 and then the U2000 automatically applies the configuration and NE software version to the MDU. Ltd.. the orders for useless field jobs are reduced.iManager U2000 Unified Network Management System Product Description 4 Networking and Application power-off of an ONU. With this function. the U2000 determines that the backbone fiber connected to the PON port is faulty. You need configure the MDU neither on site nor on the OSS. PnP (plug and play) of the MDU after replacement: When an MDU is faulty. it is recommended that you directly replace the faulty MDU and save and repair faulty MDUs in a centralized manner. the U2000 determines that the branch fiber connected to the ONU is faulty.Figure 4-13 shows the implementation of the PnP function after replacement. Therefore. The U2000 provides the PnP function of the MDU. In this way. This solution improves the disaster tolerance capability of the OLT. Figure 4-14 shows the implementation of the dual homing protection at the PON port.. Ltd. Figure 4-14 Implementation of the dual homing protection 4-24 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The U2000 supports the dual homing protection of type B at the PON port. Issue 05 (2010-11-19) . The dual homing protection at the PON port is provided to fast recover services when the backbone fiber between the PON port and the splitter is faulty. When the active fiber connected to the OLT is faulty. the number of subscribers connected to a PON port increases. the U2000 automatically switches the services to the standby fiber.4 Networking and Application iManager U2000 Unified Network Management System Product Description Figure 4-13 PnP function of the MDU after replacement l Dual homing protection at the PON port: As the split ratio increases. relevant services fast recover. The U2000 provides the service cutover function. Ltd. In this case..Figure 4-15 shows the implementation of the dual homing protection. and then add all MDU data to the new port or card to implement batch data migration. the data configuration is complex and relevant services will be interrupted for a long period of time. disconnect the fiber from the faulty PON port and connect the fiber to an idle PON port of the same OLT.iManager U2000 Unified Network Management System Product Description l 4 Networking and Application Fast service cutover at the PON port: The PON port on a live network is not pluggable. create an EPON port or card. 4-25 . Then. When a PON port of an OLT is faulty. duplicate the configuration data of the faulty PON port to the idle PON port. In this manner. Figure 4-15 Implementation of the fast service cutover Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. you migrate the configuration of the MDUs connected to the PON port to the idle PON port. That is. When an PON port or card is faulty or the network is adjusted. you can delete the faulty PON port. . . Meanwhile.and domainbased management NE user management Security of NE access NE license management Topology management Subnet management NE management Card management Link management Fault management Performance management Network management Alarm severity and status Performance handling process MSTP network management Network-wide alarm monitoring Monitoring template management WDM network management Alarm statistics Monitored instance management RTN network management Alarm handling Performance data viewing PTN network management Remote alarm notification Data lifecycle management Router and switch network management Network performance monitoring Security network management Alarm correlation analysis Access network management 5. ensuring the security of the U2000. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1 Overview of Functions and Features This topic presents an overview of functions and features of the U2000. login.and domain-based operations. the security management supports the log management in terms of the login.2 Security Management This topic describes how to implement security management by managing users. and the authorization of right. Ltd.iManager U2000 Unified Network Management System Product Description 5 Basic Functions 5 Basic Functions About This Chapter The U2000 provides all management functions at element management layer and network management layer. Figure 5-1 Basic functions of the U2000 Security management Security management policy Right. 5-1 . Figure 5-1 shows the basic functions of the U2000. 5. 5. logs. the U2000 needs to notify maintenance engineers of the exception in a timely manner. The U2000 allows administrators to query and save logs and collect statistics on logs periodically. This facilitates detection of unauthorized logins and operations and fault analysis.9 NE Communication Parameter Management The U2000 communicates with managed NEs successfully only after you correctly set the connection parameters of the U2000 and the managed NEs.7 Log Management Logs record the information about operations performed on the U2000 and important events that occur in the U2000. and supports the HA scheme and data backup to achieve an excellent security solution. WDM. 5. 5-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The performance management function enables you to detect the deteriorating tendency in advance and solve the potential threats so that faults can be prevented. and resources. you can quickly and clearly view information about various resources network-wide. 5. You can learn the network structure and monitor the operating status of the entire network in real time by browsing the topology view.5 Basic Functions iManager U2000 Unified Network Management System Product Description operations.13 System Monitoring The U2000 provides a GUI-based system monitoring tool. the managed NEs and their connections are displayed in a topology view. 5. 5. Logs also can record operations that the OSS performs on NEs through NBIs.5 Performance Management The performance of a network may deteriorate because of internal or external problems and faults may occur. 5. Specifically. The DC enables you to back up NE data and upgrade or downgrade NE software.12 Report Management The U2000 provides reports about alarms.4 Alarm Management When an exception occurs on a network. 5. You can print the required data or save the data as a file when viewing it. TXT. or CSV files. The reports in tabular format can be filtered by equipment type and saved in XLS.6 Inventory Management The U2000 supports unified inventory management of physical resources and service resources on the entire network. 5. and running.8 Database Management Database management involves the management of NE databases and U2000 databases. The inventory information serves as a reference for service planning and expansion planning. Issue 05 (2010-11-19) . by browsing and collecting statistics on logs. so that the maintenance engineers will recover the network efficiently.11 NE Software Management The NE software management module (called DC) is an independent subsystem of the U2000 and it is used to manage software and data on NEs. and maintenance of data consistency between the U2000 and NEs. 5. HTML. You can also dump and print logs. 5. On the U2000. microwave. which is used to manage the U2000 and query the system information. submarine cable NEs..3 Topology Management In topology management. you can query the client from which a U2000 user logs in to the U2000 server and query the operations performed by the user after login. 5. Ltd.10 DCN Management DCN management is applicable to MSTP. restoration. By setting NE licenses. Table 5-1 Overview of functions and features of the U2000 Issue 05 (2010-11-19) Function or Feature Description Unified network managem ent The U2000 provides the unified GUI-based management of Huawei NEs in the transport. performance. In data management. which makes NE configuration faster and easier. Two types of tasks are managed in the centralized task management: system scheduled tasks (periodic) and custom scheduled tasks (one-off). The two types of tasks can run automatically at a scheduled time and users can set parameters and browse the task status. network alarms. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. It is a unified network management system (NMS) that offers comprehensive functions in managing NE alarms.1 Overview of Functions and Features This topic presents an overview of functions and features of the U2000. License managem ent NE license management allows users to query.iManager U2000 Unified Network Management System Product Description 5 Basic Functions 5. the U2000 supports bulk configuration of NE services by using configuration templates. Ltd. the U2000 supports the backup. logs. the NE status. and databases. This avoids tedious and labor-intensive configuration. After the upgrade. IP. NE licenses also controls the validity periods of and functions available to NEs. and access domains. 5-3 . users can perform functions as required. reports. NE template managem ent NE template management allows users to bulk configure NEs by means of duplication. This helps to ensure the normal running of major services immediately after the upgrade and achieve timely detection of issues such as data loss. install. and loading configuration files. Client auto update (CAU) The CAU function enables the U2000 client to upgrade automatically through the Internet provided that the U2000 server functions properly and communicates successfully with the U2000 client. and results. services can be provisioned quickly in the GUI. NE resources are assigned automatically with parameter values in that template.. After a template is referenced in NE configuration management. progress. This function meets the requirements of network convergence and rapid development of customer services. Users can view the status of NEs and make adjustment accordingly in license management. importing data sheets. apply for. topology. inventories. and synchronization of NMS data and NE data. Centraliz ed task managem ent Centralized task management is an NMS task management mechanism that manages and coordinates all scheduled tasks in a unified management GUI. With this function. NE data configura tion and managem ent In NE data configuration. security. and routing relationships are checked and a check report is generated. and adjust NE licenses (in case of capacity change and server change). basic services. Check after the upgrade The U2000 can be upgraded smoothly without service interruption. operations. the security management supports the log management in terms of the login.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Function or Feature Description Online Help The Online Help is displayed if users press F1 when using the U2000. The help information is also available in offline mode. and running. Figure 5-2 Security management overview 5-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd.2 Security Management This topic describes how to implement security management by managing users. Figure 5-2 shows the overview of security management. Issue 05 (2010-11-19) .. login. and supports the HA scheme and data backup to achieve an excellent security solution. ensuring the security of the U2000. It provides comprehensive help information and supports fast searches for information. and the authorization of right. Meanwhile. 5.and domain-based operations. l User group management: The U2000 supports the creation. l For details about the firewall security policy. l User management: The U2000 uniquely identifies the login. as shown in Figure 5-3. see 5. l For the U2000 HA scheme.. and management rights of NMS users according to user names and passwords. and deletion of user groups. + operation. Figure 5-3 Right Right management = Managed objects Operation rights(login. see Deployment Mode. – The U2000 supports the creation. administrator group. The U2000 supports the function of creating a user group to manage users that have the same rights and to bulk manage rights of NMS users. modification. the operation rights. user admin. OS and database security policy. operation. Ltd. 5-5 . querying) After NMS users are planned. see chapter "Security Planning" in the iManager U2000 Planning Guide User Management This feature is to assign NMS users the appropriate rights for management and maintenance functions according to the O&M requirements when NMS users are planned. In this case. and the ACL. the user has all the rights of the user groups as well as the rights that are assigned to the user. equipment C and object set D are invisible to user A in the Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. modification. Right Management A right defines the operations that can be performed on managed objects. is provided after the U2000 is installed. User admin is a superuser and has all operation and management rights. Only one default user. monitor group. l Issue 05 (2010-11-19) Management domain rights define the objects that can be managed by users or user groups. The right elements include managed objects and operation rights. and maintainer group. Different users have different operation rights over different managed objects. and data transmission security policy. For example. operator group. l For the backup and restoration of the database. the user group to which a user belongs. After the management attributes of a user group are set and a user is added to the user group.8 Database Management. – The creation of users involves setting detailed information about users. which reduces management costs. see Log Management. l For the security solution to the log management. and deletion of users. the user has all rights of the user group. A user can be added to multiple user groups. the users can perform operations on NEs only after rights are assigned to them. if user A is not authorized to manage equipment C and object set D. Other users are directly or indirectly created by user admin.iManager U2000 Unified Network Management System Product Description 5 Basic Functions NOTE This section mainly describes the NMS user security. system enhancement policy. the management domains. The U2000 provides five default user groups: security management group. and the range of the configuration data. including the maximum times for password repetition. and the U2000 assign rights to login users according the rights that their user group has. User Authentication Management U2000 provides three types of user authentication management: local authentication. password policy.. certain NEs can be assigned directly to a certain user. the number of characters of history passwords that the current password cannot contain. Only the operations within the rights of a user in a certain domain can be performed on NEs of this domain. l Local authentication: NMS user management. right management. see RADIUS-based Authentication. see LDAPBased Authentication. The administrators of different domains manage different objects with the domain rights that are assigned to them. l RADIUS authentication: When a user logs into the U2000. and deletion of object sets. login authentication. For the details. services. If operation sets are assigned to users or user groups. An object set is a collection of multiple pieces of equipment. – Setting the correlation policy between the current password and history passwords.iManager U2000 Unified Network Management System Product Description 5 Basic Functions topology view. or data to different domains. Ltd. Meanwhile. – Domain-based management refers to dividing equipment nodes. The LADP-based authentication is similar to the RADIUSbased authentication. and login control. they have different operation rights over the device if different operation rights are assigned to them. and whether the password can be similar to history passwords. 5-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. modification. – Right-based management refers to domain-based authentication. For details. the LADP server verifies and authenticates the login request. account policy. The U2000 supports the creation. they have rights that the operation sets include. An operation set is a collection of multiple rights. When multiple users manage the same device or object set. l Setting of the password policy – Setting the minimum password length and maximum password length. see Local Authentication. Only system administrator and members of the security management group can assign rights and domains to other users. and the security strategy are all implemented by the U2000 server. but the authentication protocols are different. The U2000 supports the creation. RADIUS authentication. l LDAP authentication: When a user logs into the U2000. For the details. user security management ensures the secure running of the U2000 in multiple aspects. l The U2000 also supports right. Issue 05 (2010-11-19) .and domain-based management. the RADIUS server verifies and authenticates the login request. and deletion of operation sets. Local authentication is the management method of the login authentication by default. Users and user groups have different operation rights if they are assigned these rights. Operation right management is implemented by managing the operation sets or specific rights. Local Authentication In the local authentication mode. modification. After dividing domains and then dividing rights. including local user management. the personnel with different duties or positions in the same domain have different operation rights over different objects in the domain. and LDAP authentication. and the U2000 assign rights to login users according the rights that their user group has. l Operation rights define the operations that a user can perform. – The ACL controls the login IP addresses of clients. see Figure 5-4. In addition. minimum length of a user name. maximum number of login attempts. 5-7 . When a user enters the user name and password. make sure that the account to be authorized for logging in to the U2000 is added to the corresponding user group. – User login mode specifies whether multiple users are allowed to log into the U2000 at the same time. these users cannot log in to the U2000 server. avoiding interferences from the operations of other users. For the RADIUS-based authentication process. l Login control involves the login mode. Therefore. make sure that the name of the user group defined on the U2000 is the same as that defined in the account database of carriers. and thus the U2000 security is improved. timeout period for a login or unlocking failure. Usually. and then the security process assigns rights to the user according to the operation set policy of the user group. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. If you need to perform special operations on the U2000 server.. multiuser mode is adopted. the security process learns the user group to which this user belongs. Users can log in to the U2000 server only from certain IP addresses. NOTE Before adopting the RADIUS authentication mode. Ltd. even if the user account and the password are obtained by unauthorized users. l The account policy involves the account validity period.iManager U2000 Unified Network Management System Product Description 5 Basic Functions – Setting the validity period of the password. If the user passes the RADIUS authentication. the administrator does not need to create a user account on the NMS in advance. and user policy of no login within a period. – Setting the rules for the forms of passwords. automatic unlocking time. – Users can log in to the U2000 only in the specified login period. and the IP address control. The user account for logging in to the U2000 is an existing account that can pass the authentication of the RADIUS server. RADIUS-Based Authentication When the RADIUS authentication is adopted. including the maximum and minimum period validity of the password. the number of days warning given before the password expiry. the login period control. the security process of the U2000 server sends the user name and password to the RADIUS server. you can set the user login mode to single-user mode. Issue 05 (2010-11-19) . see Figure 5-5. l Supporting multiple LDAP authentication servers and being compatible with the HA scheme of the U2000. SSL mode. Ltd. the LDAP authentication supports the following features: l Supporting common mode (encryption-free).iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-4 RADIUS-based user authentication OSS Authentication GUI Security NBI User group privilege AAA agent Security server RADIUS server User and user group datebase U2000 server U2000 user LDAP-Based Authentication As a distributed client/server system protocol. For the LDAP-based authentication process. Compared with the RADIUS authentication. 5-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. The LDAP-based authentication mode is similar to the RADIUS-based authentication mode except for different authentication protocols. and TLS mode for the communication between the U2000 and the LDAP server. LDAP is adopted in the VPN and WAN to control the users' access to the network and prevent unauthorized users from accessing the networks. To unlock the client. the user must enter the password of the current login user or use the account of the administrator. the managed NEs and their connections are displayed in a topology view. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. You can learn the network structure and monitor the operating status of the entire network in real time by browsing the topology view. l Client lockout: If a user does not perform operations on the client temporarily. Tunnel View. Clock View. the user must enter the password of the current login user or use the account of the administrator. l The members of the administrator group can monitor sessions and operations of common U2000 users.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-5 LDAP user authentication OSS Securiyt NBI User group database AAA agent Security server LDAP server User and user group database U2000 server U2000 user Session Management l If a user does not perform operations on the client temporarily.. 5. and unlock U2000 users. Required information can be easily learned in different views. and Custom View. The U2000 has the Physical Root. which enables you to learn and monitor the operating status of the entire network conveniently. Ltd. l The U2000 can automatically detect and clear invalid sessions.3 Topology Management In topology management. the user can lock the client manually or set the time for the U2000 to automatically lock the client to prevent unauthorized operations. the user can lock out the client or set the time to automatically lock the U2000 client to prevent unauthorized operations. To unlock the client. 5-9 . forcibly log out U2000 users. and tunnel services.iManager U2000 Unified Network Management System Product Description 5 Basic Functions The U2000 offers service topology management for various end-to-end services. Figure 5-6 Topology view and its functions 1 13 5-10 2 12 3 4 11 5 10 9 8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 7 6 Issue 05 (2010-11-19) . PWE3 services.. Topology View and Its Functions The topology view of the U2000 consists of a navigation tree on the left side and a view on the right side. users can view and configure services easily. Ltd. for example. Figure 5-6 shows the topology view of the U2000 and its functions. By means of the service topology. L3VPN services. which helps to identify the locations of deployed objects. The navigation tree shows the network hierarchy. The view displays the objects at different coordinates on the background map. E-AGGR services. VPLS services. l 3: You can click a button to perform a simple task quickly. zooming in. or unlocking views. the color of Abnormal event indicator is changed from green to red.. The number displayed on an alarm button indicates the number of the alarms of the corresponding severity. refreshing. zooming out. In this area. You can click the indicator to view the current abnormal event on the U2000. viewing current alarms and displaying the alarm panel. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. For example. 7: Current client time When an abnormal event occurs in the U2000. You can click a button to view the alarms of the corresponding severity on the current U2000. you can perform operations on the NMS and NEs. For example. you can set the display types of the objects in a view and view the descriptions of legends in the view. viewing alarms. launching the NE Explorer. 5: Alarm button bar 6: Filter tree and legend Alarms of different severities are displayed in different colors. locking. 5 Basic Functions 2: Menu bar 3 and 4: Toolbar buttons With submenus. logging out of an NMS. For example. and viewing performance data. such as configuring and managing tasks. l 4: You can click a button to perform a simple task quickly on the Main Topology. exiting an NMS. 5-11 . locking a terminal. Ltd. The filter tree and legends help you to locate an object quickly. saving. showing or hiding navigation trees. and searching for objects.iManager U2000 Unified Network Management System Product Description 1: Name of the network management system You can change the name of the network management system (NMS) as required. The alarms are displayed with two methods: color-coded display and small icon display. all NEs managed by the U2000 are displayed. the color or icon that indicates the highest alarm severity of these alarms is displayed in the topology view. The default method is the small icon display. Figure 5-7 Alarm display in the topology view The alarm display in the topology view has the following features: 5-12 l The color of a topological node indicates the operating status (such as normal. a subnet. you can launch the NE Explorer. Ltd. you can locate the required NE quickly. You can choose nodes of different levels from the Physical Root navigation tree. 11: Coordinates of the pointer in the Main Topology. In the Main Topology. delete topological objects. view fibers/cables. the subnet is displayed in the color or icon that indicates the highest alarm severity of these alarms. l When multiple nodes in a subnet generate alarms. create connections. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 5 Basic Functions 8: Name of the current login user of the U2000. 12: Topology navigation tree 13: Network-wide NE statistics In this area. 9: Name and the IP address of the U2000 server that the U2000 client currently logs in to. l When an NE generates multiple alarms of different severities. create NEs. view performance data. for example. 10: Physical map The name of the U2000 server is the name that you set on the U2000 client. and view current alarms. Alarm Display in the Topology View In the topology view. a node.. Issue 05 (2010-11-19) . alarms are displayed in different colors or icons to indicate different status of the subnets and NEs. or offline) and alarm status of the monitored NE. unknown. all NEs managed by the U2000 are displayed. In this area. as shown in Figure 5-7. Using this tree. or an NE to browse current alarms. configure NE data. You can collect statistics on the NE types and the number of NEs of each type on the entire network. iManager U2000 Unified Network Management System Product Description l 5 Basic Functions You can switch to the current alarm window of an NE using the shortcut menu of the NE node. In addition, you can query the details of current alarms in the NE Panel. Automatic Topology Discovery The U2000 provides an automatic topology discovery function to automatically add NEs to the topology view. Therefore, the operational expenditure (OPEX) is reduced. The U2000 supports the automatic topology discovery as follows: l Bulk creation of NEs – Bulk creation of SNMP/ICMP-based NEs: SNMP/ICMP-based NEs involve the router, switch, security access NEs. When the U2000 communicates with the preceding NEs successfully, it can search out the required NEs by IP address or by network segment and then bulk create these NEs. – Bulk creation of transport/ PTN NEs: Based on the IP address, network segment, or network service access point (NSAP) address of a GNE, the U2000 automatically searches out all the NEs that communicate with the GNE and bulk creates the NEs. – Bulk import of NEs: Security GNEs, service monitoring GNEs, and security virtual network (SVN) series security NEs periodically sends proactive registry messages that contain the IP addresses of NEs to the U2000 server. With the proactive registry management, the U2000 bulk creates the NEs after receiving the messages. l Configuring NEs automatically: The U2000 provides the function of configuring autodiscovered NEs (such as PTN NEs) automatically. l Searching for NEs at a scheduled interval: The U2000 searches for NEs of a specified type in a specified network segment according to the preset conditions at a scheduled interval. It automatically adds the new NEs to the topology view. NE types are as follows: the access router, switch, and security NEs. l Creating fibers/cables or links automatically: The U2000 supports the function of bulk creating fibers/cables and links. It supports the function of bulk searching and adding new fibers/cables and links to the topology view automatically after a search. Figure 5-8 Illustration of automatic topology discovery Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 5-13 iManager U2000 Unified Network Management System Product Description 5 Basic Functions 1. The automatic topology discovery is implemented step by step through a wizard. The wizard instructs you to set the parameters required for the automatic discovery, such as NE type, SNMP parameters, and the IP address range. 2. After you set the parameters, the U2000 searches for the required NEs in the specified network segments according to the preset conditions. All NEs from Huawei and other vendors that meet the conditions are displayed in the topology view. Meanwhile, the basic configuration data of the NEs is uploaded, which simplifies the configuration of these NEs. 3. You can stop the automatic topology discovery at any time. If the discovery fails, the cause is displayed. Clock View and Its Functions In the clock view, you can set the NE clocks, query network-wide clock synchronization status, search for clocks, and traces clocks. The U2000 supports the passive optical network (PON) clocks synchronous Ethernet clocks, IEEE 1588 v2 clocks, and SDH clocks. In the clock view, NEs of various types can be displayed, such as the PTN, router, access, MSTP, RTN, and NG WDM NEs. Figure 5-9 shows the clock view of the U2000 and its functions. Figure 5-9 Clock view and its functions 5-14 l Discovering the clock topology automatically: The U2000 searches for clock links between all NEs in the entire network to obtain the clock tracing relationships of all NEs. You can search for clock links by NE or by clock link type. When the clock source of an NE is changed, the U2000 performs a search again to renew the clock tracing relationships. l Viewing the clock topology: After the U2000 automatically discovers the clock topology, you can view the clock tracing relationships in the entire network. To adjust the clock topology, you can manually create and delete topological nodes and links. l Configuring clocks: In the clock configuration window of the NE Explorer, you can configure the clocks of the NE. You can configure the following clocks: PON clocks Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) iManager U2000 Unified Network Management System Product Description 5 Basic Functions synchronous Ethernet clocks, IEEE 1588 v2 clocks, and SDH clocks. The clock configuration function varies with NE types. l Monitoring the change of clocks: When an NE or a link fails or a switching of clock sources occurs in a network, the U2000 automatically updates the clock tracing relationships and the clock synchronization status in the topology view. According to the clock alarms of the NE whose clock is changed, you can identify the fault. l Switching clocks manually: You can select a clock link and set its clock tracing relationship as the current clock tracing relationships of the NE. 5.4 Alarm Management When an exception occurs on a network, the U2000 needs to notify maintenance engineers of the exception in a timely manner, so that the maintenance engineers will recover the network efficiently. Alarm management consists of the following functions: l Network-wide alarm monitoring and remote alarm notification enable the U2000 to notify maintenance engineers of network exceptions in time so that the engineers will rectify faults quickly and effectively. l Alarm correlation analysis, alarm association (with NEs, ports, or services), alarm masking, alarm suppression, and maintenance experience base improve the accuracy and efficiency of alarm processing. l Alarm synchronization ensures the reliability of alarms. l Custom functions such as alarm filtering, alarm redefinition, and time localization meet individualized requirements in different scenarios. Alarm Severity Table 5-2 shows different alarm severities and the handling methods. Table 5-2 Alarm severity Issue 05 (2010-11-19) Alarm Severity Definition Handling Method Critical A critical alarm indicates a fault or an event that may seriously affect an NE or the entire network, such as a board failure or a clock board failure. Handle a critical alarm immediately to avoid a system breakdown. Major A major alarm indicates a fault or an event that may affect part of a network, such as a board failure or line failure. Handle a major alarm in a timely manner to avoid loss of important functions. Minor A minor alarm indicates a general fault or an event about the functioning of a board or line. Minor alarms remind maintenance engineers of identifying alarm causes and rectifying possible faults. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 5-15 iManager U2000 Unified Network Management System Product Description 5 Basic Functions Alarm Severity Definition Handling Method Warning A warning alarm indicates a fault or an event that does not affect the system performance and services but may potentially affect the service quality of the NE or resources. Some warning alarms indicate status change. For example, when an NE recovers, a switching alarm is generated. Maintenance engineers can learn the information about the operating status of the network and NEs according to warning alarms and handle the alarms depending on actual situations. Handle different severities of alarms by using different methods. The U2000 supports the function of redefining the alarm severity so that you can change the severity of a specific alarm as required. The severity of an alarm needs to be adjusted when the impact of the alarm becomes larger or smaller. Alarm Status l Alarm acknowledgment and alarm clearance – Alarm acknowledgment: An acknowledged alarm indicates that this alarm has been handled by a user. An alarm can be acknowledged in the following two ways: – Manual acknowledgment: You can select an alarm from the current alarm window to acknowledge it. – Automatic acknowledgment: If you enable the automatic alarm acknowledgment, the U2000 acknowledges an alarm immediately after it is cleared or automatically acknowledges the alarms that are cleared within the specified time at 01:00 every day. – Alarm clearance: When you delete an alarm, the alarm is cleared from the NE and the current alarm library of the U2000. After that, the alarm is moved to the history alarm library. l Alarm status classification Based on the acknowledgment and clearance status, alarm status can be classified into the following types: – Unacknowledged and uncleared – Acknowledged and uncleared – Unacknowledged and cleared – Acknowledged and cleared NOTE Acknowledged and cleared alarms become history alarms after a preset period elapses. All nonhistory alarms are current alarms. l Changing alarm states – Changing the clearance status 5-16 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) iManager U2000 Unified Network Management System Product Description 5 Basic Functions When the condition triggering an alarm disappears, the NE or the U2000 server recovers. In this case, the NE or the U2000 server reports a clearance alarm. The alarm state changes from uncleared to cleared. You can also manually clear an alarm. – Changing the acknowledgment status If an alarm is acknowledged, it indicates that the alarm will be handled or has been handled. After the alarm is acknowledged, the alarm state changes from unacknowledged to acknowledged. You can unacknowledge an acknowledged alarm if necessary. After the alarm is unacknowledged, the alarm state changes from acknowledged to unacknowledged. l Relationships between alarm states Figure 5-10 shows the relationships between alarm states and how an alarm changes from one state to another. Figure 5-10 Relationships between alarm states Alarm Reporting and Handling Flowchart Figure 5-11 shows the alarm reporting and handling flowchart of the U2000. Figure 5-11 Alarm reporting and handling flowchart Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 5-17 iManager U2000 Unified Network Management System Product Description 5 Basic Functions Network-Wide Alarm Monitoring Traditionally, a network is maintained separately by domain. Faults across domains need to be located manually, which lowers the locating efficiency. The U2000 provides unified means of alarm monitoring, such as the alarm panel and alarm browsing, which helps users to understand the operating status of the network in real time. It also provides alarm query templates that are a collection of common query criteria. You can create different alarm query templates according to the region, type, and network layer of the device on which an alarm is generated. The alarm query templates facilitate the query and monitoring of alarms. The alarm display function is implemented in three different ways: alarm panel display, alarm bar chart, and alarm query and browsing. Figure 5-12 shows the alarm panel, and Figure 5-13 shows the alarm bar chart. Figure 5-12 Alarm panel 5-18 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) l Viewing event logs: Query current abnormal events. l Viewing alarm logs: Query all fault alarms that are reported by NEs. Querying and viewing alarms l Viewing current alarms: Query the fault alarms that are not handled. Ltd. The alarm bar chart displays the alarm statistics collected by the alarm panel. Alarm bar chart The alarm bar chart shows the real-time alarm statistics. that is. 5-19 .. The alarm panel provides a summary of system faults and can be used as a monitoring panel. unacknowledged or uncleared alarms. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. This function helps you to view and monitor the required alarms. You can directly use the template to query alarms based on the same query conditions.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-13 Alarm bar chart Table 5-3 Alarm display functions Function Description Alarm panel The alarm panel collects statistics on the alarms of managed objects by severity and displays the number of the alarms of each severity. l Setting an alarm query template: Save common query conditions as an alarm query template. that is. l Viewing history alarms: Query the fault alarms that are handled. acknowledged and cleared alarms. Issue 05 (2010-11-19) . alarm logs. and event logs. and supports multiple custom functions. history alarms. Click the alarm panel to display the window for viewing alarms. Pop-ups of the alarm panel or the blinks of alarm indicators show current alarms. Figure 5-14 Viewing alarms Alarm browsing Dynamic alarm template Alarm sorting Alarm details Alarm color display Alarm filtering Alarm cause and handling suggestion Alarm handling means Table 5-4 Alarm function 5-20 Function Description Dynamic alarm panel The alarm panel shows the number of the alarms of different severities of the U2000 client. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd..iManager U2000 Unified Network Management System Product Description 5 Basic Functions Alarm browsing consists of operations of viewing current alarms. as shown in Figure 5-14 and Table 5-4. or . status. type. alarm severity. . l Viewing all current alarms of a specific severity: You can quickly learn the critical. l Viewing the current alarms of a trail: In the trail management window. For a physical alarm. The query results can be saved and printed. alarm status. The alarm filtering function improves the efficiency of viewing alarms. Alarm viewing You can view the alarms relevant to NEs and services on the U2000 to learn the operating status of the NEs and networks. you can locate the board where the alarm is generated in the NE panel. You can filter alarms by attributes of alarm sources. The colors can be customized. Ltd. you can filter alarms by alarm name.xls.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Function Description Alarm filtering When a large number of alarms exist. You can right-click the NE to query current alarms of the NE. Alarm locating You can select an alarm and locate the topological object where this alarm is generated. such as the objects of NEs.html. Alarm display in color Alarms of different severities are displayed in different colors in the alarm list. you can learn the faults that occurred on the U2000 and NEs. l Viewing history alarms: By viewing all history alarms of the U2000. In this manner. and maintenance areas. object groups. This function facilitates trail maintenance. function type. or alarm severity. last occurrence time segment and clearance time segment. Alarm sort You can sort alarms by field and customize the columns displayed in the alarm list. l Viewing the alarms of a specified NE or U2000: You can select an NE or a U2000 in the Main Topology and quickly learn the current alarms of the selected object. Alarm template The alarm template can be customized. you can quickly learn the alarms and events of the managed trails. or minor alarms of the entire network from the alarm icons on the toolbar. and create the required alarm filter templates by customizing the filter criteria.txt.csv) and can be printed. Customized display Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Alarm display in the topology view When an NE reports an alarm. Alarm query You can query alarms by object where the alarms are generated. The history alarm data can be used for long-term performance analysis. the icon in the upper left corner of the NE or the color of the NE in the topology view varies with the alarm severity. Therefore.. major. you can sort alarms flexibly as required and locate the required alarms quickly. 5-21 . . l Viewing current alarms: View current alarms of all severities on the entire network. Alarms can be saved to a file (. you can select the required alarm filter template to filter alarms. Alarm Masking and Correlation Analysis l By using the alarm masking function. In this case. you can set the alarm/event masking conditions to avoid display of a large number of redundant alarms. transient alarm analysis. first occurrence time. tested. acknowledgment status. the NE may report a large number of alarms which can be ignored. repeated event analysis. 5-22 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. ASON object name. In the Handling Suggestion area. Handling suggestion The handling suggestion provides information. maintenance experience. acknowledgment user. direction.. name. including the severity. Issue 05 (2010-11-19) . such as the alarm name and identification information. You can view the information about an alarm in the alarm browsing window. you need to mask these alarms so that the U2000 does not display and save them. l While an NE is being repaired. The U2000 can collect statistics on alarms based on the preset conditions. clearance status. acknowledgment time. such as the alarm cause. location. and affected services. Alarm Statistics You can quickly learn alarm information by collecting statistics on alarms and analyzing them. and cause type. or a combination of the preceding items. Ltd. function type. and analysis on duration of acknowledged but uncleared alarms. last occurrence time. trail name. clearance time. source of an alarm. alarm source. trail domain. severity. recovery suggestion. location information. Figure 5-15 shows the implementation of alarm correlation analysis. alarm/event frequency analysis. alarm reversion. occurrence time. alarm description. protection subnet name. generation time. or deployed. clearance user.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Function Description Details You can obtain the details of an alarm. alarm plane. a link to the corresponding alarm reference topic in the Online Help is provided. The U2000 provides the following correlation analysis means: alarm/event correlation analysis. You can click on Click here to show detail information to display the corresponding alarm reference topic in the Online Help. The conditions can be the name. alarm status. labels them as correlative alarms. In the Default Correlation window. You can set the rules for the correlation analysis on the U2000 according to certain features of correlative alarms. – The alarm for high memory usage of a service causes the alarm for high memory usage and the alarm for high CPU usage. – Various alarms are generated when a certain fault occurs.. and saves them to a suppressed alarm database. – Correlative alarms are the alarms whose causes are relevant to each other. 5-23 . These rules can be enabled if required. the U2000 directly discards non-root alarms that meet the preset conditions.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-15 Alarm correlation analysis l Correlation Analysis – The Default Correlation and Correlation Analysis windows are provided for a correlation analysis. Therefore. or downgrades their severities. the predefined rules for the alarm correlation analysis are displayed. If non-root alarms are reported. – Figure 5-16 shows the relationships between a root alarm and its correlative alarms. the rules for the alarm correlation analysis can be customized. such as generation time and physical locations where the alarms are generated. In the Correlation Analysis window. One of the alarms is the root cause. the fault locating and analysis are affected. the alarm for high memory usage of a service is the root alarm and the rest are the correlative alarms. In this manner. Ltd. The alarm for high CPU usage causes the alarm for abnormal exit of the U2000 service. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the NE or services may be repeatedly switched between the normal state and the abnormal state. the U2000 handles these alarms according to the preset method. To resolve the problem in time. – If the repeated alarms generated due to certain faults or under certain circumstances are redundant to maintenance engineers. – Repeated events are the events that are reported repeatedly within the preset interval. lower the alarm severity.. enable the transient alarm analysis to raise the alarm severity so that maintenance engineers will pay attention to the alarms. l Alarm/Event frequency analysis – Alarms of the same type that are generated within a period may be relevant to each other. it can be concluded that those alarms are relevant to each other. or directly mask these alarms. – Alarms or events that are reported repeatedly within a short period due to certain faults may be redundant to maintenance engineers. sort the repeated alarms. – After you set rules for the event/alarm frequency analysis. Ltd. if the number of specified alarms generated within a specified period exceeds the preset threshold. the U2000 changes the severity of the alarm to major. Then. you can set analysis rules for transient alarm and repeated events on the U2000.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-16 Relationships between a root alarm and its correlative alarms l Transient alarm analysis/Repeated event analysis – Transient alarms are the alarms that are cleared twice within the preset period. the U2000 displays only the first repeated event or cleared transient alarm and discards the rest. For example. Then. If a major alarm is not cleared in 30 minutes after it is processed. For these alarms or events. To ensure that major alarms are handled in time. it can be concluded that these alarms are relevant to each other. enable the analysis on duration of 5-24 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 05 (2010-11-19) . – If transient alarms are reported continuously within a short period. further actions are required. if an alarm is reported and cleared repeatedly for five times within ten seconds. if the number of the same alarms generated within a period reaches a certain number. After you enable the alarm/event frequency analysis. l Analysis on duration of acknowledged but uncleared alarms – Major alarms are normally cleared within 30 minutes after they are handled. Then. R_OOF. the regenerator section termination (RST) function module of the regeneration section generates correlative alarms. To prevent the generation of correlative alarms. Manually enable this function if necessary. Ltd. B1_SD. you can set the preceding alarm correlation analysis rules and enable the alarm correlation analysis on the NE to suppress correlative alarms. correlative alarms are masked. Automatic dumping is classified into overflow dumping and periodic dumping. HTML. and XLS. The U2000 changes severities of the alarms to a higher level to remind maintenance engineers of handling the alarms in a timely manner. you can handle alarms in a timely manner. Alarm Synchronization After communication between the U2000 and an NE recovers from an interruption. such as the R_LOF. PDF. you need to synchronize Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the SDH physical interface (SPI) functional module of an optical board detects the R_LOS alarm (root alarm). Exercise caution when setting the rules. l By default. – A root alarm is directly caused by an abnormal event or a fault on the network. and B1_EXC. In the case. For example. If a major alarm is not cleared in 30 minutes after it is handled. such as TXT. the alarm correlation analysis is disabled. l Alarm acknowledgment: Alarms can be acknowledged manually or automatically. Alarm Dumping and Acknowledgment Alarm acknowledgment enables you to check whether alarms are handled according to the acknowledgment status of the alarms. CAUTION l Alarm correlation analysis depends on alarm correlation rules. CVS. – Enable this analysis function for the acknowledged alarms that are not cleared for a long time. In this manner. Understanding the monitoring mechanism helps you to correctly analyze and identify faults. A root alarm generally causes correlative alarms whose severities are lower.iManager U2000 Unified Network Management System Product Description 5 Basic Functions acknowledged but uncleared alarms. The NE alarms on the U2000 are different from the actual alarms on the NE. NOTE Alarm logs can be saved in various formats. some alarms on the NE are not reported to the U2000. or the U2000 is restarted. Then. the U2000 changes the severity of the alarm to critical. 5-25 . These rules cannot be modified. The rules will affect the analysis result. l Alarm Correlation on the NMS After you set alarm correlation analysis rules on the U2000 and enable the alarm correlation analysis. l The default correlation analysis rules on the U2000 are recommended. l Alarm Correlation on NEs – Alarm correlation rules on NEs are an inherent alarm performance monitoring mechanism of a logical function block of an NE.. the NE reports only the root alarm R_LOS to the U2000. thus improving the maintenance efficiency. l Alarm dumping: Automatic dumping and manual dumping of alarms are supported. when a fiber is cut. Issue 05 (2010-11-19) . an NE still reports the masked alarm but the U2000 does not receive the alarm. If you enable alarm suppression. the alarm will be cleared from the U2000. the U2000 automatically synchronizes alarms to ensure alarm consistency between the U2000 and NEs after the communication between the U2000 and NEs recovers or the U2000 is restarted. Alarms are synchronized according to the following rules: l If an alarm is cleared from an NE but uncleared on the U2000. the NE does not report the alarm. Figure 5-17 Alarm synchronization Alarm Redefinition The U2000 allows you to redefine the severities of alarms on NEs according to the requirements. Manual synchronization of alarms ensures that the U2000 displays the current operating status of the NE correctly. see Figure 5-18. The difference between alarm suppression and alarm masking is as follows: If you enable alarm masking. For details. Figure 5-17 shows the implementation of alarm synchronization. You can set the policy for automatic alarm synchronization. 5-26 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Alarm Suppression The U2000 supports the function of suppressing NE alarms. the alarm will be added to the U2000. This function changes the alarm severity displayed on the U2000. After you enable automatic alarm synchronization. If you set the status of an alarm to Suppressed. the NE does not report the suppressed alarm. highlighting only the required alarms. l If an alarm is present on an NE but absent on the U2000.iManager U2000 Unified Network Management System Product Description 5 Basic Functions alarms.. The U2000 supports the function of synchronizing NE alarms manually or automatically. Ltd. l Different filter criteria can be set to enable the U2000 to notify maintenance engineers of only the required alarms. Figure 5-19 Various alarm notification means Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Then. Ltd. It can notify maintenance engineers of alarms at any time from anywhere. The U2000 also supports two remote notification means: email and short message service (SMS). 5-27 . Therefore. l For the alarms that are cleared within a period (a customized delay). the maintenance engineers will locate and rectify faults quickly and effectively. the U2000 does not notify maintenance engineers of these alarms because they do not affect services any more. Figure 5-19 shows the alarm notification means..iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-18 Difference between alarm masking and alarm suppression Various Alarm Notification Means The U2000 provides various alarm notification means. the U2000 notifies non-onsite maintenance engineers of the fault. When a fault occurs in a network. the maintenance engineers will locate and rectify the fault promptly. that is.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Alarm Association The U2000 supports the function of locating alarms. For details. Figure 5-20 Alarm association Alarm association Alarm source: NE. 5-28 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. associating alarms with the topological object (NE or NE panel) where the alarms are generated. This base is a database that stores alarm details. Ltd. see Figure 5-21. This function improves fault locating efficiency. board. or port etc Alarm Maintenance Experience Base You can obtain the alarm handling information from the alarm maintenance experience base. Figure 5-20 shows the alarm association function. Issue 05 (2010-11-19) . you can enable the NMS to collect performance data from network devices according to a specified period. including: – CPU usage – Memory usage – Hard disk usage – Total of online accesses Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. This makes it easier to view alarm/event maintenance experience in the file. For the correct alarm generation time. This function supports the monitoring of performance indicators at the NE level. By using the function of importing alarm/event maintenance experience. 5. Ltd. Benefit NMS provides performance monitoring functions to support performance management at both the NE level and the network level. l Monitoring NE performance. The U2000 can display the time when an alarm is generated. cleared. or received as the local time of the U2000 client or server. you can export alarm/ event maintenance experience on the U2000 to a file. acknowledged. the U2000 automatically converts the alarm generation time (expressed in the NE time) into the local time of the U2000. If a similar fault occurs. The performance management function enables you to detect the deteriorating tendency in advance and solve the potential threats so that faults can be prevented. By using the function of exporting alarm/event maintenance experience.. relevant alarm handling information is available in the base for reference to achieve quick and efficient alarm handling. By creating a performance instance.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Alarm maintenance experience is summarized and recorded on the U2000 by users during maintenance. 5-29 .5 Performance Management The performance of a network may deteriorate because of internal or external problems and faults may occur. you can import the previously exported alarm/event maintenance experience to the U2000. Figure 5-21 Alarm maintenance experience base Alarm Time Localization The NE that reports an alarm and the U2000 may be in different time zones. and SNMP packets between network nodes – Delay. TCP. VPLS. With this function. and loss ratio of packets between network devices – Connection delay and download speed of Internet services such as the HTTP and FTP services l Collecting interface-based traffic and performance indicators.. This function allows you to set the thresholds for specific performance indicators. – Inbound bandwidth utilization – Outbound bandwidth utilization – Error Packet Rate l Monitoring SLA data. This function is used to collect the traffic statistics of network ports and is implemented by collecting the statistics of the following performance indicators: – Inbound traffic – Outbound traffic. Issue 05 (2010-11-19) . l Setting performance thresholds. and the collection of performance indicators such as delay. and PWE3 services. The NMS also provides default global settings to facilitate batch configuration. This facilitates network performance management. and jitter in the BGP/MPLS VPN SLA service. you can perform the following operations: – Storing performance statistics – Dumping performance statistics – Regularly compressing performance statistics Process The U2000 provides a graphical user interface (GUI) to monitor the key indicators of a network and provide statistics on the collected performance data. This function supports multiple types of SLA data monitoring and is implemented by monitoring the following performance indicators: – Delay and loss ratio of ICMP.iManager U2000 Unified Network Management System Product Description 5 Basic Functions – Number of PPPoE online accesses – Number of packets received or forwarded by devices l Monitoring network traffic. Ltd. packet loss ratio. UDP. jitter. You can set the following parameters: – Upper and lower thresholds – Trend thresholds – Non-burst peak thresholds – The NMS reports alarms when the values of some indicators are out of the set ranges l Maintaining data. This function supports the collection of interface-based traffic in BGP/MPLSVPN. 5-30 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-22 Performance management process Function Description The following is a function description of performance module. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. It may contain indicators and indicator groups for collecting performance data of network resources. Performance Monitoring Template Management Performance monitoring template: a collection of performance indicators. set certain service level agreement (SLA) parameters in the template and apply the parameters to data monitoring instances. The indicators are included in various indicator groups. Ltd. The following table describes different types of performance monitoring templates. Table 5-5 Performance monitoring templates Issue 05 (2010-11-19) Template Description Data monitoring template A data monitoring template is a collection of indicators for collecting performance data. By setting a performance monitoring template. 5-31 . In the case of network quality analysis (NQA) indicators.. you can manage a performance monitoring task easily. An instance is considered as one or more performance collection tasks. Issue 05 (2010-11-19) . set certain SLA parameters in the template and apply the parameters to TCA monitoring instances. an instance.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Template Description TCA monitoring template A threshold crossing alert (TCA) monitoring template is a collection of indicators with specified thresholds. In the case of NQA indicators. Thresholds include the upper and lower thresholds for triggering and clearing alarms and the upper and lower alarm severities. The management of a task is implemented by management of an instance. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Figure 5-23 Relationships between a template. and a task Monitoring instances enable you to collect performance statistics on resources of specified equipment according to a preset monitoring template and schedule policy. an instance. you can collect data of certain performance indicators of a resource. and a task. boards. Task: A task is the minimum unit for performance collection. you need not create SLA parameters when creating an instance. Monitoring Instance Management Instance: An instance consists of a resource and a template. Template-Based SLA Parameters This function collects most SLA parameters into data templates and TCA templates.. It may monitor TCAs of the specified resources. ports. One monitoring instance collects statistics on only one resource. A task consists of a resource and an indicator group. In this manner. You can perform the following operations on the U2000: l 5-32 Create monitoring instances for resources. A monitoring instance can be either a data monitoring instance or a TCA monitoring instance. TCAs are classified into upper threshold alarms and lower threshold alarms. and monitor the IP SLA of the PTN and third-party equipment. By means of an instance. Ltd. and links. which improves operation efficiency. Figure 5-23 shows the relationships between a template. such as NEs. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. NOTE l The information displayed in a graph or bar chart can be saved in HTML. l Synchronize resources corresponding to monitoring instances. control the number of created monitoring instances by a license. l Query the VPN SLA test result by means of a matrix. CSV. In addition. NOTE l The information displayed in a graph or bar chart can be saved in HTML. Viewing History Performance Data You can collect the network performance data in a specified period to learn the network performance. l Control the management capability. or HTML format. History performance data provides reference data for predicting a performance change of the network. you can compare the performance data in different periods in a graph or bar chart or compare the indicators of different resources in the same diagram. CSV. or HTML format.iManager U2000 Unified Network Management System Product Description 5 Basic Functions l Modify monitoring instances. Schedule Policy Management The schedule policy enables you to set the time segments and periods at which the data is collected. and the result will be refreshed in real time. or table. and save the performance data in different file formats. and save the performance data in different file formats. Sorting Resources with Top N Deteriorated Performance You can sort resources with top N deteriorated performance by alarms of the resources. l Suspend monitoring instances. bar chart. TXT. TXT. l Resume monitoring instances. Ltd. CSV.. or PDF format. or bar chart. 5-33 . You can view the history performance data of a network in a graph. graph. l The information displayed in a table can be saved in TXT. l The information displayed in a table can be saved in TXT. l Query monitoring instances. CSV. or PDF format. The schedule policy can be applied to resources when a monitoring instance is created or modified. Viewing Real-Time Performance Data You can view real-time performance data in a table. Sorting Resources with Top N Performance You can view resources with top N performance sorted by indicators. that is. l Query TCAs. 6 Inventory Management The U2000 supports unified inventory management of physical resources and service resources on the entire network. dynamic tunnels. or 12 hours before and after the current time can be generated. to evaluate the quality of networks and services and analyze correlation between the quality of networks and services. tunnels. Issue 05 (2010-11-19) . interfaces. Monitoring Network Performance You can view the performance data of NEs. a performance trend analysis graph for either the current time. this function enables you to learn the health status of the entire network and solve problems accordingly. such as an area-based rule or service-based rule.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Query of Top N Deteriorated Resources This function sorts resources by TCA duration according to the preset conditions. you can quickly and clearly view information about various resources network-wide. evaluate network performance. and analyze correlation between the indicators and network performance. enabling you to locate the current deteriorated resources quickly. The performance trend analysis graph helps you understand the general change trend of the interface performance in a timely manner. IP links.. Data can be dumped in the following two ways: l Automatic Dumping: Performance data is dumped automatically based on the preset parameters. l You can perform the following operations on the U2000: – Maintain inventory information – Query inventory information – Collect statistics on resource inventories according to the preset statistical items 5-34 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. l Analyzing the interface performance trend After the network interface indicators are set. L2 links. 5. The inventory information serves as a reference for service planning and expansion planning. In addition. l Manual Dumping: Performance data is dumped based on the user-defined conditions according to the dump type before the end date. you can perform various tests on a network. In addition. static. such as the tests of UDP jitter and FTP ping. On the U2000. you can understand the information about network-related indicators. Data Lifecycle Management You can back up performance data to a specified storage medium manually or automatically when excessive performance data is saved in the database of the U2000. such as different periods and the database usage. l Viewing the results of network monitoring test cases in a matrix You can view the results of network monitoring test cases in a matrix. you can browse and compare data easily. and test cases on the same network through network grouping. Then. l Creating a network group Associate the monitoring instances of resources of different types within the same network according to the customized grouping rules. In this manner. Patch Version List. NE MAC Address. If an existing asset is updated. HTML. Cabling Mode. 5-35 . Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. an NE icon would remind you of that the data on the U2000 is asynchronous with the data on the NE. Alias. Shelf Shelf Name. Shelf Type. Alias. Software Version.. Board Type.iManager U2000 Unified Network Management System Product Description 5 Basic Functions – Save inventory information to XLS. TXT. Depth (mm). NE Type. Voltage. Internal Power Supply or Not. Location. Relevant Rack. or CSV files – Print inventory information l The U2000 supports auto-discovery of a new asset (such as a new device. Relevant NE. Rack Type. Software Version. Relevant Telecommunications Room. Country. Software Version. Number of Batteries. Height (mm). With the U2000. Width (mm). etc). Alias. Shelf ID. Relevant Telecommunications Room. Ltd.. Figure 5-24 shows the inventory management window of the U2000. you can quickly identify the causes of the data asynchronization. Equipment No. Internal Transmission or Not. Board Board Name. Run Status. Internal Battery or Not. Relevant NE. Province. NE NE Name. Room Number. Relevant Subnet. Relevant Subnet Path. Physical Location. NE IP Address. Thickness of the Antistatic Floor (mm). NE ID. Shelf ID. Shelf No. Number of Shelves . board. Relevant Station. Figure 5-24 Inventory management window and its functions View inventory resources by type Collect statistics on inventory resources Perform operations on inventory records Table 5-6 Statistical items for resource inventory management Issue 05 (2010-11-19) Resource Statistical Item Telecommunic ations Room Telecommunications Room Name. Slot ID. Serial Number. Hardware Version. Rack Rack Name. City. Antistatic Floor or Not. Create Time. Fiber/Cable Count. Internal MDF or Not. Power Box Type. NE Type.. Type. Alarm Severity. Used Optical Split. Date of Manufacture. Source NE. Up Band Width. You can also dump and print logs. Router/Switch Interface Name. Disabled Status. 5-36 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. NE Name. Serial Number. Attenuation. Source IP. Port. Software Version. Name. PON Port Splitting Status OLT Device Name. Part Number. ONU Version. 5. This facilitates detection of unauthorized logins and operations and fault analysis. Amount. Optical Module Port. . IPv4 Operating Status. Total Slot Number. Subboard Description. Slot Number. CLEI Code. Created on. Ltd. Administrative Status. NE Type. Idle Optical Split. Sink Port. Device Name. Sink Port. Description.. Slot Used Statistics NE Type. Creator. IPv6 Operating Status. Fiber/Cable Name. Remaining Bandwidth. IPv6 Address. Link Level. Logs also can record operations that the OSS performs on NEs through NBIs. Sink NE. Type of Borne Network Protocol. by browsing and collecting statistics on logs. Rate. The U2000 allows administrators to query and save logs and collect statistics on logs periodically. Logical Card. User Label. Name. Relevant NE. Serial Number. Link Alarm Severity. Link Rate. Medium Type. IPv6 Enable Status. Sink IP. Frame. ONU Terminal Type. Specifically. Link Name. Sink NE. Source Port. Slot. Sub-Slot Number. Alias. Optical Split. Source NE. Fiber/Cable Type. User Label.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Resource Statistical Item Subboard Subboard Name. Maintainer. you can query the client from which a U2000 user logs in to the U2000 server and query the operations performed by the user after login. Source Port.7 Log Management Logs record the information about operations performed on the U2000 and important events that occur in the U2000. Subboard Type. Physical Card. Used Slot Number. MAC Address. Down Band Width. Level/Capacity. Direction. Figure 5-25 shows the log management window and functions of the U2000. Port Port Type. Issue 05 (2010-11-19) . Length. IPv4 Address. Hardware Version. operation object. You can learn the operation logs of NEs on the U2000 client instead of from each NE. security logs. HTML. CSV. lockout. Querying and Collecting Statistics on Logs U2000 administrators can set query conditions to query logs by operation user. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The administrators can learn about the operations performed on the U2000 by the current user. logout. l NE Syslog running logs record the operating information of NEs managed by the U2000. and XLS files. You can browse the Syslog running logs of the managed NEs on the U2000 instead of from each NE. l NE Syslog operation logs record operation results of managed NEs. system logs. and NE logs. The U2000 obtains from NEs all Syslog running logs of NEs. l Security logs record the security-related operations that users perform.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-25 Log management window and functions Log Classification The logs of the U2000 are classified into operation logs. l System logs record the operations that the U2000 automatically performs. 5-37 . and unlocking. such as creating a subnet and enabling or disabling the alarm sound. Ltd. l Operation logs record the non-security-related operations that users perform. The logs can be saved to TXT. risk level. operation terminal. operation time. or a combination of all of the preceding items according to the requirements. such as login. PDF. operation result. operation name. such as scheduled tasks and system tasks.. U2000 administrators and maintenance engineers can view the status of NEs according to the importance of the NE information.. The log exporting function enables you to export logs to a file for logs viewing or fault locating. You can compress the files into a ZIP file. You cannot delete the system tasks or create new dumping tasks. By default. Ltd. You can only modify the parameters of the system tasks. Figure 5-26 shows the window and functions of the U2000 for dumping and exporting logs. and security logs can be dumped periodically and automatically or dumped manually. which releases storage space on the U2000 server. l NE log forwarding: The U2000 can forward the information about various NEs in the format that complies with the system log protocol to the Syslog server. Issue 05 (2010-11-19) . – Dumped logs are saved to CSV or XML files. 5-38 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Figure 5-26 Window and functions of dumping and exporting logs l Dumping logs – Operation logs. Dumping and Exporting Logs The log dumping function enables you to delete the logs that are not required. This function prevents logs from occupying too much space. – The U2000 provides only one default system task for each type of logs. system logs.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Forwarding Logs l U2000 log forwarding: The U2000 can forward its operation logs to the Syslog server to save the operation information. The logs can also be dumped upon an overflow when the size of the logs exceeds the preset threshold. automatically at a scheduled time or manually. logs are dumped to the $IMAP_ROOT/dump/ThresholdExport/ Log (Solaris/Linux) or %IMAP_ROOT%\dump\ThresholdExport\Log (Windows) path. The logs serve as a reference for maintenance. Then. l Back up the NE database to the CF board manually or automatically. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. they are not deleted from the database.. 5. See Figure 5-27. Ltd. you can back up and restore NE data on a server. periodically back up the database.8 Database Management Database management involves the management of NE databases and U2000 databases. You can use the system control and communication unit (SCC) or CF board on the NE to back up and restore the NE database for the transport access NEs. – Exported logs are saved to CSV or XML files. You cannot delete the system tasks or create new exporting tasks. To ensure data security. NE Database Management To ensure NE data security. l Back up the NE database to a local or remote server in a manual or scheduled manner. You can compress the files into a ZIP file. l Exporting logs – The U2000 provides only one default system task for each type of logs. NMS Database Management The database of the U2000 supports two types of storage files. the U2000 provides the functions of backing up and restoring NE data. they are deleted from the database to release the database space. In NE software management. logs are exported to the $IMAP_ROOT/dump/fileint/syslogs (Solaris/ Linux) or %IMAP_ROOT%\dump\fileint\syslogs (Windows) path. l Restore the NE configuration data from the SCC board or CF board. By default. You can only modify the parameters of the system tasks. One type is used to store data and the other type is used to store the logs that record the operating information of the database.iManager U2000 Unified Network Management System Product Description 5 Basic Functions – After the logs are dumped. l Back up the NE database to the SCC board manually. and maintenance of data consistency between the U2000 and NEs. l Restore the NE database from a local or remote server. 5-39 . – After the logs are exported. WDM. and microwave NEs. Ltd. and alarm/event logs) and other data (such as performance data). l Dump data in the U2000 database. The configuration upgrade wizard instructs users to restore the U2000 database by using the configuration data script that has been backed up. the NE icon has a sign.. Script files can be exported in a scheduled manner through task scheduling. Alarm Configuration Performance Log Security …… The U2000 provides a database backup and restoration tool. or import the configuration data to the U2000 from script files. security logs. – Manual dump – Periodic dump l Import or export script files: Export the configuration data in the U2000 to script files. The functions of importing and exporting script files are applicable to only the PTN MSTP. The U2000 provides rich functions to ensure the security and consistency of the NE 5-40 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In addition. system logs. Issue 05 (2010-11-19) . Keeping Data Consistency Between the U2000 and NEs If the configuration data is not synchronous between the U2000 and the NE. including logs (such as operation logs. The U2000 information about the MSTP and WDM NEs can be exported to a TXT file so that the information can be used by the MDS 6600.iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-27 NMS database management NMS Database Storage Device Automatically Back Up Manually Back Up All important system data are stored in the NMS database. the U2000 can import a TXT file that contains the MDS 6600 data. It provides the following NMS database management functions: l Back up the U2000 database to a local or remote server in the following ways: – Immediate backup – Scheduled backup through task scheduling l Restore the U2000 database from a local or remote server. The tool facilitates database maintenance and ensures the stability and security of the U2000. l Initialize the U2000 database: Clear and initialize the U2000 database before restoring the database in the case where the database data is in disorder or damaged. the U2000 converts the configuration data to the Qx interface information. l During the downloading of configuration data. and NG WDM product series do not support preconfiguration and the downloading of configuration data. synchronization. which ensures a high efficiency. such as the uploading. l Query and set the NE Telnet or STelnet parameters. These nodes are connected through Ethernet or data communications Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 5-41 . but the database package can have many backup copies. the U2000 and NEs are considered as nodes. The U2000 provides more reliable functions. The U2000 communicates with NEs. In the DCN network. l Consistency check: Check whether the NE data on the U2000 is consistent with the data on NEs. you can configure the new NE by duplicating the data of the configured NE. Select the backup package as required. preconfiguration. If it is inconsistent. databases are directly downloaded to the NE.. NA WDM. if the configuration data of an NE to be configured is the same as that of a configured NE. l Downloading: The NE data on the U2000 is applied to the NEs to overwrite the data on the NEs. DCN management is applicable to PTN NEs. consistency check. l Manage the Telnet or STelnet parameter template. synchronize or upload the NE configuration data. This is because: l The configuration data does not contain complete NE data. l Initialization of the NE data on the U2000: The NE data on the U2000 is deleted and the NE becomes unconfigured after the initialization. and the initialization of the NE data on the U2000. the database package backup and restoration.iManager U2000 Unified Network Management System Product Description 5 Basic Functions configuration data. In the database package restoration mode. Duplicating the NE data only changes the data on the U2000 and does not affect the data on the NE. the data can be exchanged between the U2000 and the NE. downloading. l On the U2000. The data that is present on the U2000 but absent on NEs is not deleted. NOTE The PTN RTN. l Preconfiguration: The configuration data of an NE is saved only at the NE layer on the U2000 and does not affect the actual configuration data on the NE. The complete data can be obtained by using the database package restoration function. l Uploading: Data on NEs is reported to the U2000 to overwrite the NE data on the U2000. duplication. you need to apply the configuration. The preconfiguration function is generally used for the large-scale service adjustment or expansion. and manages and maintains network nodes through a DCN network. l Manage the default access protocol parameters. To make the duplicated data take effect on the NE. You can query or set the following parameters on the U2000: l Query and set the NE access protocol parameters. The data that is present both on the U2000 and NEs is not uploaded.9 NE Communication Parameter Management The U2000 communicates with managed NEs successfully only after you correctly set the connection parameters of the U2000 and the managed NEs. but the efficiency is relatively low. Then. 5. and the data that is present on the U2000 but absent on NEs is not deleted. l Synchronization: Upload the inconsistent data (including the conflicting data. that is. and the data that is present on NEs but absent on the U2000) to the NE layer on the U2000. l Duplication: When NEs are of the same type and of the same software version. only one set of configuration data can be saved. to resolve the data restoration problem. Ltd. the DCN network between NEs is referred to as an internal DCN network. l Set the secondary GNE of a non-GNE. In an actual network. l Set the secondary GNE of a non-GNE. 5. Issue 05 (2010-11-19) . l Convert a GNE to a non-GNE. submarine cable NEs. and manages and maintains network nodes through a DCN network. l Change the GNE of a non-GNE. DCN management involves the following operations: l Modify gateway NE (GNE) parameters. Relatively. the U2000 and NEs are usually connected through an external DCN network that consists of equipment such as switches and routers. The U2000 communicates with NEs.10 DCN Management DCN management is applicable to MSTP. These nodes are connected through Ethernet or data communications channel (DCC). the data is saved in the memory of NEs. Hence. l Check the network communication status. l Test the communication between the U2000 and a GNE. WDM. l Convert a non-GNE to a GNE. This prevents the loss of the configuration file in case of system restart. microwave. the U2000 and NEs may be located at different floors of the same building or in different buildings or cities. l Check the network communication status. l Check the GNE switching status. In the DCN network.iManager U2000 Unified Network Management System Product Description 5 Basic Functions channel (DCC). l Convert a GNE to a non-GNE. 5.11 NE Software Management The NE software management module (called DC) is an independent subsystem of the U2000 and it is used to manage software and data on NEs. l Check the GNE switching status. the DCN network between NEs is referred to as an internal DCN network. The DC saves data through: Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Test the communication between the U2000 and a GNE. DCN management involves the following operations: l Modify gateway NE (GNE) parameters. This feature saves the system configuration to the flash memory or hard disk of NEs.. the U2000 and NEs are considered as nodes. 5-42 l The DC implements the upgrade and downgrade of NEs in the following ways: l Saving: After the system is configured. the U2000 and NEs may be located at different floors of the same building or in different buildings or cities. In an actual network. l Change the GNE of a non-GNE. the U2000 and NEs are usually connected through an external DCN network that consists of equipment such as switches and routers. Ltd. The DC enables you to back up NE data and upgrade or downgrade NE software. Relatively. l Convert a non-GNE to a GNE. Hence. The reports in tabular format can be filtered by equipment type and saved in XLS. TXT. or restoration operation is being performed on the NE. and resource reports of equipment in the IP domain Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the NE accepts the request for loading. or restoration operation is being performed on the NE. The DC restores data through the manual restoration operation. – A task is not periodic. If the DC has the rights to manage the NE and no loading. 5. backup. You can view reports on the U2000 in the following ways: l Viewing resource reports on the U2000 client l Viewing iWeb reports through the IE browser. The DC then transmits the contents for loading to the NE through FTP/TFTP/SFTP. – A policy is periodic. backup.iManager U2000 Unified Network Management System Product Description 5 Basic Functions – Saving operation (manual) – Saving task (manual) – Saving policy (automatic) l Backup: Backs up the configuration to storage devices other than NEs. For example. If the DC has the rights to manage the NE and no loading. The DC backs up data through: – Backup operation (manual) – Backup task (manual) – Backup policy (automatic) l Loading: Loads software for the upgrade to an NE. The DC loads data through: – Loading operation (manual) – Loading task (manual) – Upgrading task (automatic) l Restoration: Restores NE data from the backup to an NE. logs. you can save and back up data through a policy or a task. such as data upgrading and data loading. or restoration operation is being performed on the NE. The DC then transmits the contents for restoration to the NE through FTP/TFTP/SFTP. HTML. The backup data is used for restoring the NE configuration. 5-43 . It is mainly used for the operations that are performed frequently. l Policy and Task: The DC provides different methods for implementing features. The DC then transmits the contents for backup to the specified backup directory on the FTP/TFTP/SFTP server through FTP/TFTP/SFTP. log reports. or CSV files. Users can select a method according to the actual situation.12 Report Management The U2000 provides reports about alarms. the NE accepts the request for backup. You can print the required data or save the data as a file when viewing it. If the DC has the rights to manage the NE and no loading. performance reports. and resources. It is mainly used for the operations that are not performed frequently. the NE accepts the request for restoration. Ltd. such as data saving and data backup. backup. including alarm reports.. iManager U2000 Unified Network Management System Product Description 5 Basic Functions Table 5-7 Resource Report Type Report SDH statistics report Port statistics report Statistics report of SDH tributary port resources Statistics report of lower order cross-connections SDH fiber/cable or radio link resource usage report Statistics report of trails between SDH NEs Statistics report of SDH protection subnet resources Statistics report of SDH trail resources Microwave report Radio link report Microwave license capacity report MSTP Ethernet report Statistics report of Ethernet port resources Statistics report of services resources between Ethernet NEs WDM statistics report Report on WDM protection group switching status WDM NE master/slave shelf info report Statistics report of WDM client-side port resources Statistics report of WDM link resources Statistics report of inter-station wavelength resources Statistics report of WDM bandwidth resources WDM channel resource report Wavelength resource usage report xPON statistics report Report on PON port splitting status PTN statistics report Interface resource report Project document Board manufacturer information Export electronic labels Clock tracing diagram Networking diagram Timeslot allocation diagram 5-44 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 05 (2010-11-19) .. Ltd. Ltd..iManager U2000 Unified Network Management System Product Description 5 Basic Functions Resource Report Diagram Figure 5-28 and Figure 5-29 show the diagrams of the NE-level resource report and the networklevel resource report. Figure 5-28 Diagram of the NE resource report Display the NEs on NMS The resource report shows the statistical value of each parameter The buttons for querying and setting parameters and the print and save buttons are displayed Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 5-45 . Ltd. and manage reports based on the Web. The iWeb report system supports the following alarm and log reports: l Details report on equipment alarm severity distribution l Report on equipment alarm severity distribution l Equipment connectivity statistics report l General alarm information report l History change record report For information on the functions of the iWeb report system. and improve network performance. which is used to manage the U2000 and query the system information. 5-46 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. analyze. The powerful report system helps you to monitor.9 Report Subsystem Management.13 System Monitoring The U2000 provides a GUI-based system monitoring tool. The function of managing system processes enables you to perform the following operations as shown in Figure 5-30. Issue 05 (2010-11-19) . and make decisions accordingly. 5. see 10. It allows you to generate..iManager U2000 Unified Network Management System Product Description 5 Basic Functions Figure 5-29 Diagram of the network resource report Display the NEs on NMS The resource report shows the statistical value of each parameter The buttons for querying and setting parameters and the print and save buttons are displayed iWeb Report The iWeb report system provides a complete set of flexible and convenient services. distribute. the system sends an alarm and the corresponding status icon turns red. the U2000 sets thresholds for certain monitored items such as the CPU usage and database usage. When a value of the monitored item reaches the corresponding threshold. Ltd. By default. the corresponding status icons turn red. For the running status of the U2000 server. l Query database information. hard disks.iManager U2000 Unified Network Management System Product Description 5 Basic Functions l Monitor the processes. see System Information Monitoring. l Query hard disk information. and the running status of all the components installed on the U2000 server. memory. all the processes start automatically. Users can view the service process status and resource usage (such as the CPU. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Figure 5-30 System monitoring processes System Information Monitoring The U2000 provides a GUI-based system monitoring function. l Set the security communication mode. 5-47 .. databases and server information about the U2000 in real time. When items monitored by the U2000 are abnormal. – The U2000 restarts a process automatically if this process stops abnormally. l Query operation logs. l Monitor the server. as shown in the following figure. l Query process information. l Start and stop processes automatically or manually. – Processes can be started or stopped manually as required. Users can modify the thresholds if necessary. and database) of the U2000 in real time. l Query component information. The system monitoring tool of the U2000 also provides the function of querying system information. – When the U2000 is started. .5 Basic Functions iManager U2000 Unified Network Management System Product Description Figure 5-31 System monitoring information 5-48 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 05 (2010-11-19) . Ltd. iManager U2000 Unified Network Management System Product Description 6 6 MSTP Network Feature Management MSTP Network Feature Management About This Chapter This topic describes the functional features of MSTP NE management and network management. 6. 6.4 SDH ASON Management The automatically switched optical network (ASON) is a new generation of optical network that integrates the exchange and transport functions. communication. such as an MSP ring and a path protection (PP) ring. An ASON NE refers to the equipment that is equipped with both SDH and ASON features. 6. or directly configure the data at the network layer of the U2000.2 MSTP Protection Subnet Management A protection subnet is a network structure with the comprehensive self-protection function. After a user initiates a service request. protection. and apply the data to all the related NEs. and clocks. Ltd.1 MSTP NE Management NE management refers to the management of configurations of an NE in terms of attributes. establishes and removes connections through the signaling control. Compared with configuring NE data on a per-NE basis. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 6. such as an unprotected ring and an unprotected chain. the ASON selects a route automatically. configuring NE data by using the trail management function is faster and more convenient.3 E2E MSTP Management E2E network management is also referred to as trail management. An ASON is managed by the U2000 that combines ASON and SDH features. the protection subnet is a generalized concept that includes not only the network structure with the comprehensive self-protection function.. The configuration data is saved to the database of the U2000 and to the database of the NE. and performs network connections automatically and dynamically. but also the network structure without the self-protection function. You can construct the configuration data of E2E network management by searching for the data at the NE layer of the U2000. 6-1 . services. In the U2000. modify the NE ID on the U2000. l Query physical resources in the following lists: – NE list – Board manufacturer information – Board list – Cabinet list – Subrack list – Equipment room list l Use the board plug and play function: After a board is inserted into the slot. l Enable the function of automatically disabling the NE: periodically disable some NE functions that may affect services. You can replace a board with a board of another type on the U2000. these operations will stop automatically. l Synchronize NE time: Align all NEs with the system time of the U2000 server automatically. l Environment monitoring information.. – The user can replace board A with board B whose rate and number of ports is the same or less as of board A. and clocks. communication. the NE Panel automatically displays the board icon and board information. Ltd. 6-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Query the actual physical board type of a board that is used as a board of another type. services. protection. such as loopback and automatic laser shutdown (ALS). When the time expires.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description 6. l Replace a board. The configuration data is saved to the database of the U2000 and to the database of the NE. The following items can be set: – PMU interface – EMU interface – CAU interface – NE fan speed l Virtual NE management – Create a virtual NE. Issue 05 (2010-11-19) . Basic NE Configuration You can perform the following operations on the U2000: l Modify NE attributes such as: – NE name – NE ID – Extended NE ID – Remarks – NE pre-configuration NOTE For the NE whose ID needs to be set through the DIP switch.1 MSTP NE Management NE management refers to the management of configurations of an NE in terms of attributes. l Modify the optical/electrical attributes of the port. 6-3 . Board Protection Configuration You can perform the following operations on the U2000: l Configure board 1+1 protection. l Supports the management of inband DCN. l Configure and query the SDH network node interface (NNI) connection for orderwire. l Set and query the length of the subnet ID and the related subnet of the optical interface. – Create fibers between the virtual NE and other NEs. l Configure 1:N tributary protection switching (TPS) protection for a tributary board. l Configure port protection. l Support graphical display of performance events relevant to the optical power. l Configure and query the broadcast data port. l Set and query the network-wide conference call number. call waiting time. and orderwire phone port availability.iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management – Add a board. l Set overhead interfaces. l Configure board level protection. Orderwire Configuration You can perform the following operations on the U2000: l Set and query the orderwire phone numbers. including: – Orderwire – Hotline number – Special line number – Conference call number Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Configure and query the F1 data port. – Search for and create trails on the virtual NE. – Create protection subnets. l Set the parameters of CES interfaces. l Create a board with adjustable bandwidth for a preconfigured NE.. – Create SDH services. l Query the data backup status between the active and standby SCC boards. l Set the parameters of PDH interfaces. l Support the replacement of the boards. SDH Interface Configuration You can perform the following operations on the U2000: l Interface board management: query and set the SDH interface boards installed on NEs. Ltd. l Set the parameters of SDH interfaces. l Manage subnetwork connection tunnel protection (SNCTP) services. l Activate or deactivate services. bind or unbind services. or VC4 services and select protection groups for them. l Manage Transmux services. including: – TDA clock source – TDA power feeding l Query and set the overhead including: – Regenerator section overhead (J0) – Lower order path overhead (V5. l Convert an SNCP service to a normal service or convert a normal service to an SNCP service. C2) l Enable the PRBS function. l Enable the function of pre-alerts for the port optical power. l Manage subnetwork connection protection (SNCP) services.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description – Subnet number length – F1 data port – Broadcast data port – Communication port – Data port – Out-ring route l Set the optical amplifier board interface. including M13/E13 Transmux and M13/E13 Transmux Server services. l Manage subnetwork connection multiple protection (SNCMP) services. C2) and its pass-through or termination – VC3 higher order path overhead (J1. VC4-16C. l Set tone and data access (TDA) interfaces. In the platform 4. l Manage the power consumption. l Set and query the TUG structure in the transmit and receive directions. and select protection groups for them. l Set and query the optical power threshold of a line board. Nx64 kbit/s services). or VC4-64C concatenated service.0 equipment. VC4-8C. VC3. l Manage the optical power of a board. Configuration for SDH Services and Protection You can perform the following operations on the U2000: 6-4 l Configure VC12. l Configure other services: enterprise system connection (ESCON) services. l Perform lower order loopbacks. 64 kbit/s services (including TDA board services.. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. select protection groups of these services. and DSL services. Issue 05 (2010-11-19) . J2) – VC4 higher order path overhead (J1. l Configure VC4-4C. Ltd. l Query the in service (IS) port status and the out of service (OOS) port status of a line board or a data board. l Query the bandwidth of ATM board. – Configure ATM protection pairs. Configuration for Ethernet Interfaces and Services You can perform the following operations on the U2000: l Query and configure the Ethernet interface board on an NE. l Perform ATM operation. – Configure ATM cross-connections.. Ltd. including: – Basic attributes – TAG attributes Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Services. – Create a network to network interface (NNI) on the ATM processing board. l Configure ATM traffic. 6-5 . and Protection You can perform the following operations on the U2000: l Query and configure the ATM interface board on an NE. l Configure an inverse multiplexing over ATM (IMA) group. Configuration for ATM Interfaces. duplicate the OAM data of the NE or perform the related consistency check. – Activate or deactivate ATM cross-connections. l Configure ATM cross-connections. Configure multiple MSP rings by VC4 at an optical port to increase the usage of network resources. l Set the parameters of the Ethernet internal interfaces.iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management l Configure multiple multiplex section protection (MSP) rings at a single optical port. administration and maintenance (OAM). – Configure ATM services from ATM board to SDH line. The REG function is completely implemented by the board without the cooperation of the SCC board and a cross-connect board. l Configure ATM bound path. each pair of optical interfaces of the line board provides a special receive or transmit function. l Set the parameters for an ATM interface. the SDH signals from the receiving optical interface are sent out directly to the corresponding transmitting optical interface after passing through the regenerator section layer and being amplified. – Set or query the NE loopback location identifier (LLID). – Configure ATM protection groups. l Configure fast Ethernet transparent transmission board. l Configure REG. l Query the capacity of higher order and lower order cross-connections on an NE. Through the internal switch. – Perform a remote loopback test. download. – Set or query the section-end attribute of a connection point. After the line board is set as REG. – Set or query the continuity check (CC) activation status of the connection point. – Upload. l Configure E-Line services. l Configure the parameters of quality of service (QoS). l Configure Ethernet private LAN (EPLAN) services. and VLAN MAC address table capacity. Perform operations such as adding. including Ethernet private line (EPL) and Ethernet virtual private line (EVPL). l Configure Ethernet link aggregation group (LAG). including: – Aging time – Spanning Tree Protocol – Multiple Spanning Tree Protocol – IGMP snooping protocol l Configure QinQ service: QinQ is an embedded technology in VLAN. Issue 05 (2010-11-19) . Create a new virtual bridge (VB) and configure the following parameters: service mount. – Add or delete LAG ports. so that VLAN can be extended. Ltd. self-learning MAC address. MAC address disabling. l Configure the parameters of Ethernet Layer-2 switching. including: – Flow configuration – CAR configuration – CoS configuration – Flow shaping management – Port shaping management – Differentiated service (DiffServ) domains – CAR policy – Port WRED Policy – V-UNI ingress policy – V-UNI egress policy 6-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. VB port MAC address table capacity. Create a new service and configure a bound path.. bound path. – Create or delete an LAG. including: – Basic attributes – Flow control – TAG attributes – Network attributes – Advanced attributes l Configure point-to-point LPT and point-to-multipoint LPT. which contains intra-board LAG and inter-board LAG. – Query LAG ports and aggregation state. and tags users with multi-layer VLAN ID. stripping and exchanging of tags in different scenarios.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description – Network attributes – Encapsulation/mapping – Link capacity adjustment scheme (LCAS) – Bound path – Advanced attributes l Configure the parameters of the external ports of Ethernet interface. VLAN unicast. VLAN filtering table. and encapsulates LSPs into virtual concatenation groups (VCGs) for transmission. EFS and EMS boards. or clear switching in the RPR that an NE belongs to. E-AGGR services. l Enable the automatic reporting function of RMON performance of Ethernet boards. l Set the clock source priority tables. l Configure forced switching. l Query the protection status. E-LAN services. 6-7 . l Support the ability to manage multi-protocol label switching (MPLS). and clock services. l Set and query the node information of an NE in the RPR. l Configure the static routes and address resolution. l Set and query the MAC address of a data board. l Support the Ethernet port mirroring. l Support traffic monitoring and report for an Ethernet port. l Configure E-Line services. EGS. l Query the opposite NE of the data services on these boards. l Use QoS template to simplify the QoS configuration for Ethernet services. including: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Set the RPR link information of an NE. The MSTP equipment builds a label switched path (LSP) with a PE router. manual switching. l Allow the board to respond to the ping command.. RPR Management You can perform the following operations on the U2000: l Modify resilient packet ring (RPR) node information. including the EGT.iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management – PW policy – Weighted random early detection (WRED) congestion and discarding policy of services – QinQ policy – Weighted fair queuing (WFQ) schedule policy – CoS queue scheduling priority mapping l Test frame receiving and transmitting on Ethernet boards. Clock Configuration You can perform the following operations on the U2000: l Query the clock synchronization status. l Create flows in batches. l Support the dumping of history RMON performance of Ethernet boards. EFT. switching status. identifies LSP labels and service priorities. l Support the protocol diagnosis function. and switching position of the RPR that an NE belongs to. l Support the traffic statistics function at a port. l Query the topology of the RPR that the NE belongs to. l Support the alarm function in the case of no traffic at Ethernet ports. Ltd. including: – Clock subnet – Clock quality – Synchronization status message (SSM) output control – Clock ID status l Set phase-locked sources output by external clock.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description – System clock source priority list – Priority table for phase-locked sources of 1st external clock output – Priority table for phase-locked sources of 2nd external clock output l Set clock source switching. l Perform performance detection. l Set the quality level of the clock source. This function helps to detect the events of frame error. l Perform a link trace (LT) check. l Set the PTP clock source port. Ltd. l Perform a loopback (LB) check. l Set link monitoring parameters. and frame error seconds. You can perform the following operations on the U2000 for configuring the 802. frame error period.. l Set the PTP clock source priority. l Configure a PTP clock service. l Perform a continuity check (CC) check. l Set the clock interface configuration. l Set the external clock interface configuration. Ethernet OAM Management You can perform the following operations on the U2000 for configuring the 802. including: – Clock source restoration parameters – Clock source switching condition – Clock source switching l Configure clock subnets.3ah Ethernet OAM: 6-8 l Query remote OAM parameters. Issue 05 (2010-11-19) . Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Perform a ping test. including: – External clock output phase-locked source – 2 Mbit/s phase-locked source external clock attributes IEEE 1588 Packet Clock You can perform the following operations on the U2000: l Configure the selection mode of a frequency source.1ag Ethernet OAM: l Create and configure maintenance nodes. tunnel resources and transmit services over different networks can be saved. l Query the protection switching status of an MPLS tunnel. This function prevents packet increase in a loop network and generation of broadcast storms in an endless cycle. l Configure QoS of the CES service. Peform OAM management for MPLS tunnels. l Query CIST status and MSTI status. 6-9 . l Select the tunnel where a PW is carried online. MS PW Configuration By creating a multi-segment pseudowire (MS-PW) to transmit services. l Create CES services of structure-aware TDM circuit emulation service over packet switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP). Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. MPLS Tunnel Protection Group Configuration You can perform the following operations on the U2000 for configuring an MPLS tunnel protection group: l Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group. MSTP Configuration The MSTP can be used to clear loops in a network. You can perform the following operations on the U2000 for configuring the following MSTP attributes: l Configure parameters of port groups and bridges. Ltd. You can perform the following operations on the U2000 for configuring CES services: l Create the corresponding PW when creating a CES service. return mode. wait-to-restore (WTR) time. The MSTP uses a specific algorithm to block some redundant trails and change a loop network to a non-loop tree network. l Perform MPLS tunnel protection switching. l Create UNI-UNI and UNI-NNI CES services. l Configure CIST and MSTI parameters. l Enable the reporting of Ethernet OAM loopback events.iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management l Perform a remote loopback test. Different from the STP and RSTP. and hold-off time. the MSTP can forward data according to VLAN packets and achieve load balance of VLAN data. CES Service Configuration CES is mainly used for service transparent transmission of TDM trail switching data in the PTN network. including the switching mode. l Configure CES service alarm transparent transmission.. CES ACR Clock CES ACR (Adaptive Clock Recover) is based on CES services and recovers the clock of the source at the sink in adaptive mode. and bidirectional tunnel. such as enabling or disabling the MSP protocols network-wide or the MSP protocol for a single node. MCSP. the protection subnet is a generalized concept that includes not only the network structure with the comprehensive self-protection function. In the U2000. MS PW. to form a complete protection subnet. such as an MSP ring and a path protection (PP) ring. – MSP ring: two-fiber bidirectional MS shared protection ring. l Adjust the bandwidth dynamically. – Linear MSP: 1+1 and M:N. such as the PW OAM. 6. Ltd. such as an unprotected ring and an unprotected chain. Packet Function Implement the packet functions. and four-fiber bidirectional MS shared protection ring. CES.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description OSPF Protocol Configuration You can perform the following operations on the U2000 by using OSPF protocol as the network protocol: l Manage the OSPF routes and set relevant parameters. To perform protection subnet management.2 MSTP Protection Subnet Management A protection subnet is a network structure with the comprehensive self-protection function. – Non-protection (NP) ring and NP chain. – PP ring: two-fiber unidirectional PP ring and two-fiber bidirectional PP ring.. You can perform the following operations on the U2000: l Create protection subnets of different types. l Support the automatic generation of the services on the protection channel according to the services on the working channel. PW APS. the relevant license is required. but also the network structure without the self-protection function. l Start or stop the MSP protocol of the MSP subnet. MC LAG. you can dynamically adjust the MSP bandwidth according to the service demands and how the network bandwidth is used currently to improve the utilization of network bandwidth. For example. two-fiber unidirectional MS dedicated protection ring. 6-10 l Search for a protection subnet according to the information of NEs and fibers or cables. Issue 05 (2010-11-19) . l Transfer an NP chain to a 1+1 linear MSP without interrupting services. l Enable or disable port-level OSPF and LSA. l Import static routes. The sink equipment can recover the TDM clock (in FIFO mode) according to the change in the buffer for receiving CES services (the change is caused by the packets received on the NNI side). for an STM-16 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Dual node connection (DNI) protection. To be specific. and apply the data to all the related NEs. 6.. l Change the revertive mode of linear MSP protection without restarting the protocol. VC4-4C. the U2000 retains the attributes of the existing ones as they are. For example. You can construct the configuration data of E2E network management by searching for the data at the NE layer of the U2000. – Create an SDH trail. Compared with configuring NE data on a per-NE basis.3 E2E MSTP Management E2E network management is also referred to as trail management. you can create. including MSP. MSTP Trail Management You can perform the following operations on the U2000: l Create and maintain an SDH trail. VC4-16C and VC4-64C. types and status of all protection subnets. and enable or disable a VC4 server trail. VC4. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Join or split. configuring NE data by using the trail management function is faster and more convenient.iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management MSP of an 8 x VC4 bandwidth. VC4 server trail. and select the protection priority strategy and the resource usage strategy. then change the protection bandwidth from 8 x VC4 to 6 x VC4 bandwidth and save 4 x VC4 for the use of non-MSP-protected services. To perform E2E network management. or directly configure the data at the network layer of the U2000. the relevant licenses is required. NP ring. PP. l Generate the MSTP protection subnet report to facilitate the statistics and maintenance of the protection subnets. NP chain and their combinations. – Query the service status on a per-NE basis according to SDH trails. l Query the names. l Set and view SDH NNIs. To be specific. VC3. you can manage the RPR ring protection parameters and link parameters. Ltd. you can expand the link capacity by replacing the line boards on both sides of the link without interrupting active services. To be specific. RPR ring topology can be displayed through a view. l Query the relevant trail by protection subnet. if the 6 x VC4 bandwidth is enough. – Downgrade an ASON trail to an SDH trail. l Expand and add nodes to multiple types of protection subnets. l Query all the isolated nodes and delete useless nodes. 6-11 . and the trigger condition of the protection subnet. SNCP. and lock or unlock an SDH trail. VC4-8C. – Upgrade an SDH trail to an ASON trail. l Manage the entire RPR ring network. upgrade an STM-16 MSP ring to STM-64 smoothly. l Query and set the switching status. designate a timeslot. – Activate or deactivate. delete. and search for an RPR ring. l Expand the capacity of an MSP ring and a linear MSP chain. The service levels include VC12. wait-to-restore (WTR) time. – During search of SDH trails. – Configure alarm suppression or alarm reversion for a trail. – Modify the route for concatenated services without interrupting services. – Set overhead pass-through or termination for all NEs on the trail. Based on the NE configuration data at the NE layer. Issue 05 (2010-11-19) . – Set performance parameters for an SDH trail. optical interface loopback and cross-connection loopback.. and the fiber connection data and protection subnet information at the network layer. – Duplicate an SDH trail so that SDH trails can be created in batches. such as querying or analyzing discrete services. – View the usage of VC12 or VC3 trails related to a VC4 server trail in graphical format. – Set SNCP switching on a trail.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description – Manage optical power: Query the input power. l Name trails automatically. board or timeslot that the trail passes through. – Insert alarms such as AIS and remote defect indication (RDI) into the trails at the VC4 level. and power thresholds for SDH boards. – Convert SDH discrete cross-connections to a mono nodal trail. – Implement the function of automatically generating dually-fed SDH services for 1+1 linear MSP. l Filter trails in three ways. – Display R_LOS alarms in the Transmission Media Layer Route view. 6-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. including VC4 loopback. Ltd. – Filter all: Filter all trails and display only the qualified trails. – Duplicate an SDH trail that is configured with DNI protection. the U2000 generates the network layer information about E2E trails. – Query the SDH trails and customer information affected by an alarm. – Manage discrete SDH services. l Manage the alarms and performance events related to an SDH trail. – Query the status of a lower order service. current and history performance data. – Manage SDH trails based on permissions and domains. – Set and query the overhead bytes of all NEs on the trail. – Modify the add/drop ports on a trail and the timeslots occupied by the trail without interrupting services. – Query current and history alarms. – Set loopback on any nodes on a trail. – Perform a PRBS test on a trail. – Search for fibers on an SDH trail. – Analyze the connectivity of an SDH trail and locate a fault of an SDH trail. output power. so that SDH trails can be created in batches. l Search for trails. tributary loopback. such as the trace byte. – Adjust the original route partially by changing the NE. and the information about the VC12 or VC3 trails. unavailable time (UAT) and performance threshold-crossing records of an SDH trail. – The U2000 prompts users to configure trace bytes when timeslot out-of-sequence occurs to the MS. – Activate or deactivate an ATM trail.0 NEs (version 4. such as querying or analyzing discrete services. – Filter all: Filter all trails and display only the qualified trails. – Create an ATM trail. EPLAN. such as querying or analyzing discrete services.cc. Ethernet Trail Management You can perform the following operations on the U2000: l Create and maintain an Ethernet trail. VC3. l Activate or deactivate an Ethernet trail. EVPL. Ltd. 6-13 . NOTE For release 4. unterminated EPL. the SDH NNI needs to be created on Ethernet line boards.dd). – Create an ATM trunk link. l Manage the alarms and performance events related to an Ethernet trail. – Search for an ATM trail. VC4-4C. l Issue 05 (2010-11-19) Manage the alarms and performance events related to an ATM trail. l During search of Ethernet trails. l Create an Ethernet trail. – Query current and history alarms related to an Ethernet trail.iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management – Secondary filter: Filter those trails that are already displayed according to the filter criteria. l Filter trails in three ways.. VC4-8C and VC4-16C levels. l Create an unterminated trunk link. EVPL based on RPR and EVPLAN based on RPR. l Create trunk links at VC12.bb. l Search for an Ethernet trail. l Manage discrete Ethernet services. – Incremental filter: Filter all trails and display the newly qualified trails together with the currently displayed ones. – Manage ATM discrete services. l Create a protection Ethernet trail that has one source and dual sinks. the U2000 retains the attributes of the existing ones as they are. – Incremental filter: Filter all trails and display the newly qualified trails together with the currently displayed ones. EVPL based on QinQ. The service includes EPL. VC4. – Secondary filter: Filter those trails that are already displayed according to the filter criteria. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Create an Ethernet trail that belongs to multiple VLANs. – Implement the RMON performance function for an Ethernet trail. – Query the Ethernet trails and customer information affected by an alarm. ATM Trail Management You can perform the following operations on the U2000: l Create and maintain an asynchronous transfer mode (ATM) trail. – Manage PWE3 service templates. – Set loopback and view the loopback status. Management of Packet Services You can perform the following operations on the U2000: l Manage PWE3 services. – Filter all: Filter all trails and display only the qualified trails. – Predeploy a tunnel. – Modify and delete PWE3 services.. l Manage tunnels. modify. – Manage multi-hop PWE3 services. and filter tunnels to view the desired tunnels. – View the topology of tunnels. – View the results of testing and checking a tunnel. – Secondary filter: Filter those trails that are already displayed according to the filter criteria. – Implement the function of automatically generating Ethernet OAM for PWE3 services. – View the performance of a tunnel. – Query the current and history alarms related to an ATM trail. – Implement the function of automatically discovering tunnels. – Modify and delete tunnels. – View the performance of a PWE3 service. including working routes and protection routes. 6-14 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Create an ETH PWE3 service or a CES PWE3 service. Issue 05 (2010-11-19) . and delete 1+1 or 1:1 tunnel protection groups. – Create PWE3 services by using the duplication function. – Predeploy a PWE3 service. – Create a tunnel based on the static CR protocol. – Manually switch 1+1 or 1:1 tunnel protection groups. – Manage PWE3 services based on permissions and domains. and filter PWE3 services to view the desired services. – Incremental filter: Filter all trails and display the newly qualified trails together with the currently displayed ones. – View the alarms of a PWE3 service. – Manage discrete tunnels. – Manage discrete PWE3 services. and implement the function of automatically discovering 1+1 or 1:1 tunnel protection groups. – View the alarms of a tunnel.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description – Query the ATM trails and customer information affected by an alarm. l Filter trails in three ways. Ltd. – View the topology of PWE3 services. – Manage the protection of PWE3 services. – Create. – Implement the function of automatically discovering PWE3 services. – View the topology of an E-AGGR service. – Manage VPLS services based on permissions and domains. l Manage composite services. – View the tunnel names in the global LSP view. – Implement the function of automatically discovering VPLS services. and filter E-AGGR services to view the desired services. – Create a VPLS service. l Manage VPLS services.iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management – View the topology of a 1+1 or 1:1 tunnel protection group. – Configure OAM. a PWE3 service accesses another PWE3 service. – Manage VPLS services. – View the alarms of an E-AGGR service. – Modify and delete composite services. and a PWE3 service accesses an E-AGGR service. 6-15 . – Create an E-AGGR service. – View the alarms of a VPLS service. – Predeploy a VPLS service. l Manage E-AGGR service. – Set loopback and view the loopback status. – Configure OAM. – Set loopback and view the loopback status. – Manage discrete E-AGGR services. – View the performance of a VPLS service. Ltd. – Implement the function of automatically generating Ethernet OAM for VPLS services. – Modify and delete VPLS services. and filter composite services to view the desired services. – Implement the function of automatically discovering composite services. – Manage E-AGGR services based on permissions and domains. – View the topology of VPLS services.. – Manage composite services in the scenarios where an EPL service accesses a PWE3 service. – Manage VPLS service templates. – Manage E-AGGR service templates. – Manage discrete VPLS services. – View the topologies of composite services and the internal connections between composite services. – Predeploy an E-AGGR service. – Manage bidirectional tunnels. – Modify and delete E-AGGR services. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and filter VPLS services to view the desired services. – View the performance of an E-AGGR service. – Implement the function of automatically discovering E-AGGR services. Clock Topology Management The U2000 provides the following functions: l Supporting the IEEE 1588 V2. establishes and removes connections through the signaling control. restore. l Create and delete active and preconfigured services in handover groups. the ASON selects a route automatically. An ASON NE refers to the equipment that is equipped with both SDH and ASON features. l Manage the node IDs of ASON NEs. SDH. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Hand over. ASON Topology Management You can perform the following operations on the U2000: 6-16 l Discover ASON topologies and resources automatically. l Prepare a service handover plan by using either the rollback handover policy or the besteffort handover policy. l Search for ASON discrete signaling. l Prepare a manual or automatic service handover plan. Ltd. l Manage domains.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description – View the status of composite services. After a user initiates a service request. deleting nodes. l Query the ASON NE software version. and delete handover groups and handover plans in batches.. l Set an account and a password for NE management. and changing the domain name. and upgrading or adjusting link capacities. l Synchronize NEs in a domain: The U2000 can obtain the topology of the network through the active NE.4 SDH ASON Management The automatically switched optical network (ASON) is a new generation of optical network that integrates the exchange and transport functions. l Synchronize cross-connections for NEs. and verify the trails of handover groups in batches. l Set the active and standby NEs. An ASON is managed by the U2000 that combines ASON and SDH features. Issue 05 (2010-11-19) . and synchronous Ethernet clocks l Displaying the clock trace relationship l Displaying the clock alarm status 6. Network Expansion and Service Handover Management You can perform the following operations on the U2000: l Expand a PTN by adding nodes. l Create and modify handover groups and handover plans. l Implement the handover of PWE3 trails at present. and implement the function of automatically uploading the configuration data of NEs that are already created. including creating and deleting domains. and performs network connections automatically and dynamically. l Print or save the report list about control links information. l Create a link resource report. 6-17 . l Set resources reservation. l Allocate TE links to an OVPN customer. Control Link Management You can perform the following operations on the U2000: l Synchronize network-wide control links. l Create virtual TE links. l Set the risk link group number. l Create fibers. l Print or save the report list about component links information..iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management l Enable or disable the optical virtual private network (OVPN) status of the NE. Ltd. TE Link Management You can perform the following operations on the U2000: l Synchronize network-wide traffic engineering (TE) links by domain. l Delete virtual TE links. l View control links. l Set alarm suppression for a control link. l View component link information. l Query the current alarm and history alarm about a control link. l Filter TE links by domain. l Filter links by domain or source/sink information. source/sink information or OVPN customer. l Delete component links. l Query link timeslot segmentation. l View bandwidth usage. l Filter component links by domain or source/sink information. l Set the distance for a TE link. l Customize whether to display the color of alarms in the SDH Control Link Management window. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Component Link Management You can perform the following operations on the U2000: l Synchronize network-wide component links. l Query SRGs relevant to an NE. l Query VC4 timeslot usage status. l Create component links. l View TE links. l Query the related SDH trails for ASON trails. Ltd. schedule revertive time. l Query the rerouting reversion status of a revertive ASON trail. rerouting priority. l Set the association source for ASON trails. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Set routing attributes of ASON trails. including rerouting lockout status. l Set alarm suppression for a TE link. rerouting revertive mode. l Query SRGs relevant to a TE link. l Pre-calculate and optimize service trails. l Activate or deactivate ASON trails or SDH ASON server trails.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description l Query the alarms of a TE link. copper or iron class. l Query the performance of a TE link. rerouting policy. Issue 05 (2010-11-19) . l Migrate a trail without interrupting services. l Delete SDH ASON trails or SDH ASON server trails on the NMS side. l Set the OVPN customer of an ASON trail. trigger condition. l Switch the working or protection trail of a diamond trail manually. revertive lockout status. l Delete inactive SDH ASON trails or inactive SDH ASON server trails. WTR time.. l View the actual route. l View the interrupted TE links. l Create an ASON server trail of the diamond. l Duplicate ASON trails. original route or shared mesh restoration trail. gold. l View the alarms of an ASON trail. l Create the associated trails with a same initial node or different initial nodes. or copper class. original route or associated route of an ASON trail. l View ASON trails. l Create an ASON trail of the diamond. l Set a preset restoration trail for an ASON trail. silver. l Optimize ASON trails. l Customize the cost for a TE link. l Query the affected TE links according to control plane alarms. l Synchronize ASON trails by domain or basic attributes. l Remove association for ASON trails. l View the details of an ASON trail. gold. l View the preset restoration trail or shared mesh restoration trail of an ASON trail. ASON Trail Management You can perform the following operations on the U2000: 6-18 l Filter ASON services by actual route. crankback and rerouting triggered by B3 bit error. l Revert ASON trails manually. l Set association for ASON trails. l Downgrade an ASON trail to an SDH trail. silver. iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management l Set alarm suppression for the selected ASON trail. l Manage a hybrid network composed of an ASON clock subnet and a traditional clock subnet. l Convert a preconfigured ASON clock subnet into an ASON clock subnet. l Delete a UNI service. l Create a preconfigured ASON clock subnet. l View the control plane performance of an ASON trail. l Implement the function of automatically refreshing routes after a diamond trail protection switching. l Save the attributes of the service after you create an ASON service successfully. l View actual routes of gold services after MSP switching. SRG Management You can perform the following operations on the U2000: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Set the associated route attribute of the associated ASON trails. l Create the ASON trail report. l Set names for ASON trails in batches according to the naming rules. l Deactivate a UNI service. Ltd. l Manage the startup time for the SDH ASON clock recovery. l Set an actual route as an original route. l Restore to the original route in batches. l Refresh the original route. actual route or associated route of an ASON trail. l View the information about a UNI service. UNI Trail Management You can perform the following operations on the U2000: l Synchronize UNI services by domain. ASON Clock Subnet Management You can perform the following operations on the U2000: l Create an ASON clock subnet. l Manage creators of SDH ASON trails. l Restore the default attributes of an ASON service when you create the ASON service. l Query the service level agreement (SLA) conformity of ASON trails.. l Reroute the preset SDH ASON restoration trail in case of a fault. l Refresh the preset restoration trail or shared MESH restoration trail for an ASON trail. l View the performance events of an ASON trail. l Filter UNI services by domain or source/sink information. l Set SNCP access to an ASON trail. 6-19 . l Convert a traditional clock subnet into an ASON clock subnet. Ltd. alarms and performance of an ASON-SDH trail in a unified manner. delete and modify an SRG. One-End Terminated ASON Server Trail Management You can perform the following operations on the U2000: l Create and delete a one-end terminated ASON server trail. l View SDH and ASON trails at the same time in the SDH Trail Management window. l Activate and deactivate an ASON-SDH trail that contains one-end terminated ASON server trails. component link information.6 MSTP Network Feature Management iManager U2000 Unified Network Management System Product Description l Create. ASON NE Catastrophe Restoration The U2000 supports an ASON NE catastrophe restoration scheme. TE link information. l Create dually fed and selectively received VC4 ASON server trails. l Query the related SDH trails by an ASON trail. l Manage overhead bytes. l Manage SRGs of the pipe type. network layer information file. l Query the related ASON trails by an SDH trail. route calculation policy. l Set the revertive attributes when an SDH trail is being migrated to an ASON trail. and customized type.. WTR time information. an ASON-SDH trail includes an SDH trail and an ASON trail. fiber type. l Import the scripts of the simulated network planning information. l Downgrade an ASON trail to an SDH trail. Script Export and Import for Simulated Network Planning Information You can perform the following operations on the U2000: l Export the scripts of the simulated network planning information. l The alarm in the ASON section of an ASON-SDH trail supports the alarm statistics function. ASON information file. l Search for an ASON-SDH trail that contains one-end terminated ASON server trails. NE type. ASON resource reservation information. associated ASON service information. NE configuration file. preset restoration trails and route calculation policy for nodes. l Set association relationships between the ASON trails that have different sources and sinks. including the networkwide configuration file. l Create and delete an ASON-SDH trail that contains one-end terminated ASON server trails. That is. Issue 05 (2010-11-19) . l Activate and deactivate a one-end terminated ASON server trail. l Associate one-end terminated ASON server trails. Integration of SDH and ASON Trails You can perform the following operations on the U2000: l Specify the explicit route for ASON services when creating an ASON-SDH trail. 6-20 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Calculate working and protection routes using the SPC first policy. site type. l Upgrade an SDH trail to an ASON trail. l Manage control plane performance parameters. l Query OSPF control links. l Manage the inactive PPPoE interfaces. l Manage OSPF IP addresses. Ltd. bandwidth weight. l Maintain ASON shared mesh switch controllers. l Manage the virtual interfaces of ASON links. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Manage the VC4 timeslot occupation status. 6-21 . distance weight. l Manage the ASON feature of boards. l Query LMP TE links. l Query LMP component links.. l Manage the levels and suppression status of control plane alarms. l Maintain SDH ASON switch controllers. l Manage control plane parameters.iManager U2000 Unified Network Management System Product Description 6 MSTP Network Feature Management SDH ASON Management on a Per-NE Basis You can perform the following operations on the U2000: l Manage the ASON features of NEs. l Manage ASON trail groups. and customized cost weight. l Manage OSPF protocol authentication. the route selection policy is supported. l Query OSPF component links. l Query ASON trails. including the bandwidth occupancy (%). l Manage fiber resource thresholds. In addition. hop weight. l Query OSPF SDH TE links. l Manage resource reservation. l Manage IDs of ASON NEs. l Manage control channels. l Manage the auto-reporting status of control plane alarms. l Query the performance of the control plane. l Set the LMP auto discovery mode. l Maintain SDH ASON signaling. l Manage OSPF TE link flood thresholds. . iManager U2000 Unified Network Management System Product Description 7 7 WDM Network Feature Management WDM Network Feature Management About This Chapter This topic describes the functions and features of WDM NE management and network management. 7.1 WDM NE Management NE management refers to management of the configurations of an NE in terms of attributes, services, protection, and clocks. The configuration object is a single NE. The data is saved to the NE database on the U2000 and the NE database on the NE. 7.2 WDM NA NE Management NE management includes setting of attributes and configuration of communication, services, protection, and clocks on a per-NE basis. The configuration data is saved at the NE layer on the U2000 and in the database of the NE. 7.3 WDM Protection Subnet Management A protection subnet is a network with holistic self-protection. On the U2000, the protection subnet is a general concept that refers to not only a network with holistic self-protection, such as a multiplex section protection (MSP) ring or a path protection (PP) ring, but also a network without self-protection, such as an unprotected ring or an unprotected chain. 7.4 End-to-End WDM Management End-to-end network management is also referred to as trail management. You can construct the configuration data about end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all related NEs. Compared with configuring NE data on a per-NE basis, configuring NE data by using the trail management function is quicker and more convenient. 7.5 WDM ASON Management The automatically switched optical network (ASON) is a new generation of optical network that integrates switch and transport functions. After a user initiates a service request, the ASON selects a route automatically, establishes and disconnects connections by using signaling control, and establishes network connections automatically and dynamically. An ASON NE refers to the equipment that is enabled with both WDM and ASON features. An ASON network is managed by the U2000 that combines ASON and WDM features. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 7-1 7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description 7.1 WDM NE Management NE management refers to management of the configurations of an NE in terms of attributes, services, protection, and clocks. The configuration object is a single NE. The data is saved to the NE database on the U2000 and the NE database on the NE. Basic NE Configuration You can perform the following operations on the U2000: l Synchronize NE time: Send the computer system time, NTP server time, or standard NTP server time at the U2000 server to all NEs for synchronizing the NE time. You can set the U2000 to automatically synchronize the NE time by specifying the automatic synchronization period. l Query the physical inventory information, including information about the telecommunications rooms, racks, NEs, shelves, boards, and ports. l Implement the board plug and play feature: After a board is inserted into a slot, the NE Panel automatically displays the board and the board information. l Disable NE functions automatically: You can set the time when the U2000 automatically disables certain NE functions that may affect services. At the time specified, these functions are automatically disabled. l Modify the following NE attributes: – NE name – NE ID – Extended NE ID – Remarks – NE pre-configuration l Modify the following attributes of an optical NE: – Name – Remarks – Resources assigned l Manage environment monitoring information: You can set the PMU interface, NE fan speed, temperature monitoring, and voltage monitoring. l Manage network operator information: You can set the information about the network operator, including the international identifier, domestic identifier, and user-defined identifier. l Search for and create NEs by discovering NE IP addresses automatically. Orderwire Configuration You can perform the following operations on the U2000: 7-2 l Set a board as an orderwire board and query the orderwire board information. l Set and query the orderwire phone numbers, call waiting time, dialing mode, and orderwire phone port availability. l Set and query network-wide conference call numbers. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management l Set and query the subnet number length and the related subnet of an optical interface. l Set and query an NNI orderwire phone. l Set and query an F1 data port. l Set and query a broadcast data port. l Set E1 cross-connections. Configuration for Ethernet Interfaces and Services By using the U2000, you can perform the following operations: l Configure Ethernet port mirroring. You can monitor packets, perform routine maintenance and in-service commissioning through a mirrored port in a flexible manner. l Set the following attributes of an internal Ethernet interface: – Basic attributes – Flow control – Tag attributes – Network attributes – Bound path – Advanced attributes l Set the following attributes of an external Ethernet interface: – Basic attributes – Flow control – Tag attributes – Network attributes – Advanced attributes l Configure E-Line services such as Ethernet private line (EPL), Ethernet virtual private line (EVPL) (QinQ), and VLAN subnetwork connection protection (SNCP) services. NOTE l QinQ is a VLAN embedding technique that employs multi-layer VLAN IDs to identify different users. In this manner, VLAN resources are expanded. The U2000 supports the function of adding labels. l A VLAN SNCP service is a VLAN-based E-Line service that is configured with SNCP protection. You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a VLAN SNCP service and a common Ethernet service. l Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB) and set parameters including service mounting, VLAN filtering, VLAN unicast, MAC address disablement, bound path, and MAC address automatic learning. l Set the following parameters for QoS: – Flow – CAR – CoS – Flow shaping – Port shaping l Issue 05 (2010-11-19) Configure link capacity adjustment scheme (LCAS): LCAS can dynamically adjust the number of virtual containers for mapping desired services, so as to satisfy different Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 7-3 7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description bandwidth requirements of services. In this manner, bandwidth utilization and robustness of virtual connections are improved. l Configure OAM for Ethernet services. l Configure OAM for Ethernet ports. l Configure the intra-board LAG function. l Configure the inter-board LAG function. l Configure the VLAN group function. l Configure port MAC address filtering. l Test frames received and transmitted on Ethernet boards. l Configure the protocol diagnosis function. l Configure the QinQ type area. l Configure the following attributes for Ethernet Layer 2 switching: – Aging time – Spanning tree – IGMP snooping protocol l Configure the multiple spanning tree protocol (MSTP): MSTP is compatible with STP and RSTP, and it also addresses the defects of STP and RSTP. MSTP supports fast convergence. In addition, MSTP provides multiple redundancy trails for data forwarding, implementing load balancing of VLAN data during data forwarding. l Configure MPLS tunnels: On a PSN network, an MPLS tunnel carries pseudo wires (PWs) where various services are encapsulated. In this manner, data packets can be transparently transmitted among NEs. You can dynamically adjust the required number of virtual containers for service mapping so as to adapt to the requirements for different service bandwidths, at the same time improving bandwidth utilization and robustness of virtual concatenations. l Configure link-state pass through (LPT): LPT is used to return the remote-end link status to the near end. The near-end equipment performs operations depending on the remote-end link status. The Ethernet board periodically monitors the network to learn the Ethernet status. When the connection status of Ethernet ports changes due to a link fault, you can use the LPT function to quickly switch services from the working route to the protection route between the two ends. The LPT feature protects transmission of important data. l Configure Ethernet ring protection switching (ERPS): Based on the traditional Ethernet mechanism, ERPS uses the ETH OAM function and the ring automatic protection switching (R-APS) protocol to achieve fast protection switching on the Ethernet ring network. l Configure automatic reporting of RMON performance of Ethernet boards. l Dump history RMON performance data of Ethernet boards. WDM Board Configuration You can perform the following operations on the U2000: 7-4 l Configure optical transponder boards. l Configure service multiplexing and de-multiplexing boards. l Configure tributary and line boards. l Configure protection boards. l Configure optical amplifier boards. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management l Configure spectrum analysis boards. l Configure optical supervisory channel boards. l Configure optical add/drop multiplexing boards. l Configure variable optical attenuator boards. l Configure optical equalization boards. l Configure automatic optical fiber monitoring boards. l Configure dispersion compensation boards. l Configure wavelength management boards. Dynamically manage ports. Query the line rate of an optical transport network (OTN). Overhead Configuration You can configure OTN overheads as follows on the U2000: l Configure and query section monitoring (SM) overheads. l Configure and query optical transmission section (OTS) overheads. l Configure and query path monitoring (PM) overheads. l Configure and query tandem connection monitoring (TCM) overheads. l Query optical channel payload unit (OPU) overheads. l Configure and query fault type and fault location reporting channel (FTFL) overheads. You can configure WDM overheads as follows on the U2000: l Configure optical channel (OCh) overheads at SDH interfaces. l Configure optical transponder unit (OTU) overheads at OTN interfaces. l Configure optical demultiplexer unit (ODU) overheads at OTN interfaces. l Query OPU overheads at OTN interfaces. l Configure OTS overheads at OTN interfaces. You can configure SDH overheads for the OptiX OSN 8800 T32 and OptiX OSN 8800 T64 as follows on the U2000: l Configure regenerator section overheads (J0). l Configure lower order path overheads (V5 and J2). l Configure VC4 higher order path overheads (J1 and C2) and pass-through or termination. l Configure VC3 higher order path overheads (J1 and C2). WDM Service Configuration At an optical add/drop multiplexer (OADM) station, you can perform ADM configurations for Gigabit Ethernet (GE)/fiber channel (FC) services by using the OTU board as follows: l Configure several WDM service boards in specified slots to form a cross-connect unit group. l Perform the add/drop, pass-through, and loopback operation on GE/FC services in each cross-connect unit group. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 7-5 7 WDM Network Feature Management l iManager U2000 Unified Network Management System Product Description Implement wavelength cross-connection protection (WXCP), with working and protection cross-connections configured on the sink NE. Configure electrical cross-connections: l The U2000 allows you to configure electrical cross-connections to control the service flow at the electrical layer, and to dynamically groom, converge, and split sub-wavelength services. In this manner, the network structure and network survivability are enhanced. l The U2000 supports integrated grooming of GE, ODU0, ODU1, ODU2, and ODU3 services implemented by the XCS. l The U2000 supports distributed grooming of GE, ODU0, ODU1, and ODU2 services and Any services. l The U2000 supports unidirectional and bidirectional SNCP at the ODU3, ODU2, ODU1, or ODU0 level. Configure optical cross-connections: l Create optical cross-connections dynamically, and manage optical cross-connections by board or NE, including creation, activation, deactivation, deletion and query. l Create, query, and delete edge ports. l Configure optical broadcast cross-connection services on a per-NE basis. Perform service management operations: l Lock WDM trails and view the lock status of the corresponding trails in the Service Management window of the NE Explorer. l View the name of the trail that a service belongs to. l Query the trail that a service belongs to. Perform service package management on the OptiX OSN 1800. The service package module helps you perform typical service configurations. In this manner, you need not perform onsite commissioning. This reduces costs in deployment commissioning and product maintenance. In addition, the equipment can be configured in a one-key manner. Manage licenses for service types and cross-connect capacities of the OptiX OSN 8800 T32 and OptiX OSN 8800 T64. ROADM Configuration By using the reconfigurable optical add/drop multiplexer (ROADM) function on the U2000, you can perform add/drop and pass-through configuration for optical channels. The WDM equipment uses the DWC and wave selective switch (WSS) to implement the ROADM function. 7-6 l Configure ROADM boards based on DWC boards: Wavelength grooming is implemented by using the DWC boards. This configuration method is often used for common nodes on a chain or ring network. l Configure ROADM boards based on WSS boards: There are two types of network structures, WSSD+WSSM and WSS+RMU/ROAM. This configuration method is often used for cross-connect nodes on a ring network. l Configure ROADM boards based on multiplexing and demultiplexing boards: Wavelengths cannot be groomed dynamically. This configuration method is often used for common nodes on a chain network. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) 7-7 . WDM Protection Configuration You can perform the following operations on the U2000: l Configure optical line protection. l Configure optical wavelength share protection (OWSP) with the Metro WDM equipment and the NG WDM equipment. l Configure a clock for the SCC board. – Configure a clock for the optical supervisory channel unit. l Configure the quality of clock sources. l Configure the system clock source priority table. l Configure protection for clock transparent transmission. l Configure 1:N (N ≤ 8) optical channel protection. l Configure an optical wavelength protection group. l Configure the PTP clock subnet. l Configure PTP packet attributes. PTP Clock (1588V2 Clock) Configuration You can perform the following operations on the U2000: l Configure the frequency source mode. l Configure WXCP protection for GE/FC services. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management Clock Configuration You can perform the following operations on the U2000: l Configure a clock source for a board. l Configure phase-locked source output of external clocks. Ltd. – Define clock source priorities. – Configure a WXCP protection group for the sink NE. – Specify the clock source traced by the SCC board. – Configure and query WXCP protection parameters. l Configure an external time interface.. Physical Clock Configuration You can perform the following operations on the U2000: l Configure input attributes of external clocks. l Configure port protection. l Configure clock source protection and clock source switching. l Configure PTP clock synchronization attributes. l Configure transparent transmission for an external clock. l Configure 1+N (N ≤ 48) optical channel protection. l Query the clock source received at a port. l Configure board protection switching (BPS). l Configure distribute board protect system (DBPS). l Configure a DPPS protection group. – Configure VLAN SNCP for an Ethernet board. and link attenuation (gain mode). – Perform WXCP protection switching. After the fiber is reconnected. DBPS protects 10GE and GE ports on a TBE board. – Configure SNCP for optical channel data unit (ODUk) services. power detection. Issue 05 (2010-11-19) . The U2000 supports adjustment modes including wavelength count detection. l Perform intelligent power adjustment (IPA). When the spectrum analyzer unit detects that the total optical power of the wavelengths greatly differs from the standard power corresponding to the 7-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Configure 1+1 protection for boards. Ltd. you can query the data backup status between the active and standby SCC boards. – Configure MS SNCP. When a fiber is cut. l In 1+1 protection for SCC boards. For example. – Configure 1+1 protection for cross-connect and synchronous timing (XCS) boards. – Query the switching status. The local station reports an exception event to the U2000. The cross-connection granularity is the GE service. the optical amplifier boards at the upstream and downstream stations reduce their output power to a safe value to prevent a fiber maintainer from being injured by the laser emitted from the cut fiber. you can manually control whether to enable the ALC function. – Perform working/protection switching. and power threshold of each WDM board. – Configure 1+1 protection for SCC boards. In wavelength count detection mode and power detection mode. – Perform protection switching. query the input power. – Configure sub-wavelength (SW) SNCP for GE services or Any services on an OTU board. – Query services with WXCP protection. output power.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description – Query the status of WXCP protection switching. l Perform automatic level control (ALC).. l Configure ODUk SPRings at the ODU1 and ODU2 levels. the optical amplifier board detects signal loss at the local station. After the user confirms the event. – The wavelength count detection mode applies to a transmission link where no service is added or dropped or where the number of wavelengths added and dropped are the same at an OADM station. the optical signals recover to normal and the optical power of each optical amplifier board automatically returns to a normal value. – Query the switching status. l Configure a TPS protection group. Optical Power Adjustment You can perform the following operations on the U2000: l Manage the optical power. l Configure SNCP protection. l Perform ROADM optical power equalization.. and the optical attenuation adjustment board adjusts the add wavelengths based on wavelength flags. – The link attenuation adjustment mode also applies to a transmission link where the number of add wavelengths differs from the number of drop wavelengths at an OADM station. an exception event is reported to the U2000. l Configure pre-alerts for optical power at ports. may be greatly different. – The power detection mode applies to a transmission link where the number of add wavelengths differs from the number of drop wavelengths at an OADM station. l Use tunable dispersion compensators (TDCs) to adjust dispersion precisely. and OptiX OSN 8800 T64. which compares line attenuation with amplifier gain. Then the DWC/WSS adjusts the optical power of the pass-through wavelengths. The optical power between each channel. When the optical power is attenuated to the detection threshold. the U2000 issues a command to the optical attenuation adjustment board of the upstream station. the attenuation is equal to the gain. 7-9 . After ROADM is enabled for dynamically configuring wavelength services. After the nominal gain of the optical amplifier unit and the attenuation of the attenuation adjustment unit are adjusted. This board adjusts the optical power of the abnormal channel so that the optical signal noise ratio (OSNR) of each channel at the receive end is equalized. the WDM equipment outputs multiplexed wavelengths. ensuring the power budget of the entire link. After the user confirms the event. you can perform wavelength monitoring management for the OptiX BWS 1600G. NOTE The link attenuation adjustment mode is also referred to as the gain mode. the user needs to manually issue a command to adjust the attenuation of each station on the link. To avoid negative impact on transmission performance. the station automatically issues a command to adjust the attenuation of each station on the link. use a separate dispersion compensation board. OptiX OSN 8800 T32. This mode does not involve a spectrum analyzer unit and is therefore cost-effective. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the ROADM optical power equalization mechanism is provided. and then compares the difference between line attenuation and amplifier gain with node gain compensation offset. If the MCA board at the receive end detects that the optical power of certain channels is abnormal. Wavelength Monitoring By using the U2000. such as the TDC1 or TDC2 board. the station reports an exception event to the U2000. to perform dispersion compensation for signals on the line side of an OTU board. Dispersion Compensation You can perform the following operations on the U2000: l Perform dispersion compensation (with the help of the DCM board) at each band to implement dispersion equalization. OptiX OSN 6800.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management wavelength count. When the optical amplifier board detects that the output power is abnormal. especially for new add wavelengths. The ROADM first distinguishes between pass-through wavelengths and the add wavelengths. l In the submarine system. however. l Perform automatic power equilibrium (APE). a command is automatically issued to adjust the attenuation of each station on the link. After the user confirms the event. Ltd. In the MSP protection. l Configure transoceanic MSP rings. l Switch between an SNCP service and a common service. l Configure SNCP services. l Configure subnetwork connection tunnel protection (SNCTP). l Query the capacities of higher order and lower order cross-connections on an NE. bytes K1 and K2 in the SDH multiplex section overhead (MSOH) are used to transmit protocol information to control the transmit and receive routes of services on a chain network. SDH Board Configuration By using the U2000. l Configure MSP rings. l Configure energy conservation for an NE. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Activate or deactivate services. l Adjust the rates of optical ports on SDH boards. You can also check whether a WDM link functions properly before a service is provisioned. SNCTP provides protection channels at the VC4 level. l View network-wide NE power consumption reports. You can dynamically adjust NE power consumption to achieve environment protection and energy conservation. l Query power consumption of a board or an NE. When the working channel is faulty. you can configure SDH line boards for the OptiX OSN 8800 T32 and OptiX OSN 8800 T64. l Query the status of a port.. VC3. Ltd. Power Consumption Management You can perform the following operations on the U2000: 7-10 l Manage NE power consumption to achieve energy conservation and environment protection when the NE runs in the normal state. or VC4 services and select protection groups for them. you can perform a pseudo-random binary sequence (PRBS) test on a board to check the path quality. Configuration for SDH Services and Protection You can perform the following operations on the U2000: l Configure SDH line boards. SDH services. l Configure linear multiplex section protection (MSP). all its services are switched to the protection channel. A transoceanic multiplex section (MS) is an MS based on the transoceanic MSP protocol and used to provide path protection for higher-order services on a transoceanic ring network. including two-fiber and four-fiber MSP rings. Issue 05 (2010-11-19) . You can perform the following operations: l Configure dynamic SDH ports.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description WDM PRBS By using the U2000. l Configure VC12. and SDH service protection for the OptiX OSN 8800 T32 and OptiX OSN 8800 T64. . you can perform the following operations: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The FC service test verifies whether the FC service line and the equipment under test are in the normal state. l Synchronize. By using the U2000. you can perform submarine line monitoring as follows: l Managing submarine line thresholds. you can manage the PFE 1670. By using the U2000. l Activate a submarine line. and monitor the working status of lines. FC Service Test The FC service test uses the 12LOM board to replace the FC test equipment (such as the SmartBits) for running the test. The PFE 1670 is the power supply equipment for the submarine transmission system. 7. Ltd. services. PFE Management By using the U2000. protection. l Perform tests of multiple types: manual test. l Identify a fault on a submarine line in off-service mode. By using the U2000. l Use the fast fault identification function. The configuration data is saved at the NE layer on the U2000 and in the database of the NE.2 WDM NA NE Management NE management includes setting of attributes and configuration of communication. 7-11 . you can perform FC service tests. you can perform submarine line management as follows: l Create a submarine line. l Delete a submarine line.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management Submarine Line Management You need to create a line group for actual submarine lines on the U2000. and analyze the test data. Basic NE Configuration By using the U2000. l Monitor submarine lines and the status of a repeater in in-service mode. query. l Refresh monitoring information in real time. l Query the gain report and performance report. Submarine Line Monitoring You can monitor and test the status of fibers and repeaters and analyze test data to monitor the working status of a submarine system and identify faults. l Modify a submarine line. Hence. you can measure and analyze line data. comparison test in single-test mode. and comparison test in periodic mode. and clocks on a per-NE basis. – Clear audible and visual alarm indication of an NE in a cabinet. – Set the NE alarm delay time. l Configure or modify the NE attributes: – Modify the NE name. – Modify shelf remarks. including the delay time for alarm start and the delay time for alarm end. – Enable or disable ARP proxy. – Enable or disable alarm reporting. – Set the state model of an NE.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description l Synchronize the NE time: Send the computer system time and NTP server time at the U2000 server to all NEs for synchronizing the NE time. l Query physical resources in the following items: – NE list – Bard manufacturer information – board list – Shelf list – Telecommunications room list l Implement the board plug and play feature: After a board is inserted into a slot. – Modify the NE remarks. – Set the time zone and DST. – Set start time for 24-hour performance monitoring. – Reset the NE in DBERASE mode. l Disable the NE functions automatically: You can set the time when the U2000 automatically disables certain NE functions that may affect services. 7-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the NE Panel automatically displays the board and the board information. these functions are disabled automatically. Issue 05 (2010-11-19) . such as the loopback and automatic laser shutdown (ALS) functions. – Set the longitude and latitude of an NE. with the NE database erased. – Set the affiliated gateway IP address. – Perform a cold reset or warm reset on an NE. – Enable or disable performance reporting. – Enable or disable LAN port access control. Ltd. You can configure the U2000 to automatically synchronize the NE time by specifying the automatic synchronization period. – Reset the NE in SWDL mode after the NE software is downloaded. – Enable or disable the OSI protocol. – Set the affiliated gateway port. – Enable or disable database change (DBCHG) reporting. – Modify the IP address and subnet mask of an NE. – Enable or disable automatic board installation. At the time specified. – Modify a shelf name.. – Enable or disable daylight saving time (DST). – Query the CLEI code. FPGA version. – Perform a cold reset on a board. l Dynamically add a port: SFP/XFP client-side colored ports support the new functions of dynamically add. – Set the primary and secondary states. – Create a fiber cable report. vendor ID. – Set the fan speed. Ltd. delete. – Set the upper temperature threshold and lower temperature threshold. and LED state. – Enable or disable the buzzer of an NE. – Perform a warm reset on a board. – Query the backup power and rated power voltage.. l Set the following attributes for an internal Ethernet interface: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. perform routine maintenance. serial number. l Search and create NEs by discovering NE IP addresses automatically. l Manage environment monitoring information: You can set the fan speed mode and speed level on an NE. part number. 7-13 . You can monitor packets. and in-service commissioning through a mirrored port in a flexible manner. and modify. – Query the PCB version. l Manage fibers and cables as follows: – View fiber cable information. l Set and query the subnet number length. date of manufacture.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management – Set the country code and national segment code of an NE. Orderwire Configuration By using the U2000. working mode. l Modify the following attributes of an optical NE: – Type – Name – Remarks – Vendor – Resources assigned l Query and modify the parameters in the Card Attribute window. you can perform the following operations: l Set and query orderwire phone numbers and call waiting time. and board description. – Create or delete a fiber cable. you can perform the following operations: l Configure Ethernet port mirroring. l Set and query network-wide conference call numbers. software version. Configuration for Ethernet Interfaces and Services By using the U2000. – Query logical boards and physical boards on an NE. and BIOS version of a board. VLAN resources are expanded. NOTE l QinQ is a VLAN embedding technique that employs multi-layer VLAN IDs to identify different users. The U2000 supports the function of adding labels. l Configure port MAC address filtering. bound path. VLAN unicast. Issue 05 (2010-11-19) . In this manner. l Configure the QinQ type area. Ethernet virtual private line (EVPL) (QinQ). VLAN filtering.. and perform conversion between a VLAN SNCP service and a common Ethernet service. l Dump history RMON performance data of Ethernet boards. l Configure the protocol diagnosis function. l Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB) and set parameters including service mounting. You can create VLAN SNCP and QinQ VLAN SNCP services. MAC address disablement. l Configure the DLAG function. l Set the following parameters for Ethernet Layer 2 switching: – Aging time – Spanning tree – IGMP snooping protocol 7-14 l Configure automatic reporting of RMON performance of Ethernet boards. and MAC address automatic learning. Ltd. l Configure the VLAN group function. l Test frames received and transmitted on Ethernet boards. l Configure OAM for Ethernet ports. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Set the following parameters for QoS: – Flow – CAR – CoS – Port shaping l Configure OAM for Ethernet services.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description – Basic attributes – Tag attributes – Network attributes – Advanced attributes – Flow control l Set the following attributes for an external Ethernet interface: – Basic attributes – Flow control – Tag attributes – Network attributes – Advanced attributes l Configure Ethernet private line (EPL). l A VLAN SNCP service is a VLAN-based E-Line service with SNCP protection. and VLAN subnetwork connection protection (SNCP) services. l Configure the intra-board LAG function. Configure electrical cross-connections: The U2000 allows you to configure electrical crossconnections to control service flows at the electrical layer. l Configure OTS overheads at the OCh overhead management-OTN interface. 7-15 .iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management WDM Board Configuration By using the U2000. Overhead Configuration By using the U2000. LOG. you can perform the following operations: l Configure optical transponder boards. l Configure optical equalization boards. you can configure OTN overheads as follows: l Configure and query section monitoring (SM) overheads. the network structure and network survivability are improved. l Implement unidirectional and bidirectional WXCP protection with working and protection cross-connections configured on the sink node. pass-through. l Configure optical amplifier boards. l Configure wavelength monitoring. l Perform the add/drop. l Query optical channel payload unit (OPU) overheads. and loopback operation on GE services in each crossconnect unit group. l Configure TCM overheads at the OCh overhead management-OTN interface. In this manner. The following two features are supported: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and other boards as follows: l Configure several WDM service boards in specified slots to form a cross-connect unit group. l Configure tributary and line boards. you can configure WDM overheads as follows: l Configure an optical channel (OCh) overhead management-SONET interface. l Configure and query fault type and fault location reporting channel (FTFL) overheads. l Configure OTU overheads at the OCh overhead management-OTN interface. l Configure ODU overheads at the OCh overhead management-OTN interface. l Configure OPU overheads at the OCh overhead management-OTN interface. l Configure spectrum analysis boards. WDM Service Configuration At an optical add/drop multiplexer (OADM) station. l Configure and query path monitoring (PM) overheads. Ltd. l Configure service multiplexing and de-multiplexing boards. By using the U2000. l Configure optical supervisory channel boards. l Configure and query tandem connection monitoring (TCM) overheads. l Configure optical add/drop multiplexing boards. l Configure variable optical attenuator boards. l Configure protection boards.. you can configure ADM for GE/Any services by using the LQG. and OTU1 cross-connections. The WDM equipment uses DWC and WSS to implement the re-configuring of optical add/drop multiplexing.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description l Integrated grooming of GE. ODU2. l Set the output attributes of a clock for the OTC board. l Set the working route of a clock for the OTC board. ODU1. l Delete a clock source. Configure a clock for the OTC board. l Configure 1:N optical channel protection. you can perform add/drop and pass-through configurations on optical channels. The U2000 supports optical broadcast cross-connection services on a per-NE basis. including creation. deletion and query. l Distributed grooming of GE. l View the names of the trails that a service traverses. ODU1. ODU1. you can perform the following operations: 7-16 l Configure 1+1 optical channel protection. l Create OCh cross-connections dynamically. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. ODU2. and manage optical cross-connections by board or NE. and ODU3 levels. ODU0.. ODU2. GE/Any. Configure ODU3. l Query a clock source. A maximum of eight dimensions are supported. ODU1. and Any services. activation. deactivation. l Set the input attributes of a clock for the OTC board. Clock Configuration By using the U2000. ROADM Configuration By using the ROADM function on the U2000. l Configure inter-shelf protection. ODU2. Perform the following service management operations: l Lock WDM trails and view the lock status of the trails in the Service Management window of the NE Explorer. l Add a clock source. you can perform the following operations: Configure the master clock. l WSS type of ROADM: WSS is applicable to cross-connect nodes on a ring. Ltd. WDM Protection Configuration By using the U2000. l DWC type of ROADM: DWC is applicable to common nodes on a chain or ring network. This feature is applicable to grooming of multi-dimensional optical cross-connections. and unidirectional and bidirectional SNCP at the ODU0. Issue 05 (2010-11-19) . and ODU3 services implemented by XCS. l Set the synchronization clock source. l Query the trails that a service traverses. l Create edge ports. l Configure board 1+1 protection. you can query the status of data backup between the active and standby SCC boards. – Configure client-side 1+1 protection. – Query the switching status. When a fiber is cut. – Configure XCS board 1+1 protection. – Configure SNCP for optical channel data unit (ODUk) services. l Configure OWSP protection. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Configure board protection switching (BPS). l In 1+1 protection for SCC boards. l Configure protection for clock transparent transmission. – Configure a WXCP protection group for the board in the sink slot. The station reports an exception event to the U2000. query the input power. 7-17 . Ltd. – Query services with WXCP protection. you can perform the following operations: l Manage the optical power. – Configure subwavelength (SW) SNCP for GE or Any services on an OTU board. – Configure intra-board 1+1 protection: This function includes intra-board 1+1 protection implemented by dual-fed OTU boards and intra-board 1+1 protection implemented with the help of the DCP or OLP board. – Configure VLAN SNCP for an Ethernet board.. Optical Power Adjustment By using the U2000. – Configure AUX board 1+1 protection. – Configure and query WXCP protection parameters. – Configure optical line protection.iManager U2000 Unified Network Management System Product Description l 7 WDM Network Feature Management Configure port protection. and power threshold of each WDM board. – Perform switching between working and protection boards. – Query the switching status. – Configure SCC board 1+1 protection. – Query the status of WXCP protection switching. After the user confirms the event. For example. l Configure WXCP protection for GE/OTU1 services. The BPS protection uses two boards: the working and protection boards. – Perform WXCP protection switching. After the fiber is reconnected. BPS protection protects any single port on the two boards by board-level switching. l Configure SNCP protection. output power. the optical amplifier boards at the upstream and downstream stations reduce their output power to a safe value to prevent the fiber maintenance personnel from being injured by the laser emitted from the cut fiber. the optical amplifier board detects signal loss at a station. l Perform intelligent power adjustment (IPA). – Perform protection switching. l Perform ROADM optical power equalization. the U2000 issues a command to the optical attenuation adjustment board at the upstream station. the WDM equipment outputs multiplexed wavelengths. The optical power. you can perform wavelength monitoring. however. accumulation of positive dispersion broadens the optical signal pulse and seriously affects system transmission performance.. and also compares node gain with compensation offset. l Perform automatic level control (ALC). so as to maintain the original shape of the signal pulse.655 fibers have positive dispersion coefficient and positive dispersion slope at the 1550 nm window. The ROADM first distinguishes between pass-through wavelengths and add wavelengths. Wavelength Monitoring Wavelength monitoring uses a wavelength supervisory unit to monitor the wavelengths that are transmitted from a WDM-side optical interface on the OTU board (including the service convergence unit) and to control wavelength shift. 7-18 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Configure pre-alerts for the optical power at a port. The link attenuation adjustment mode applies to a transmission link where the number of add wavelengths differs from the number of drop wavelengths at an OADM. l Perform automatic power equilibrium (APE). and the optical attenuation adjustment board adjusts the add wavelengths based on wavelength flags. Ltd. which uses the TDC to adjust dispersion precisely. Dispersion Compensation l The G. By using the U2000. If an MCA board at the receive end detects that the optical power of certain channels is abnormal. the ROADM optical power equalization mechanism is provided. This board adjusts the optical power of the abnormal channel so that the optical signal-to-noise ratio (OSNR) of each channel at the receive end is equalized. After an optical signal is transmitted over a certain distance. The negative DCM uses negative dispersion to compensate the positive dispersion of the transmission fiber. especially on new wavelength channels. When the optical power is attenuated to the detection threshold. l The U2000 supports 40G dispersion compensation. Issue 05 (2010-11-19) . NOTE The link attenuation adjustment mode is also referred to as the gain mode. Link attenuation (gain mode) can be used as the adjustment mode. may deviate greatly on channels. ensuring the power budget of the entire link.652 and G. l An OEQ NE can apply dispersion compensation at each band to achieve dispersion equalization. a command is automatically issued to adjust the attenuation of each station on the link. This function ensures wavelength stability. To avoid negative impact on transmission performance.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description the optical signals recover to normal and the optical power of each optical amplifier board automatically returns to a normal value. After the user confirms the event. which compares line attenuation with amplifier gain. the attenuation value is equal to the gain value. a negative DCM is used on the network. After ROADM is enabled for dynamically configuring wavelength services. Then the DWC/WSS adjusts the optical power of the pass-through wavelengths. After the nominal gain of an optical amplifier unit and the attenuation value of an attenuation adjustment unit are adjusted. To minimize this impact. the station reports an exception event to the U2000. you can perform the following operations: l Query the records in the automatic output (AO) buffer. Ltd.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management WDM PRBS By using the U2000.. you can perform pseudo-random binary sequence (PRBS) on a board to check the path quality. – Query external control attributes. – Query environmental alarm attributes. Housekeeping Configuration By using the U2000. – Modify external control attributes. you can query the EAPE function of an OCh trail. you can perform the following operations: l Set and query the environmental alarm property. – Create external control attributes. – Set the control time of the external control relay. l Save the records in the AO buffer to a file. By using the U2000. l Query the power consumption of a board or an NE. l Set and query the external control property. Query of AO Buffer Records By using the U2000. Power Consumption Management By using the U2000. – Modify environmental alarm attributes. 7-19 . you can perform the following operations: l Manage NE power consumption to achieve energy conservation and environment protection when the NE runs in the normal state. You can also check whether a WDM link functions properly before a service is provisioned. – Delete environmental alarm attributes. – Set the normal state of the environmental alarm property. – Delete external control attributes. – Create environmental alarm attributes. The record information includes: – Time at which the record is generated – Autonomously generated correlation tag (ATAG) of the record – Type of the record – Description of the record l Filter the records in the AO buffer. EAPE Management Enhanced automatic power equalization (EAPE) management can reduce the bit error rate (BER) of a service. l Export the AO buffer information to the browser of the operating system for printing. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description l Configure energy conservation for an NE. On the U2000. – Create ODUk SPRings at ODU1 and ODU2 levels by using the search function. the protection subnet is a general concept that refers to not only a network with holistic self-protection. l Query the status (enabled/disabled) of the ASON NE software. l Filter links by domain. and changing domain names. – Perform and verify 1:N wavelength protection switching. payload type. link signal type. ASON Management Topology Management By using the U2000. 7-20 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. including creating and deleting domains. you can perform the following operations: l Synchronize network-wide links by domain or payload type. l Create a link resource report. l View TE links. l Manage domains. l Set the length of a TE link. Issue 05 (2010-11-19) . TE Link Management By using the U2000.. l Manage TE links whose payload type is OCh. you can perform the following operations: l Discover ASON topologies and resources automatically. l Create fibers. l Query the ASON NE software version. – Set parameters of a 1:N wavelength protection subnet. or source/sink information. l Manage IDs of ASON NEs. such as a multiplex section protection (MSP) ring or a path protection (PP) ring. Ltd.3 WDM Protection Subnet Management A protection subnet is a network with holistic self-protection. l Enable or disable the ASON feature of an ASON NE. l Synchronize NEs in a domain: On the U2000. – Create a 1:N wavelength protection subnet by using the search function. l Set the active and standby NEs. but also a network without self-protection. you can obtain the topology of a network from the active NE. the relevant license is required. 7. You can dynamically adjust NE power consumption to achieve environment protection and energy conservation. l View network-wide NE power consumption reports. To perform protection subnet management on the U2000. You can perform the following operations on the U2000: l Search for a wavelength protection subnet. l Manage a wavelength protection subnet. such as an unprotected ring or an unprotected chain. 4 End-to-End WDM Management End-to-end network management is also referred to as trail management. – Create SNCP or WXCP by using the trail management function. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Create a trail. ODUk trails and optical channel transport unit (OTUk) trails. ODU1. and apply the data to all related NEs. the U2000 generates the network-layer information about end-to-end trails. – Search for inverse multiplexing trails for 40G and 10G services. ODU2 or ODU3 cross-connections by using the trail management function. including OTS trails. 7. configuring NE data by using the trail management function is quicker and more convenient. – Select the explicit route for protection when creating a WDM trail. – Create a WDM trail by double-clicking an NE and select the source and sink nodes. and FE services based on OCh or ODUk trails by using the trail management function. – Use the end-to-end management function for ASON-WDM trails. 7-21 . FC. optical multiplex section (OMS) trails. – Query and delete an isolated node. – Create and manage third-party WDM wavelength trails (OCh trails). – Select an NE in the topology and view relevant alarms when creating a trail. Ltd. and create ODU0. You can perform the following operations on the U2000: l Search for a trail. You can construct the configuration data about end-to-end network management by searching for the data at the NE layer of the U2000. or directly configure the data at the network layer of the U2000. – Joint trails automatically during the trail search process.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management – Set parameters of an ODUk SPRing protection subnet. OCh client trails. – View detailed information about a route during WDM trail creation.. – Optimize OMS trails search. optical supervisory channel (OSC) trails. – Perform and verify the ODUk Wavelength Protection Switching – Query and delete a protection subnet. ODU1. and create GE. – Reserve user-defined information about trails during WDM trail search. Compared with configuring NE data on a per-NE basis. – Query protection subnet resources. To perform end-to-end network management on the U2000. Based on the NE configuration data and fiber connection data at the NE layer. The U2000 automatically generates an OTS trail after fibers are correctly connected between specified boards. the relevant license is required. – Search for and manage ODU3 trails. – Create ODU0. – Manage conflicts trails generated during the search process. – Analyze failure causes when a route fails to be computed at the optical or electrical layer during trail creation. ODU2 or ODU3 trails. OCh trails. – Create a client trail. and service type. In addition. – Query the detailed information about a trail group. – View the trails related to a customer. – Query the client trail for a trail. – Split a trail into trails of the same level. and create client and ODUk cross-connections by using the trail management function. trail status. – Query current alarms of a trail. – Query detailed information about a trail. – Switch between the window for viewing WDM trails and the window for viewing associated SDH trails. query the optical power of a WDM trail. – Query the route information about a trail. source and sink wavelengths. – Display the signal flow diagram of a trail. – Display intra-site fibers in solid lines and inter-site fibers in dotted lines in the signal flow diagram of a trail.. – Query the transmission media layer for a trail. source and sink nodes. – Query valid routes for protected WDM trails. – View and modify customer information. and the input and output optical power of the source and sink nodes of the trail. generate client and ODUk cross-connections in batches by using the trail management function. 7-22 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 05 (2010-11-19) . – Query the associated working and protection trails for OCh trails. – Join trails of the same level. Ltd. including its attributes and channel allocation. – Delete a customer. – Set port attributes. rate. – Enable or disable service alarms. – Create a customer and customer group. name. – View new cross-connections. That is. – Switch from the signal flow diagram of a trail to another window to query alarms. – Query the optical power of a trail. – Support lockout of WDM trails. The information includes the direction. That is. bearer rate. – Create trails by means of duplication. – Create WDM trails where fiber jumpers are connected inside a station. l View trails.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description – Create multi-layer WDM trails. l Manage the alarms and performance events related to a trail. – Query the server trail for a trail. – View current and history alarms for a customer. – Query DPPS protection for a trail. create multiple trails by duplicating a trail. l Manage customers that trails belong. – Display working and protection routes in different colors in the signal flow diagram of a trail. and perform protection switching for the trails. – Query trails with WXCP and SNCP protection. – Query history performance data of a trail. – Modify the source and sink of ODUk (k = 0. – Support ODU trail end-to-end management. – Search for and end-to-end manage GE trails based on ODUk. – Enable and disable WXCP or SNCP protection for an ODUk trail or a client trail. l Query reports on resource statistics. 2. – View alarms in case of a fiber cut in the signal flow diagram. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Set the alarm threshold of a trail. – Query UAT of a trail. – View relevant fibers based on trails. 3) trails and client trails. That is. – Manage WDM trails base on rights and domains. – Generate a statistics report on WDM wavelength resources utilization. – Set the performance parameters and performance threshold of a WDM trail. – Use the TTI byte to check fiber connection relationships over an OCh trail. – Manage in real time network-wide WDM trails with alarms. – Apply the automatic naming rule for WDM trails. – Collect the statistics on WDM link resources. Ltd. – Manage WDM discrete services. – Query 1+1 protection of optical-layer trails and perform 1+1 protection switching for the optical-layer trails.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management – Query history alarms of a trail. – Generate a statistics report on WDM bandwidth resources. – Implement the "save as" and "print" functions for channel allocation of a WDM trail. when alarms occur in case of a fiber cut. – Query performance threshold-crossing records of a trail. – Create WDM trails by using eight clients at the same time. – Manage service alarms. 1. – Query current performance data of a trail. 7-23 . – Analyze connectivity of a WDM trail and identify a fault on a WDM trail. – Collect the statistics on WDM inter-site wavelength resources. a fiber is displayed in red in the signal flow diagram. l Manage trails. – Manage optical-layer alarms and configure optical-layer overheads on a trail. – Collect the statistics on WDM client-side port resources.. – Query Ethernet performance of an OCh client trail with services. – Save the signal flow diagram of a WDM trail. – Manage WDM platinum trails. – Set the end-to-end optical power mode. – Collect the statistics on WDM wavelength resources. service availability is ensured. – Add a column in the WDM Trail Management window to indicate whether protection is configured. l Query the version of the ASON software. After a user initiates a service request. and changing domain names. 7. filter trails from those that are already displayed. the ASON selects a route automatically. l Query the ASON NE software version. Control Link Management You can perform the following operations on the U2000: 7-24 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 05 (2010-11-19) . The EAPE function automatically adjusts the transmitted optical power of each channel according to the signal quality of each channel monitored by the OTU board at the receive end. In this way. – Incremental filter: Filter the newly added trails and display the qualified trails. l Manage the OVPN status of ASON NEs. Ltd. An ASON NE refers to the equipment that is enabled with both WDM and ASON features. l Implement enhanced automatic power equilibrium (EAPE) based on OCh trails. l Disable the ASON feature at the electrical layer. l Set the active and standby NEs. l Synchronize NEs in a domain: The U2000 can obtain the topology of an ASON domain from the active NE. You can delete a WDM trail (except an OTS trail) from the NE layer and network layer of the U2000. An ASON network is managed by the U2000 that combines ASON and WDM features. and establishes network connections automatically and dynamically. l Delete a trail. establishes and disconnects connections by using signaling control. l Filter trails in the following ways: – Filter all: Filter all trails and display only the qualified trails on a network..5 WDM ASON Management The automatically switched optical network (ASON) is a new generation of optical network that integrates switch and transport functions. – Identify whether an OCh trail is used by a client trail. – Secondary filter: According to filter criteria. Topology Management You can perform the following operations on the U2000: l Discover ASON topologies and resources automatically. l Manage IDs of ASON NEs. including creating and deleting domains.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description – View directly the timeslots and wavelengths that are used by a configured client service trail in the signal flow diagram. to ensure that the quality of signals in each channel at the receive end satisfies the preset requirements. which should also be the trails included in the currently displayed trails. l Manage domains. l Query the status of a TE link. actual route. silver. l Query relevant ASON trails for a TE link. ASON Trail Management You can perform the following operations on the U2000: l Filter relevant WDM ASON trails by domain. or client (GE/Any). gold. whether the original route is active.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management l Synchronize network-wide control links. payload type (optical layer or electrical layer). protection type. l Create a link resource report. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Delete a virtual TE link. TE Link Management You can perform the following operations on the U2000: l Synchronize network-wide TE links by domain or payload type. l Filter TE links by domain. l Synchronize network-wide WDM ASON trails by domain. management status. ODU1_ODU2. l Query detailed information about WDM ASON trails. creation time. l Create a virtual TE link.. or attributes. l Customize the cost for a TE link. link signal type. l View resource usage. l Query the information about current or history alarms on a link. alarm level. 7-25 . l View control links. l Set the risk link group number. OVPN customer. or source/sink information. name. l Create fibers according to the TE link whose payload type is OCh. l View TE links. l Manage TE links whose payload type is OCh. l Query the information about current or history alarms on a control link. l Set the length of a TE link. and whether inverse multiplexing is available. Ltd. l Filter control links by domain or source/sink information. ODUk. planning time. l Set alarm suppression for a control link. service level. activation status. service level. l Set alarm suppression for control-plane alarms. l User-define whether to display the color of alarms in the Control Link Management window. l Query relevant TE links according to control-plane alarms. l Create WDM ASON trails of the diamond. original route. l Delete an interrupted TE link. l View WDM ASON trails. or copper class. l Allocate optical-layer TE links to OVPN customers. ODU1. original route. l Optimize WDM ASON trails. l Set the current route as the original route. l Activate or deactivate WDM ASON trails. l Apply planning data to an ASON trail. l Switch services in the working or protection diamond trail manually. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l View control-plane performance of WDM ASON trails. l View alarms of a WDM ASON trail. crankback times. l Set association source for WDM ASON trails. Ltd. scheduled revertive time. l Query relevant server-layer trails for WDM ASON trails. l Revert a WDM ASON trail to the original route. rerouting triggered by SD. ODU0. l Set association for WDM ASON trails. l Downgrade a WDM ASON trail to a traditional trail. l Migrate an electrical-layer ASON trail in-service. l Refresh the actual route. l Enable or disable optical parameters verify of WDM ASON OCh trails. l Delete inactive WDM ASON trails. l Set control-plane alarm suppression for WDM ASON trails. l Delete a WDM ASON trail from the NMS. l Create WDM ASON trail reports. rerouting policy. reversion lockout status. l Query relevant trails for ASON trails. and rerouting hold-off time. WTR time. original route. associated routes. l View the control-plane alarm suppression information about WDM ASON trails. l View performance events of WDM ASON trails. Issue 05 (2010-11-19) . l Set routing attributes. rerouting priorities. PMD. or associated routes of a WDM ASON trail. l Create associated WDM ASON trails with the same source node or different source nodes. including rerouting lockout status. l Create an inverse multiplexing WDM ASON trail. or signal flow diagram of a WDM ASON trail. l Pre-compute routes when creating or optimizing WDM ASON trails. revertive mode. or client level. l View the actual route. l View the control-plane performance parameters of WDM ASON trails. including OSNR. l Cancel association for WDM ASON trails. l Delete the preset restoration trail for a WDM ASON trail. ODU3. l Duplicate WDM ASON trails. l Query relevant client-layer trails for WDM ASON trails.. l Refresh the preset restoration trail for a WDM ASON trail. l Revert WDM ASON trails manually. l View the preset restoration trail for a WDM ASON trail. trigger condition. and dispersion. ODU2.7 WDM Network Feature Management 7-26 iManager U2000 Unified Network Management System Product Description l Create WDM ASON trails of the OCh. l Set one or two preset restoration trails for a WDM ASON trail. 7-27 . when you create a client trail. l Manage creators of WDM ASON trails. l Manage SRGs of the channel type or customized type. l Manage. l Set the OVPN customer of a WDM ASON OCh trail. Exchange of Scripts You can perform the following operations on the U2000: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Set the OVPN customer when creating an ASON OCh trail. l Implement sharing of wavelengths in the working and protection diamond ASON trails at the optical layer. ODU2. and modify an SRG. alarms. l Implement the OVPN with colored routes in the WDM. its server-layer ASON-WDM trail is automatically created. which is added to the alarm statistics of the ASON-WDM trail. l Set names for WDM ASON trails in batches according to the naming rules. l Downgrade an ASON trail to a traditional trail. l Query the optical power of ASON trails. including trigger condition for rerouting associated routes and shared policy of associated services. l Refresh routes automatically after diamond trail protection switching. and downgrade ODU3 ASON-WDM trails. and performance events of an ASON-WDM trail in a centralized manner. l Save the attributes of a service after creating a WDM ASON service successfully. l Set the route attributes of associated ASON trails. l Simplify the layers where multi-layer services are provisioned. l Implement sharing of wavelengths in associated trails at the optical layer.. l Restore the default attributes of a service when creating a WDM ASON service. upgrade. search for. l View both WDM trails and managed ASON trails in the WDM Trail Management window. l Upgrade a traditional WDM trail to a WDM ASON trail. l Collect the alarm statistics of the ASON section. ODU1. Combination of ASON Trails and Traditional Trails You can perform the following operations on the U2000: l Create an ASON-WDM trail at the OCh. l Refresh wavelengths at the notification of wavelength changes on an OCh ASON trail. To be specific. SRG Management You can perform the following operations on the U2000: l Create. or client level.iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management l Revert to original routes in batches. l Query the WDM trails relevant to an ASON trail. l Manage overhead bytes. delete. Ltd. l Query the ASON trails relevant to a WDM trail. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Manage OSPF IP addresses. l Manage LMP control channels. l Authenticate the RSVP protocol. l Implement LMP automatic discovery. l Manage the resource occupation status. bandwidth weight. l Query OSPF member links. distance weight. l Query SCN control routes. you can configure SDH ASON feature for the OptiX OSN 8800 I and OptiX OSN 8800 II as follows: 7-28 l Query OSPF SDH TE links. By using the U2000. Issue 05 (2010-11-19) . including the bandwidth occupancy (%). l Manage control-plane parameters. l Query SDH ASON trails. l Manage the flood threshold of OSPF TE links. l Maintain ASON signaling. l Manage the LMP status. and customized cost weight.. l Query control-plane performance. l Manage LMP TE links. l Manage the automatic reporting status of control-plane alarms. l Manage OSPF TE links. l Maintain SDH ASON signaling. l Manage WDM ASON trails. l Manage resource reservation. l Manage the fiber resource threshold. l Manage control-plane performance parameters. l Manage OSPF control links. l Manage ASON trail groups. l Manage levels and suppression status of control-plane alarms. ASON Management on a Per-NE Basis You can perform the following operations on the U2000: l Manage the ASON features of NEs. l Manage IDs of ASON NEs. l Manage the WDM fiber resource threshold. l Authenticate the OSPF protocol. l Maintain the ASON switching controller. l Import and export scripts of WDM TE links l Import and export scripts of WDM ASON trails. Ltd. l Manage the OSPF protocol status. hop weight.7 WDM Network Feature Management iManager U2000 Unified Network Management System Product Description l Import and export scripts of WDM ASON nodes. iManager U2000 Unified Network Management System Product Description 7 WDM Network Feature Management l Maintain the SDH ASON switch controller. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. l Manage control-plane alarms of SDH ASON trails. 7-29 .. l Manage VC4 timeslot occupation status. l Maintain the ASON-shared MESH switch controller. l Manage resource reservation. l Manage control-plane performance of SDH ASON trails. . and apply the data to all the related NEs.iManager U2000 Unified Network Management System Product Description 8 8 RTN Network Feature Management RTN Network Feature Management About This Chapter This topic describes the functional features of RTN NE management and network management.2 RTN Protection Subnet Management A protection subnet is a network structure providing comprehensive self-protection functions. communication. 8. and clocks..1 RTN NE Management NE management refers to the management of configurations of an NE in terms of attributes. You can construct the configuration data of the end-to-end network management by searching for the data at the NE layer of the U2000. protection. 8-1 .3 End-to-End RTN Management End-to-end network management is also referred to as trail management. or directly configure the data at the network layer of the U2000. configuring NE data by using the trail management function is faster and more convenient. 8. The data is saved to the NE layer of the U2000 and to the database on the NE. Ltd. The configuration object is a single NE. Compared with configuring NE data on a per-NE basis. services. 8. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd.. l Support the hop management function. l Support the press-to-install function for logical boards. the connections between back-to-back RTN NEs indicate the relationships between the RTN NEs on the same station that are connected in a backto-back manner through network interfaces. protection. these operations automatically stop. When the time expires. communication. The data is saved to the NE layer of the U2000 and to the database on the NE. On the Main Topology of the U2000. The configuration object is a single NE. l Support the license management function for equipment.1 RTN NE Management NE management refers to the management of configurations of an NE in terms of attributes. l Query physical resources in the following lists: – NE list – Board manufacturer information – Board list – Cabinet list – Subrack list – Equipment room list l Support the plug and play feature for boards: After a board is inserted into a slot. such as loopback and automatic laser shutdown (ALS). l Environment monitoring information. Basic NE Configuration You can perform the following operations on the U2000: l Support the ability to manage the connections between back-to-back RTN NEs. The user can configure the U2000 to automatically synchronize the NE time by specifying the automatic synchronization period. Orderwire Configuration You can perform the following operations on the U2000: 8-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 05 (2010-11-19) . services. the NE Panel automatically displays the board and board information. can be periodically disabled. You can set the interfaces of environment monitoring.8 RTN Network Feature Management iManager U2000 Unified Network Management System Product Description 8. l Automatically disable the NE functions: Some NE functions that may affect services. and clocks. l Modify NE attributes such as: – NE name – NE ID – Extended NE ID – Remarks l Synchronize NE time: Align all NEs with the system time of the U2000 server. iManager U2000 Unified Network Management System Product Description 8 RTN Network Feature Management l Set and query the orderwire phone numbers, call waiting time, and orderwire phone port availability. l Set and query the orderwire occupied bytes. l Set and query the F1 data port. l Set and query the broadcast data port. Equipment Protection Configuration You can perform the following operations on the U2000: l Configure 1+1 board protection. l Configure 1+1 IF protection. Interface Configuration You can perform the following operations on the U2000: l Set the parameters for an SDH interface. l Set automatic laser shutdown. l Set the parameters for a PDH interface. l Set the parameters for an IF interface. l Set the parameters for a digital interface. l Set the parameters for an outdoor unit (ODU) interface. l Set overhead interfaces, including: – Orderwire – Broadcast data port l Query and set the overhead including: – Regenerator section overhead (J0). – Lower order path overhead (V5, J2) – VC-4 higher order path overhead (J1, C2) and its pass-through or termination. – VC-3 higher order path overhead (J1, C2). l Enable IEEE 1588 overhead bytes. l Support PRBS. l Support the features of packet radio. You can configure a microwave interface in terms of basic and advanced attributes, IF attributes, and Layer-2 and Layer-3 attributes. l Support the ability to configure the long and short serial numbers for an MP group. Configuration for RTN Service and Protection You can perform the following operations on the U2000: l Configure VC-12, VC-3, or VC-4 services. l Convert between an SNCP service and a normal service. l Modify attributes of SNCP services. l Perform SNCP protection switching. l Support 1+1 linear MSP, 1:N (N ≤ 3) linear MSP. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 8-3 8 RTN Network Feature Management iManager U2000 Unified Network Management System Product Description l Support the N+1 protection. l Support IF 1+1 protection. l Support the REG configuration. l Support MSP rings. l Support the XPIC feature. l Support Hybrid radio and the AM feature, carrying hybrid E1 and Ethernet services and enhancing the availability of radio links. Configuration for Ethernet Interfaces and Services You can perform the following operations on the U2000: l Configure Ethernet internal interfaces, including: – TAG attributes – Encapsulation/mapping – Network attributes – Link capacity adjustment scheme (LCAS) – Bound path l Configure external Ethernet ports, including: – Basic attributes – Flow control – TAG attributes – Network attributes – Advanced attributes. l Configure jumbo frames. l Configure QinQ types. l Configure Ethernet private line (EPL) services. l Configure EVPL (QinQ) services. l Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge (VB) and configure the following: service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, self-learning MAC address, and VLAN MAC address table capacity. l Test frame receiving and transmitting on Ethernet boards. l Configure quality of service (QoS), including: – Flow setting – CAR – CoS – Port shaping – Board shaping l Configure Ethernet Layer-2 switching, including: – Aging time – Spanning tree – IGMP snooping protocol. 8-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) iManager U2000 Unified Network Management System Product Description 8 RTN Network Feature Management l Support the ability to diagnose protocol faults and to restore protocols. l Configure point-to-point LPT management and point-to-multipoint LPT management. l Configure intra-board Ethernet LAGs. l Configure Ethernet ring protection. l Configure the RMON performance functions such as browsing history groups of Ethernet ports, collecting performance statistics of a group, setting an alarm group of Ethernet ports, and setting a history control group. Clock Configuration You can perform the following operations on the U2000: l Query the clock synchronization status. l Set clock source priority list, including: – System clock source priority list – Priority table for phase-locked sources of the first external clock output – Priority table for phase-locked sources of the second external clock output l Set clock source switching, including: – Clock source restoration parameters – Clock source switching condition – Clock source switching l Configure clock subnets, including: – Clock subnet – Clock quality – Synchronization status message (SSM) output control – Clock ID status l Set the external clock output phase-locked source, including: – External clock output phase-locked source – 2M phase-locked source external clock attributes Ethernet OAM Management You can configure the 802.1ag Ethernet OAM as follows on the U2000: l Support maintenance domain (MD), maintenance association (MA), maintenance end point (MEP), and maintenance intermediate point (MIP). l Perform CC check. l Perform LB check. l Perform LT check. l Perform Ping tests. l Perform performance detect. You can configure the 802.3ah Ethernet OAM as follows on the U2000: l Support OAM self-loop detection. l Enable OAM automatic discovery. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 8-5 8 RTN Network Feature Management iManager U2000 Unified Network Management System Product Description l Support link event notification and the adjustment of the OAM error frame monitoring threshold. l Perform remote loopback. IS-IS Protocol Configuration The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the protocol of the network control plane, and provides the following configuration functions: l Configure an IS-IS protocol instance. l Enable the IS-IS protocol for a port. l Import routes. l Configure link TE information. OSPF Protocol Configuration The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network control plane, and provides the following configuration functions: l Configure an OSPF protocol instance. l Enable the OSPF protocol for a port. l Import routes. l Configure the TE information about a link. MPLS Signaling Protocol Configuration The U2000 supports the configuration of the following signaling protocols: l RSVP-TE protocol: Resource reservation protocol-traffic engineering (RSVP-TE) is derived from the RSVP protocol. The RSVP protocol is a type of QoS protocol. The RSVP protocol reserves resources for specific services in a network to ensure the service quality. As the TE is generated, RSVP is extended accordingly to support LSP creation and to realize TE. l LDP protocol: Label distribution protocol (LDP) is a control and signaling protocol of multi-protocol label switching (MPLS). RTN equipment supports using the RSVP-TE protocol to create dynamic LSP connection and using the LDP protocol to create PW connection. Static Route Management Configuration The U2000 supports the configuration of static route management. Address Resolution Configuration The U2000 supports the configuration of address resolution. IEEE 1588 Packet Clock Configuration You can perform the following operations on the U2000: 8-6 l Configure the selection mode of a frequency source. l Set the PTP system time. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) iManager U2000 Unified Network Management System Product Description l Configure a PTP clock subnet. l Configure a PTP clock service. l Set the WTR time for a PTP clock source. l Set the PTP clock source priority. 8 RTN Network Feature Management ACR Clock Configuration Configure CES ACR or 1588 ACR clock. LAG Configuration Link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical link of faster rate for transmitting data. This function improves the link availability and increases link capacity. The U2000 supports the configuration of the following LAG attributes: l Configure the load sharing type, including sharing and non-sharing. l Configure the LAG type, including manual and static. l Configure the service distribution algorithm of the LAG. l Configure the port priority and system priority of the LAG. BFD Configuration Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status. BFD is a simple Hello protocol. It is similar to the neighbor detection of those famous protocols in many aspects. A pair of systems periodically sends detection packets on the channel on which session between the two systems was created. If a system does not receive any detection packet from the opposite end within a specific time, the system assumes that a failure occurred in some part of the bidirectional channel of the adjacent system. QoS Configuration Quality of service (QoS) indicates the performance of the data flow that travels through a network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the bandwidth, but it can minimize the delay and jitter in the network by reasonably allocating and monitoring network resources. In this way, the quality of important services is ensured. The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification on the traffic that enters the DS domain. Traffic of different types is marked with different PHB service types. For internal DS nodes, you need to perform only simple flow classification based on PHB service type. The U2000 supports the following QoS operations: l Configure Diffsever domains. l Configure ATM CoS mapping. l Configure simple flow classification and complex flow classification. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 8-7 8 RTN Network Feature Management iManager U2000 Unified Network Management System Product Description l Configure CAR and Shaping. l Configure the color blindness mode. l Configure the WFQ schedule policy. l Configure the port WREQ schedule policy. l To simplify the operation and share some common QoS configuration parameters, the U2000 supports creating QoS function point policy. The function point policies are as follows: port policy, ATM policy, and V-UNI ingress policy. Use these function point policies to bind the CAR configuration attribute, shaping configuration attribute, flow classification configuration attributes, WFQ schedule policy and WRED policy attributes. MPLS Tunnel Configuration The MPLS tunnel is defined in the MPLS protocol. Independent from the service, the MPLS tunnel realizes end-to-end transmission, and carries the PWs related to the service. The U2000 supports the following functions for configuring an MPLS tunnel on a per-NE basis: l Configure basic attributes of the MPLS. l Configure static unicast MPLS tunnels. l Create forward and backward MPLS tunnels at the same time. l Create the E-LSP. l Manage PWs. l Manage tunnel labels and PW labels. MPLS Tunnel Protection Group Configuration The U2000 supports the following functions for configuring an MPLS tunnel protection group: l Create a 1+1 MPLS tunnel protection group and a 1:1 MPLS tunnel protection group, containing the switching mode, revertive mode, wait-to-restore (WTR) time, and hold-off time. l Perform MPLS tunnel protection switching. l Query the protection switching status of an MPLS tunnel. PWs with UDP Encapsulation The U2000 supports the PWs with UDP encapsulation that are carried in IP tunnels. IP Tunnel and GRE Tunnel Configuration If the equipment at both ends of an IP network does not support MPLS tunnel, PWE3 services can pass through the IP network by using an IP tunnel or GRE tunnel. An IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication. The U2000 supports the configuration of bidirectional IP tunnels and GRE tunnels on a per-NE basis. The U2000 supports the Offload protection between MPLS and GRE tunnels. 8-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) l Create the corresponding PW when creating an ATM service. l Create UNI-NNI E-Line services that are carried on QinQ links. l Create UNI-NNI E-Line services that are carried on ports. User data from multiple points can be converged into one point. The equipment transmits user packets from the user side to the network side based on Port or Port+VLAN. l Create UNI-NNI E-Line services that are carried on PWs. ATM Service Configuration ATM emulation service is mainly used to transparently transmit ATM services in the packet transport network. l Configure CoS mapping. The U2000 supports the following functions for configuring CES services: l Create the corresponding PW when creating a CES service. l Configure QoS of the ATM service. l Create UNI-UNI and UNIs-NNI ATM services. l Create PVP and PVC ATM services. The U2000 supports the following functions for creating ATM services: l Create an ATM service that contains multiple ATM connections. l Configure the service and the QoS of the corresponding PW when creating an L2VPN service. User data can be transparently transmitted in a point-to-point manner.iManager U2000 Unified Network Management System Product Description 8 RTN Network Feature Management CES Service Configuration CES is used for transparent transmission of switching data on TDM circuits in the packet transport network. The equipment uses several ports to access services from the V-UNI side.. l Create CES services of structure-aware TDM circuit emulation service over packet switched network (CESoPSN) and of a structure-agnostic TDM over packet (SAToP). Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Create UNI-UNI and UNI-NNI CES services. l Configure the recovery value of idle timeslots. l Configure the V-UNI group. l Configure QoS of the CES service.. and converges the services into one PW at the network side for transmission. The U2000 supports the following functions for configuring E-line services on a per-NE basis: l Create UNI-UNI E-Line services. l Configure the IMA group. l Carry CES services over IP/GRE tunnels. E-AGGR Service Configuration The E-AGGR service is a multipoint-to-point Ethernet service. E-Line Service Configuration The E-line service is a point-to-point Ethernet service. 8-9 . Ltd. l Perform LSP ping checks. MPLS OAM Configuration MPLS OAM is an OAM function of the MPLS network. the MPLS OAM provides a trigger scheme of protection switching. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Perform CC activation test. l Perform remote loopback. You can perform the following operations on the U2000: 8-10 l Create an RTN protection subnet. l Perform LSP traceroute checks. The ATM OAM function checks an ATM link by inserting some OAM cells of the standard cell structure to the user cell flow. The U2000 provides the following functions for configuring ATM OAM: l Set segment end attributes. l Configure the service and the QoS of the corresponding PW when creating an E-AGGR service. Issue 05 (2010-11-19) . This function can check the quality of LSPs in an MPLS network. l Create an IF N+1 protection subnet. l Configure the V-UNI group. l Manage RTN protection subnets. The U2000 provides the following functions for configuring MPLS OAM: l Configure MPLS OAM parameters of a tunnel. l Perform PW ping checks. This function can check the quality of ATM links that pass through multiple NEs. To perform protection subnet management. 8.. acknowledge. The MPLS OAM scheme can effectively check. you need to have the related license. When a fault occurs. It can report and handle a defect.8 RTN Network Feature Management iManager U2000 Unified Network Management System Product Description The U2000 supports the following functions for configuring E-AGGR services on a per-NE basis: l Configure the VLAN forwarding table items of an E-AGGR service. ATM OAM Configuration ATM OAM is an end-to-end OAM function for ATM services.2 RTN Protection Subnet Management A protection subnet is a network structure providing comprehensive self-protection functions. Ltd. l Set the parameters for a protection subnet. l Set the LLID. l Query the switching status of a protection subnet. l Create an IF 1+1 protection subnet. and locate a defect inside the network at the MPLS layer. l Perform CV/FFD checks. configuring NE data by using the trail management function is faster and more convenient. Ltd.iManager U2000 Unified Network Management System Product Description l Query and delete a protection subnet. – Set the performance parameters for an RTN trail. UAT. current and history performance data. 8-11 . – Implement the protection management of PWE3 services. You can construct the configuration data of the end-to-end network management by searching for the data at the NE layer of the U2000. the relevant license is required. – Manage discrete PWE3 services. and performance threshold-crossing records of an RTN trail. according to the filter criteria. To perform end-to-end network management. and apply the data to all the related NEs. such as ATM.3 End-to-End RTN Management End-to-end network management is also referred to as trail management. – View the performance of a PWE3 service. – Manage multi-segment PWE3 services. Compared with configuring NE data on a per-NE basis. – View the alarms of a PWE3 service. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Clone a PWE3 service. – Implement the function of automatically discovering PWE3 services. – Activate or deactivate an RTN trail. or directly configure the data at the network layer of the U2000.. – Incremental filter: Filter all trails and display the newly qualified trails together with the currently displayed ones Management of Packet Services l PWE3 service management – Create PWE3 services of multiple types. – Predeploy a PWE3 service. – Manage PWE3 services based on rights and domains. – View the topology of PWE3 services. l Manage the alarms and performance events related to an RTN trail. and Ethernet. CES. l Query protection subnet resources. – Modify and delete PWE3 services. 8 RTN Network Feature Management 8. l Filter trails in three ways – Filter all: Filter all trails and display only the qualified trails on a network – Secondary filter: Filter the trails that are displayed. – Query current and history alarms. – Query the RTN trails and customer information affected by an alarm. You can perform the following operations on the U2000: l Create and maintain an RTN trail – Create a PDH microwave trail – Create an SDH microwave trail. and filter PWE3 services to view the desired services. including the working and protection routes. and synchronous Ethernet clocks. – Implement the function of automatically generating Ethernet OAM for PWE3 services. and filter tunnels to view the desired tunnels. RSVP. – Manage discrete tunnels.. and delete 1+1 or 1:1 tunnel protection groups. – View the performance of a tunnel. – View the alarm of a tunnel. l Display clock alarm status. and IP tunnels. – Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection groups. – Implement the function of automatically discovering tunnels. – View the topology of tunnels. and implement the function of automatically discovering 1+1 or 1:1 tunnel protection groups. – Create. – Predeploy a tunnel. – Modify and delete a tunnel. modify. – Switch services in a 1+1 or 1:1 tunnel protection group manually. LDP. Ltd. Issue 05 (2010-11-19) . SDH. Network-Wide Clock Topology Management 8-12 l Support the IEEE 1588 V2. l Tunnel Management – Create static CR.8 RTN Network Feature Management iManager U2000 Unified Network Management System Product Description – Manage PWE3 service templates. l Display clock trace relationship. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. – Create RSVP and LDP tunnels in batches. Then. The trail-based configuration can be performed by searching for the NE-layer data on the U2000 or by configuring the network-layer data on the U2000.2 E2E PTN Management E2E network management is also referred to as trail management. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. and clocks on an NE.iManager U2000 Unified Network Management System Product Description 9 9 PTN Network Feature Management PTN Network Feature Management About This Chapter This topic describes the functions and features of PTN NE management and network management. services.. the trail-based configuration is easier.1 PTN NE Management NE configuration includes the configuration of attributes. Compared with the NE-based configuration. 9-1 . 9. communications. protection schemes. the configuration is delivered to all associated NEs. which means the trail-based configuration of network management data. 9. such as loopback and automatic laser shutdown (ALX). protection schemes. these functions are disabled automatically.. Issue 05 (2010-11-19) . l Plug and play feature of boards: After a board is inserted into a correct slot. services. the NE Panel displays the board and board information. and clocks on an NE. Layer 2 attributes are the data link layer attributes of an interface.1 PTN NE Management NE configuration includes the configuration of attributes. In addition. VLAN. and QinQ. Table 9-1 lists the types of PTN service interfaces supported by the U2000. and Layer 3 attributes of the interface. can be disabled automatically by specifying an automatic disabling time. such as IP attribute. Layer 2 attributes. Basic attributes are the physical attributes of an interface. 9-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Basic NE Configuration l Modifying NE attributes such as: – NE name – NE ID – Extended NE ID – Remarks – NE pre-configuration l Synchronizing NE time: NE time can be synchronized by delivering the system time of the U2000 server to all NEs.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management 9. Layer 3 attributes are the network layer attributes of an interface. you can specify automatic synchronization time and automatic synchronization period on the U2000. l Environment monitoring l Board replacement l Fan management Service Interface Types Configuration The working mode and application scenarios of an interface are determined by the general attributes. Ltd. When the time arrives. l Disabling functions automatically: Service-affecting functions. such as ATM. communications. Layer 2 attributes Physical port Not supported Carrying ATM services Layer 3 attributes Physical port Not supported Carrying tunnels after the PPP protocol is enabled General attributes Physical port Not supported Carrying TDM services Layer 2 attributes Physical port Not supported Carrying IMA signals Layer 3 attributes Physical port Supported Added to a multi-link PPP (MP) group after the PPP protocol is enabled General attributes N/A - The general attributes of an Ethernet interface can be configured according to the Layer 2 attributes and Layer 3 attributes of the interface.. 9-3 .iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management Table 9-1 Types of PTN service interfaces Service Interface Supported Port Mode/ Encapsulation Type Port Type MP Group Supported or Not Function SDH interface General attributes Physical port Not supported The general attributes of an SDH interface can be configured according to its Layer 3 attributes or be set to a channelized STM service interface. Ltd. PDH interface Ethernet interface Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. . Layer 2 attributes Logical port Not supported VLAN Sub Interface: carrying Ethernet services Layer 3 attributes Logical port Not supported l EOA Virtual Interface: carrying IP tunnels or GRE tunnels l VLAN Sub Interface: used for BFD. Issue 05 (2010-11-19) .iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management Service Interface Ethernet virtual interface Supported Port Mode/ Encapsulation Type Port Type MP Group Supported or Not Function Layer 2 attributes Physical port Not supported Carrying userside or networkside Ethernet services Layer 3 attributes Physical port Not supported Carrying tunnels General attributes Logical port Not supported The general attributes of an Ethernet interface can be configured according to Layer 2 attributes and Layer 3 attributes. L3VPN or carrying tunnels l L3 Virtual Interface: carrying IPLINE services 9-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. Ltd..SHDSL signals EFM bound group Logical port - Set according to the bound mode ATM bound group Logical port - Set according to the bound mode IMA bound group Logical port - Carrying G.SHDSL signals General attributes - - The general attributes of a serial interface can be configured according to the Layer 3 attributes of the interface. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Layer 3 attributes Logical port Supported A serial interface can be added to an MP group after the PPP protocol is enabled. General attributes Physical port - Carrying ADSL signals DSLTRUNK attributes Logical port - Carrying ADSL signals General attributes Physical port - Carrying G.SHDSL interface Serial interface Issue 05 (2010-11-19) 9 PTN Network Feature Management Supported Port Mode/ Encapsulation Type Port Type MP Group Supported or Not Function Advanced attributes Logical port Not supported The advanced attributes of an Ethernet virtual interface can be configured according to attributes of an ADLS2+ interface.SHDSL signals Bound mode N/A - Carrying G. 9-5 .iManager U2000 Unified Network Management System Product Description Service Interface ADSL interface G. and provides the following configuration functions: 9-6 l Configure node attributes l Configure port attributes l Configure peer attributes l Import routes l Configure the TE information of a link Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Layer 3 attributes. and provides the following configuration functions: l Configure node attributes l Configure port attributes l Import routes l Configure the TE information of a link l Configure GR sessions l Configure route aggregation l View route forwarding tables OSPF Protocol Configuration The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network control plane. IF boards. Issue 05 (2010-11-19) .. IS-IS Protocol Configuration The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the protocol of the network control plane. including IF 1+1 protection. l Configure HOP management. and ODU boards. Ltd.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management Service Interface Supported Port Mode/ Encapsulation Type Port Type MP Group Supported or Not Function MP Group General attributes - - The general attributes of an MP group can be configured according to the IP attributes of the group. Layer 2 attributes. including general attributes. l Configure a radio link. IP attributes Logical port - Carrying tunnels Microwave Interface Configuration You can perform the following operations on the U2000: l Configure a microwave interface. IF attributes. and advanced attributes. Address Resolution Configuration The U2000 supports the configuration of address resolution. and provides the following configuration functions: l Configure MPLS-LDP peer entities l Configure node attributes l Configure port attributes l Configure IP address filtering tables l Configure routing policies l Configure label policies RSVP Protocol Configuration The U2000 uses the resource reserved protocol (RSVP) to create LSP connections.. Ltd. and provides the following configuration functions: l Configure MP-BGP instances l Configure MP-BGP peers l Configure route filtering policies LDP Protocol Configuration The U2000 uses the label distribution protocol (LDP) to create LSP connections and PW connections. and provides the following functions: l Configure the clock domain l Query the status of clock synchronization l Configure the IEEE 1588 Packet Clock – Configure clock services – Configure clock synchronization attributes Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and provides the following configuration functions: l Configure node attributes l Configure port attributes Static Route Management Configuration The U2000 supports the configuration of static route management.iManager U2000 Unified Network Management System Product Description l Configure route aggregation l Query peer information l View route forwarding tables 9 PTN Network Feature Management MP-BGP Protocol Configuration The U2000 uses the internal border gateway protocol (IBGP) to implement L3VPN functions. Clock Configuration The U2000 supports the configuration of various clock modes. 9-7 . Ltd. including – System clock source priority list – Priority table for phase-locked sources of 1st external clock output – Priority table for phase-locked sources of 2nd external clock output – Setting clock source switching parameters. including – Clock source reversion parameters – Clock source switching condition – Clock source switching – Configure clock subnets. including – External clock output phase-locked source – 2 Mbit/s phase-locked source external clock attributes Board-Level Protection Configuration You can perform the following operations on the U2000: l Configure TPS protection of a subboard. Synchronization Protocol Configuration In the application scenario of dual-homing. Issue 05 (2010-11-19) . l Check the switching status..iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management – Configure the clock source priority table – Configure clock subnets – Configure external time interfaces l Configure ACR clocks – Configure CES ACR and 1588 ACR clocks l Configure physical-layer clocks – Query the status of clock synchronization – Set clock source priority tables. a channel is established for control status synchronization with the peer end. l Configure board 1+1 protection for the SCC and cross-connect boards. Meanwhile. the control packets can be transmitted and received through the channel and link fault detection can be performed. With the method of adding information of the peer end. l Perform protection switching. the actions on both sides need to be negotiated based on different fault cases. In this manner. including – Clock subnets – Clock quality – SSM output control – Clock ID status – Setting phase-locked sources output by external clock. 9-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the status of the peer equipment needs to be obtained either for the MC LAG or for the cross-MC LMSP. The multi-chassis (MC) LMSP can implement the LMSP between NEs. and provides the following functions: l Configure IGMP Snooping protocol parameters l Configure fast leave ports Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The protection scheme uses the protection channel to protect services that are transmitted on the working channel. The U2000 provides the following functions: l Configure parameters of port groups and bridges l Configure CIST and MSTI parameters l Query CIST status and MSTI status IGMP Snooping Configuration The Internet group management protocol snooping (IGMP Snooping) is the multicast constraint scheme that runs on Layer 2 equipment. This function improves link availability and increases link capacity.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management LAG/MC LAG Configuration A link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical link with a higher transmission rate. and is used to manage and control multicast groups. achieving load balance of VLAN data. the MSTP can forward data according to VLAN packets. Ltd. The U2000 supports the configuration of IGMP snooping for E-LAN services. Linear MSP applies to the POS interface and structured STM interface. services are switched to the protection channel. A multi-chassis (MC) LAG achieves load sharing between NEs. The U2000 supports the following LMSP/MC LMSP functions: l Create LMSP groups l Check the status of LMSP groups l Perform a linear MSP switching MSTP Configuration The multiple spanning tree protocol (MSTP) can be used to clear loops in a network. Different from the STP and RSTP. 9-9 . The U2000 supports the configuration of the following LAG/MC LAG attributes: l Load sharing type (sharing or non-sharing) l LAG types (manual or static) l Load sharing hash algorithm l Port priority and system priority LMSP/MC LMSP Configuration Linear MSP (LMSP) includes 1+1 linear MSP and 1:N linear MSP. The MSTP uses a specific algorithm to block some redundant trails and change a loop network to a nonloop tree network. This function prevents packet increase in a loop network and generation of broadcast storms in an endless cycle. When the working channel fails.. DS nodes are classified into edge DS nodes and internal DS nodes.. It is similar to the neighbor detection of those famous protocols in many aspects. but it can minimize the delay and jitter in the network by properly allocating and monitoring network resources. the quality of important services is ensured. The U2000 supports the following QoS functions: 9-10 l Configure QoS profile l Configure DiffServ domains l Configure ATM CoS mapping l Configure SVLAN DEI used flag l Configure simple flow classification and complex flow classification l Configure CAR and shaping l Configure the color blindness mode l Configure the WFQ schedule policy l Configure the port WRED policy Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the LPT immediately informs the access equipment at both ends of the transmission network to activate the backup network. In a DS domain. When the intermediate transmission network is faulty. that is. A pair of systems periodically send detection packets on the bidirectional channel where a session between the two systems is created. The near-end equipment performs operations according to the remote-end link status. the normal transmission of important data is ensured. LPT Configuration The link state pass through (LPT) protocol is used to return the remote-end link status to the near end. In this manner.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management l Manage routes l Configure route member ports l Query statistics of IGMP protocol packets. Ltd. The U2000 supports the BFD detection on IP/GRE tunnels and the interior gateway protocol (IGP). BFD Configuration The bidirectional forwarding detection (BFD) protocol can be used to check the Ethernet link status. QoS Configuration The quality of service (QoS) indicates the performance of the data flow that travels through a network. Edge DS nodes usually perform complex flow classification on the traffic that enters the DS domain. Internal DS nodes only need to perform simple flow classification based on PHB service types. The QoS cannot increase the bandwidth. the system regards that a failure occurs on the channel. The QoS is used to ensure end-to-end service quality. The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ function. In this manner. BFD is a simple Hello protocol. all DS nodes use the same service provision policy to achieve the same per-hop behavior (PHB). Different types of traffic are marked with different PHB service types. Issue 05 (2010-11-19) . DS nodes. If a system does not receive any detection packet from the opposite end in a specific time. By using these function point policies. ATM policy. 9-11 . Unicast MPLS tunnel is mainly used to transparently transmit point-to-point PWE3 services. and QinQ policy. MPLS tunnels are the tunnels defined in the MPLS protocol. Figure 9-1 Unicast MPLS tunnel The U2000 provides the following functions associated with MPLS tunnels on a per-NE basis: l Configure MPLS basic attributes l Configure static unicast MPLS tunnels l Create forward and backward MPLS tunnels at the same time Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Independent from the service. you can bind CAR configuration. and color blindness mode. PW policy. WFQ schedule policy. MPLS Tunnel Configuration The multi-protocol label switch (MPLS) protocol achieves transparent transmission of data services. the MPLS tunnel achieves end-to-end transmission and carries the PWs related to the service. V-UNI ingress policy. V-UNI egress policy. the U2000 supports the creation of QoS function point policies. See Figure 9-1. Ltd.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management l Configure the service WRED policy l To simplify operations and share common QoS configuration parameters. WRED policy. l Configure CoS queue mapping l Configure the QoS profile for applying the same QoS policies to multiple NEs. flow classification configuration.. shaping configuration. including port policy. the services on the working PW are switched to the protection PW. revertive mode. Issue 05 (2010-11-19) . IP tunnels and GRE tunnels mainly apply to the Offload scenarios of mobile communication. In this manner. the services on the working PW are protected.. when the working PW is faulty. you can save tunnel resources and transmit services over different networks. The following PW APS/MC PW APS functions can be performed on a per-NE basis: l Create protection groups l Bind the master and slave protection pairs IP Tunnel and GRE Tunnel Configuration If the equipment at the two ends of an IP network does not support MPLS tunnels. Ltd. That is. and hold-off time for the groups l Perform MPLS tunnel protection switching l Query the status of an MPLS tunnel protection group MS PW Configuration By creating multi-segment pseudowire (MS-PW) to transmit services. Dual-Homing Protection Configuration In the case of dual-homing protection. The following types of dual-homing protection can be configured for ATM and CES services: 9-12 l 1:1 MC-PW APS and 1:1 MC-LMSP l 1:1 MC-PW APS and 1+1 MC-LMSP Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. two PE nodes (dual-homing nodes) are connected to one CE node through attachment circuit (AC) links so that the services received by the PE nodes at both ends of the bearer network can be protected. PW automatic protection switching (APS) is intended to protect the services on the working PW with a protection PW. The MC PW APS can be used to implement inter-NE PW APS protection. PWE3 services can pass through the IP network by using IP tunnels or GRE tunnels. wait-to-restore (WTR) time. The U2000 supports the configuration of bidirectional IP tunnels and GRE tunnels on a per-NE basis.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management l Create static and bidirectional MPLS tunnels l Create the E-LSP l Manage PWs l Manage tunnel labels and PW labels MPLS Tunnel Protection Group Configuration The U2000 provides the following functions associated with MPLS tunnel protection groups: l Create MPLS tunnel 1+1 protection groups and MPLS tunnel 1:1 protection groups and configuring switching mode. PW APS/MC PW APS Configuration As a network protection mechanism. and transmits the E1 signals to the opposite end by using the PW. l 1:1 MC-PW APS and MC-LAG l 1:1 PW redundancy and MC-LAG CES Service Configuration Circuit emulation services (CES services) achieve transparent transmission of TDM circuit switching data on the PSN. The 2G/3G stations or Intranet line accesses the PTN equipment by using the E1/ channelized STM-1 line.iManager U2000 Unified Network Management System Product Description l 1:1 PW redundancy and 1:1 MC-LMSP l 1+1 PW redundancy and 1+1 MC-LMSP 9 PTN Network Feature Management The following types of dual-homing protection can be configured for E-line services. 9-13 . See Figure 9-2. The equipment divides the E1 signals into pieces. Ltd. encapsulates the pieces into the Ethernet. Figure 9-2 CES service application model The U2000 provides the following functions associated with CES services: l Create CES services and corresponding PWs at the same time l Create UNI-UNI and UNI-NNI CES services l Create CES services of structure-aware TDM circuit emulation service over packet switched network (CESoPSN) and CES services of structure-agnostic TDM over packet (SAToP) l Configure QoS policies of CES services l Configure idle timeslot recovery value l Configure CES service alarm transparent transmission l Select the tunnel where a PW is carried online Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. 9-14 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The 3G station accesses the PTN equipment by using the ATM IMA group. The equipment encapsulates the ATM cells into the Ethernet. to meet their communication requirements. See Figure 9-4. See Figure 9-3. and transmits the ATM cells to the opposite end by using the PW. The equipment transmits user packets from the user side to the network side based on Port or Port+VLAN. Ltd. l Select the tunnel where a PW is carried online E-Line Service Configuration E-line services achieve point-to-point transparent transmission of user data. In addition. Issue 05 (2010-11-19) . Figure 9-3 ATM service application model The U2000 provides the following functions associated with ATM services: l Create ATM services that contain multiple ATM connections l Create UNI-UNI and UNI-NNI ATM services l Create PVP and PVC ATM services l Create ATM services and corresponding PWs at the same time l Configure the IMA group l Configure QoS policies of ATM services l Configure the CoS mapping table.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management ATM Service Configuration ATM emulation services achieve transparent transmission of ATM services on the PSN.. Branches of Company A or Company C that are in different cities need data communication. the service data can be completely isolated. Company C has branches in City 1 and City 2. The PTN equipment can provide E-line services for Company A and Company C. Company A has branches in City 1 and City 3. 9-15 . A carrier wants to construct a 3G network. the QoS parameters such as the overall bandwidth are specified. The data between each Node B and RNC is regarded as one service. At the convergence point. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and converges the services into one PW at the network side for transmission. Ltd. The equipment uses several ports to access services from the V-UNI side.. Services of each Node B are converged and transported to the RNC. See Figure 9-5 and Figure 9-6.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management Figure 9-4 E-Line Service The U2000 supports the following functions associated with E-line services on a per-NE basis: l Create UNI-UNI E-Line services l Create UNI-NNI E-Line services that are carried on ports l Create UNI-NNI E-Line services that are carried on PWs l Create UNI-NNI E-Line services that are carried on QinQ links l Configure QoS policies for L2VPN services and corresponding PWs during the creation of L2VPN services l Configure the V-UNI group l Select the tunnel where a PW is carried online E-AGGR Service Configuration E-AGGR services achieve multipoint-to-point aggregation of user data. .iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management Figure 9-5 E-AGGR service scenario 1 Figure 9-6 E-AGGR service scenario 2 The U2000 supports the following functions associated with E-AGGR services on a per-NE basis: 9-16 l Configure the VLAN forwarding table items of an E-AGGR service l Configure QoS policies for L2VPN services and corresponding PWs during the creation of L2VPN services l Configure the V-UNI group l Select the tunnel where a PW is carried online Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. Issue 05 (2010-11-19) . The Internet data of the HQ is also isolated from the internal service data by using the VLAN. City 2. the data should be isolated between the two branches. Company A has Branch A in City 1.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management E-LAN Service Configuration Based on the self-learning of MAC addresses.. See Figure 9-7. E-LAN services achieve packet forwarding between multiple V-UNI and NNI interfaces. Figure 9-7 E-LAN service E-LAN services use different VLAN IDs to identify service data of different branches. data is shared within a branch and is isolated from the data for other branches. The HQ of Company A is in City 3. 9-17 . In this way. The HQ has requirements of communicating with each branch and accessing the Internet. Branch A and Branch B do not have business with each other. and has Branch B in City 1 and City 2. Ltd. and City 3. Hence. The U2000 supports the following functions associated with E-LAN services on a per-NE basis: l Create E-LAN services that are carried on port l Create E-LAN services that are carried on PWs l Create E-LAN services that are carried on QinQ links l Configure QoS policies for L2VPN services and corresponding PWs during the creation of L2VPN services l Configure the V-UNI and NNI interfaces of an E-LAN service l Configure the split horizon group of an E-LAN service l Configure the V-UNI group l Configure the MAC address learning parameters l Configure the unknown frame processing mode l Configure the static MAC address Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. You can configure the service mirroring as follows: l Local service mirroring l Remote service mirroring MPLS OAM Configuration MPLS OAM is an OAM function of the MPLS network. maintenance associations (MAs). and maintenance intermediate points (MIPs) l Perform a CC check l Perform an LB check l Perform an LT check Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. this function does not affect services carried by the link.. The MPLS OAM scheme can effectively detect a defect inside the network at the MPLS layer.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management l Disable an MAC address l Configure the self-learning of MAC addresses l Select the tunnel where a PW is carried online Service Mirroring Configuration In service mirroring. the normal service is scarcely affected when packets of the mirrored service are captured and analyzed. and then report and handle the defect. The OAM packet is handled only at the MAC layer. the OAM protocol occupies very low network bandwidth. the MPLS OAM triggers a protection switching. Issue 05 (2010-11-19) . When a fault occurs. The Ethernet service OAM checks an Ethernet link by sending OAM packets. This function can check the quality of Ethernet links that pass through multiple NEs. Hence. As a low rate protocol. Ltd. The U2000 provides the following Ethernet service OAM functions: 9-18 l Create maintenance domains (MDs). In this manner. all packets that enter a certain port are duplicated and then duplicated packets are transmitted through an observation port. This function can check the quality of LSPs in an MPLS network. maintenance end points (MEPs). The U2000 provides the following MPLS OAM functions: l Configure MPLS OAM parameters of a tunnel l Perform CV/FFD check l Perform LSP ping check l Perform PW ping check l Perform LSP traceroute check l Perform PW traceroute check l Enable and disable FDI Ethernet Service OAM Configuration Ethernet service OAM is an end-to-end OAM function for services. iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management Ethernet Port OAM Configuration The Ethernet port OAM is mainly used to automatically check the connectivity and performance and locate the faults of the physical links. The ATM OAM function checks an ATM link by inserting some OAM cells of the standard cell structure into the user cell flow. such as ATM. This function can check the quality of ATM links that pass through multiple NEs. the relevant license is required. The U2000 provides the following ATM OAM functions: l Set segment end attributes l Perform CC activation tests l Perform remote loopbacks l Settin the LLID l Configure ATM alarm transmission NMS Server Configuration After the IP address of the NMS is configured on the gateway NE.2 E2E PTN Management E2E network management is also referred to as trail management. l Implement the function of automatically discovering PWE3 services. l Predeploys PWE3 services. l Manage PWE3 services.. It is applicable when the physical Ethernet ports are directly connected. which means the trail-based configuration of network management data. The trail-based configuration can be performed by searching for the NE-layer data on the U2000 or by configuring the network-layer data on the U2000. and view PWE3 services by using the filtering function. l Modify and delete PWE3 services. CES. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and Ethernet services. Compared with the NE-based configuration. 9-19 . The U2000 provides the following Ethernet port OAM functions: l Configure OAM parameters l Configure the OAM error frame monitoring l Query the remote OAM parameters ATM OAM Configuration ATM OAM is an end-to-end OAM function for ATM services. the configuration is delivered to all associated NEs. To perform E2E network management on the U2000. PWE3 Service Management You can perform the following operations on the U2000: l Create PWE3 services of multiple types. 9. Then. all the managed non-gateway NEs can automatically go online after being powered on. Ltd. the trail-based configuration is easier. l Set and view the status of port loopback at the node of VPLS services. Ltd. l Manage VPLS services based on authority. l View the performance events of PWE3 services. l Create a monitoring instance for a VPLS service. l Set and view the status of port loopback at the node of PWE3 services. L3VPN Service Management You can perform the following operations on the U2000: 9-20 l Create an L3VPN service that supports the BGP/MPLS protocol. l View the topology of VPLS services.. l Manage VPLS services. l View the performance events of VPLS services. l Manage discrete PWE3 services. l Modify and delete L3VPN services. l View the alarms of PWE3 services. l View the alarms of an L3VPN service. l Manage PWE3 services based on authority. Issue 05 (2010-11-19) . l Clone PWE3 services. l Manage discrete VPLS services. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Manage PWE3 service templates.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management l Implement the protection management of PWE3 services. and view VPLS services by using the filtering function. l View the topology of PWE3 services. l Create a monitoring instance for a PWE3 service. l View the topology of L3VPN services. l Test and check PWE3 services. and view L3VPN services by using the filtering function. l Implement the function of automatically generating Ethernet OAM for VPLS services. l View the alarms of VPLS services. l Manage VPLS service templates. l Implement the function of automatically discovering L3VPN services. l Implement the function of automatically discovering VPLS services. l Predeploy an L3VPN service. VPLS Service Management You can perform the following operations on the U2000: l Create VPLS services. l Modify and delete VPLS services. l Test and check VPLS services. l Implement the function of automatically generating Ethernet OAM for PWE3 services. l Predeploy VPLS services. . l Manage L3VPN service templates. l Set and view the status of port loopback at the node of L3VPN services.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management l View the performance events of an L3VPN service. l Display the name of a tunnel in the global LSP view. and IP tunnels. l Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection groups. l Implement the protection management of IP line service. l Predeploy an IP line service. l Manage discrete L3VPN services. l Manage static CR. 9-21 . l Create a tunnel and its protection tunnel at the same time. LDP. l Set and view the status of port loopback at the node of tunnel. l Manage discrete tunnels. RSVP. l Create RSVP and LDP tunnels in batches. Tunnel Management You can perform the following operations on the U2000: l Create static CR. including the working and protection routes. l Implement the function of automatically discovering tunnels. Ltd. IP Line Service Management You can perform the following operations on the U2000: l Create an IP line service. RSVP. l Manage L3VPN services based on authority. l View the topology of tunnels. l Create. l Modify and delete a tunnel. and IP tunnels. modify. l Test and check a tunnel. and delete 1+1 or 1:1 tunnel protection groups. l Implement the function of automatically discovering IP line services. l Configure OAM. l Predeploy a tunnel. l Manage the bidirectional static CR tunnels. and view tunnels by using the filtering function. LDP. l Configure OAM. l View the alarms of a tunnel. and implement the function of automatically discovering 1+1 or 1:1 tunnel protection groups. l Create a monitoring instance for a tunnel. l Create a monitoring instance for a L3VPN service. l Configure the VRRP. l Test and check L3VPN services. l View the performance events of a tunnel. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Switch services in a 1+1 or 1:1 tunnel protection group manually. l View the alarms of an IP line service. including the internal connections between the services. deleting nodes. l Set and view the status of port loopback at the node of IP line services. l Implement the function of automatically discovering composite services. l Manage IP line services based on rights and domains. l Create and delete active and pre-configured services in cutover groups. and upgrading or adjusting link capacities.. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Prepare a manual or scheduled service cutover plan. PTN Network Expansion and Service Cutover Management You can perform the following operations on the U2000: 9-22 l Expand a PTN by adding nodes. l Prepare a service cutover plan by using either the rollback cutover policy or the best-effort cutover policy. l Test and check an IP line service. Ltd. l Display the status of composite services. and view composite services by using the filtering function. restore. Issue 05 (2010-11-19) . l Modify and delete composite services. l Hand over.iManager U2000 Unified Network Management System Product Description 9 PTN Network Feature Management l Modify and delete IP line services. l View the performance events of an IP line service. l View the topology of IP line services. and view IP line services by using the filtering function. l Create and modify cutover groups and cutover plans. and verify the trails of cutover groups in batches. Composite Service Management You can perform the following operations on the U2000: l Manage PWE3 access into PWE3 and PWE3 access into E-AGGR services. and delete cutover groups and cutover plans in batches. l Implement the cutover of PWE3 trails. l View the topology of composite services. 1 Router Management Router management allows you to configure and maintain routers by means of the GUI. 10. reducing the costs in device deployment and increasing the efficiency of device deployment.4 Switch Management Switch management allows you to configure and maintain switches by means of the GUI. Automatic NE configuration management allows you to deploy and remotely debug case-shaped routers. 10. 10.2 Router V8 Management Router V8 management allows you to view NE configurations by means of GUIs. 10. 10.8 Node Redounded Management Enhanced-Trunk (E-Trunk). is a protocol that controls and implements link aggregation among multiple sets of Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 10.7 Cluster Management The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of automatic management operations and centralized management for multiple dispersed low-end and mid-range switches. 10. The template management function is introduced to solve this problem. developed on the basis of Link Aggregation Control Protocol (LACP). This function allows you to rapidly configure NEs in batches.iManager U2000 Unified Network Management System Product Description 10 10 Router Feature and Switch Feature Management Router Feature and Switch Feature Management About This Chapter This topic describes router features and switch features.5 Template Management In NE configuration management.6 Diagnosis Management Diagnosis management provides easy-to-use diagnostic functions for you to test network and service connectivity. Diagnostic cases can be run manually or run automatically at scheduled times.3 Automatic NE Configuration Management Automatic NE configuration management is implemented by means of DHCP on the U2000. 10. many operations need to be performed repeatedly. 10-1 . Ltd.. E-Trunk can be used to protect the PEs and the links between the CE and PEs. 10. Ltd. and optimize network performance. 10. VLL. and service diagnosis. BGP/MPLS VPN service. namely.11 Tunnel Service Management Tunnel service management is used to plan and deploy services on the entire MPLS network. audit. Carriers can plan. including service deployment.. thus reducing the costs of operating and maintaining MPLS networks. and manage reports based on the Web and helps you to monitor. VPLS service. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS.9 Report Subsystem Management The report subsystem allows you to generate. In the scenario. or PWE3 network. 10-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.10 VPN Service Management The U2000 provides centralized and unified management. deploy. analyze. and monitor end-to-end LSPs through tunnel service management. and PWE3 service. Issue 05 (2010-11-19) . on VPN services.10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description equipment. service monitoring. 10. distribute. .1ag and IEEE 802.1ag. l Information about components can be refreshed and component status can be monitored. including frames. fans. MAC address learning rules. and virtual template (VT) interfaces LLDP Management LLDP can be globally configured or on interfaces. Device Management Device types and software versions can be automatically identified and differentiated management can be performed accordingly. the U2000 can monitor user services of the last mile and report faults by means of IEEE 802. and ports. power supplies. fans. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. VLAN stacking. loopback interfaces. and VLAN mapping. can be displayed. Interface Management The following interfaces can be configured: l Ethernet interfaces l POS interfaces l Virtual interfaces such as subinterfaces. port VLAN. Ethernet Features Management l VLAN functions.iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management 10. Ethernet OAM Management OAM is implemented on the basis of two standards: IEEE 802. 10-3 . trunk interfaces. including frames. and ports can be automatically obtained. boards. can be configured.3ah. boards. l The VLAN switch feature is supported. Clock Management Physical clocks and PTP clocks can be configured and managed. Ltd.3ah. including global VLAN. and MAC address aging. l MAC address forwarding can be managed by configuring static MAC addresses. power supplies.1 Router Management Router management allows you to configure and maintain routers by means of the GUI. Component Management l Information about components. Panel Management Information about components on panels. and identify and locate faults by means of IEEE 802. The U2000 can continuously monitor user services. and HQoS user scheduling Route Management Static routes. link trace. HQoS scheduler. Issue 05 (2010-11-19) . MA. such as the configurations of the MD.3ah-related functions. MPLS Management The following NE-level MPLS configurations are supported: l MPLS-related protocols l MPLS TE tunnel l MPLS interface parameters l Static LSPs l MPLS OAM detection and protection groups ACL Management ACLs-based access control is supported.. querying ports. Channel Management The following channels can be configured and managed: l VTYs l Telnet and FTP services l Syslog parameters l Alarms l SSH services l NAP services QoS Management The following QoS functions are supported: l Traffic classifications. routing information.10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description Ethernet OAM management supports the following functions: l Manages global information. HQoS flow queue mapping. and traffic policies l Interface QoS and system QoS l DS domain policies l Traffic mirroring and port mirroring l HQoS. OSPF routes. such as Ethernet OAM configurations. MAC ping. and MIP. traffic behaviors. l Supports IEEE 802. and diagnostic operations (including loopback. l Supports IEEE 802. and BGP/IS-IS public network and private network routes can be configured. remote MEP. and loopback detection. Ltd. and MAC trace). including the discard policy.1ag-related functions. 10-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. local MEP. HQoS flow queue policy. routing policies. iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management BRAS Management The following broadband remote access service (BRAS) features of multi-service gateways are supported: l Address pool management l Authorization. VPN Management The following VPN management functions are supported: l Tunnel policies l PWs l PW templates l VSIs l VRFs MSE Management MSE functions. are supported. including global VRRP attributes. and VGMP alarms. user management. are supported. BFD Management The following BFD functions are supported: l BFD attributes l BFD sessions l BFD alarms l BFD for VRF/PW/MPLS TE/VSI/physical links VRRP/VGMP Management l Virtual Router Redundancy Protocol (VRRP) configurations. l VRRP Group Management Protocol (VGMP) configurations. and device IP addresses VPDN Management The Layer-2 Tunneling Protocol (L2TP) can be configured on multi-service gateways and L2TP tunnels can be managed. interface attributes. IP address segments. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 10-5 . including global VGMP attributes. and interface services. and VRRP alarms. authentication and accounting (AAA) management l Domain and Point-to-Point Protocol (PPP) management l Built-in Web server management l Layer 3 Internet Service Provider (ISP) configuration management l Portal server management l VLAN management l User management l Real-time statistics collection on domains.. are supported. Ltd. AAA. including global MSE. and interface VR. VGMP members. 10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description Layer 3 Multicast Management The following Layer 3 multicast functions are supported: l Manage routers l Manage IGMP l Manage PIM l Manage MSDP l Manage L3VPN RP Layer 2 Multicast Management The following VSI-based Layer 2 multicast functions are supported for routers: l IGMP snooping l SSM mapping l Multicast CAC l Multicast groups E-Trunk Management The E-trunk search and discovery. CLI grammar check. navigation paths are supported. E-trunk member management. ANCP Management The following ANCP features are supported for routers: l ANCP management l ANCP global configuration l Line management l Neighbor management 10. template configuration. Smart Configuration Tool The Smart Configuration Tool (SCT) can import the routers managed by the U2000. Device Management NE software versions can be automatically identified. and trunk member monitoring are supported. 10-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. E-trunk configuration. Ltd.. The SCT can issue configurations in batches and can be integrated with the U2000. Issue 05 (2010-11-19) .2 Router V8 Management Router V8 management allows you to view NE configurations by means of GUIs. and IS-IS l Security. including Ethernet and trunk interfaces l Channels. Ltd. including L2VPN and L3VPN l QoS l Interfaces. Function The detailed functions are as follows: l Manages planned records The functions of managing configuration data. NE Management The following functions can be configured and information about these functions can be displayed: l Routing protocols. boards. l Real-time performance data and historical performance data can be displayed. subboards. l Manages configuration data. l Assigns NE IP addresses automatically. and ports on the NE panel can be displayed. l Changes management IP addresses. including AAA and attack defense l MPLS l VPN. l Information about alarms can be displayed. OSPF.iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management Panel Management l Information about components such as frames. and NETCONF channels 10. l Views script application results. 10-7 . Automatic NE configuration management supports the following functions: l Starts or stops the DHCP server. fans. Telnet. Automatic NE configuration management uses the C/S model. including SNMP. reducing the costs in device deployment and increasing the efficiency of device deployment. l Showing alarms using alarm indicators on the NE panel.3 Automatic NE Configuration Management Automatic NE configuration management is implemented by means of DHCP on the U2000. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. l Upgrades NE versions. in which the NEs serve as the DHCP clients and the U2000 serves as the DHCP server to remotely deploy and commission NEs. including BGP. l Modifies and applies NE scripts. power supplies. Automatic NE configuration management allows you to deploy and remotely debug case-shaped routers. creating a data record and importing data records in batches are provided. Component Management l Information about components. power supplies. loopback interfaces. power supplies. including frames. l Information about components can be refreshed and component status can be monitored. trunk interfaces. fans. Ltd. fans. l Manages scripts The function of managing device scripts on the U2000 is provided for automatically deploying device configurations. and ports. LLDP Management LLDP can be globally configured or on interfaces. l Upgrades system versions remotely The function of remotely upgrading device versions is provided.10 Router Feature and Switch Feature Management l iManager U2000 Unified Network Management System Product Description Manages DHCP servers The function of automatically assigning IP addresses to NEs is supported when the DHCP server function is enabled. l Monitors task status during automatic device deployment The function of monitoring task status during automatic device deployment is provided. Both automatic and manual upgrade modes are available. Device Management Device types and software versions can be automatically identified and differentiated management can be performed accordingly. Issue 05 (2010-11-19) . and ports can be automatically obtained. and Tunnel interfaces Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.4 Switch Management Switch management allows you to configure and maintain switches by means of the GUI.. 10. including frames. Panel Management Information about components on panels. l Deploys device scripts remotely The function of remotely deploying device scripts is provided. boards. boards. Both automatic and manual deployment modes are available. can be displayed. Interface Management The following interfaces can be configured: 10-8 l Ethernet interfaces l POS interfaces l Virtual interfaces such as subinterfaces. local MEP. l VRRP Group Management Protocol (VGMP) configurations. querying ports.3ah. VCT.1ag and IEEE 802. MPLS Management The following NE-level MPLS configurations are supported: l MPLS-related protocols l MPLS TE tunnel l MPLS interface parameters l Static LSPs l MPLS OAM detection and protection groups BFD Management The following BFD functions are supported: l BFD attributes l BFD sessions l BFD alarms l BFD for VRF/PW/MPLS TE/VSI/physical links VRRP/VGMP Management l Virtual Router Redundancy Protocol (VRRP) configurations. the U2000 can monitor user services of the last mile and report faults by means of IEEE 802. and BGP routes can be configured. interface attributes. l Supports IEEE 802. and MIP. and VRRP alarms. including global VRRP attributes. 10-9 . VGMP members. are supported. and MAC trace). routing policies. remote MEP. IS-IS routes. and identify and locate faults by means of IEEE 802. Route Management Static routes. OSPF routes. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. are supported. such as the configurations of the MD.1ag-related functions. l Supports IEEE 802. such as Ethernet OAM configurations.1ag. and VLAN switch features are supported.3ah-related functions. OAM Management OAM is implemented on the basis of two standards: IEEE 802. Ethernet OAM management supports the following functions: l Manages global information.3ah. including global VGMP attributes. MAC ping.. and diagnostic operations (including loopback. Ltd. and loopback detection. and VGMP alarms. MA.iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management Ethernet Features Management The VLAN. The U2000 can continuously monitor user services. and interface VR. link trace. Mirroring Management Local/remote interface mirroring.10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description VPN Management The following VPN functions are supported: l Tunnel policies l PWs l PW templates l VSIs l VRFs EPON Management PON interface management and ONU management are supported. VLAN mirroring. Issue 05 (2010-11-19) . and DHCP statistics are supported. and interface filtering are supported. MAC address mirroring.. 10-10 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Web Authentication Management The Web authentication server is supported. and CPU buffer statistics are supported. client addresses. and statistics collection are supported. flow mirroring. Controllable Multicast Management Multicast group. MSTP protection. DHCP relay. MSTP Management MSTP domains. multicast template. DHCP Management DHCP servers. Channel Management The following channels can be configured and managed: l VTYs l FTP services l Local users l Syslog parameters l Alarm services l SSH services l SNMP parameters DLDP Management The Device Link Detection Protocol (DLDP). CPU mirroring. and statistics collection are supported. Ltd. packet authentication mode. MFF servers. DHCP Snooping Management Alarms on spoofing attacks. PPPoE+ Management PPPoE+ functions are supported. Interface Security Management Ethernet interface security management is supported. lease-extending packet attacks. and clearance of dynamic configurations are supported. Ltd. AAA and User Management AAA and user management are supported. MFF Management Static gateways. MAC Address Authentication Management MAC address authentication is supported.iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management IP Source Guard Management Static user binding table. and MFF network-side interfaces are supported. 10-11 . Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. dynamic check. blacklists. Traffic Suppression Management Traffic suppression is supported on Ethernet interfaces. and packet discarding are supported. IP Source Trail Management Attack source search and URPF are supported. and CAR are supported. user-defined flow. DoS attacks. ARP Management Proxy ARP and ARP Ping-IP are supported. Anti-attack Management Whitelists. NAT Network address translation (NAT) is supported. Firewall Management Firewall functions are supported.. packet sending rate. 1x management is supported. Smart Link Management Smart Link groups.10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description MBGP Management Route advertisement policies. PIM-SM Management Multicast sources. 802. multicast forwarding. 10-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Multicast Route Management Static multicast routes. data flow policies for Smart Link groups. and route attributes are supported. multicast neighbors. dynamic RP. IGMP Management IGMP groups. IGMP Snooping Management Static router interfaces. Layer 2 Multicast Management Layer 2 multicast and multicast VLAN replication are supported. multicast policies. RRPP rings. and IGMP snooping are supported. and IGMP proxy are supported. and SPT switching are supported. IGMP group policies. multicast route policies.1x Management 802. Ltd. and Monitor Link groups are supported. RRPP Management RRPP.. Batch VLAN Management Managing VLANs in batches is supported. Issue 05 (2010-11-19) . multicast neighbors. and working mode are supported. RRPP instances. route exchange policies. and assertion management are supported. and multicast forwarding are supported. MSDP Management MSDP peers and SA messages are supported. and IGMP features are supported. prompt leave. IGMP Proxy Management Static router interfaces. multicast policies. PIM-DM Management Multicast sources. When a template is referenced. A template has the following features: l Issue 05 (2010-11-19) Offline configuration Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management Port Isolation Configuration Port isolation is supported. and traffic policies l Interface QoS and system QoS l DS domain policies l Traffic mirroring and port mirroring VLANIF Configuration VLAN interfaces are supported. NAT. 10-13 . QoS Management The following QoS functions are supported: l Traffic classifications. MAC tables. Template Features Default templates are available. traffic behaviors. BPDU tunnels. Basic Configuration NAP remote deployment is supported. many operations need to be performed repeatedly. Ltd. This function allows you to rapidly configure NEs in batches. and SEP are supported. 10. Stack Configuration Stack functions are supported. Security Configuration The ACL. firewall. the attribute settings on the template automatically apply to the configured resource. PoE Configuration PoE is supported.5 Template Management In NE configuration management. Ethernet Configuration LDT.. and ARP features are supported. The template management function is introduced to solve this problem. 6 Diagnosis Management Diagnosis management provides easy-to-use diagnostic functions for you to test network and service connectivity.10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description Global templates are created in advance and saved on the U2000. The creation of global templates is irrelevant to the equipment status. 10. and NE interfaces to adjust and configure multicast CAC configurations in batches – Layer 2 static multicast group templates.. 10-14 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Global validity A global template can be referenced by all the devices managed by the U2000. which can be applied to NE interfaces in batches: – CBQoS templates – DS domain templates – HQoS templates – PQ templates – Interface CAR templates l IP multicast template Routers support the following IP multicast templates: – Layer 2 CAC templates. which can be applied to PWs and NE interfaces to adjust and configure static multicast groups in batches l VPN service template Used to configure VPN services in batches. the U2000 does not add a record of template data. – When a device references a global template. They are not created on devices. l Minimal duplicate data – After a global template is applied. the U2000 keeps only one record on the devices that reference this template. Issue 05 (2010-11-19) . is small. The number of global templates. therefore. l A global template can be referenced by a large number of devices of the same type. which can be applied to VSIs. Ltd. global templates are easy to manage. Consequently. PWs. Diagnostic cases can be run manually or run automatically at scheduled times. simplifying attack defense configurations on the network access side. l QoS template Routers support the following QoS templates. l Switch EPON template Used to configure ONU services in batches. Main Templates The main templates are as follows: l ACL template An ACL template allows you to configure ACLs on multiple interfaces of different routers at the same time. The U2000 only records the reference relationship between the device and the template. A result analysis template can be customized to include diagnostic indicators such as delay. ICMP ping/traceroute. l Network scanning Network information is collected and virtual link connectivity and side-by-side link connectivity are tested. and ICMP VRF ping/traceroute. multicast VRF trace. such as daily. and VoIP – Transport layer TCP and UDP – Network layer ICMP ping/traceroute. l Issue 05 (2010-11-19) Historical data Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. such as delay. network layer. A test diagnostic tool consists of the following parts: l Test suite – A test suite consists of multiple test cases. LSP ping. ICMP jitter. such as VPLS MAC ping/traceroute. By diagnosing services layer by layer. and packet loss ratio. PWE3 ping/traceroute.. – You can choose to perform all test cases or only some cases in a test suite at the same time. jitter. QoS can be determined based on the parameters shown in the test results. Test cases for MPLS services can also be created. and MTU ping – Data link layer 8021. FTP. MFIB ping.ag MAC ping and CE ping – MPLS service PWE3 ping. l The U2000 allows you to combine several test cases into a test suite. jitter. or monthly. ICMP VRF ping/traceroute. LSP ping/traceroute. Test cases are implemented on different layers: the application layer. VPLS MAC ping.iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management Test Diagnosis Functions l The U2000 provides test cases. 10-15 . so that you can perform test cases in batches. Ltd. VPLS MAC trace. the U2000 can rapidly locate the network layer where a fault occurs. LSP trace. It also provides the traceroute function to locate faults. weekly. The U2000 displays scanning progress in real time and allows you to stop the scanning. and service ping l The U2000 supports intelligent diagnostic result analysis. HTTP. and packet loss ratio and a result analysis policy based on service levels. MAC study. transport layer. – Application layer DNS. Test Diagnosis Management Test diagnosis management allows you to test network connectivity and QoS and rapidly pinpoint a fault location. l Diagnostic policy Test suites can be performed at a specified interval. SNMP. multicast ping/trace. PWE3 trace. and data link layer. DHCP. Diagnostic result analysis can help you rapidly determine network status. which can help you to test network connectivity at each protocol layer. the U2000 meets the ever-increasing service requests. or test time. Cluster network management involves the following functions: l Managing cluster views l Configuring clusters l Managing cluster configuration files l Managing image programs l Locating cluster faults The U2000 provides cluster management for the CX200/CX200D/CX300/CX380/CX600/ S2300/S3300/S5300. test results. It supports filtering and querying historical data based on test suite names. Issue 05 (2010-11-19) . jitter. you can monitor the network status through the physical topology of cluster networks and reduce improper operations on single equipment during management. Diagnostic result analysis can help you rapidly determine network status.10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description The U2000 records historical data of test suite operations. Figure 10-1 and Figure 10-2 show the cluster topology management window and functions provided by theU2000. Therefore. Ltd. A result analysis template can be customized to include diagnostic indicators such as delay. 10. l Diagnostic result analysis The U2000 supports intelligent diagnostic result analysis. and packet loss ratio and a result analysis policy based on service levels.7 Cluster Management The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of automatic management operations and centralized management for multiple dispersed low-end and mid-range switches. This function allows you to manage network equipment in a more convenient and efficient manner. Figure 10-1 Cluster topology 10-16 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. With this function. 10-17 . for the switches of a cluster l Supporting the plug-and-play feature of protocols such as NDP. This function allows you to perform the following operations: l Creat an E-Trunk.8 Node Redounded Management Enhanced-Trunk (E-Trunk). and HGMP l Supporting the access to command or member switches through Telnet based on the nodes in the cluster view 10. Ltd. such as the management VLAN. NTDP. In the scenario. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. or PWE3 network.iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management Figure 10-2 Navigation path to cluster functions The U2000 provides the following functions: l Automatically discovering and dynamically refreshing cluster equipment nodes l Automatically discovering and dynamically refreshing the physical topology of cluster networks and links l Managing the configurations of cluster equipment in batches and in a unified and centralized manner l Maintaining the equipment of a cluster in a centralized manner and supporting fault detection and recovery l Facilitating the backup and recovery of configuration data l Setting the parameters. and configure the attributes of the E-Trunk and the Eth-Trunks. VLL. is a protocol that controls and implements link aggregation among multiple sets of equipment. and multicast MAC address. the configuration of the equipment and the E-Trunk group can be automatically discovered. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS. l Automatically discover the E-Trunk by user specify the equipment range. IP address pool. bind Eth-Trunks. E-Trunk can be used to protect the PEs and the links between the CE and PEs. l Display the automatically discovered E-Trunk information in the database of the NMS to the interface of the NMS. developed on the basis of Link Aggregation Control Protocol (LACP).. the ME60 forwards packets according to the ISP information of the users and forwards all the packets from the users to the access server of the ISP. Generally. the ME60 forwards all the user service packets of a certain ISP to the access server of the ISP through VPNs. and binding customers to VPN services. analyze. the providers who construct physical networks are called network service providers (NSPs) and the providers who lease physical networks to operate services are called ISPs. namely. on VPN services. The multi-ISP service is also called the virtual ISP service. Issue 05 (2010-11-19) . and manage reports based on the Web and helps you to monitor. the ME60 does not forward packets according to the destination IP addresses of the packets as it usually does. 10.10 VPN Service Management The U2000 provides centralized and unified management. – With the service wholesale feature. and Extranet – Configuring VPN FRR and IP FRR for L3VPNs and binding L3VPNs to TE tunnels – Configuring static. OSPF. The access server of the ISP then implements the related services or performs service accounting. The parameters of multiple sets of equipment can be automatically generated through related service templates.. service monitoring. l BGP/MPLS VPN service management – Configuring L3VPNs in networking modes such as Full-Mesh. It can be easily integrated with the security management module of the U2000. and BGP private routes – Configuring VPN services in inter-AS OptionA or inter-AS OptionB mode – Configuring the service wholesale feature of BGP/MPLS VPNs based on the ME60 l In service wholesale mode. BGP/MPLS VPN service. and modifying customers. l Customer management The U2000 supports the operations of adding. Ltd. User configuration results can be previewed through the topology before being delivered. refer to the iManager U2000 (RPT)V100R002C01 Release Notes.10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description 10. Hub-Spoke.9 Report Subsystem Management The report subsystem allows you to generate. Service Deployment The U2000 provides a user-friendly service configuration GUI on which you can complete all configuration operations. and PWE3 service. VPLS service. These ISPs lease the physical network of the physical network provider to operate services. and service diagnosis. For more information. The report subsystem can generate reports in both manual and automatic modes. distribute. Instead. the U2000 can support the multi-ISP service. including service deployment. and optimize network performance. 10-18 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. multiple ISPs exist on a physical network. – In this mode. deleting. For a multi-ISP service. thus helping you to quickly locate faults. and displaying the error information. IWF. 10-19 . Service Monitoring l The U2000 provides the visual topology display function for MPLS VPN. and heterogeneous interworking mode – Backing up PW configurations – Configuring PW FRR l Composite service management The U2000 supports the management on composite services. Ltd. The diagnosis results can be directly displayed. without requiring much user participation. VPLS. you can generate diagnosis tasks according to the selected services and directly operate equipment nodes in topology views. ATM. Automatic Service Discovery The U2000 provides the function of automatically discovering BGP/MPLS VPN. such as the access of a VLL to another VLL. Ethernet.iManager U2000 Unified Network Management System Product Description 10 Router Feature and Switch Feature Management – The ME60 supports the multi-ISP service by wholesaling the user service packets of different ISPs to related ISPs. the access of a VLL to an L3VPN. Service Diagnosis l The diagnosis tools are used to detect the connectivity of networks and locate faults. VPLS. and PWE3 services. such as an interface. Through the service diagnosis function. can be displayed in the related topology view. For example. you can place the services of key customers in one topology view for monitoring. Service Check and Test l Configuration check: checking the consistency of VPN service configurations on different sites and showing the positions of configuration errors l Service connectivity test: testing the service connectivity through the ping and tracert tests. and inter-AS OptionA. a VRF. In addition. and PWE3 services that are running on the managed network. the U2000 can quickly load services on the current network to itself for unified management and monitoring. and locating the fault equipment l Protocol status test: checking the service protocol status and the forwarding table.. l VPLS service management – Supporting the VPLS services in LDP signaling (Martini) mode – Supporting the interworking of different VSIs – Supporting VLL/VPLS services l PWE3 service management – Configuring static and dynamic PWE3 services – Supporting PWE3 services in CES. l You can quickly locate a faulty service based on the alarm generated by the related NE. or a VSI. L3VPN multi-VRF. thereby helping you to locate faults Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The running status of the resources used by the current service. the access of a VLL to a VPLS network. Moreover. the U2000 also allows you to customize topology views. such as static. and monitoring of related alarms Automatic Tunnel Discovery With the help of a network administrator. and monitor end-to-end LSPs through tunnel service management. Ltd. Moreover. and their alarms in the topology view l Collecting and displaying the performance data of tunnels l Switching to the related tunnel from an alarm Tunnel Diagnosis The U2000 supports LSP ping and LSP tracert functions through which you can diagnose deployed MPLS TE tunnels and static tunnel services.10 Router Feature and Switch Feature Management iManager U2000 Unified Network Management System Product Description 10. audit. RSVP. thus reducing the costs of operating and maintaining MPLS networks. the LSPs and related protection groups that are previously deployed on the network can be restored to the U2000. 10-20 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Tunnel Deployment l Enabling MPLS. LDP.11 Tunnel Service Management Tunnel service management is used to plan and deploy services on the entire MPLS network. configuration of MPLS OAM detection. LDP. Tunnel Monitoring l Supporting the networkwide tunnel view and displaying multiple types of tunnels. less time of the network administrator is required and the impact of incorrect operations on original services is prevented. deploy. This satisfies the requirement in the special case where the LSP deployment is prior to the U2000 installation. and MPLS TE on the network equipment and interfaces in batches l Implement the planning of traffic on MPLS core networks by supporting the deployment of end-to-end MPLS TE tunnel services l Facilitating the implementation of the MPLS access scheme by supporting the deployment of static LSP services l Implementing the end-to-end MPLS OAM protection by supporting the configuration of end-to-end MPLS TE protection groups. and IP tunnels. Carriers can plan.. Issue 05 (2010-11-19) . 4 Report Subsystem Management The report subsystem provides a complete set of convenient services. 11.2 Single-Point Web Configuration for Security Devices Single-point Web configuration integrates the existing Web functions on the device by embedding browser controls in the Client/Server interfaces. The powerful report subsystem can help you to monitor.5 VPN Service Management The VPN service management module is an important part to implement the IPSec VPN/L2TP VPN solution.1 Security Device Management Security device management allows you to configure and maintain security devices by means of the GUI. 11. analyze. 11. and plan network performance. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and manage reports based on the Web. Single-point configuration applies to all the configurations of security devices. 11. it provides an integrated and comprehensive network security management solution. In collaboration with centralized security policy configuration. Ltd. 11.. It is used to configure and monitor IPSec and L2TP VPN service. It allows you to generate. improve.iManager U2000 Unified Network Management System Product Description 11 11 Feature Management for Security Devices Feature Management for Security Devices About This Chapter This topic describes the features supported by security devices. distribute.3 Centralized Security Policy Configuration Deploying a set of security devices with comprehensive security technologies on a network does not mean that the network is well secured. 11-1 . boards. can be displayed. l Interface management General interface information and Ethernet interfaces can be configured. l GTP management Security devices can filter GTP packets according to GTP policies to protect GPRS networks from attacks such as GTP overbilling attacks. Ltd. The single-point Web configuration includes two parts: Web proxy and Web browser. SNMP parameters. it provides an integrated and comprehensive network security management solution. It can be implemented without affecting local browsers such as Internet Explorer and Firefox. fans.2 Single-Point Web Configuration for Security Devices Single-point Web configuration integrates the existing Web functions on the device by embedding browser controls in the Client/Server interfaces. power supplies. l Component management – Information about device components. In collaboration with centralized security policy configuration. Security device management supports the following functions: l Device management – Identifies software versions and adapt to different types of devices automatically.11 Feature Management for Security Devices iManager U2000 Unified Network Management System Product Description 11. l Users can log in to the Web window automatically. The Web features of security devices provide easy-to-use Web configuration windows through which users can operate and maintain devices. l Automatic registration The U2000 can automatically update the IP address of a receiving device based on registration messages sent by the receiving device. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Panel management Information about components on the panel.1 Security Device Management Security device management allows you to configure and maintain security devices by means of the GUI.. fans. Issue 05 (2010-11-19) . 11. and ports. – Information about device components can be refreshed and device component status can be monitored. – Supports channel management. The functions of single-point Web configuration are as follows: 11-2 l Users can open the Web management window of a device on a U2000 client. Single-point configuration applies to all the configurations of security devices. power supplies. including frames. including frames. and ports can be automatically obtained. including local users using Telnet and STelnet. and trap parameters. The single-point Web configuration is a proxy-based Web access mode. boards. Centralized security policy configuration has the following features: l Policy package management – A policy package can manage all security devices on a network. It is implemented on security devices deployed on the network. and import the configurations of other NEs to this NE. l l Issue 05 (2010-11-19) Security policy configuration and management in two dimensions 1. and verifying configurations. and remove configurations on a single NE. the data consistency between the U2000 and devices must be ensured so that the actual network configurations can be accurately displayed on the U2000. Centralized security policy configuration provides a reliable and stable protection system for a network. Hyper Text Marked Language (HTML). deploying a satisfied security scheme for a small-sized local network is a complicated task. and Applet. attack defense. During network security maintenance. – Policy recovery can restore the security policies and attack defense configurations deployed on devices and the used resources of devices to the U2000. Policy deployment status display Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. such as Java script. Designing and deploying a reliable security scheme for a large-scale network is a more difficult and challenging task.3 Centralized Security Policy Configuration Deploying a set of security devices with comprehensive security technologies on a network does not mean that the network is well secured. l Policy audit Auditing the configuration data difference between the U2000 and devices helps to ensure data consistency between the NEs and the U2000. A policy package consists of security policy. – Users can create their own policy packages.. deploy. create. modify. reducing the cost and improving the efficiency. l Multiple Web protocols. A policy package can include all security configurations such as creating. This allows users to manage and audit services in a unified manner. 11. achieving the data consistency between the NMS and devices. Ltd. and service port mapping. 2. removing. Users can check security configurations. Single NE-dimension configuration: manages the configurations of a single NE. Service-dimension configuration: manages services that are deployed on multiple or all devices on a network.iManager U2000 Unified Network Management System Product Description 11 Feature Management for Security Devices l Users can access security devices by means of the Hyper Text Transfer Protocol (HTTP) or the Hyper Text Transfer Protocol Secure (HTTPS) protocol. deploying.0 are supported. Users do not need to configure and check services on devices separately. l Configuration and management scope – Security policy – Attack defense – Service port mapping – Policy resource l Policy recovery – During network security management and maintenance. and technologies related to Web 2. CSS. 11-3 . undeploy. whether the deployment is successful. Operations on policy packages are recorded in logs for the policy maintenance personnel to monitor and manage policies.period and ports sets. The policy packages verifying function ensures the correctness of policy package configurations and correlations among the policies within the same policy package. l History record query The detailed procedures for configuring and maintaining policy packages are recorded. view the deployment and audit result of policy packages.5 Mapping Service The U2000 It provides the configuration function that re-maps the most common service ports to other ones. 11.3.3. The historical operations that users performed on policy packages can be checked. Issue 05 (2010-11-19) .2 Security Policy Configuration The U2000 allows you to manually create and modify security device rules. delete.3. This helps to prevent duplicate deployment of a policy. you can correctly deploy policy packages on devices and avoid repeated modifications due to configuration errors during policy deployment. so as to determine whether the policy needs to be deployed or discovered. The rights to perform various operations on policy packages are under control.3 Attack Defense Configuration The U2000 provides attack defense functions.3.3.1 Policy Package Management This topic describes the fuction of policy package management. Policy auditing is to audit the policy configuration differences between the NMS and device. modify. Ltd. deploy. this feature increases operation efficiency and reduces maintenance cost. 11. 11. including: 11-4 l Specify the name of a new rule l Select the source security zone Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. discover.addess sets. With the policy verifying function. Policy discovery is to recover the data synchronized to the database to the NMS for management. verify. 11. 11.11 Feature Management for Security Devices iManager U2000 Unified Network Management System Product Description Whether a policy is deployed. 11. By changing operations based on single policies and single devices to centralized operations based on batch policies and multiple devices. This feature allows you to create.3.. and audit policy packages.1 Policy Package Management This topic describes the fuction of policy package management.3.4 Policy Resource Configuration The configuration of policy resources includes the configuration of service.2 Security Policy Configuration The U2000 allows you to manually create and modify security device rules. The U2000 allows you to manually create the device rule. 11. and whether the deployment status is the same as that on the device can be displayed. 3. Ltd. and blacklist for security devices.4 Policy Resource Configuration The configuration of policy resources includes the configuration of service. l Configuring services. 11.. This feature provides attack defense functions against SYN flood. special packet control. UDP flood. the device filters device information according to this rule. or the value of a certain configuration item of a rule.iManager U2000 Unified Network Management System Product Description l Add the source address manually l Select the destination security zone l Add the destination address l Select the service l Select the action l Add the device l Add the time range l Choose whether to generate logs l Configure functions such as ASPF l Configure functions such as DDoS l Configure functions such as package filtering 11 Feature Management for Security Devices After a rule is created and deployed to a device. The U2000 allows you to modify the device rule.addess sets. address set. connection flood. ICMP flood. HTTP get flood. 11. time range.3 Attack Defense Configuration The U2000 provides attack defense functions. 11-5 . malformed packet. and port set – Services Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. including: l Change the name of a rule l Change the source security zone l Change the source address l Change the destination security zone l Change the destination address l Change the service l Change the action l Change the device l Change the time range l Change whether to generate logs l Modify functions such as ASPF l Modify functions such as DDoS l Modify functions such as package filtering The U2000 also allows you to delete a rule. scanning. DNS request flood.period and ports sets.3. 3. 11. – Port set A port set is a collection of single. Issue 05 (2010-11-19) . 11.1 IPSec End-to-End Service The IPSec end-to-end service is to securely connect two intranets trustable to each other through Internet. The powerful report subsystem can help you to monitor. analyze. and manage reports based on the Web. You need to set the start time and end time of a day and specify on which days of a week the rules are valid. The U2000 provides some basic services by default.5 Mapping Service The U2000 It provides the configuration function that re-maps the most common service ports to other ones. Rules are valid only within the time range. Different types of services can form a service group.11 Feature Management for Security Devices iManager U2000 Unified Network Management System Product Description As flexible support for the IP protocol. A period time range is on a weekly cycle. Mapping Service means security devices map the service ports of networking program to outof-ordered ports when forwarding network data packets. It is used to configure and monitor IPSec and L2TP VPN service. – Address set When setting source and destination addresses on the U2000.It implies the most common ports to prevent the outer attack to programs. you can either set single IP addresses or set address sets. Then the rules will take effect on a weekly cycle. 11. The value of a port set ranges from 0 to 65535. l Configuration log server Binary flow logs of devices can be sent to binary servers via configuration of log server. When you log in to the U2000 for the first time. 11.5 VPN Service Management The VPN service management module is an important part to implement the IPSec VPN/L2TP VPN solution. specifying the ports through which the server can provide services.. UDP services. This application mode can be used to protect the sensitive data transmitted on the Internet. the U2000 provides some services by default. In the case where a rule corresponds to multiple services. It allows you to generate.9 Report Subsystem Management lists the details of the report subsystem management. A continuous time range starts from one time point and ends at another time point. continuous. and other services.5. security services can be classified into TCP services. ICMP services. Ltd. It is applied when secure communication connections need to be established. 11-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. You can create different services by adding different parameter settings to the same protocol. or discontinuous port numbers. improve. – Time range Time ranges are classified into two types: continuous time ranges and periodic time ranges.4 Report Subsystem Management The report subsystem provides a complete set of convenient services. 10. distribute. these services can be in a service group or map to these services. and plan network performance. A rule corresponds to one or multiple services. 2 Remote Access Service The U2000 supports the implementation of remote VPN access through L2TP. 11-7 . It is applied when secure communication connections need to be established. The remote access service is applicable to employees accessing the enterprise intranet in remote dial-up mode over the Internet.. Ltd. L2TP over IPSec service and IPSec (IKEv2) service three types. l Service monitoring By monitoring the status of managed services in real time. service statuses. restricting the number of online users. Service deployment is used to make services take effect on devices. and forcing users to log out. L2TP over IPSec service and IPSec (IKEv2) service management can manage and monitor the online users of remote access services. l Service deployment The remote access service management supports the deployment of a single service and the deployment of services in batches.5. This application mode can be used to protect the sensitive data transmitted on the Internet.5. l Display of the service topology This feature provides the function of visualizing the service topology.5. With this function.iManager U2000 Unified Network Management System Product Description 11 Feature Management for Security Devices 11. and service-related device alarms. l Service monitoring The L2TP service. You can view the deployment results through the auditing function. Remote access services include L2TP service. In the topology view. l Service deployment This feature provides both the single service deployment function and the service batch deployment function. you can view deployment results in the service topology view. l Service audit This feature supports to audit the differences of service configuration between the NMS and device.1 IPSec End-to-End Service The IPSec end-to-end service is to securely connect two intranets trustable to each other through Internet. The remote access service is applicable to employees accessing the enterprise intranet in remote dial-up mode over the Internet. It also provides the functions of displaying the statuses of online users in real time. The performance management module monitors the service status and performance indicators and displays collected performance data in graphs or reports. l Issue 05 (2010-11-19) Display of the service topology Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Service discovery This feature supports the function of automatically discovering services. you can view service alarms. IPSec (IKEv2) and L2TP over IPSec technologies. you can discover running IPSec VPN services on the network and then restore the discovered services to the U2000 for unified management and monitoring.2 Remote Access Service The U2000 supports the implementation of remote VPN access through L2TP. the performance management module allows you to view the service status in the topology view. 11. 11. IPSec (IKEv2) and L2TP over IPSec technologies. In addition. service statuses.11 Feature Management for Security Devices iManager U2000 Unified Network Management System Product Description The remote access service management provides the function of visualizing the service topology. Issue 05 (2010-11-19) . l Service resource management The remote access service management provides the function of radius template management and user domain management. and servicerelated device alarms. 11-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. l Service audit The remote access service management supports to audit the differences of service configuration between the NMS and device.. you can view service alarms. In the topology view. iManager U2000 Unified Network Management System Product Description 12 12 FTTx Network Feature Management FTTx Network Feature Management About This Chapter This topic describes the functions and features of FTTx NE management and network management. the U2000 provides graphical user interfaces (GUIs) for configuring NEs and maintaining NE configurations. 12.1 OLT Management For NE configuration management. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. You can configure services for equipment in the GUIs. the U2000 provides graphical user interfaces (GUIs) for configuring NEs and maintaining NE configurations.. 12. Ltd.2 ONU Management For NE configuration management. 12-1 . You can configure services for equipment in the GUIs. l Query inter-shelf links. and device templates. the U2000 provides graphical user interfaces (GUIs) for configuring NEs and maintaining NE configurations. l Query the statistics on the resources and status of devices. l Configure traffic management and rate limitation for GPON boards.. l Collect statistics on device resources. l Perform an active/standby switchover on the control boards. IP address of a device. l Query the details of equipment. Issue 05 (2010-11-19) . Clock Source Management Clock source management includes the management and configuration of equipment-level clock source information. reset. clock sources. NE Panel Management You can perform the following operations on the U2000: l Display the NE panel by double-clicking an NE. l Configure the SNMP protocol port. 12-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Collect the statistics on shelf resources. l Configure the system time. l Query the CPU usage and memory usage of boards in real time. and the binding between a Layer 3 interface and an IP address. You can configure services for equipment in the GUIs.12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description 12. Management of Basic and Common Device Attributes The management of basic and common device attributes includes the query of the global information about devices and the configuration of the global policies of devices. l Enable and disable the energy-conservation function of a device. and clock priorities. basic and common device attributes. l Query the license information about the functions and resources of devices. l Configure rate limitation for EPON boards. l Add. start. l Set device handshake parameters. protocols. Device Management Device management includes the management of NE panels. l Query the information about shelves. security. such as information about the line clock. 1588 clock. Ltd. l Display the port view by double-clicking a board. You can perform the following operations on the U2000: l Query the system information about devices. and confirm a board. l Configure and manage license files. delete. l Configure the policy for automatically backing up device data. disable.1 OLT Management For NE configuration management. traffic template. query timeslots. set a port alias. configure port attributes. Device Template Management Device template management includes the display of different types of device templates on the U2000. VLAN service template.. l Control the Address Resolution Protocol (ARP) proxy. and PW template. Protocol Management You can perform the following operations on the U2000: l Manage the Link Aggregation Control Protocol (LACP). On E1 ports for upstream transmission. anti-MAC spoofing. Spanning Tree Protocol (STP)/ Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP). Network Interface Management Network interface management includes the management and maintenance of E1/T1 ports and the Ethernet port. Bidirectional Forwarding Detection (BFD). Ltd. l Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option (RAIO) customized format. l Control the DHCP proxy and DHCP relay forwarding functions. l Configure 802. you can perform the following operations: configure or delete port attributes. l Enable and disable MAC address learning. Currently. l Configure the security attributes for user login in the CLI. and perform loopback. TDM E1/T1 ports can be used as access ports or upstream ports. 12-3 . GPON.1ag attributes of the Ethernet packet. CES E1/T1 ports. you can collect real-time performance statistics of the ports. xDSL. and Internet Group Management Protocol (IGMP). you can perform only the loopback operation. EPON. IGMP template. and enable or disable services. anti-IP attack. On E1 ports for PRA access. MDU SNMP template. set the alarm threshold of L2 signaling bit errors. the U2000 supports only query and generation of global templates. On CES E1/T1 ports. anti-IP spoofing. depending on the function of a board. Global Configuration of Services The global configuration of services includes the configuration of the VLAN. and anti-DoS attack. and IMA E1/T1 ports. l Control the Dynamic Host Configuration Protocol (DHCP) option 82 function. and multicast services. Management and Maintenance of E1/T1 Ports E1/T1 ports are classified into TDM E1/T1 ports.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management Security Management You can perform the following operations on the U2000: l Enable and disable anti-ICMP attack. QoS. EPON template. Templates include the GPON template. l Set the aging time of an MAC address. optical transceiver alarm template. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. perform this operation. 802. the encapsulation type. and deactivate a service virtual port. l Activate and deactivate an Ethernet port. This ensures the security of user access. the service port assumes the new VLAN ID. If the source MAC address does not match any of the MAC addresses bound to the service virtual port. To specify that only the users with certain IP addresses can access the service virtual port. and port rate limit functions. The service virtual port provides service streams between the user equipment and the OLT for carrying user services. Issue 05 (2010-11-19) . l Configure the extended attributes of a service virtual port. l Collect the real-time performance statistics and clear the performance statistics. add. including the alias. l Bind static MAC addresses to a service virtual port. This ensures the security of user access. l Configure the PPPoE. you can query real-time performance statistics of the ports.. l Configure the connection attributes of a service virtual port. and receive traffic profile. resetting. and the maximum number of MAC addresses that can be bound. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Extended attributes allow for greater flexibility of addressing customer requirements. You can perform the following operations on the U2000: 12-4 l Query. the PPPoE session. the service forwarding module checks the source IP address of user packets. perform the binding operation. the user packets are forwarded. After successful binding. DHCP option 82. l Collect real-time performance statistics and clear the performance statistics. modify. delete. To specify that only the users with certain static MAC addresses can access the service virtual port. l Perform ATM ping tests. delete. deleting. such as adding. the user packets are dropped. Extended attributes include the maximum number of learnable MAC addresses. Otherwise. Connection Management Connection management includes the management of service virtual ports and E1 connections. l Bind IP addresses to a service virtual port and query the bound IP addresses. modifying. the user packets are dropped. You can perform the following operations on the U2000: l Configure port attributes. VPI/VCI.12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description On IMA E1/T1 ports. the user packets are forwarded. l Create. Management of Ethernet Ports Ethernet port management includes the management of ports and aggregation groups. l Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtual port. and manage IMA groups and IMA links. and modify an aggregation group. Service Virtual Port Management A service virtual port enables user equipment to access the OLT. After successful shifting. transmit traffic profile. blocking.3ah ETH OAM loopback. query. After successful binding. If the source IP address does not match any of the IP addresses bound to the service virtual port. Ltd. Otherwise. and unblocking an IMA group or link. the service forwarding module checks the source MAC address of user packets. l Query the attributes of optical transceivers on Ethernet optical ports. activate. delete. VLAN Service Management VLAN service management includes the management of the standard VLAN. modify. RSTP Management You can perform the following operations on the U2000: l Modify and restore the default value of the trail overheads of a port. an E1 connection is used for transmitting the TDM service over the GPON network by encapsulating the TDM packets directly into a GPON GEM frame.iManager U2000 Unified Network Management System Product Description l 12 FTTx Network Feature Management Configure service bundles. l Add. you can perform the query. and delete an E1 connection on the U2000. Ltd. You can perform the following operations on the U2000: l Query. l Query the real-time status of an ANCP session. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Access Node Control Protocol (ANCP). You can perform the following operations on the U2000: l Modify and restore the default setting of a domain. and modify a VLAN. enable. ANCP Management You can perform the following operations on the U2000: l Add. l Clear the real-time performance statistics of a VLAN. l Modify a port. l Manage a Layer 3 interface and its subinterfaces. the Rapid Spanning Tree Protocol (RSTP). add. RRPP Management For RRPP management. Multiple Spanning Tree Protocol (MSTP). instances. If several service virtual ports carry the same service. In E1 connection management. Layer 2 Management Layer 2 management includes the management of the VLAN. and super VLAN. MSTP Management MSTP management includes the management of domains. l Clear the RSTP statistics of a port. and modify operations. MUX VLAN. modify.. a service bundle can be configured to bundle the service streams over the service virtual ports. add. delete. and disable an ANCP session. you can query. 12-5 . delete. l Query the statistics of a port. l Collect the RSTP statistics of a port. and Rapid Ring Protection Protocol (RRPP). and ports. add. and modify an instance. E1 Connection Management In the FTTx scenario. smart VLAN. l Collect the real-time performance statistics of a VLAN. delete. Issue 05 (2010-11-19) . and modify a DHCP server group. however. Every router adopts the first-in first-out (FIFO) policy to process packets. MAC address segment. add. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. For ACL management. extended. l Configure the MPLS tunnel of the static unicast type. delete. does not make any commitment to packet transmission performance. disable. In addition. such as the delay. new services are emerging and raise new requirements on the service capability of the IP network. l Query. an MPLS tunnel implements end-to-end transmission and carries service-related PWs. and reliability. l Create forward MPLS tunnels. MPLS/PWE3 Management The MPLS is a transmission technology. devices must be able to apply QoS techniques and provide hierarchical QoS guarantee for different types of service streams (especially for those highly sensitive to delay and jitter). It implements transparent transmission of data packets between users. With the rapid development of the computer network. DHCP domain. You can perform the following operations on the U2000: l Query. and VLAN L3 interface. l Query. quality of service (QoS). Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge (PWE3). The MPLS tunnel is defined in the MPLS protocol. and makes its best effort to transmit packets to the destination. and associate a time segment with an ACL by specifying the name of the time segment in the ACL. add. you can perform the following operations on the U2000: 12-6 l Configure one or more time segments. ACL and QoS Management ACL and QoS management includes the management of the access control list (ACL). l Create an E-LSP. and hierarchical QoS (HQoS).12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description Layer 3 Management Layer 3 management includes the management of the Dynamic Host Configuration Protocol (DHCP). network-wide end-to-end QoS solutions are called into attention. which necessitates QoS assurance for services. delay variation (jitter). enable. and userdefined types. standard mode. packet loss rate. delete.. l Query. l Query. more and more networks are connected to the Internet. Ltd. To achieve so. time segments. l Manage tunnel tags and PW labels. and modify a DHCP domain. DHCP Management DHCP management includes the management of the DHCP server group. l Modify a VLAN Layer 3 interface. l Manage PWs. Layer 2. The router. all packets are treated in the same way. In a traditional packet-based network. Independent of a service. and modify a MAC address segment. delete. and delete the ACL of the standard. Therefore. and Layer 3 routes. modify. create. You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000: l Configure the basic attributes of the MPLS. and modify a standard mode. add. tagging priorities. multiple VLANs can map one SI. add. and forward AIS alarms. and delete an HQoS policy. l Configure user access control. An MD can be divided into multiple MAs. Different MDs are maintained by different management entities. link trace (LT). An MP is a combination of a bridge port. l Manage maintenance associations (MAs). and delete a QoS policy. you can query. It not only controls user traffic but also schedules packets according to the priorities of user services. and carrier domain (levels 2-0). collecting statistics on traffic. Actions can then be taken to ensure service continuity. limiting traffic and port rate. and mirroring. loopback (LB). An MA can be regarded as a combination of an MD and a VLAN. a network device needs to quickly detect any fault occurring between the device and its adjacent devices. A bridge can span multiple levels to manage different MDs. The trail can be a physical or a logical link. administration and maintenance (OAM) of transport equipment hence arises. Ltd. An imperative demand for the operation. l Configure user access in DHCP option 82 mode. HQoS stands for the hierarchical QoS. User Security and System Security Management You can perform the following operations on the U2000: l Configure user access in PITP mode. On the U2000. a VLAN. An MA consists of MPs defined on the ports of bridges. Ethernet CFM divides a network into up to eight levels. A CFM MD is constituted by bridges. An MD is the combination of bridges and maintenance levels. The BFD mechanism is a remedy for the weakness of the existing detection mechanism. Each MA maps a service instance (SI) that belongs to an MD and is identified by a VLAN.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management QoS management includes filtering packets based on ACL. add. l Configure system secure access. 12-7 . The 802. l Manage maintenance points (MPs). MDs can be classified into three layers: user domain (levels 7-5). especially the Ethernet equipment.1ag connectivity fault management (CFM) provides a method for detecting faults end-toend.1ag CFM include connectivity check (CC). According to the standards. modify. You can perform the following operations on the U2000: l Manage maintenance domains (MDs). carriers are increasingly concerned about the maintainability of equipment. BFD Management The BFD can quickly check the link status between two devices. The Ethernet OAM mechanisms supported by 802. To mitigate the impact of device faults on services and to improve the network availability. modify. MPs are classified into maintenance association end points (MEPs) and maintenance association Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ethernet Connectivity Fault Management As the Ethernet technology extends from carrier networks to metropolitan area networks (MANs) and wide area networks (WANs). The BFD enables the device to check the connectivity of a type of data protocol of the same trail between two systems. and one SI maps one MA. including a tunnel. redirecting.. On the U2000. and a maintenance level. you can query. service provider domain (levels 4-3). 12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description intermediate points (MIPs). the GEM port is encapsulated in the line template of the UNI port.244 Gbit/s. and manage the configuration data and status that are involved by the protection relationship between the members. The equipment and the U2000 support both modes. and update cycle of the encryption key of the GPON UNI port. Protection switchover: Important board resources and port resources are generally backed up to enhance system reliability. you can perform the following operations on the U2000: 12-8 l Modify the port attributes. MIPs transparently transmit or respond to CFM messages but do not initiate the messages. After the ONU auto-discovery function is enabled. GPON service management includes the management of the UNI ports. For GPON UNI port management. Issue 05 (2010-11-19) . If a fault occurs on a working member. With the protection group feature. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In a protection group. record the status of members. and ONUs. maximum reach. Protection group: You can manage the working member and the protection member in the protection group. you can manage the relationship between the members involved in the protection switchover. configuration status of the downstream FEC function. In the profile mode.448 Gbit/s and an upstream transmission rate of 1. such as the minimum reach.. Ltd. configuration status of the ONU auto-discovery function. in this mode. status of the laser switch. l Enable and disable the ONU auto-discovery function for a GPON UNI port. you can protect the following objects on the U2000: l Active and standby control boards l Aggregation groups on active control board and standby control board l Ports on active and standby control boards l Upstream Ethernet ports l Upstream aggregation links of Ethernet ports l Objects configured with GPON/EPON type B protection l Objects configured with GPON type C protection l Objects configured with EPON type D protection l Objects configured with GPON/EPON type B dual-homing GPON Service Management Gigabit passive optical network (GPON) uses the passive optical transmission technology. In the distributed mode. GEM ports. Protection Group Management Protection group management involves the protection switchover and protection group. GPON service management includes the management of the UNI ports and ONUs. It supports a downstream transmission rate of 2. protection switchover will be triggered to transfer services to the protection member that will continue to handle the services. MEPs initiate and respond to CFM messages. GPON service management supports two modes: distributed mode and profile mode. the OLT regularly checks whether any ONUs newly connected to the GPON UNI port are online. A GEM port identifies the virtual service channel that carries service streams between the MA5600T or MA5603T and an ONU. l Activate and deactivate an ONU. l Detect and isolate rogue ONU on a GPON UNI port. you can perform the following operations on the U2000: l Add. l Query the alarms of GPON UNI ports. the PON does not require node devices but only a simple optical splitter at the optical branching point. The VAS feature of the GPON ONU is used for provisioning VAS. l Locate directly an ONU in the topology view through the topological node. the ONU re-registers with the OLT to update the registration information about the ONU. ONU re-discovery is applicable only to the ONU that adopts the once-on authentication mode. This function allows you to maintain and manage GPON UNI ports according to the details about and suggested solutions for active alarms. l Limit the rate of packets of a specified priority on a GEM port according to the specified traffic profile. l Query the real-time performance statistics and clear the performance statistics. For GEM port management. The PON has the following features: l Issue 05 (2010-11-19) Fewer optical fibers. T-CONT. and modify an ONU. using the point to multi-point (P2MP) structure and the passive optical fiber transmission mode. the laser of a GPON UNI port is enabled so that the ONUs connected to the GPON UNI port can go online. 12-9 . When the encryption function is enabled. If the active GPON port on the OLT is faulty. Ltd.. l Configure the parameters of value-added service (VAS). Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Enable and disable the laser of a GPON UNI port. This feature enhances the security of user data. An ONU provides user interfaces. l Upgrade ONUs. l Generate topological nodes. A GPON UNI port can be connected to a maximum of 128 ONUs. l Bind a GEM port to an ONU to establish the mapping between the GEM port on the OLT and the T-CONT on the ONU. By default. After an online ONU is reset by force. It is a new generation broadband access technology. you can perform the following operations on the U2000: l Enable and disable the encryption function. such as the VoIP service.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management l Cut over services to implement GPON port backup on the OLT. and service stream is configured on the ONU. you can switch over the ONU services from the faulty GPON port to the specified standby GPON port on the OLT. EPON Service Management The Ethernet passive optical network (EPON) is an Ethernet-based passive optical network (PON). l Re-register an ONU. l Re-discover an ONU. For GPON ONU management. the device encrypts the service stream carried on the GEM port. l Query the real-time performance statistics and clear the performance statistics of a GEM port. delete. l Query the real-time performance statistics of ONUs and clear the performance statistics. Perform this operation to generate topological nodes for ONT management in the topology view. An ONU can provision services only after the mapping between the GEM port. As a new technology of fiber broadband access for the "last mile". in upstream direction. you can perform the following operations on the U2000: 12-10 l Add. you can switch over the ONU services from the faulty EPON port to a specified standby EPON port on the OLT. the EPON broadcasts encrypted data to different users. Perform this operation to generate topological nodes for ONT management in the topology view. Ltd. This function allows you to maintain and manage EPON UNI ports according to the details about and suggested solutions for active alarms. the OLT regularly checks whether any ONUs newly connected to the EPON UNI port go online. and video services for users over a single optical fiber. The EPON UNI port is the downstream port for the EPON access. EPON service management includes the management of EPON UNI ports and ONUs. The EPON uses the wavelength division multiplexing (WDM) technology for concurrent bidirectional signal transmission. and configure relevant services. and modify the MDU. l Generate topological nodes. l Cut over services to implement EPON port backup on the OLT. l Locate directly an ONU in the topology view through the topological node. l Query the real-time performance statistics and clear the performance statistics. l Lower overall costs for network construction. the EPON supports a maximum symmetric transmission rate of 1. An ONU provides user interfaces. you can add. data. ONU auto-discovery function. and a maximum transmission reach of 20 km. and modify an ONU. After the ONU auto-discovery function is enabled. In addition. delete. the maximum distance between an ONU and the OLT.12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description l Shared bandwidth between branches. l Enable and disable the ONU auto-discovery function for an EPON UNI port. In this way. l Display the topology of the optical distribution node (ODN). through the UNI port to provision high-speed Internet service for users. The laser of an EPON UNI port is enabled by default so that the ONUs connected to the EPON UNI port can go online. Currently. including MDUs. Issue 05 (2010-11-19) .25 Gbit/s in upstream and downstream. Upstream and downstream signals are transmitted over different wavelengths: upstream uses a 1310 nm wavelength and downstream uses a 1490 nm wavelength. the EPON employs the time division multiplexing (TDM) technology. including the alias. The EPON UNI port.. l Faster network deployment. and the tag attribute of packets. you can enter the ODN+MDU Layer 2 topology view. l Less investment in telecommunications rooms. For EPON UNI port management. With this feature. The EPON provisions the voice. For EPON ONU management. delete. The OLT is connected to various types of ONUs. In downstream direction. l Higher equipment security. and view the ODN-centered star topology. l Enable and disable an EPON UNI port. is connected to a remote MDU. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the EPON implements bandwidth sharing in upstream and downstream directions and accommodates the bandwidth requirements of access users. as an ODN. l Query the alarms of EPON UNI ports. If the active EPON port on the OLT is faulty. you can perform the following operations on the U2000: l Modify the attributes of an EPON UNI port. 0 to 239. Then. the OLT only relays and forwards multicast protocol packets. the OLT does not set up routes for forwarding multicast packets. Multicast services are applicable to the streaming media.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management l Activate and deactivate an ONU. or the terminal is experiencing a power outage. A source host sends out a packet that uses a class D IP address as the destination. such as the VoIP service. data replication. video on demand (VOD).. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Upgrade ONUs. ONU re-discovery is applicable only to the ONU that adopts the once-on authentication mode.255. physical visits to the sites of fault can be reduced. You can perform the following operations on the U2000 to manage multicast services: l Manage multicast users. l IGMP proxy: In a tree topology. the ONU re-registers with the OLT to update the registration information about the ONU. the OLT is a multicast user. To multicast users.255) as the destination IP address. network equipment determines whether a user has the rights to watch programs by identifying the join or request packets of the user. the OLT is a multicast router that implements the router functions defined in the IGMP protocol. After an online ONU is reset by force. Alarm Responsibility Division The alarm responsibility division function helps quickly and accurately identify the possible cause of an out-of-management alarm of an ONU. Multicast communication uses a class D IP address (224. Ltd. l Manage multicast subtending ports. l Configure the parameters of value-added service (VAS). l Re-discover an ONU. video conferencing. such as whether the backbone optical fiber or branch optical fiber is faulty. l Manage multicast VLANs. Service Provisioning Template The OLT supports the E2E service template to improve the service provisioning efficiency. l Re-register an ONU. In controllable multicast. l Manage the virtual upstream ports of multicast services. network gaming. 12-11 . The VAS feature of the EPON ONU is used for provisioning VAS. There are two multicast modes: l IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer. Multicast Service Management Multicast is a point-to-multipoint (P2MP) communication mode in which the source sends information to a specified subset of objects under a network node.0. The hosts outside of the group cannot receive the packets sent by the source host. the access device controls and forwards the multicast services accordingly. If other hosts in the network are interested in the multicast packet. these hosts can send a request to join the multicast group and receive the packet. and other P2MP transmission. In this manner.0.255. l Query the real-time performance statistics of ONUs and clear the performance statistics. To multicast routers. It is used to manage and control multicast services. distance learning. basic and common device attributes.12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description 12. 12-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. reset. Management of Basic and Common Device Attributes The management of basic and common device attributes includes the query of the global information about devices and the configuration of the global policies of devices. and confirm a board. l Query the statistics on the resources and status of devices. delete. start. l Query the details of equipment. Ltd. and clock priorities.2 ONU Management For NE configuration management. disable. l Query the real-time performance statistics on the CPU usage and memory of boards. l Configure the system time. security.. Device Management Device management includes the management of NE panels. l Set device handshake parameters. l Query the information about shelves. global configuration of services. l Collect statistics on device resources. l Query the license information about the functions and resources of devices. l Configure the SNMP protocol port. l Query inter-shelf links. protocols. Clock Source Management Clock source management includes the management and configuration of equipment-level clock source information. and the binding between a Layer 3 interface and an IP address. the U2000 provides graphical user interfaces (GUIs) for configuring NEs and maintaining NE configurations. You can configure services for equipment in the GUIs. l Add. clock sources. l Display the port view by double-clicking a board. NE Panel Management You can perform the following operations on the U2000: l Display the NE panel by double-clicking an NE. l Perform an active/standby switchover on the control boards. l Enable and disable the energy-conservation function of a device. 1588 clock. l Configure and manage license files. Issue 05 (2010-11-19) . IP address of a device. such as information about the line clock. and device templates. You can perform the following operations on the U2000: l Query the system information about devices. l Collect the statistics on shelf resources. l Configure the policy for automatically backing up device data. QoS.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management Security Management You can perform the following operations on the U2000: l Enable and disable anti-ICMP attack. and xDSL bonding groups. Management of EPON NNI Ports Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Set the aging time of an MAC address.. l Configure 802. Global Configuration of Services The global configuration of services includes the configuration of the VLAN. You can perform the following operations on the U2000: l Configure the suppression level of the broadcast. Currently. received PLOAM messages. EPON ports. l Collect the real-time performance statistics on the number of discarded Ethernet frames. and Internet Group Management Protocol (IGMP). l Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option (RAIO) custom format. Ltd.1ag attributes of the Ethernet packet. and multicast services. l Configure the security attributes for user login in the CLI. and received OMC messages. transmitted Ethernet frames. and unknown unicast packet traffic. and anti-DoS attack. optical transceiver alarm template. received GEM frames. anti-IP spoofing. transmitted PLOAM messages. Ethernet ports. l Control the Address Resolution Protocol (ARP) proxy. l Control the Dynamic Host Configuration Protocol (DHCP) option 82 function. transmitted GEM frames. Bidirectional Forwarding Detection (BFD). 12-13 . Protocol Management You can perform the following operations on the U2000: l Manage the Link Aggregation Control Protocol (LACP). anti-IP attack. anti-MAC spoofing. Network Interface Management Network interface management includes the management of GPON ports. Templates include the GPON template. and PW template. l Control the DHCP proxy and DHCP relay forwarding functions. EPON template. VLAN service template. multicast. transmitted OMC messages. Spanning Tree Protocol (STP)/ Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP). xDSL. IGMP template. l Configure and query the alarm thresholds of an optical transceiver. Management of GPON NNI Ports The GPON network to network interface (NNI) is the upstream port provided by the control board. traffic template. l Enable and disable MAC address learning. MDU SNMP template. the U2000 supports only query and generation of global templates. Device Template Management Device template management includes the display of different types of device templates on the U2000. received Ethernet frames. l Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtual port. perform the binding operation. You can perform the following operations on the U2000: 12-14 l Query.12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description EPON NNI is the upstream port provided by the ONU. l Create. l Query the attributes of optical transceivers on Ethernet optical ports. the encapsulation type. l Configure the extended attributes of a service virtual port. l Perform ATM ping tests. Service Virtual Port Management A service virtual port enables user equipment to access the ONU. received OAMPDU frames. received bytes. After successful binding. delete. To specify that only the users with certain IP addresses can access the service virtual port. query. DHCP option 82. You can perform the following operations on the U2000: l Configure port attributes. l Collect the real-time performance statistics and clear the performance statistics. Extended attributes allow for greater flexibility of addressing customer requirements. and deactivate a service virtual port. transmit traffic profile. l Activate and deactivate an Ethernet port. and received MPCP frames. You can perform the following operations on the U2000: l Configure and query the alarm thresholds of an optical transceiver. Management of Ethernet Ports Ethernet port management includes the management of ports and aggregation groups. VPI/VCI. If the source IP address does not match any of the IP Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Connection Management ONU connection management includes the management of service virtual ports. the service forwarding module checks the source IP address of user packets. and port rate limit functions. and receive traffic profile. and modify an xDSL bonding group. l Configure the PPPoE. Management of xDSL Bonding Groups You can perform the following operations on the U2000: l Create. received frames. The service virtual port provides service streams between the user equipment and the ONU for carrying user services. l Bind IP addresses to a service virtual port and query the bound IP addresses. including the alias. l Collect real-time performance statistics and clear the performance statistics. delete. delete. and the maximum number of MAC addresses that can be bound. Ltd. 802. l Set the upstream PVC value for an xDSL bonding group. l Configure the connection attributes of a service virtual port..3ah ETH OAM loopback. l Collect the real-time performance statistics on the number of transmitted frames. modify. Extended attributes include the maximum number of learnable MAC addresses. and modify an aggregation group. Issue 05 (2010-11-19) . After successful shifting. add. transmitted bytes. the service port assumes the new VLAN ID. activate. the PPPoE session. the user packets are dropped.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management addresses bound to the service virtual port. and modify a VLAN. l Collect the RSTP statistics of a port. and disable an ANCP session. 12-15 . Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and the Access Node Control Protocol (ANCP). smart VLAN. l Clear the RSTP statistics of a port. If several service virtual ports carry the same service. You can perform the following operations on the U2000: l Modify and restore the default setting of a domain. enable.. l Configure service bundles. and ports. the Rapid Spanning Tree Protocol (RSTP). the user packets are forwarded. the user packets are forwarded. perform the binding operation. Otherwise. l Query the real-time status of an ANCP session. To specify that only the users with certain static MAC addresses can access the service virtual port. modify. VLAN Service Management VLAN service management includes the management of the standard VLAN. You can perform the following operations on the U2000: l Query. a service bundle can be configured to bundle the service streams over the service virtual ports. If the source MAC address does not match any of the MAC addresses bound to the service virtual port. MUX VLAN. MSTP Management MSTP management includes the management of domains. RSTP Management You can perform the following operations on the U2000: l Modify and restore the default value of the trail overheads of a port. l Modify a port. delete. l Add. delete. l Query the statistics of a port. the service forwarding module checks the source MAC address of user packets. delete. and modify an instance. l Bind static MAC addresses to a service virtual port. ANCP Management You can perform the following operations on the U2000: l Add. l Clear the real-time performance statistics of a VLAN. This ensures the security of user access. After successful binding. Otherwise. Ltd. and super VLAN. the user packets are dropped. This ensures the security of user access. instances. l Manage a Layer 3 interface and its subinterfaces. add. the Multiple Spanning Tree Protocol (MSTP). l Collect the real-time performance statistics of a VLAN. Layer 2 Management Layer 2 management includes the management of the VLAN. standard mode. and makes its best effort to transmit packets to the destination. DHCP domain. quality of service (QoS). l Query. and modify a DHCP domain. l Create forward MPLS tunnels. Ltd. Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge (PWE3). l Configure the MPLS tunnel of the static unicast type. packet loss rate. modify. devices must be able to apply QoS techniques and provide hierarchical QoS guarantee for different types of service streams (especially for those highly sensitive to delay and jitter). For ACL management. In a traditional packet-based network. add. You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000: l Configure the basic attributes of the MPLS. however. DHCP Management DHCP management includes the management of the DHCP server group. delete. and modify a DHCP server group. you can perform the following operations on the U2000: 12-16 l Configure one or more time segments. The MPLS tunnel is defined in the MPLS protocol. extended. l Manage PWs. You can perform the following operations on the U2000: l Query. With the rapid development of the computer network. Independent of a service.12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description Layer 3 Management Layer 3 management includes the management of the Dynamic Host Configuration Protocol (DHCP). add. delete. add. delete. The router. Therefore. all packets are treated in the same way. l Manage tunnel tags and PW label. and reliability.. It implements transparent transmission of data packets between users. which necessitates QoS assurance for services. more and more networks are connected to the Internet. create. Issue 05 (2010-11-19) . and modify a MAC address segment. an MPLS tunnel implements end-to-end transmission and carries service-related PWs. MPLS/PWE3 Management The MPLS is a transmission technology. To achieve so. l Query. and VLAN L3 interface. and modify a standard mode. and associate a time segment with an ACL by specifying the name of the time segment in the ACL. such as the delay. does not make any commitment to packet transmission performance. new services are emerging and raise new requirements on the service capability of the IP network. ACL and QoS Management ACL and QoS management includes the management of the access control list (ACL). delay variation (jitter). disable. and Layer 3 routes. Layer 2. and delete the ACL of the standard. enable. l Query. In addition. l Create an E-LSP. network-wide end-to-end QoS solutions are called into attention. and userdefined types. Every router adopts the first-in first-out (FIFO) policy to process packets. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Query. and time segments. MAC address segment. l Modify a VLAN Layer 3 interface. administration and maintenance (OAM) of transport equipment hence arises. modify. carriers are increasingly concerned about the maintainability of equipment. MEPs initiate and respond to CFM messages. especially the Ethernet equipment. According to the standards. On the U2000. An imperative demand for the operation. l Configure user access control. Ethernet Connectivity Fault Management As the Ethernet technology extends from carrier networks to metropolitan area networks (MANs) and wide area networks (WANs). 12-17 . and forward AIS alarms. The BFD mechanism is a remedy for the weakness of the existing detection mechanism.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management QoS management includes filtering packets based on ACL. add. l Manage maintenance associations (MAs). To mitigate the impact of device faults on services and to improve the network availability. MPs are classified into maintenance association end points (MEPs) and maintenance association intermediate points (MIPs). l Manage BFD sessions. Ethernet CFM divides a network into up to eight levels. including a tunnel. The trail can be a physical or a logical link. link trace (LT). Ltd. Actions can then be taken to ensure service continuity. and carrier domain (levels 2-0). you can query. An MP is a combination of a bridge port. You can perform the following operations on the U2000: l Manage maintenance domains (MDs). A bridge can span multiple levels to manage different MDs. tagging priorities. l Manage maintenance points (MPs). and one SI maps one MA. BFD Management The BFD mechanism can quickly check the link status between two devices. and delete a QoS policy. Within Ethernet technology. The BFD enables the device to check the connectivity of a type of data protocol of the same trail between two systems. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. loopback (LB). An MD is the combination of bridges and maintenance levels. The Ethernet OAM mechanisms supported by 802. A CFM MD is constituted by bridges. Each MA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. service provider domain (levels 4-3). collecting statistics on traffic. redirecting. a VLAN. MDs can be classified into three layers: user domain (levels 7-5). multiple VLANs can map one SI. Different MDs are maintained by different management entities.. l Configure system secure access.1ag connectivity fault management (CFM) provides a method for detecting faults end-to-end. and mirroring. An MD can be divided into multiple MAs.1ag CFM include connectivity check (CC). l Configure user access in DHCP option 82 mode. An MA can be regarded as a combination of an MD and a VLAN. limiting traffic and port rate. MIPs transparently transmit or respond to CFM messages but do not initiate the messages. the 802. An MA consists of MPs defined on the ports of bridges. and a maintenance level. User Security and System Security Management You can perform the following operations on the U2000: l Configure user access in PITP mode. a network device needs to quickly detect any fault occurring between the device and its adjacent devices. ATM global single-pair high-speed digital subscriber line (G. The 2-wire.5 km.SHDSL port.SHDSL is a technology for providing a high-rate symmetrical data service over one or two twisted pairs. You can bind multiple ATM G. It supports a maximum transmission rate of 24 Mbit/s and 2. You can perform the following operations on the U2000: l Activate and deactivate a port. VDSL2 Service Management VDSL2 is an extension of the VDSL technology. These attributes are used to activate the ATM G. and 768 kbit/s to 22784 kbit/s respectively. It provides high-speed private line access in the symmetrical or asymmetrical mode over common twisted pairs. G.. 4-wire. alarm template.SHDSL Service Management G. The features of these services are as follows: ADSL Service Management ADSL is a technology for providing the asymmetric and high-speed private line access service over common twisted pairs. You can perform the following operations on the U2000: 12-18 l Activate and deactivate a port. VDSL2 supports a high bandwidth with symmetric rates of up to 100 Mbit/s and multiple spectrum template and encapsulation modes.SHDSL lines range from 192 kbit/s to 5696 kbit/s. such as the associated line profile and alarm profile. This increases the bandwidth at the physical layer and improves the rate of the ATM G. l Configure the port attributes. 6-wire. 4-wire. l Deactivate a port and then activate it again to initialize a port. Issue 05 (2010-11-19) . Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Based on these features.SHDSL access services are supported to allow for a transmission distance ranging from 3 km to 6 km. such as the associated line template. 576 kbit/s to 17088 kbit/s. l Bind and unbind a port. l Query the real-time performance statistics.5 Mbit/s in the downstream and upstream respectively and a maximum transmission distance of 6. These attributes are used to activate the ADSL port. You can perform the following operations on the U2000: l Activate and deactivate a port. l Maintain a port.SHDSL ports. l Configure port attributes. l Reconfigure port attributes. extended template. l Perform and cancel a loopback. 384 kbit/s to 4608 kbit/ s. Ltd.SHDSL port. 6-wire. The ADSL2+ is an extension of the ADSL technology. l Perform and cancel a loopback. and 8-wire G. and 8-wire G. l Deactivate a port and then activate it again to initialize the port. and very high speed digital subscriber lines 2 (VDSL2) services. which is suitable for the user data access service and can provide high-speed data transmission channels for users. and monitoring thresholds. it provides short-distance and high-speed access solutions to the next generation broadband access scenarios. The ADSL supports the asymmetrical transmission in the upstream and downstream directions. ADSL2+.12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description xDSL Service Management xDSL service management includes the management of the asymmetrical digital subscriber loop (ADSL). l Query the real-time and history performance statistics.SHDSL). The rates of the 2-wire. 3ah ETH OAM loopback. Multicast Service Management Multicast is a point-to-multipoint (P2MP) communication mode in which the source sends information to a specified subset of objects under a network node. Then.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management l Reconfigure port attributes. Ltd. video on demand (VOD). the OLT is a multicast user. and monitoring thresholds of a VDSL2 port. These attributes are used to activate the VDSL2 port. l Collect real-time performance statistics and clear the performance statistics. l Query the real-time and history performance statistics. In controllable multicast. extended profile. query.. The hosts outside of the group cannot receive the packets sent by the source host. delete. the access device controls and forwards the multicast services accordingly. 802. network equipment determines whether a user has the rights to watch programs by identifying the join or request packets of the user. You can perform the following operations on the U2000 to manage multicast services: l Manage multicast users.0.255) as the destination IP address. 12-19 . There are two multicast modes: l IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer. To multicast routers. l Manage multicast subtending ports. It is used to manage and control multicast services. the OLT does not set up routes for forwarding multicast packets. l Create. and modify an aggregation group.0. these hosts can send a request to join the multicast group and receive the packet.255. network gaming.255. the OLT only relays and forwards multicast protocol packets. and port rate limit functions. data replication. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Activate and deactivate an Ethernet port. alarm profile. DHCP Option 82. If other hosts in the network are interested in the multicast packet. Multicast communication uses a class D IP address (224. the OLT is a multicast router that implements the router functions defined in the IGMP protocol. l IGMP proxy: In a tree topology. video conferencing. Ethernet Access Management Ethernet access management includes the management of ports and aggregation groups. A source host sends out a packet that uses a class D IP address as the destination. l Configure the port attributes.0 to 239. l Manage the virtual upstream ports of multicast services. You can perform the following operations on the U2000: l Configure port attributes. Multicast services are applicable to the streaming media. l Control the PPPoE. l Query the attributes of optical transceivers for Ethernet optical ports. distance learning. To multicast users. l Manage multicast VLANs. and other P2MP transmission. such as the associated line profile. MG Management In the next generation network (NGN). That is. An SCTP association provides data transmission for the transfer of the protocol data unit of one or more ports. the media gateway (MG) and the media gateway controller (MGC) are separated. the ONU transmits the ISDN service to the NGN network in IP networking mode.. It is also called plain old telephone service (POTS). The messages of the user plane interact with each other by using the MG and the messages of the control plane interact with each other by using the MGC. The ISDN service is called the VoIP ISDN BRA service. and ringing mapping. Issue 05 (2010-11-19) . An SG is a part for signaling interaction. VoIP ISDN BRA Port Management ISDN basic rate access (BRA) is the basic rate interface (BRI) and user-network interface provided by the ONU. VoIP PSTN Port Management The public switched telephone network (PSTN) is a communication network that provides telephone services for public users over analog subscriber lines. the functions of the user plane are separated from the functions of the control plane. digital signal processor (DSP) management. An MG device consists of the MG. A gateway is established on the ONU between the PSTN network and the IP network. In the upstream direction. l Perform and cancel a loopback. You can perform the following operations on the U2000: 12-20 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. voice information is transmitted in digital form in discrete packets rather than through the traditional circuit-oriented protocols of PSTN. l Reset a port. An SG is a signaling proxy for receiving and transmitting signaling messages between the No. MGC. l Collect the real-time performance statistics.12 FTTx Network Feature Management iManager U2000 Unified Network Management System Product Description Narrowband Service Management Narrowband service management includes the management of the media gateway (MG). POTS ports. The VoIP PSTN service is provided through the VoIP PSTN ports on the voice service board of an ONU. Ltd. Voice over IP (VoIP) is a communication mode for delivery of voice and data over Internet Protocol (IP) networks. You can perform the following operations on the U2000: l Configure and modify port attributes. You can perform the following operations on the U2000: l Manage MGs l Manage MGCs l Manage ringing mapping l Manage DSP channels SG Management Signaling gateway (SG) management includes the management of signaling gateways and associations. The BRI supports a transmission rate of 44 kbit/s and provides 2 B channels for carrying services and 1 D channel for transmitting the call control signaling and maintaining the management signaling. signaling gateway (SG). l Enable and disable services.7 signaling network and the IP network. and IP ports. The rate of B channels is 64 kbit/s and the rate of D channel is 16 kbit/s. In the VoIP technology. l Enable and disable services. l Reset a port.iManager U2000 Unified Network Management System Product Description 12 FTTx Network Feature Management l Configure and modify port attributes. time-consuming to locate and troubleshoot an internal fault of the MDU. l Perform and cancel a loopback. l Query the timeslots that are occupied by a specified VoIP ISDN PRA port. l Activate and deactivate a port. Solution limitations: l The versions of the MDUs of the same type in the entire network must be the same. The PRI supports a transmission rate of 2. The ISDN service is called the VoIP ISDN PRA service. l Configure the alarm threshold of Layer 2 signaling errors. implements software-commissioning-free and requires only one site visit. and are stored and repaired later in a centralized manner. Ltd. You can perform the following operations on the U2000: l Configure and modify port attributes. l Query the statistics on the usage of MG ports and collect the number of VoIP ISDN BRA ports by port status. The rates of the B channel and D channel are 64 kbit/s. l Collect the real-time performance statistics. l Configure the alarm threshold of Layer 2 signaling errors. l Query the statistics on the usage of MG ports and collect the number of VoIP ISDN PRA ports by port status. and at the same time allows for concurrent offline configuration and on-site construction. l Enable and disable services. Sheet-based predeployment has the following features: l Offline deployment by importing a predeployed sheet l Automatic upgrade of NE software l Automatic issuing of configuration data Plug-and-Play Feature Management When an MDU is faulty. Therefore. Therefore. Sheet-based Predeployment Management The U2000 provides the sheet-based predeployment solution which enables you to import device data to the U2000 in batches. faulty MDUs are directly replaced. In the upstream direction.048 Mbit/s and provides 30 B channels and 1 D channel. however. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l The configuration data of the MDUs must be backed up periodically to safeguard the data. l Perform and cancel a loopback. this solution improves deployment efficiency and reduces network construction cost. It is. the ONU transmits the ISDN service to the NGN network in IP networking mode. 12-21 . This solution provides for plug-and-play (PnP) of equipment. it is essential to locate the fault and recover services quickly. VoIP ISDN PRA Port Management ISDN primary rate access (PRA) is the primary rate interface (PRI) and user-network interface provided by the ONU.. the deployed ONUs must support remote acceptance. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Solution benefit: l The MDU implements PnP and is replaced quickly. Replace the MDU that encounters a severe hardware fault. The U2000 provides the automatic offline bulk upgrade solution for ONTs.12 FTTx Network Feature Management l iManager U2000 Unified Network Management System Product Description Only one MDU can go offline and one MDU be automatically discovered during automatic replacement. l PPPoE dialup emulation acceptance. l The configuration data is restored quickly. Ltd. l 2. ONT Automatic Bulk Upgrade An FTTH network is deployed with a large number of ONTs. Issue 05 (2010-11-19) . The hardware installation engineer replaces the faulty MDU with a new MDU and furnishes the maintenance engineer with the identification information about the new MDU. MDU replacement methods: l Manual replacement based on a MAC address (EPON) or SN (GPON) l Automatic replacement based on the key or password l Automatic one-to-one replacement based on the MAC address Remote Acceptance To achieve one site visit and reduce the O&M cost in FTTx network construction. When the ONTs are upgraded. You can perform the following operations on the U2000: 12-22 l Upgrade ONTs in batches. to check whether the links for Internet access are in the normal state. l Upgrade offline ONTs automatically when the ONTs go online. l 3. The maintenance engineer modifies the authentication information about the MDU on the U2000. l 4. Back up the configuration data as required by using the DC component. l Upgrade ONTs automatically by creating a periodic upgrade task. to check whether the voice links are in the normal state by using the call emulation test. you can perform the following acceptance operations: l Narrowband emulation acceptance. Solution implementation procedure: l 1. and loads the configuration file to the MDU. the following problems may occur: l The range of ONTs to be upgraded cannot be determined when ONTs are added to the network during service provisioning. l l The online status of ONTs in user premises cannot be confirmed. starts the automatic upgrade of the NE software by using the DC component. With the FTTx PnP solution.. 13-1 .1 MSAN Management For NE configuration management.iManager U2000 Unified Network Management System Product Description 13 13 MSAN Network Feature Management MSAN Network Feature Management About This Chapter This topic describes the functions and features of MSAN NE management and network management. Ltd.. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 13. You can configure services for equipment in the GUIs. the U2000 provides graphical user interfaces (GUIs) for configuring NEs and maintaining NE configurations. Issue 05 (2010-11-19) . 13-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Query the real-time performance statistics on the CPU usage and memory of boards. l Collect the statistics on shelf resources. l Display the port view by double-clicking a board.. 1588 clock. l Configure and manage license files. l Collect statistics on device resources. and the binding between a Layer 3 interface and an IP address. l Configure the policy for automatically backing up device data. l Enable and disable the energy-conservation function of a device. l Query the information about shelves. l Configure the SNMP protocol port. clock sources. l Query the details of equipment. l Query the license information about the functions and resources of devices. l Query inter-shelf links. and clock priorities. Clock Source Management Clock source management includes the management and configuration of equipment-level clock source information. l Perform an active/standby switchover on the control boards. l Add. Ltd. the U2000 provides graphical user interfaces (GUIs) for configuring NEs and maintaining NE configurations. and device templates. start. l Query the statistics on the resources and status of devices. security. reset. such as information about the line clock. global configuration of services. l Configure the system time.1 MSAN Management For NE configuration management. protocols. NE Panel Management You can perform the following operations on the U2000: l Display the NE panel by double-clicking an NE. l Set device handshake parameters. IP address of a device. Management of Basic and Common Device Attributes The management of basic and common device attributes includes the query of the global information about devices and the configuration of the global policies of devices. You can configure services for equipment in the GUIs. and confirm a board. basic and common device attributes. disable. Device Management Device management includes the management of NE panels. delete.13 MSAN Network Feature Management iManager U2000 Unified Network Management System Product Description 13. You can perform the following operations on the U2000: l Query the system information about devices. . Currently. Ltd. l Control the Dynamic Host Configuration Protocol (DHCP) option 82 function.iManager U2000 Unified Network Management System Product Description 13 MSAN Network Feature Management Security Management You can perform the following operations on the U2000: l Enable and disable anti-ICMP attack. Device Template Management Device template management includes the display of different types of device templates on the U2000. l Configure 802. and PW template. On E1 ports for PRA access. Templates include the IGMP template. anti-IP spoofing. l Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option (RAIO) custom format. l Control the DHCP proxy and DHCP relay forwarding functions. Global Configuration of Services The global configuration of services includes the configuration of the VLAN. l Set the aging time of a MAC address. and enable or disable services. On E1 ports for upstream transmission. you can collect real-time performance statistics of ports. Bidirectional Forwarding Detection (BFD). 13-3 . anti-MAC spoofing. the U2000 supports only query and generation of global templates. depending on the functions of the boards. CES E1/T1 ports. Protocol Management You can perform the following operations on the U2000: l Manage the Link Aggregation Control Protocol (LACP). and anti-DoS attack. and Internet Group Management Protocol (IGMP). anti-IP attack. l Enable and disable MAC address learning. traffic template. set port alias. Network Interface Management Network interface management includes the management and maintenance of E1/T1 ports and the Ethernet port. Spanning Tree Protocol (STP)/ Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP). TDM E1/T1 ports can be used as access ports or upstream ports. and perform loopback. query timeslots. VLAN service template. and multicast services. you can perform the following operations: configure or delete port attributes. l Control the Address Resolution Protocol (ARP) proxy. you can perform only the loopback operation. xDSL. set the alarm threshold of L2 signaling bit errors. QoS. Management and Maintenance of E1/T1 Ports E1/T1 ports are classified into TDM E1/T1 ports. configure the port attributes. and IMA E1/T1 ports. On CES E1/T1 ports. l Configure the security attributes for user login in the CLI. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1ag attributes of the Ethernet packet. perform the binding operation. Otherwise. To specify that only the users with certain static MAC addresses can access the service virtual port. l Configure the extended attributes of a service virtual port. Otherwise. l Perform ATM ping tests. If the source IP address does not match any of the IP addresses bound to the service virtual port. blocking. l Create. l Activate and deactivate an Ethernet port. l Bind static MAC addresses to a service virtual port. VPI/VCI. and port rate limit functions. After successful binding. resetting. If the source MAC address does not match any of the MAC addresses bound to the service virtual port. The service virtual port provides service streams between the user equipment and the OLT for carrying user services. After successful binding. l Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtual port. Connection Management Connection management includes the management of service virtual ports and CESoP connections. After successful shifting. Management of Ethernet Ports Ethernet port management includes the management of ports and aggregation groups. the service forwarding module checks the source MAC address of user packets. including adding. perform the binding operation. You can perform the following operations on the U2000: l Configure port attributes. modifying. l Bind IP addresses to a service virtual port and query the bound IP addresses. Extended attributes allow for greater flexibility of addressing customer requirements. Ltd. You can perform the following operations on the U2000: 13-4 l Query. and receive traffic profile. modify.13 MSAN Network Feature Management iManager U2000 Unified Network Management System Product Description On IMA E1/T1 ports. including the alias. Extended attributes include the maximum number of learnable MAC addresses. the user packets are forwarded. and deactivate a service virtual port. l Query the attributes of optical transceivers for Ethernet optical ports. and the maximum number of MAC addresses that can be bound. the service port assumes the new VLAN ID. the user packets are dropped. l Configure the PPPoE. DHCP option 82. To specify that only the users with certain IP addresses can access the service virtual port. the user packets are forwarded. query. the user packets are dropped. and manage IMA groups and IMA links. Issue 05 (2010-11-19) . This ensures the security of user access. you can query real-time performance statistics of the ports. and modify an aggregation group. This ensures the security of user access. deleting. delete. add. the PPPoE session. Service Virtual Port Management A service virtual port enables user equipment to access the OLT. transmit traffic profile. activate. l Collect real-time performance statistics and clear the performance statistics. 802. the service forwarding module checks the source IP address of user packets. l Configure the connection attributes of a service virtual port.3ah ETH OAM loopback. l Collect the real-time performance statistics and clear the performance statistics. the encapsulation type.. and unblocking an IMA group or link. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. delete. you can perform the query. You can perform the following operations on the U2000: l Modify and restore the default setting of a domain. Multiple Spanning Tree Protocol (MSTP). and ports. delete. delete. After the CESoP connection is set up and the required service stream is created. Ltd. If several service virtual ports carry the same service. l Query the real-time status of an ANCP session. l Collect the real-time performance statistics of a VLAN. 13-5 . delete. instances. enable. You can perform the following operations on the U2000: l Query. RSTP Management You can perform the following operations on the U2000: l Modify and restore the default value of the trail overheads of a port. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. l Query the statistics of a port. and disable an ANCP session. a service bundle can be configured to bundle the service streams over the service virtual ports. the Rapid Spanning Tree Protocol (RSTP). l Modify a port. MUX VLAN. and modify a VLAN.iManager U2000 Unified Network Management System Product Description l 13 MSAN Network Feature Management Configure service bundles. ANCP Management You can perform the following operations on the U2000: l Add. smart VLAN. l Collect the RSTP statistics of a port. Management of CESoP Connection Management The circuit emulation service over packet (CESoP) simulates circuit emulation services over packets. add. l Clear the RSTP statistics of a port. l Manage a Layer 3 interface and its subinterfaces. and super VLAN. VLAN Service Management VLAN service management includes the management of the standard VLAN. modify. add. l Add. the communication over the CESoP E1 line is successful. Layer 2 Management Layer 2 management includes the management of the VLAN. and modify an instance. Access Node Control Protocol (ANCP). l Clear the real-time performance statistics of a VLAN. and Rapid Ring Protection Protocol (RRPP). and modify operations. delete. MSTP Management MSTP management includes the management of domains. RRPP Management For RRPP management. and userdefined types. modify.13 MSAN Network Feature Management iManager U2000 Unified Network Management System Product Description Layer 3 Management Layer 3 management includes the management of the Dynamic Host Configuration Protocol (DHCP). In a traditional packet-based network. quality of service (QoS). With the rapid development of the computer network. and modify a standard mode. l Manage PWs. Layer 2. Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge (PWE3). Every router adopts the first-in first-out (FIFO) policy to process packets. add. more and more networks are connected to the Internet. and associate a time segment with an ACL by specifying the name of the time segment in the ACL. devices must be able to apply QoS techniques and provide hierarchical QoS guarantee for different types of service streams (especially for those highly sensitive to delay and jitter). delete. MPLS PWE3 Management The MPLS is a transmission technology. add. l Query. In addition. and makes its best effort to transmit packets to the destination. and reliability. all packets are treated in the same way. delay variation (jitter). For ACL management. add. l Configure the MPLS tunnel of the static unicast type.. network-wide end-to-end QoS solutions are called into attention. time segments. and hierarchical QoS (HQoS). To achieve so. and Layer 3 routes. DHCP Management DHCP management includes the management of the DHCP server group. new services are emerging and raise new requirements on the service capability of the IP network. and delete the ACL of the standard. and modify a MAC address segment. l Query. The router. however. You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000: l Configure the basic attributes of the MPLS. l Query. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. disable. an MPLS tunnel implements end-to-end transmission and carries service-related PWs. enable. ACL and QoS Management ACL and QoS management includes the management of the access control list (ACL). you can perform the following operations on the U2000: 13-6 l Configure one or more time segments. l Create an E-LSP. MAC address segment. and VLAN L3 interface. delete. l Manage tunnel tags and PW labels. standard mode. delete. l Modify a VLAN Layer 3 interface. such as the delay. You can perform the following operations on the U2000: l Query. Therefore. packet loss rate. Issue 05 (2010-11-19) . DHCP domain. It implements transparent transmission of data packets between users. which necessitates QoS assurance for services. l Create forward MPLS tunnels. Ltd. The MPLS tunnel is defined in the MPLS protocol. l Query. extended. does not make any commitment to packet transmission performance. and modify a DHCP server group. and modify a DHCP domain. Independent of a service. create. link trace (LT). MPs are classified into maintenance association end points (MEPs) and maintenance association intermediate points (MIPs). MEPs initiate and respond to CFM messages. add. Ethernet CFM divides a network into up to eight levels. a VLAN. The Ethernet OAM mechanisms supported by 802. especially the Ethernet equipment. l Manage maintenance points (MPs). An MD is the combination of bridges and maintenance levels. the 802. modify. An MD can be divided into multiple MAs. administration and maintenance (OAM) of transport equipment hence arises. You can perform the following operations on the U2000: l Manage maintenance domains (MDs). Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 13-7 . A CFM MD is constituted by bridges. Different MDs are maintained by different management entities. and forward AIS alarms. MIPs transparently transmit or respond to CFM messages but do not initiate the messages.iManager U2000 Unified Network Management System Product Description 13 MSAN Network Feature Management QoS management includes filtering packets based on ACL. collecting statistics on traffic. you can query. you can query. According to the standards. l Manage BFD sessions. On the U2000. MDs can be classified into three layers: user domain (levels 7-5). Ethernet Connectivity Fault Management As the Ethernet technology extends from carrier networks to metropolitan area networks (MANs) and wide area networks (WANs). loopback (LB). l Manage maintenance associations (MAs). tagging priorities. Within Ethernet technology. limiting traffic and port rate. and a maintenance level. An MP is a combination of a bridge port.1ag CFM include connectivity check (CC). HQoS stands for the hierarchical QoS. and carrier domain (levels 2-0). and one SI maps one MA. An MA consists of MPs defined on the ports of bridges. l Configure user access control. User Security and System Security You can perform the following operations on the U2000: l Configure user access in PITP mode. It not only controls user traffic but also schedules packets according to the priorities of user services. Each MA maps a service instance (SI) that belongs to an MD and is identified by a VLAN.1ag connectivity fault management (CFM) provides a method for detecting faults end-to-end. Protection Group Management Protection group management involves the protection switchover and protection group. carriers are increasingly concerned about the maintainability of equipment. Ltd. On the U2000. multiple VLANs can map one SI. l Configure user access in DHCP option 82 mode. An imperative demand for the operation. An MA can be regarded as a combination of an MD and a VLAN. If a fault occurs on a working member. add. l Configure system secure access. A bridge can span multiple levels to manage different MDs. and delete a QoS policy. protection switchover will be triggered to transfer services to the protection member that will continue to handle the services. service provider domain (levels 4-3). redirecting. Protection switchover: Important board resources and port resources are generally backed up to enhance system reliability. and mirroring. modify.. and delete an HQoS policy. With the protection group feature. These attributes are used to activate the ADSL port. l Configure the port attributes.SHDSL port. This increases the bandwidth at the physical layer and improves the rate of the ATM G. The features of these services are as follows: ADSL Service Management ADSL is a technology for providing the asymmetric and high-speed private line access service over common twisted pairs. ADSL2+ is an extension of the ADSL technology. Issue 05 (2010-11-19) . record the status of members. and 768 kbit/s to 22784 kbit/s respectively.5 Mbit/s in the downstream and upstream respectively and a maximum transmission distance of 6.5 km. 6-wire. l Query the real-time and history performance statistics. G. You can bind multiple ATM G. which is suitable for the user data access service and can provide highspeed data transmission channels for users. ADSL2+. and manage the configuration data and status that are involved by the protection relationship between the members. Ltd.SHDSL lines range from 192 kbit/s to 5696 kbit/s. 576 kbit/s to 17088 kbit/s. ATM global single-pair high-speed digital subscriber line (G.SHDSL). you can manage the relationship between the members involved in the protection switchover. you can protect the following objects on the U2000: l Active and standby control boards l Aggregation groups on active control board and standby control board l Ports on active and standby control boards l Upstream Ethernet ports l Upstream aggregation links of Ethernet ports xDSL Service Management xDSL service management includes the management of the asymmetrical digital subscriber loop (ADSL). and 8-wire G.13 MSAN Network Feature Management iManager U2000 Unified Network Management System Product Description Protection group: You can manage the working member and the protection member in the protection group.SHDSL Service Management G. extended template. You can perform the following operations on the U2000: l Activate and deactivate a port. such as the associated line template. l Deactivate a port and then activate it again to initialize the port. In a protection group.SHDSL is a technology for providing a high-rate symmetrical data service over one or two twisted pairs. l Perform and cancel a loopback.. The rates of the 2-wire. You can perform the following operations on the U2000: 13-8 l Activate and deactivate a port. and very high speed digital subscriber lines 2 (VDSL2) services. 4-wire. l Bind and unbind a port.SHDSL access services are supported to allow for a transmission distance ranging from 3 km to 6 km. l Reconfigure port attributes. and monitoring thresholds. The 2-wire.SHDSL ports. l Perform and cancel a loopback. It supports a maximum transmission rate of 24 Mbit/s and 2. 384 kbit/s to 4608 kbit/ s. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 6-wire. ADSL supports the asymmetrical transmission in the upstream and downstream directions. alarm template. 4-wire. and 8-wire G. 255.SHDSL port. In controllable multicast. Ltd.0. the OLT only relays and forwards multicast protocol packets.255) as the destination IP address. video conferencing. VDSL2 service Management VDSL2 is an extension of the VDSL technology. the access device controls and forwards the multicast services accordingly. 13-9 . network gaming. VDSL2 supports a high bandwidth with symmetric rates of up to 100 Mbit/s and multiple spectrum template and encapsulation modes. There are two multicast modes: l IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer. extended profile. l Manage the virtual upstream ports of multicast services. these hosts can send a request to join the multicast group and receive the packet. Based on these features. To multicast routers. It is used to manage and control multicast services. You can perform the following operations on the U2000: l Activate and deactivate a port. data replication.0 to 239. the OLT does not set up routes for forwarding multicast packets. You can perform the following operations on the U2000 to manage multicast services: l Manage multicast users. such as the associated line profile. l Query the real-time and history performance statistics. Multicast communication uses a class D IP address (224.. l Deactivate a port and then activate it again to initialize a port. the OLT is a multicast router that implements the router functions defined in the IGMP protocol. If other hosts in the network are interested in the multicast packet. the OLT is a multicast user. Multicast Service Management Multicast is a point-to-multipoint (P2MP) communication mode in which the source sends information to a specified subset of objects under a network node. To multicast users. A source host sends out a packet that uses a class D IP address as the destination. and other P2MP transmission. l Configure the port attributes. l Reconfigure port attributes. network equipment determines whether a user has the rights to watch programs by identifying the join or request packets of the user. These attributes are used to activate the VDSL2 port. distance learning.iManager U2000 Unified Network Management System Product Description 13 MSAN Network Feature Management l Configure port attributes. Then. video on demand (VOD). it provides short-distance and high-speed access solutions to the next generation broadband access scenarios. alarm profile. l IGMP proxy: In a tree topology. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Query the real-time performance statistics. Multicast services are applicable to the streaming media. The hosts outside of the group cannot receive the packets sent by the source host. l Manage multicast VLANs. and monitoring thresholds of a VDSL2 port.255.0. such as the associated line profile and alarm profile. l Perform and cancel a loopback. It provides high-speed private line access in the symmetrical or asymmetrical mode over common twisted pairs. These attributes are used to activate the ATM G. l Manage multicast subtending ports. l Manage MGCs. The messages of the user plane interact with each other by using the MG and the messages of the control plane interact with each other by using the MGC. POTS ports. Ltd. AN SG is a signaling proxy for receiving and transmitting signaling messages between the No. the media gateway (MG) and the media gateway controller (MGC) are separated. l Reset a port. l Collect the real-time performance statistics. the ONU transmits the ISDN service to the NGN 13-10 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. In the upstream direction.13 MSAN Network Feature Management iManager U2000 Unified Network Management System Product Description MG Management In the next generation network (NGN). You can perform the following operations on the U2000: l Manage MGs. and IP ports. Narrowband VoIP Service Management Narrowband VoIP service management includes the management of the MG.7 signaling network and the IP network. and ringing mapping. The BRI supports a transmission rate of 44 kbit/s and provides 2 B channels for carrying services and 1 D channel for transmitting the call control signaling and maintaining the management signaling. An SG is a part for signaling interaction. Issue 05 (2010-11-19) . The VoIP PSTN service is provided through the VoIP PSTN ports on the voice service board of an ONU. In the VoIP technology. l Manage DSP channels. VoIP PSTN Port Management The public switched telephone network (PSTN) is a communication network that provides telephone services for public users over analog subscriber lines. l Manage ringing mapping. VoIP ISDN BRA Port Management ISDN basic rate access (BRA) is the basic rate interface (BRI) and user-network interface provided by the ONU. An SCTP association provides data transmission for the transfer of the protocol data unit of one or more ports. digital signal processor (DSP) management. the functions of the user plane are separated from the functions of the control plane. SG Management Signaling gateway (SG) management includes the management of signaling gateways and associations. MGC. l Enable and disable services. A gateway is established on the ONU between the PSTN network and the IP network. You can perform the following operations on the U2000: l Configure and modify port attributes. voice information is transmitted in digital form in discrete packets rather than through the traditional circuit-oriented protocols of PSTN. Voice over IP (VoIP) is a communication mode for delivery of voice and data over Internet Protocol (IP) networks. l Perform and cancel a loopback. That is. It is also called plain old telephone service (POTS). An MG device consists of the MG. The rate of B channels is 64 kbit/s and the rate of D channel is 16 kbit/s. SG. and CDI boards. l Enable and disable services. l Perform and cancel a loopback.. The PRI supports a transmission rate of 2. l Configure the alarm threshold of Layer 2 signaling errors. V5 Voice Service Management V5 voice service management includes the management of V5 interfaces. You can perform the following operations on the U2000: l Manage the attributes of V5 interfaces. l Switch over the logical communication channels of a specified V5 interface for protection. l Query the statistics on the usage of MG ports and collect the number of VoIP ISDN BRA ports by port status. l Configure the alarm threshold of Layer 2 signaling errors. it separates accesses and services to optimize the network organization. 13-11 . l Restart the PSTN protocol on the V5 interface. The rates of the B channel and D channel are 64 kbit/s. You can perform the following operations on the U2000: l Configure and modify port attributes. l Manage communication channels. the ONU transmits the ISDN service to the NGN network in IP networking mode. VoIP ISDN PRA Port Management ISDN primary rate access (PRA) is the primary rate interface (PRI) and user-network interface provided by the ONU.iManager U2000 Unified Network Management System Product Description 13 MSAN Network Feature Management network in IP networking mode. l Configure the ringing mode for users. l Query the statistics on the usage of MG ports and collect the number of VoIP ISDN PRA ports by port status. l Query the timeslots that are occupied by a specified VoIP ISDN PRA port. ATI boards. l Enable and disable services. You can perform the following operations on the U2000: l Configure and modify port attributes. l Activate and deactivate a port. service ports. VFB boards. l Manage ISDN communication channels. In the upstream direction. The ISDN service is called the VoIP ISDN PRA service. Ltd. The V5 interface supports the access of abundant integrated services. semipermanent connections (SPCs). l Collect the real-time performance statistics. l Perform and cancel a loopback. l Manage 2M links. V5 Interface Management The V5 interface is a standard digital interface between the access network (AN) and the local exchange (LE). Service Port Management Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In addition. l Reset a port.048 Mbit/s and provides 30 B channels and 1 D channel. The ISDN service is called the VoIP ISDN BRA service. l Set up V5 SPCs. You can perform the following operations to manage V5 ISDN PRA ports on the U2000: l Configure and modify port attributes. SPCs occupy dedicated and fixed voice channels to meet the communication requirements of special and VIP access subscribers and ensure the communication quality. You can perform the following operations on the U2000: l Set up common SPCs between narrowband service ports. l Configure the alarm threshold of Layer 2 signaling errors. l Enable or disable services. Ltd. You can perform the following operations to manage V5 PSTN ports on the U2000: l Configure and modify port attributes. and protect one or more 64 kbit/s channels of different ports of the same board or different boards. l Set up V5 pre-SPCs. l Set up internal SPCs. l Collect real-time performance statistics. l Query the timeslots occupied by a specified V5 ISDN PRA port. l Reset a port. l Query the statistics on the usage of MG ports and collect the number of V5 ISDN BRA ports by port status. check. l Set up VoIP-based IP SPCs. V5 ISDN BRA ports. l Query the statistics on the usage of MG ports and collect the number of V5 ISDN PRA ports by port status. l Configure private lines. release. l Perform and cancel a loopback. l Activate and deactivate a port. l Reset a port. l Enable and disable services. Issue 05 (2010-11-19) . l Enable and disable services. SPC Management SPC can connect.. l Perform and cancel a loopback. l Configure the alarm threshold of Layer 2 signaling errors. and V5 ISDN PRA ports. You can connect VF telephones or modems (connecting user terminals) to the VF channels at the two sides so that the voice or data is interconnected over dedicated lines.13 MSAN Network Feature Management iManager U2000 Unified Network Management System Product Description Service ports are classified into V5 PSTN ports. VFB Board Management The UA5000(PVMV1) provides point-to-point voice frequency (VF) channels to transmit voice or data in dedicated networks. l Collect real-time performance statistics. You can perform the following operations to manage V5 ISDN BRA ports on the U2000: l Configure and modify port attributes. l Perform and cancel a loopback. The VFB board of the UA5000(PVMV1) is a 2/4-wire VF dedicated line 13-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. l Configure the hotline service of E&M trunk ports. l Configure the DDI service. transparently transmits E/M signaling and 2-wire/4wire VF signals by using SPCs. You can perform the following operations on the U2000: l Configure the attributes of MTA ports. MTA Management The MTA of the UA5000(PVMV1) provides the synchronous port with the rate of 64/128 kbit/ s and the synchronous or asynchronous port with the sub-rate of 2.6/19.. Narrowband Data Service Management Narrowband data service management includes the management of multifunctional terminal adapters (MTAs). The ATI board provides six 2-wire/4-wire E&M trunk ports. You can perform the following operations on the U2000: l Configure the 2-wire/4-wire VF and E&M trunk service.SHDSL ports. which implements the transparent transmission through analog subscriber ports. l Add SPCs. In addition. transparent transmission. If the 1E1M signaling line is not in use. You can perform the following operations on the U2000: l Configure the Z interface extension service. The CDI board implements the transparent extension inside the HONET system for the analog subscriber ports of external exchanges by means of digital-to-analog conversion between CDI ports and ASL ports. as a foreign exchange office (FXO) port. You can perform the following operations on the U2000: l Configure the attributes of ports provided by the VFB board. In dedicated networks. Each port provides the 2-wire/4-wire VF line and the 1E1M signaling line.4/4. HSL boards.35 ports and two FE1 ports to access N x 64k (n ranges from 1 to 31) data services. l Add SPCs. You can perform the following operations on the U2000: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. This helps the HONET system access certain dedicated networks. inserted in a service shelf. CDI Board Management The CDI board is a 16-channel direct-dialing-in subscriber interface board of the HONET access system. the 2-wire/4-wire VF line can be used independently to transmit VF signals. To access these users over the access network. 13-13 . l Configure the PBX bidirectional service. The MTA also provides physical communication channels between terminal users and the DDN network or other digital terminal users.iManager U2000 Unified Network Management System Product Description 13 MSAN Network Feature Management interface board and supports the VF dedicated line services. and signaling processing of hosts. many users adopt the E&M trunk ports. HSL Management The HSL board of the UA5000 (PVMV1) provides two V. ATI Board Management The ATI board. ONUs must provide the E&M trunk ports. Ltd. It provides sixteen 2-wire port or eight 4-wire ports. Certain dedicated networks access LEs or interwork with remote dedicated networks over the access network. the CDI port works with the foreign exchange subscriber (FXS) port provided by the ASL board to implement the analog access of the POTS users to the LE.2 kbit/s. The VFB board provides the function of adjusting the 2/4-wire port through software. and TDM G.8/9. SHDSL service. l Add SPCs.SHDSL service of data dedicated line subscribers in TDM mode. The SDL board accesses the G. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. TDM G. You can perform the following operations on the U2000: 13-14 l Configure the TDM G. Ltd.. Issue 05 (2010-11-19) .SHDSL ports The UA5000(PVMV1) uses the SDL board to carry G.35 ports provided by the HSL board. l Configure the subtend service of the TDM G.SHDSL port.SHDSL services.13 MSAN Network Feature Management iManager U2000 Unified Network Management System Product Description l Configure the attributes of V. .1 DSLAM Management For NE configuration management. You can configure services for equipment in the GUIs. Ltd. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 14.iManager U2000 Unified Network Management System Product Description 14 14 DSLAM Network Feature Management DSLAM Network Feature Management About This Chapter This topic describes the functions and features of DSLAM NE management and network management. 14-1 . the U2000 provides graphical user interfaces (GUIs) for configuring NEs and maintaining NE configurations. l Add. clock sources. and confirm a board. such as information about the line clock. l Configure the SNMP protocol port. l Collect statistics on device resources. and the binding between a Layer 3 interface and an IP address. IP address of a device.14 DSLAM Network Feature Management iManager U2000 Unified Network Management System Product Description 14. l Configure and manage license files. You can perform the following operations on the U2000: l Query the system information about devices. security. basic and common device attributes. l Configure the policy for automatically backing up device data. l Configure the system time. 1588 clock. l Query the license information about the functions and resources of devices. 14-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. l Query the information about shelves. l Enable and disable the energy-conservation function of a device. and device templates. l Set device handshake parameters. reset. l Collect the statistics on shelf resources.. global configuration of services. Issue 05 (2010-11-19) . disable. l Query the statistics on the resources and status of devices. You can configure services for equipment in the GUIs. l Perform an active/standby switchover on the control boards. delete. protocols. Clock Source Management Clock source management includes the management and configuration of equipment-level clock source information. Management of Basic and Common Device Attributes The management of basic and common device attributes includes the query of the global information about devices and the configuration of the global policies of devices. Device Management Device management includes the management of NE panels. NE Panel Management You can perform the following operations on the U2000: l Display the NE panel by double-clicking an NE. l Query the details of equipment. l Query the real-time performance statistics on the CPU usage and memory of boards. l Display the port view by double-clicking a board. and clock priorities. the U2000 provides graphical user interfaces (GUIs) for configuring NEs and maintaining NE configurations. start. l Query inter-shelf links.1 DSLAM Management For NE configuration management. l Enable and disable MAC address learning. l Configure the security attributes for user login in the CLI. set port alias. l Control the DHCP proxy and DHCP relay forwarding functions. and multicast services. On CES E1/T1 ports. and anti-DoS attack.. and IMA E1/T1 ports. Currently. l Control the Address Resolution Protocol (ARP) proxy. traffic template. Protocol Management You can perform the following operations on the U2000: l Manage the Link Aggregation Control Protocol (LACP). l Control the Dynamic Host Configuration Protocol (DHCP) option 82 function. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. anti-MAC spoofing. and PW template. Templates include the IGMP template. set the alarm threshold of L2 signaling bit errors.iManager U2000 Unified Network Management System Product Description 14 DSLAM Network Feature Management Security Management You can perform the following operations on the U2000: l Enable and disable anti-ICMP attack. l Set the aging time of a MAC address. you can perform the following operations: configure or delete port attributes. and Internet Group Management Protocol (IGMP). depending on the functions of boards. l Configure 802. and enable or disable services. VLAN service template. CES E1/T1 ports. 14-3 . Bidirectional Forwarding Detection (BFD). anti-IP attack. Device Template Management Device template management includes the display of different types of device templates on the U2000. On E1 ports for PRA access. xDSL. Global Configuration of Services The global configuration of services includes the configuration of the VLAN. query timeslots. configure the port attributes. you can collect real-time performance statistics of ports.1ag attributes of the Ethernet packet. and perform loopback. Ltd. the U2000 supports only query and generation of global templates. QoS. Management and Maintenance of E1/T1 Ports E1/T1 ports are classified into TDM E1/T1 ports. Spanning Tree Protocol (STP)/ Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP). l Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option (RAIO) custom format. Network Interface Management Network interface management includes the management and maintenance of E1/T1 ports and the Ethernet port. On E1 ports for upstream transmission. you can perform only the loopback operation. anti-IP spoofing. TDM E1/T1 ports can be used as access ports or upstream ports. the service port assumes the new VLAN ID. the user packets are dropped. delete. and modify an aggregation group. the encapsulation type. Ltd. the user packets are forwarded. you can query real-time performance statistics of the ports. Issue 05 (2010-11-19) . l Collect real-time performance statistics and clear the performance statistics. l Create. To specify that only the users with certain static MAC addresses can access the service virtual port. modify. If the source MAC address does not match any of the MAC addresses bound to the service virtual port. l Perform ATM ping tests. and receive traffic profile. and unblocking an IMA group or link. the PPPoE session. The service virtual port provides service streams between the user equipment and the ONU for carrying user services. After successful binding. blocking.14 DSLAM Network Feature Management iManager U2000 Unified Network Management System Product Description On IMA E1/T1 ports. l Bind static MAC addresses to a service virtual port. and deactivate a service virtual port. 802. and the maximum number of MAC addresses that can be bound. modifying. After successful shifting. l Configure the connection attributes of a service virtual port. l Configure the PPPoE. To specify that only the users with certain IP addresses can access the service virtual port. If the source IP address does not match any of the IP addresses bound to the service virtual port. including adding. perform the binding operation. l Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtual port.. Otherwise. l Configure the extended attributes of a service virtual port. Service Virtual Port Management A service virtual port enables user equipment to access the ONU. delete. Extended attributes allow for greater flexibility of addressing customer requirements. the user packets are dropped. including the alias. DHCP option 82. perform the binding operation. query. Connection Management ONU connection management includes the management of service virtual ports. the service forwarding module checks the source IP address of user packets. and manage IMA groups and IMA links. This ensures the security of user access. Extended attributes include the maximum number of learnable MAC addresses. VPI/VCI. l Activate and deactivate an Ethernet port. l Bind IP addresses to a service virtual port and query the bound IP addresses. l Query the attributes of optical transceivers for Ethernet optical ports. You can perform the following operations on the U2000: l Configure port attributes. You can perform the following operations on the U2000: 14-4 l Query. resetting. deleting. activate. and port rate limit functions. Management of Ethernet Ports Ethernet port management includes the management of ports and aggregation groups.3ah ETH OAM loopback. the user packets are forwarded. After successful binding. Otherwise. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. add. This ensures the security of user access. transmit traffic profile. the service forwarding module checks the source MAC address of user packets. l Collect the real-time performance statistics and clear the performance statistics. and ports. you can perform the query. l Modify a port. Ltd. You can perform the following operations on the U2000: l Query. add. Access Node Control Protocol (ANCP). DHCP Management Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Multiple Spanning Tree Protocol (MSTP). You can perform the following operations on the U2000: l Modify and restore the default setting of a domain. l Collect the RSTP statistics of a port. delete. modify. l Query the real-time status of an ANCP session. l Add. delete. delete. l Manage a Layer 3 interface and its subinterfaces. Layer 2 Management Layer 2 management includes the management of the VLAN. delete.iManager U2000 Unified Network Management System Product Description l 14 DSLAM Network Feature Management Configure service bundles. and Layer 3 routes. and modify operations. l Collect the real-time performance statistics of a VLAN. and modify a VLAN. If several service virtual ports carry the same service. ANCP Management You can perform the following operations on the U2000: l Add. RRPP Management For RRPP management. l Query the statistics of a port. enable. l Clear the real-time performance statistics on VLANs. the Rapid Spanning Tree Protocol (RSTP). MUX VLAN. MSTP Management MSTP management includes the management of domains. instances. smart VLAN. and super VLAN. and Rapid Ring Protection Protocol (RRPP). and modify an instance. Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge (PWE3). Layer 3 Management Layer 3 management includes the management of the Dynamic Host Configuration Protocol (DHCP).. 14-5 . VLAN Service Management VLAN management includes the management of the standard VLAN. RSTP Management You can perform the following operations on the U2000: l Modify and restore the default value of the trail overheads of a port. and disable an ANCP session. a service bundle can be configured to bundle the service streams over the service virtual ports. l Clear the RSTP statistics of a port. add. l Create forward MPLS tunnels. add. l Create an E-LSP. modify. In a traditional packet-based network. add.14 DSLAM Network Feature Management iManager U2000 Unified Network Management System Product Description DHCP management includes the management of the DHCP server group. and reliability. Layer 2. and delete an HQoS policy. and delete the ACL of the standard. disable. DHCP domain. add. MAC address segment. an MPLS tunnel implements end-to-end transmission and carries service-related PWs. and modify a standard mode. collecting statistics on traffic. l Manage PWs. You can perform the following operations on the U2000: l Query. delay variation (jitter). limiting traffic and port rate. On the U2000.. l Manage tunnel tags and PW labels. and mirroring. Every router adopts the first-in first-out (FIFO) policy to process packets. more and more networks are connected to the Internet. For ACL management. In addition. delete. MPLS PWE3 Management The MPLS is a transmission technology. l Query. extended. It not only controls user traffic but also schedules packets according to the priorities of user services. and modify a DHCP server group. The router. To achieve so. It implements transparent transmission of data packets between users. which necessitates QoS assurance for services. network-wide end-to-end QoS solutions are called into attention. you can query. however. does not make any commitment to packet transmission performance. Independent of a service. new services are emerging and raise new requirements on the service capability of the IP network. packet loss rate. l Modify a VLAN Layer 3 interface. modify. 14-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. quality of service (QoS). QoS management includes filtering packets based on ACL. enable. Issue 05 (2010-11-19) . and userdefined types. and modify a MAC address segment. and delete a QoS policy. HQoS stands for the hierarchical QoS. add. l Query. and modify a DHCP domain. tagging priorities. devices must be able to apply QoS techniques and provide hierarchical QoS guarantee for different types of service streams (especially for those highly sensitive to delay and jitter). and associate a time segment with an ACL by specifying the name of the time segment in the ACL. delete. you can perform the following operations on the U2000: l Configure one or more time segments. and VLAN L3 interface. time segments. redirecting. modify. such as the delay. You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000: l Configure the basic attributes of the MPLS. l Query. l Configure the MPLS tunnel of the static unicast type. Ltd. Therefore. you can query. l Query. standard mode. With the rapid development of the computer network. On the U2000. add. all packets are treated in the same way. create. and hierarchical QoS (HQoS). ACL and QoS Management ACL and QoS management includes the management of the access control list (ACL). delete. The MPLS tunnel is defined in the MPLS protocol. and makes its best effort to transmit packets to the destination. You can perform the following operations on the U2000: l Manage maintenance domains (MDs). and one SI maps one MA. MIPs transparently transmit or respond to CFM messages but do not initiate the messages..1ag connectivity fault management (CFM) provides a method for detecting faults end-to-end. protection switchover will Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Protection switchover: Important board recourses and port recourses are generally backed up to enhance system reliability.1ag CFM include connectivity check (CC). MDs can be classified into three layers: user domain (levels 7-5). and a maintenance level. If a fault occurs on a working member. The trail can be a physical or a logical link. The BFD mechanism is a remedy for the weakness of the existing detection mechanism. administration and maintenance (OAM) of transport equipment hence arises. BFD Management The BFD mechanism is used for quickly checking the link status between two devices. Actions can then be taken to ensure service continuity. MPs are classified into maintenance association end points (MEPs) and maintenance association intermediate points (MIPs). An MP is a combination of a bridge port. especially the Ethernet equipment. An MA can be regarded as a combination of an MD and a VLAN. and carrier domain (levels 2-0). Ethernet Connectivity Fault Management As the Ethernet technology extends from carrier networks to metropolitan area networks (MANs) and wide area networks (WANs). service provider domain (levels 4-3). Within Ethernet technology. Protection Group Management Protection group management involves the protection switchover and protection group.iManager U2000 Unified Network Management System Product Description 14 DSLAM Network Feature Management User Security and System Security You can perform the following operations on the U2000: l Configure user access in PITP mode. link trace (LT). A CFM MD is constituted by bridges. Each MA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. To mitigate the impact of device faults on services and to improve the network availability. An MD is the combination of bridges and maintenance levels. The Ethernet OAM mechanisms supported by 802. multiple VLANs can map one SI. Ltd. and forward AIS alarms. Different MDs are maintained by different management entities. the 802. A bridge can span multiple levels to manage different MDs. MEPs initiate and respond to CFM messages. carriers are increasingly concerned about the maintainability of equipment. An MA consists of MPs defined on the ports of bridges. 14-7 . l Manage maintenance points (MPs). Ethernet CFM divides a network into up to eight levels. According to the standards. a network device needs to quickly detect any fault occurring between the device and its adjacent devices. l Manage maintenance associations (MAs). a VLAN. l Configure system secure access. An MD can be divided into multiple MAs. The BFD enables the device to check the connectivity of a type of data protocol of the same trail between two systems. including a tunnel. An imperative demand for the operation. l Configure user access control. l Configure user access in DHCP option 82 mode. loopback (LB). and 768 kbit/s to 22784 kbit/s respectively. extended template. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and manage the configuration data and status that are involved by the protection relationship between the members. The rates of the 2-wire. ADSL supports the asymmetrical transmission in the upstream and downstream directions. You can perform the following operations on the U2000: 14-8 l Activate and deactivate a port. You can perform the following operations on the U2000: l Activate and deactivate a port. With the protection group feature. The features of these services are as follows: ADSL Service Management ADSL is a technology for providing the asymmetric and high-speed private line access service over common twisted pairs. alarm template. 6-wire. These attributes are used to activate the ADSL port.5 Mbit/s in the downstream and upstream respectively and a maximum transmission distance of 6. which is suitable for the user data access service and can provide highspeed data transmission channels for users. ADSL2+ is an extension of the ADSL technology.SHDSL). l Perform and cancel a loopback. l Reconfigure port attributes. and 8-wire G. you can protect the following objects on the U2000: l Active and standby control boards l Aggregation groups on active control board and standby control board l Ports on active and standby control boards l Upstream Ethernet ports l Upstream aggregation links of Ethernet ports xDSL Service Management xDSL service management includes the management of the asymmetrical digital subscriber loop (ADSL). In a protection group.SHDSL Service Management G. ATM global single-pair high-speed digital subscriber line (G. The 2-wire. Issue 05 (2010-11-19) . l Query the real-time and history performance statistics. and 8-wire G. l Perform and cancel a loopback..SHDSL access services are supported to allow for a transmission distance ranging from 3 km to 6 km. Protection group: You can manage the working member and the protection member in the protection group.14 DSLAM Network Feature Management iManager U2000 Unified Network Management System Product Description be triggered to transfer services to the protection member that will continue to handle the services. 576 kbit/s to 17088 kbit/s.SHDSL is a technology for providing a high-rate symmetrical data service over one or two twisted pairs. you can manage the relationship between the members involved in the protection switchover. 4-wire. record the status of members. ADSL2+. 4-wire.SHDSL lines range from 192 kbit/s to 5696 kbit/s. such as the associated line template. Ltd. 384 kbit/s to 4608 kbit/ s. l Configure the port attributes. 6-wire. G. It supports a maximum transmission rate of 24 Mbit/s and 2. l Deactivate a port and then activate it again to initialize the port. and very high speed digital subscriber lines 2 (VDSL2) services.5 km. and monitoring thresholds. Multicast services are applicable to the streaming media.. and monitoring thresholds of a VDSL2 port. There are two multicast modes: l IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer. Based on these features. Ltd. and other P2MP transmission. You can bind multiple ATM G. A source host sends out a packet that uses a class D IP address as the destination.255) as the destination IP address. l IGMP proxy: In a tree topology. distance learning. To multicast routers. Multicast communication uses a class D IP address (224. Then.iManager U2000 Unified Network Management System Product Description 14 DSLAM Network Feature Management l Bind and unbind a port.0. these hosts can send a request to join the multicast group and receive the packet.SHDSL port. the access device controls and forwards the multicast services accordingly. Multicast Service Management Multicast is a point-to-multipoint (P2MP) communication mode in which the source sends information to a specified subset of objects under a network node. The hosts outside of the group cannot receive the packets sent by the source host. network equipment determines whether a user has the rights to watch programs by identifying the join or request packets of the user. data replication. If other hosts in the network are interested in the multicast packet. l Configure port attributes.SHDSL port. This increases the bandwidth at the physical layer and improves the rate of the ATM G.255. l Configure the port attributes. To multicast users. video conferencing. the OLT is a multicast user. It is used to manage and control multicast services. These attributes are used to activate the ATM G.SHDSL ports. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. VDSL2 Service Management VDSL2 is an extension of the VDSL technology. VDSL2 supports a high bandwidth with symmetric rates of up to 100 Mbit/s and multiple spectrum template and encapsulation modes. it provides short-distance and high-speed access solutions to the next generation broadband access scenarios. l Manage multicast VLANs. You can perform the following operations on the U2000: l Activate and deactivate a port. l Perform and cancel a loopback. l Query the real-time and history performance statistics. the OLT only relays and forwards multicast protocol packets.0 to 239. the OLT does not set up routes for forwarding multicast packets. alarm profile.255. In controllable multicast. l Query the real-time performance statistics. such as the associated line profile and alarm profile. You can perform the following operations on the U2000 to manage multicast services: l Manage multicast users. network gaming. It provides high-speed private line access in the symmetrical or asymmetrical mode over common twisted pairs. l Reconfigure port attributes. 14-9 . the OLT is a multicast router that implements the router functions defined in the IGMP protocol. extended profile. These attributes are used to activate the VDSL2 port. such as the associated line profile. l Deactivate a port and then activate it again to initialize a port.0. video on demand (VOD). l Manage multicast subtending ports.14 DSLAM Network Feature Management 14-10 iManager U2000 Unified Network Management System Product Description l Manage the virtual upstream ports of multicast services. Issue 05 (2010-11-19) . Ltd.. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and system security and reliability. 15.3 HA System The high availability (HA) system helps you improve the running reliability of the U2000 server. 15. The reliability design of the U2000 ensures hardware reliability. 15. This improves the reliability of the communication connection between the U2000 and equipment. software reliability.1 Reliability Design This topic describes the reliability design of the U2000.. 15-1 . 15.6 Data Backup The data backup function helps to improve the reliability of important U2000 data. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 15. Ltd.iManager U2000 Unified Network Management System Product Description 15 Reliability 15 Reliability About This Chapter Reliability design assures that measures are taken to prevent potential risks so that the product can work in a safer manner.5 Disk Mirroring The disk mirroring function helps to improve the reliability of disk data on the U2000 server.2 Reliability Indicator This topic describes the indicators of the reliability design.4 DCN Protection You can use a data communication network (DCN) to connect the U2000 to a standby gateway NE (GNE). 15. l Communication security and reliability: The U2000 client and server communicate with each other in SSH mode. In addition. when the active server is faulty (for example. The reliability design of the U2000 ensures hardware reliability. and a series of security policies to ensure the security of operations that are performed on the U2000.iManager U2000 Unified Network Management System Product Description 15 Reliability 15. System Security and Reliability System security and reliability involve the following aspects: 15-2 l OS enhancement: The U2000 provides the SetSolaris to enhance the security of Solaris OS. and HA system. switchover is performed between the active server and the standby server and the standby server starts to monitor networks. which ensures security of communication between them. For example. software reliability. Periodic and effective backup of the U2000 data ensures that the system runs stably and recovers promptly from faults. RAID10. Hardware Reliability U2000Hardware reliability is improved by disk redundancy. RAID1. DCN protection ensures the reliability of communication connections between the U2000 and NEs.3 HA System. l Disk redundancy: The U2000 supports disk redundancy. equipment redundancy. When the U2000 detects that a process stops abnormally or is faulty. see 15. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. hot standby. or disk array can be used for different hardware platforms. The U2000 supports the automatic protection mechanism so that it can monitor and check the running status of its processes. Software Reliability Software reliability mechanism of the U2000 enables the U2000 to withstand software failures such as software application failure or database damage. ACL. it records system logs. AAA.. Issue 05 (2010-11-19) . l HA system: For details. For details. The U2000 provides various data backup methods. The system can also generate an alarm that urges a user to manually resolve the problem. and system security and reliability. the system restarts the process automatically and ensures that the process runs in the normal state. l Antivirus scheme: The U2000 uses the OfficeScan of Trend Micro as the antivirus software on Windows OS. the U2000 improves reliability by means of redundant equipment such as switches and NICs. l Equipment redundancy: During network deployment. l Operation security: The U2000 supports user management. see 15.6 Data Backup. right management. software applications fail or the database quits unexpectedly). In the case of an HA system. user security management. Then.1 Reliability Design This topic describes the reliability design of the U2000. Ltd. Ltd. Table 15-1 Reliability indicators of the U2000 Item Indicator Remarks MTBF The average fault interval is larger than 6 months.iManager U2000 Unified Network Management System Product Description 15 Reliability 15. Table 15-1 lists the reliability indicators of the U2000. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. If the active site is faulty.2 Reliability Indicator This topic describes the indicators of the reliability design. See Figure 15-1. HA system The fault is defined as database crash. The non-distributed U2000 server works in 1+1 backup mode. MTTR The average fault recovery time is no more than 15 minutes. 15-3 .3 HA System The high availability (HA) system helps you improve the running reliability of the U2000 server. HA switching time ≤ 15 minutes 70% of the management capacity NMS start time ≤ 10 minutes 70% of the management capacity NMS shutdown time ≤ 10 minutes 70% of the management capacity 15. HA system The fault is defined as database crash.. applications on the U2000 are automatically switched to the standby site so that the U2000 application is not interrupted. Issue 05 (2010-11-19) . The communication between non-GNEs and the U2000 is forwarded by the GNE. the number of GNEs should be increased. In the U2000. the U2000 automatically switches to the standby GNE for communication. Ltd. the U2000 determines whether to use the active GNE again according to the preset revertive mode. Applicaton The protection mechanism of an HA system has two aspects: l Database synchronization and backup between the active and standby sites l Automatic application switchover between the active and standby sites The U2000 provides the following HA schemes: l HA system (Veritas 1+1 hot standby): Applicable to remote hot standby of the nondistributed system. 15-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. When the communication between the U2000 and the active GNE recovers.iManager U2000 Unified Network Management System Product Description 15 Reliability Figure 15-1 Switchover between active and standby sites in HA system Normal Status Real time data replication Application When a fault occurs. you can set the active GNE and standby GNE for NEs in advance. When the communication between the active GNE and the U2000 is interrupted.4 DCN Protection You can use a data communication network (DCN) to connect the U2000 to a standby gateway NE (GNE). the NMS application is switched to the standby site. This improves the reliability of the communication connection between the U2000 and equipment. so that the communication between the U2000 and NEs is not interrupted. Once the limit is exceeded. NOTE The recommended number of non-gateway NEs (including non-gateway NEs that connects to the GNE by using the extended ECC) that connect to each GNE is fewer than 50. 15.. featuring automatic switching. thereby restoring the working data and parameter settings before the active disk is damaged. Configuration data Export the configuration data to script files in the MML command format. U2000 naming file. networklayer information files. The script files supported by the U2000 include network-wide configuration files. run a command to switch the data to the standby disk. you can create disk mirroring (RAID 1) when installing the U2000. Perform operations on the U2000 client. abnormal event log. The security of network data is a concern of users. if the active disk is damaged. service implementation configuration files. NE configuration file. and network simulation and planning information files. Specifically. and operation log Dump logs. If the server has two or more than two hard disks. NE list files. security log. 15-5 . see the U2000 Online Help. After you create disk mirroring.. Ltd. U2000 computer information files. The script files neglect the structural differences among databases of the U2000 of different versions. For details. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 15 Reliability 15.5 Disk Mirroring The disk mirroring function helps to improve the reliability of disk data on the U2000 server. The RAID 5 and hot spare disk are recommended for the disk array where six hard disks are configured.6 Data Backup The data backup function helps to improve the reliability of important U2000 data. Table 15-2 Data backup Issue 05 (2010-11-19) Data to Be Backed Up Solution Operation Alarm log. and are suitable for data backup in case of version upgrade. Table 15-2 lists the data backup solutions provided by the U2000. configure RAID 5 by using any four hard disks and use the remaining one as a hot spare disk. performance log. 15. Supported backup scenarios are as follows: l OS: Windows. l Source of data to be restored: local restoration or remote restoration. The restoration duration is determined by the network size and the bandwidth between the U2000 server and the remote server. immediate backup to the remote. If the scheduled backup fails. Sybase.. l Data backup path: immediate backup to the local. or Solaris. Operation In general. restoring all data on the database takes less than three hours. SUSE Linux. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the U2000 reports an alarm. or SQL Server. Ltd. and scheduled backup to the remote.iManager U2000 Unified Network Management System Product Description 15 Reliability Data to Be Backed Up Solution Database Back up all data in the U2000 database. l Database: Oracle. NE database 15-6 Back up the NE data. Issue 05 (2010-11-19) . iManager U2000 Unified Network Management System Product Description 16 16 Performance Indicators Performance Indicators This topic describes the performance indicators of the U2000. Table 16-1 Performance indicators Issue 05 (2010-11-19) Item Subitem Indicator Storage capacity Capacity of current alarms Maximum: 100,000 pieces Capacity of history alarms Maximum: 2,000,000 pieces Capacity of logs, including operation logs and system logs Maximum: 1,000,000 pieces Resources occupied CPU usage The CPU usage is normally not greater than 10%. Processing capability Response speed of handling an alarm The interval from the time at which an alarm is generated on the equipment to the time at which the alarm is displayed on the U2000 is normally not longer than 10 seconds. Response speed of handling performance data In the case of 1,000 pieces of performance data, the interval from the time at which they are reported to the U2000 to the time at which they are stored in the database is normally 10 seconds. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 16-1 iManager U2000 Unified Network Management System Product Description 16 Performance Indicators Item Subitem Indicator Alarm handling capability In a normal circumstance, 100 (400 at maximum) pieces of alarms can be handled per second by a full-domain U2000. When managing only access equipment, the U2000 can handle 50 pieces of alarms per second. User Maximum: 500 User group Maximum: 50 Object set Maximum: 100 Operation Set Maximum: 255 HA switchover time Switchover between remote active and standby servers Less than 15 minutes Stability Mean time between failures (MTBF) The MTBF is longer than six months. A failure is the situation where the database quits unexpectedly. Mean time to recovery (MTTR) The MTTR is not longer than 15 minutes. A failure is the situation where the database quits unexpectedly. Number of managed physical nodes Maximum: 15,000 Number of managed equivalent NEs Maximum: 20,000 VPN access interface Maximum: 5,000,000 Number of tunnels Maximum: 100,000 Number of manageable GNEs Not more than 3000 Number of manageable NEs for a GNE Not more than 50 U2000 user management capability Management capability Service capability HWECC/IP over DCC networking capacity Table 16-2 DCN bandwidth requirements 16-2 Item Bandwidth Bandwidth required for the communication between a U2000 client and the U2000 server 2 Mbit/s Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) iManager U2000 Unified Network Management System Product Description 16 Performance Indicators Item Bandwidth Bandwidth required for the communication between N Equivalent NEs and the U2000 server A bandwidth of 2 Mbit/s may not meet the bandwidth requirements in different networks. In this case, you can set the CIR or PIR by using the following formula: CIR: l N > 56: 2048 kbit/s + (N - 56) x 0.5 kbit/ s l N <= 56: 2 Mbit/s PIR: l N > 56: 10240 kbit/s + (N - 56) x 5 kbit/s l N <= 56: 10 Mbit/s Issue 05 (2010-11-19) Bandwidth required for the communication between an OSS and the U2000 server 2 Mbit/s Bandwidth required for the communication between the primary and secondary sites in an HA system (Veritas hot standby) 2 Mbit/s NOTE A minimum of 2 Mbit/s is required. NOTE A minimum of 2 Mbit/s is required. A bandwidth of 2 Mbit/s is enough if you do not synchronize all performance data by using PMS. If you want to synchronize the performance data, more bandwidth is required. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 16-3 iManager U2000 Unified Network Management System Product Description 17 17 Management Capability Management Capability About This Chapter Management capability refers to the capability of the NMS to manage network resources, which are expressed in the number of equivalent NEs. The key technical specifications include the number of equivalent NEs, number of clients, and number of physical NEs.The management capability of the U2000 in a network that consists of different types of NEs is affected by the following factors: l The management capability refers to the maximum number of equivalent NEs that can be managed by the U2000 on certain hardware configuration conditions. The management capability depends on the hardware and varies with the hardware configuration. l If a client also runs on the computer where the server is running, the management capability is reduced by 50%. Hence, it is recommended that you run the client and server on different computers. l The system limits the number of physical nodes. Hence, the number of physical nodes is a restriction for the management capability. l Virtual NEs are not included in the management capability. A pre-configured NE is equal to a real NE. One third-party NE is equal to one equivalent NE. The equivalent coefficient of the OEM equipment is calculated in the way similar to Huawei equipment. 17.1 NE Equivalent Coefficient The NE equivalent coefficient is the ratio of the resources used by physical NEs or ports to the resources used by equivalent NEs. 17.2 Management Capabilities of the U2000 on Different Hardware Platforms This topic describes the management capabilities of the U2000 on different hardware platforms. 17.3 Manageable Equipment This topic describes the equipment that can be managed by the U2000. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 17-1 iManager U2000 Unified Network Management System Product Description 17 Management Capability 17.1 NE Equivalent Coefficient The NE equivalent coefficient is the ratio of the resources used by physical NEs or ports to the resources used by equivalent NEs. Equivalent NE and Equivalent Coefficient l Equivalent NE: The functional features, cross-connect capacity, and number of cards, ports, or channels are specific to NEs of different types. As these NEs require different resources of the NMS, the number of NEs that can be managed by the NMS depends on the NE types. For easy description and calculation of the management capability, the concept of equivalent NE is defined so that NEs of different types or a number of ports can be converted to equivalent NEs by a uniform criteria according to the system resources required by them. The system resources required by an equivalent NE is equal to the resources for managing an STM-1 transport NE. l Equivalent coefficient: Equivalent coefficient = (Resources used by physical NEs or ports)/ (Resources used by equivalent NEs) Currently, a set of U2000 can manage a maximum of 15,000 physical NEs, 15,000 equivalent NEs, and 100 clients. This conclusion is drawn after the tests under a certain environment and objectively reflects the actual management capability of the U2000. The management scales of the U2000 are defined as follows: l Small-scale network: 2,000 equivalent NEs of the U2000 l Medium-scale network: 6,000 equivalent NEs of the U2000 l Large-scale network: 15,000 equivalent NEs of the U2000 NOTE It is recommended that you enable no more than 100,000 performance collection instances at the same time to ensure the running efficiency of the U2000. Calculating the Number of Equivalent NEs Generally, the number of equivalent NEs that the U2000 can manage is calculated according to the following rules: l The basic unit of an equivalent NE of the U2000 is OptiX Metro 1000. l Number of equivalent NEs = <Number of equivalent NEs in the transport domain> + <Number of equivalent NEs in the IP domain> + <Number of equivalent NEs in the access domain> l The comparison coefficient of an equivalent NE of the U2000 to the equivalent NE in each domain is as follows: – 1 equivalent NE in the transport domain = 1 equivalent NE of the U2000 – 4 equivalent nodes in the IP domain = 1 equivalent NE of the U2000 – 3.3 equivalent nodes in the access domain = 1 equivalent NE of the U2000 NOTE The preceding rules are not fixed. For more details, see the Management Capability Instructions. 17.1.1 Equivalent NEs in the Transport Domain <Number of equivalent NEs in the transport domain> = (Number of transport NEs of type_I x Equivalent coefficient + ... + (Number of transport NEs of type_n x Equivalent coefficient) 17-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 05 (2010-11-19) 5 (Without ASON) OptiX OSN 2500 REG 3..1.. 10 OptiX OSN 7500 (equivalent coefficient: 6.1 Equivalent NEs in the Transport Domain <Number of equivalent NEs in the transport domain> = (Number of transport NEs of type_I x Equivalent coefficient + .1.5 + 100 x 4.5 = 565 The management capability of the U2000 varies with OptiX NE Equivalents. Then. Ltd.5 (Without ASON) OptiX OSN 7500 10 (With ASON) 6. and 100 OptiX OSN 3500 (equivalent coefficient: 4. there are 5 OptiX OSN 9500 (equivalent coefficient: 10). Table 17-1 Management capabilities of the U2000 on different OptiX NE Equivalents NE Series NE Type Equivalent Coefficient for the U2000 OSN series OptiX OSN 500 1 OptiX OSN 1500 3. 17-3 .1. + (Number of transport NEs of type_n x Equivalent coefficient) NOTE For example.5 (Without ASON) OptiX OSN 2000 2 OptiX OSN 2500 4.2 Equivalent NEs in the IP Domain <Number of equivalent NEs in the IP domain> = (Number of IP NEs of type_I x Equivalent coefficient) + .iManager U2000 Unified Network Management System Product Description 17 Management Capability 17.5 (With ASON) 2.5 (With ASON) 4.5 OptiX Metro 500 1 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co..5).3 Equivalent NEs in the Access Domain <Number of equivalent NEs in the access domain> = Number of FTTx OLT equivalent NEs + Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs + Number of DSLAM equivalent NEs + Number of equivalent NEs of other access equipment 17. as shown in Table 17-1.5)..5 (Without ASON) OptiX OSN 9500 15 (With ASON) 10 (Without ASON) MSTP series Issue 05 (2010-11-19) OptiX Metro 100 0.. you can calculate the number of equivalent NEs in the transport domain as follows: Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 OptiX Metro 200 0. + (Number of IP NEs of type_n x Equivalent coefficient) 17.5 (Without ASON) OptiX OSN 3500 6.5 (With ASON) 3. 5 OptiX BWS 320GV3 1.5 OptiX Metro 6020 1 OptiX Metro 6040 1 OptiX Metro 6040V2 1 OptiX Metro 6100 1.5 OptiX OSN 900A 1 OptiX BWS OAS.5 OptiX PFE 1670 1 OptiX SLM 1630 1 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 05 (2010-11-19) .5 *N (N refers to the number of slave shelves) OptiX OTU40000 1 OptiX BWS 1600S 1. OptiX BWS OIS 1.5 OptiX Metro 6100V1E 1.5 OptiX Metro 6100V1 1. OptiX BWS OCS. Ltd.5 OptiX Metro 1100 1..5 OptiX BWS 1600G.5 OptiX 155/622 (Metro 2050) 2 OptiX 2500+(Metro 3000) 3 OptiX Metro 3100 3 OptiX 10G (Metro 5000) 4 OptiX 155C 1 OptiX 155S 1 OptiX 155/622B_I 2 OptiX 155/622B_II 2 OptiX 2500 3 OptiX 2500 REG 1.5 +1. OptiX BWS 1600G OLA 1.iManager U2000 Unified Network Management System Product Description 17 Management Capability NE Series SDH series Metro WDM series LH WDM series Marine series 17-4 NE Type Equivalent Coefficient for the U2000 OptiX 155/622H (Metro 1000) 1 OptiX Metro 1000V3 1 OptiX Metro 1050 1. .4 OptiX RTN 610 0.5 (With ASON) 1.4 OptiX RTN 620 0.5 (Without ASON) OptiX OSN 6800A 4+4*N (With ASON) 2+2*N (Without ASON) N refers to the number of slave shelves OptiX OSN 8800 T32(NA) 10+10*N (With ASON) 6+6*N (Without ASON) N refers to the number of slave shelves OptiX OSN 8800 T64(NA) 16+16*N (With ASON) 12+12*N (Without ASON) N refers to the number of slave shelves RTN series Issue 05 (2010-11-19) OptiX RTN 605 0.iManager U2000 Unified Network Management System Product Description 17 Management Capability NE Series NE Type Equivalent Coefficient for the U2000 NG WDM series OptiX OSN 1800 1 OptiX OSN 3800 3.5 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.5 OptiX OSN 1800(NA) 1 OptiX OSN 3800A 3. 17-5 .5 OptiX BWS 1600(NA) 1.5 (Without ASON) OptiX OSN 6800 4+4*N (With ASON) 2+2*N (Without ASON) N refers to the number of slave shelves OptiX OSN 8800 T32 10+10*N (With ASON) 6+6*N (Without ASON) N refers to the number of slave shelves OptiX OSN 8800 T64 16+16*N (With ASON) 12+12*N (Without ASON) N refers to the number of slave shelves NA WDM series OptiX BWS 1600A 1. Ltd.5 (With ASON) 1. 25). there are 5 NE5000E (equivalent coefficient: 10). 200 S5300 (equivalent coefficient: 1.iManager U2000 Unified Network Management System Product Description 17 Management Capability NE Series NE Type Equivalent Coefficient for the U2000 OptiX RTN 910 0...625).5 NE40E-8 2.1.25 NE40E-X8 2.5 NE40E-X16 5 NE40E-16 5 NE5000E 10*N (N: number of chassis) R-series router 1 AR-series router 0.25 + 1000 x 0.625 = 925 The management capability of the U2000 varies with IP NE Equivalents.75 NE20/NE20E 1.2 Equivalent NEs in the IP Domain <Number of equivalent NEs in the IP domain> = (Number of IP NEs of type_I x Equivalent coefficient) + . Issue 05 (2010-11-19) . you can calculate the number of equivalent NEs in the IP domain as follows: Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 NE40E-4 1. and 1000 CX200 (equivalent coefficient: 0. Table 17-2 Management capabilities of the U2000 on different IP NE Equivalents NE Series NE Type Equivalent Coefficient for the U2000 Router NE05/NE08(E)/NE16(E) 0. Then.. Ltd. as shown in Table 17-2.5 OptiX RTN 950 1 OptiX RTN 5000S 1 17.25 SSP 10 NSE 10 Security equipment for load balancing and blocking 17-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.25 NE40/NE80 5 NE40E-X3 1. + (Number of IP NEs of type_n x Equivalent coefficient) NOTE For example. 5 OptiX PTN3900-8 4.75 S7800 series 1.125 S3300 series 0.iManager U2000 Unified Network Management System Product Description NE Series NE Type Equivalent Coefficient for the U2000 Switch S2000 series 0.25 CX600-4 1.5 OptiX PTN 3900 4.25 S5700 series 1.5 S9312 series 6.25 S8016 series 1.625 S2700 series 0.25 S8500 series 1.125 S2300 series 0. Ltd. 17-7 .5 PTN series MAN service platform Issue 05 (2010-11-19) 17 Management Capability Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.25 S5300 series 1.75 S3700 series 0.25 CX600-X8 2.0 OptiX PTN 912 0.25 S9303 series 2.625 CX300 series 1..0 S9306 series 3.25 S6500 series 0.625 S3000 series 0.0 OptiX PTN 1900 2.5 OptiX PTN 910 0.5 OptiX PTN 950 1 CX200 series 0.5 CX600-X2 1 CX600-X3 1.75 S5000 series 0.25 CX600-X1 0. 25 USG2100 series 0.75 Eudomen 8040 3 Eudomen 8080 6 Eudomen 8080E 4 Eudomen 8160E 8 USG9110 4 USG9120 2 USG9210 3 USG9220 6 USG9310 4 USG9320 8 USG5000 series 0.25 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.25 SRG20-15 0.25 SRG20-20 0.5 CX600-X16 5 CX600-16 5 Eudomen 300/500/1000 0.25 SRG20-11 0.25 SRG20-12 0.25 SRG20-21 0.5 Eudomen 200E series 0.75 USG3030 0.25 SRG20-10 0.25 Eudomen 1000E series 0.25 SRG1200 0. Ltd.25 USG50 0.25 USG3040 0. Issue 05 (2010-11-19) .iManager U2000 Unified Network Management System Product Description 17 Management Capability NE Series Firewall USG SRG 17-8 NE Type Equivalent Coefficient for the U2000 CX600-8 2.25 USG2200 series 0.. Ltd. + (Number of ports of type n x Equivalent coefficient) l Number of DSLAM equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + . + (Number of ports of type n x Equivalent coefficient) l Number of MSAN equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + .. + (Number of NEs of type_n x Equivalent coefficient) The management capability of the U2000 varies with access NE Equivalents.25 SIG 17.3 Equivalent NEs in the Access Domain <Number of equivalent NEs in the access domain> = Number of FTTx OLT equivalent NEs + Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs + Number of DSLAM equivalent NEs + Number of equivalent NEs of other access equipment NOTE l Number of FTTx OLT equivalent NEs = (Number of ONTs x Equivalent coefficient) + (Number of MDUs x Equivalent coefficient) + (Number of P2P ports x Equivalent coefficient) l Number of FTTx MDU equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ...25 SIG9810 4 SIG9820 8 SIG9800 Server 4 SVN SVN3000 0.5 MA5200G series 10 ME60 series 10 Voice gateway VG1040/1041 series 0. as shown in Table 17-3. + (Number of ports of type_n x Equivalent coefficient) l Number of equivalent NEs of other access equipment = (Number of NEs of type_I x Equivalent coefficient) + . Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.25 WLAN AP AP 0.1..iManager U2000 Unified Network Management System Product Description NE Series 17 Management Capability NE Type Equivalent Coefficient for the U2000 SRG20-30 0.25 Broadband access MA5200E/F series 1. 17-9 ..25 SRG20-31 0.25 SRG20-31-D 0..... Issue 05 (2010-11-19) .5 8850 18 8825 18 8750 18 MA5200V1R2/R9 3 17.iManager U2000 Unified Network Management System Product Description 17 Management Capability Table 17-3 Management capabilities of the U2000 on different access NE Equivalents Class Type Equivalent Coefficient for the U2000 FTTx OLT (calculation based on the managed ONT.. 17-10 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. MDU. and P2P resources in the case of OLT) ONT 1/64 MDU 1/32 P2P port 1/64 FTTx MDU (calculation based on the managed user ports in the case of MDU) xDSL port 1/128 E1 port 1/128 ETH port 1/128 PSTN/ISDN/HSL port 1/160 xDSL port 1/128 E1 port 1/128 ETH port 1/128 PSTN/ISDN/HSL port 1/160 MSAN (calculation based on the number of managed ports) DSLAM (calculation xDSL port based on the number E1 port of managed ports) Other NEs (calculation based on the NE types) 1/128 1/128 ETH port 1/128 MD5500 1.2 Management Capabilities of the U2000 on Different Hardware Platforms This topic describes the management capabilities of the U2000 on different hardware platforms. Table 17-4 lists the management capabilities of the Table 17-4 on different hardware platforms. 15G-16G 6000 64 No SUN V890-4P*1. Maximum number of physical NEs: 15000 Maximum number of SDH paths: 300000 Maximum number of WDM paths: 50000 17-11 . 8GHz-16G 2000 48 No Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 5GHz-48G 5000 100 Yes PW650-4P*1.2 G-16G 2000 32 No T5220-8C*1.iManager U2000 Unified Network Management System Product Description 17 Management Capability Table 17-4 Management capabilities of the U2000 on different hardware platforms Server Short Name of Computer Managem ent Capability Number of Clients Support Unified Network Manageme nt Number of Physical NEs Mainstream Server to Be Delivered with the U2000 V100R002C01 Sun Server T5220-4C*1.4 G-32G 6000 64 Yes M4000-4P*2.5 GHz-32G 5000 80 Yes SUN E2900-12P*1.5 G-8G 1500 32 No SUN V445-4P*1.0G-8G 2000 32 Yes HP DL580G5-4P *2.13G-16G 6000 64 Yes Array: 6*300G Array PC Server Compatible Server (Reuse) SUN Server Fujitsu Server Issue 05 (2010-11-19) M4000-2P*2. 53G-32G 15000 100 Yes HP DL380G6-2P *2.6 GHz-8G 1500 32 No SUN E2900-8P*1.. Ltd.5 G-16G 3000 48 No SUN V890-2P*1. after upgraded to the U2000.. If must to manage the PTN devices. Issue 05 (2010-11-19) . For example. If T2000 is installed on Netra240.iManager U2000 Unified Network Management System Product Description 17 Management Capability Server PC Server Short Name of Computer Managem ent Capability Number of Clients Support Unified Network Manageme nt PW650-2P*1. the U2000 cannot have the management functions of the PTN devices. if the T2000 is installed on SUN V490. the T2000 can be directly upgraded to the U2000.0 G-8G 2000 32 No IBM X3850M2-4P *2. SUN Server 17-12 SUN Netra240-2P* 1. Ltd.13G-16G 6000 64 No Number of Physical NEs Compatible Server for the Single-Domain Upgrade The servers are applicable to only the single-domain upgrade instead of the cross-domain management in centralized manner. the Netra240 must be changed. but the U2000 cannot have the management functions of the IP and access domains in this case. 8GHz-8G 1500 32 No IBM X3650-2P*2.5GHz-2G 600 16 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. No SUN Netra240 does not support the management of PTN devices. 6 GHz-4G 800 24 No SUN V440-2P*1. 0G-4G 2000 48 No DELL R900-4P*2. Ltd. 4G-2G 600 24 No HP ML570-4P*2..6 GHz-4G 800 24 No SUN V240-2P*1.iManager U2000 Unified Network Management System Product Description Server PC Server Issue 05 (2010-11-19) 17 Management Capability Short Name of Computer Managem ent Capability Number of Clients Support Unified Network Manageme nt SUN V490-2P*1. 0G-4G 2000 64 No HP ML110-1P*2.13 G-4G 2000 48 No DELL PE6800-4P*2. 0G-4G 1500 32 No Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.0 G-4G 2000 64 No IBM X3200-1P*2.5 GHz-4G 600 16 No SUN V245-2P*1. Number of Physical NEs 17-13 .5 GHz-4G 600 16 No IBM X3500-2P*2. 0G-4G 2000 48 No DELL PE2900-2P*2.4 G-2G 600 14 No HP ML350-2P*2. 13 Manageable Broadband Access Series Equipment 17. Issue 05 (2010-11-19) .12 Manageable Metro Service Platform Equipment 17.0 G-8G 6000 64 No IBM X3850M2-4P *2.3.0G-8G 6000 64 No HP DL580G5-4P *2.3.3.5 Manageable RTN Series Equipment 17.9 Manageable DSLAM Series Equipment 17.3.3.1 Manageable MSTP Series Equipment 17.14 Manageable VoIP Gateway Equipment 17-14 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.3. 17. Ltd.10 Manageable Router Series Equipment 17.7 Manageable FTTx Series Equipment 17.iManager U2000 Unified Network Management System Product Description 17 Management Capability Server Short Name of Computer Managem ent Capability Number of Clients Support Unified Network Manageme nt DELL PE840-1P*2.3.13G-16G 10000 100 No Number of Physical NEs 17.3.3.11 Manageable Switch Series Equipment 17.3 Manageable NA WDM Series Equipment 17.13G-16G 10000 100 No IBM X3650-2P*2.3.3.4 Manageable Submarine Line Equipment 17.3 Manageable Equipment This topic describes the equipment that can be managed by the U2000.3.4 G-2G 600 24 No HP DL380G5-2P *2.8 Manageable MSAN Series Equipment 17.3.3..6 Manageable PTN Series Equipment 17.2 Manageable WDM Series Equipment 17. Ltd..3. 17-15 .3.19 Manageable OP-Bypass Equipment Manageable OP-Bypass equipment are listed as follows: 17.15 Manageable WLAN Series equipment 17.3.3.17 Manageable DPI Equipment 17.1 Manageable MSTP Series Equipment Manageable MSTP series equipment is listed as follows: Table 17-5 Manageable MSTP series equipment Category Equipment Description SDH series OptiX 155C OptiX 155C SDH transmission unit for the access network OptiX 155S OptiX 155S simplified STM-1 optical transmission system OptiX 1556/622B_I OptiX 155/622B STM-1/STM-4 compatible optical transmission system (19-inch rack) OptiX 1556/622B_II MSTP series Issue 05 (2010-11-19) OptiX 2500 OptiX 2500 STM-4/STM-16 compatible optical transmission system OptiX 2500 REG OptiX 2500 REG STM-16 regenerator OptiX Metro 100 OptiX Metro 100 terminal STM-1 optical transmission system OptiX Metro 200 OptiX Metro 200 ultra compact STM-1 optical transmission system OptiX Metro 500 OptiX Metro 500 ultra compact STM-1 multi-service transmission system OptiX 155/622H (Metro 1000) OptiX 155/622H(Metro1000) STM-1/ STM-4 MSTP OptiX Metro 1000 OptiX 155/622H(Metro1000) STM-1/ STM-4 MSTP optical transmission system V3 series OptiX Metro 1050 OptiX Metro 1050 compact STM-1/ STM-4 multi-service optical transmission system Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 17 Management Capability 17.3.3.18 Manageable SVN Series Equipment Manageable SVN series equipment are listed as follows: 17.16 Manageable Firewall Series Equipment 17. . Ltd.3. Issue 05 (2010-11-19) .iManager U2000 Unified Network Management System Product Description 17 Management Capability Category OSN series Equipment Description OptiX Metro 1100 OptiX Metro 1100 compact container STM-16 multi-service transmission system OptiX 155/622 (Metro 2050) OptiX 155/622(Metro2050) STM-1/ STM-4 compatible optical transmission system OptiX 2500+ (Metro 3000) OptiX 2500+(Metro3000) STM-16 MADM/MSTP optical transmission system OptiX Metro 3100 OptiX Metro 3100 STM-16 multiservice transmission system OptiX 10G (Metro 5000) OptiX 10G(Metro5000)STM-64 MADM optical transmission system OptiX OSN 500 OptiX OSN 500 STM-1/STM-4 multiservice CPE optical transmission system OptiX OSN 1500 OptiX OSN 1500 intelligent optical transmission system OptiX OSN 2000 OptiX OSN 2000 enhanced STM-1/ STM-4 multi-service optical transmission system OptiX OSN 2500 OptiX OSN 2500 intelligent optical transmission system OptiX OSN 2500 REG OptiX OSN 2500 REG STM-16 regenerator OptiX OSN 3500 OptiX OSN 3500 intelligent optical transmission system OptiX OSN 3500 II OptiX OSN 7500 OptiX OSN 7500 intelligent optical switching system OptiX OSN 9500 OptiX OSN 9500 intelligent optical switching system 17.2 Manageable WDM Series Equipment Manageable WDM series equipment is listed as follows: 17-16 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. . OptiX BWS 1600G OLA OptiX BWS 1600G backbone DWDM optical transmission system V100R003 or higher OptiX BWS 1600S OptiX BWS 1600S submarine line terminal equipment OptiX OTU40000 OptiX OTU 40000 backbone DWDM optical transmission system OptiX OSN 1800 OptiX OSN 1800 compact multi-service edge optical transport platform LH WDM series NG WDM series Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 17-17 . Ltd.iManager U2000 Unified Network Management System Product Description 17 Management Capability Table 17-6 Manageable WDM equipment Category Equipment Description Metro WDM series OptiX Metro 6020 OptiX Metro 6020 compact container CWDM system V100R001 OptiX Metro 6040 OptiX Metro 6040 compact container WDM system V100R001 OptiX Metro 6040 V2 OptiX Metro 6040 compact container DWDM system V200R001 or higher OptiX Metro 6100 OptiX Metro 6100 DWDM multi-service transmission system V100R002 OptiX Metro 6100V1 OptiX Metro 6100 DWDM multi-service transmission system V100R003 OptiX Metro 6100 V1E OptiX Metro 6100 WDM multi-service transmission system V100R004 or higher OptiX OSN 900A OptiX OSN 900A compact WDM system (A Type) OptiX BWS 320G OptiX BWS 320G backbone DWDM optical transmission system V300R002 OptiX BWS 320G V3 OptiX BWS 320G backbone DWDM optical transmission system V300R004 OptiX BWS 1600G. 17. It is supported by the OptiX BWS 1600G backbone DWDM optical transmission system V100R004 and higher versions.iManager U2000 Unified Network Management System Product Description 17 Management Capability Category Equipment Description OptiX OSN 3800 OptiX OSN 3800 compact intelligent optical transport platform OptiX OSN 6800 OptiX OSN 6800 intelligent optical transport platform OptiX OSN 8800 T32 OptiX OSN 8800 T32 intelligent optical transport platform OptiX OSN 8800 T64 OptiX OSN 8800 T64 intelligent optical transport platform NOTE The OptiX BWS 1600G OLA is an independent power supply subrack. Ltd.. Issue 05 (2010-11-19) .3.3 Manageable NA WDM Series Equipment Manageable NA WDM series equipment is listed as follows: Table 17-7 Manageable NA WDM equipment Category Equipment Description LH WDM series OptiX BWS 1600A OptiX BWS 1600A WDM Optical Transmission System OptiX BWS 1600G(NA) OptiX BWS 1600G(NA) Backbone DWDM Optical Transmission System OptiX OSN 1800(NA) compact intelligent optical transport platform OptiX OSN 1800(NA) OptiX OSN 3800A compact intelligent optical transport platform OptiX OSN 3800A OptiX OSN 6800A intelligent optical transport platform OptiX OSN 6800A OptiX OSN 8800 I/II(NA) intelligent optical transport platform OptiX OSN 8800 I/II(NA) NG WDM series 17-18 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 3.6 Manageable PTN Series Equipment Manageable PTN series equipment is listed as follows: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co..iManager U2000 Unified Network Management System Product Description 17 Management Capability 17.5 Manageable RTN Series Equipment Manageable RTN series equipment is listed as follows: Table 17-9 Manageable RTN equipment Category Equipment Description RTN series OptiX RTN 605 OptiX RTN 605 radio transmission system OptiX RTN 610 OptiX RTN 610 radio transmission system OptiX RTN 620 OptiX RTN 620 radio transmission system OptiX RTN 910 OptiX RTN 910 radio transmission system OptiX RTN 950 OptiX RTN 950 radio transmission system OptiX RTN 5000S OptiX RTN 5000S radio transmission system 17.4 Manageable Submarine Line Equipment Manageable submarine line equipment is listed as follows: Table 17-8 Manageable submarine line equipment Category Equipment Description Submarine line series OptiX SLM 1630 OptiX SLM 1630 submarine line monitor OptiX PFE 1670 OptiX PFE 1670 Power Feeding Equipment OptiX BWS 1600S OptiX BWS 1600S submarine line terminal equipment 17. Ltd. 17-19 .3.3. 7 Manageable FTTx Series Equipment Manageable FTTx series equipment are listed as follows: Table 17-11 Manageable FTTx series equipment Category OLT series 17-20 Equipment Description MA5600T SmartAX MA5600T Multi-service Access Module MA5603T SmartAX MA5603T Optical Access Equipment MA5680T SmartAX MA5680T Optical Access Equipment MA5683T SmartAX MA5683T Optical Access Equipment MA5606T SmartAX MA5606T Optical Access Equipment. Issue 05 (2010-11-19) .. Only the version of V800R105 support. MA5603U SmartAX MA5603U Multi-service Access Module Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 17 Management Capability Table 17-10 Manageable PTN series equipment Category Equipment Description PTN series OptiX PTN 1900 OptiX PTN 1900 multiservice packet transmission platform OptiX PTN 3900 OptiX PTN 3900 multiservice packet transmission platform OptiX PTN 3900-8 OptiX PTN 3900-8 multiservice packet transmission platform OptiX PTN 912 OptiX PTN 912 multiservice packet transmission platform OptiX PTN 910 OptiX PTN 910 multiservice packet transmission platform OptiX PTN 950 OptiX PTN 950 multiservice packet transmission platform 17.3. Ltd. 17-21 ..iManager U2000 Unified Network Management System Product Description Category MDU series ONT series Issue 05 (2010-11-19) 17 Management Capability Equipment Description MA5606T SmartAX MA5606T Optical Access Equipment MA5620 SmartAX MA5620 Multiple Dwelling Unit MA5626 SmartAX MA5626 Multiple Dwelling Unit MA5628 SmartAX MA5628 Multiple Dwelling Unit MA5620E SmartAX MA5620E EPON Multiple Dwelling Unit MA5626E SmartAX MA5626E EPON Multiple Dwelling Unit MA5620G SmartAX MA5620G GPON Multiple Dwelling Unit MA5626G SmartAX MA5626G GPON Multiple Dwelling Unit MA5610 SmartAX MA5610 Multi-service Access Module MA5612 SmartAX MA5612 Multi-service Access Module MA5616 SmartAX MA5616 Multi-service Access Module MA5651 SmartAX MA5651 Multiple Dwelling Unit MA5651G SmartAX MA5651G Multiple Dwelling Unit MA5652G SmartAX MA5652G GPON Multiple Dwelling Unit MA5635 SmartAX MA5635 Multi-service Access Module MA5662 SmartAX MA5662 Multi-Service Access Module SRG2220 SRG2220 Service Router Gateway EchoLife:OT550 - EchoLife:HG850 - EchoLife:HG850a - EchoLife:HG851 - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. 8 Manageable MSAN Series Equipment Manageable MSAN series equipment are listed as follows: Table 17-12 Manageable MSAN series equipment 17-22 Category Equipment Description UA5000 series UA5000 UA5000 Universal Access Unit Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.3..iManager U2000 Unified Network Management System Product Description 17 Management Capability Category Equipment Description EchoLife:HG852 - EchoLife:HG853 - EchoLife OT925 - SmartAX OT928 - EchoLife:HG810 - EchoLife:HG811 - EchoLife:HG813 - EchoLife:HG860 - EchoLife:HG861 - EchoLife:HG863 - EchoLife:HG865 - EchoLife:HG810a - EchoLife:HG866 - EchoLife:HG866e - U5KG - 810e - 813e - 850e - 925e - U5KE - HG8240 - HG8245 - HG8247 - 17. Issue 05 (2010-11-19) . Ltd. 3. 17-23 .3.10 Manageable Router Series Equipment Manageable router series equipment are listed as follows: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.9 Manageable DSLAM Series Equipment Manageable DSLAM series equipment are listed as follows: Table 17-13 Manageable DSLAM series equipment Category MA5100 series MA5300 series MA5600 series MA5600V8 series Equipment Description MA5100V2 SmartAX MA5100 Multi-service Access Module MA5105 SmartAX MA5105 Multi-service Access Module MA5300 SmartAX MA5300 Broadband Access System MA5600V3 SmartAX MA5600 Multi-service Access Module MA5605 SmartAX MA5605 Multi-service Access Module MA5615 SmartAX MA5615 Broadband Access System MA5600T SmartAX MA5600T Multiservice Access Module MA5603T SmartAX MA5603T Multiservice Access Module MA5606T SmartAX MA5606T Multiservice Access Module 17. Ltd..iManager U2000 Unified Network Management System Product Description Category MD5500 series 17 Management Capability Equipment Description UA5000(PVU) UA5000 Universal Access Unit UA5000(IPMB) UA5000 Universal Access Unit UA5000(PVMV1) UA5000 Universal Access Unit MD5500 MD5500 Multi-service Distribution Module 17. Issue 05 (2010-11-19) .11 Manageable Switch Series Equipment Manageable switch series equipment are listed as follows: Table 17-15 Manageable switch series equipment 17-24 Category Device Description S8500 series switches S8505 Quidway S8505 Series Routing Switches S8505E Quidway S8505E Series Routing Switches S8508 Quidway S8508 Series Routing Switches Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Unified Network Management System Product Description 17 Management Capability Table 17-14 Manageable router series equipment Category Device Description NE series routers NE05 Net engine 05 router NE08 Net engine 08 router NE16 Net engine 16 router NE08E Net engine 08E router NE16E Net engine 16E router NE20 Net engine 20 router NE20E Net engine 20E router NE40 Net engine 40 universal switching router NE80 Net engine 80 universal switching router NE40E/NE80E Net engine 40E/80E core router NE5000E Net engine 5000E core router R series routers R series routers AR18 Advanced router 18 serials router AR28 Advanced router 28 serials router AR46 Advanced router 46 serials router AR19 Advanced router 19 serials router AR29 Advanced router 29 serials router AR49 Advanced router 49 serials router R/AR series routers 17..3. Ltd. . Ltd. 17-25 .iManager U2000 Unified Network Management System Product Description Category Device Description S8512 Quidway S8512 Series Routing Switches S7800 series switches S7800 Quidway S7800 Series Ethernet Switches S6500 series switches S6502 Quidway S6502 Series Ethernet Switches S6503 Quidway S6502 Series Ethernet Switches S6506R Quidway S6506R Series Ethernet Switches S6506 Quidway S6506 Series Ethernet Switches S50 series switches Quidway S5000 Series Ethernet Switches S55 series switches Quidway S5500 Series Ethernet Switches S56 series switches Quidway S5600 Series Ethernet Switches S30 series switches Quidway S3000 Series Ethernet Switches S35 series switches Quidway S3500 Series Ethernet Switches S39 series switches Quidway S3900 Series Ethernet Switches S20 series switches Quidway S2000 Series Ethernet Switches S24 series switches Quidway S2400 Series Ethernet Switches S2300 Quidway S2300 Series Ethernet Switches S2700 Quidway S2700 Series Ethernet Switches S3300 Quidway S3300 Series Ethernet Switches S3700 Quidway S3700 Series Ethernet Switches S5300 Quidway S5300 Series Ethernet Switches S5000 series switches S3000 series switches S2000 series switches box series switches Issue 05 (2010-11-19) 17 Management Capability Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. .3. Ltd.iManager U2000 Unified Network Management System Product Description 17 Management Capability Category frame series switches Device Description S5700 Quidway S5700 Series Ethernet Switches S9300 Quidway S9300 Terabit Routing Switch 17.14 Manageable VoIP Gateway Equipment Manageable VoIP gateway equipment are listed as follows: 17-26 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.3.12 Manageable Metro Service Platform Equipment Manageable Metro service platform equipment are listed as follows: Table 17-16 Manageable Metro service platform equipment Category Device Description CX series devices CX200 CX200 Metro Services Platform CX200C CX200C Metro Services Platform CX200D CX200D Metro Services Platform CX300 CX300 Metro Services Platform CX380 CX380 Metro Services Platform CX600 CX600 Metro Services Platform 17.3.13 Manageable Broadband Access Series Equipment Manageable broadband access series equipment are listed as follows: Table 17-17 Manageable broadband access series equipment Category Device Description Multi-service gateways MA5200E Multiservice access 5200E service gateway MA5200F Multiservice access 5200F service gateway MA5200G Multiservice access 5200G service gateway ME60 series Multiservice engine 60 serials service gateway 17. Issue 05 (2010-11-19) . Ltd.iManager U2000 Unified Network Management System Product Description 17 Management Capability Table 17-18 Manageable VoIP gateway equipment Category Device Description VoIP Gateway VG10 VoIP gateways 10 VG20 VoIP gateways 20 VG80 VoIP gateways 80 XE series - 17..3.15 Manageable WLAN Series equipment Manageable WLAN Series equipment are listed as follows: Table 17-19 Manageable WLAN series equipment Category Device Description WLAN WA10 AP WLAN 10 WA12 AP WLAN 12 17. 17-27 .16 Manageable Firewall Series Equipment Manageable firewall series equipment are listed as follows: Table 17-20 Manageable firewall series equipment Issue 05 (2010-11-19) Category Device Description Eudemon E8080E Eudemon 8000E series Firewall E8160E Eudemon 8000E series Firewall NE40E-FW Eudemon 8000E series Firewall NE80E-FW Eudemon 8000E series Firewall E8040 Eudemon 8000 series Firewall E8080 Eudemon 8000 series Firewall E1000E U2 Eudemon 1000E series Firewall E1000E U3 Eudemon 1000E series Firewall E1000E U5 Eudemon 1000E series Firewall E1000E U6 Eudemon 1000E series Firewall Eudemon1000E-D Eudemon 1000E series Firewall Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.3. Ltd.. Issue 05 (2010-11-19) .iManager U2000 Unified Network Management System Product Description 17 Management Capability Category USG 17-28 Device Description Eudemon1000E-I Eudemon 1000E series Firewall E300 Eudemon 300 series Firewall E500 Eudemon 500 series Firewall E1000 Eudemon 1000 series Firewall E200 Eudemon 200 series Firewall E100E Eudemon E100E series Firewall E200S Eudemon E200S series Firewall USG9310 USG9300 Unified Security Gateway USG9320 USG9300 Unified Security Gateway USG9210 USG9200 Unified Security Gateway USG9220 USG9200 Unified Security Gateway USG5320 USG5000 Unified Security Gateway USG5330 USG5000 Unified Security Gateway USG5350 USG5000 Unified Security Gateway USG5360 USG5000 Unified Security Gateway USG5310 USG5000 Unified Security Gateway USG5300ADD USG5000 Unified Security Gateway USG5300ADI USG5000 Unified Security Gateway USG2130 USG2100 Unified Security Gateway USG2130W USG2100 Unified Security Gateway USG2160 USG2100 Unified Security Gateway USG2160W USG2100 Unified Security Gateway E200E-B E200E Unified Security Gateway USG2160 USG2100 Unified Security Gateway USG2160W USG2100 Unified Security Gateway USG2160BSR USG2100 Unified Security Gateway USG2160BSR-W USG2100 Unified Security Gateway USG2130BSR USG2100 Unified Security Gateway USG2130BSR-W USG2100 Unified Security Gateway USG2120BSR USG2100 Unified Security Gateway Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd.iManager U2000 Unified Network Management System Product Description Category Issue 05 (2010-11-19) 17 Management Capability Device Description USG2160HSR USG2100 Unified Security Gateway USG2160HSR-W USG2100 Unified Security Gateway USG2130HSR USG2100 Unified Security Gateway USG2130HSR-W USG2100 Unified Security Gateway Eudemon200E-B E200E Unified Security Gateway Eudemon200E-BW E200E Unified Security Gateway USG2130HSR-P USG2100 Unified Security Gateway USG2130HSR-WP USG2100 Unified Security Gateway USG2160HSR-P USG2100 Unified Security Gateway USG2160HSR-WP USG2100 Unified Security Gateway USG2110-F USG2100 Unified Security Gateway USG2110-F-W USG2100 Unified Security Gateway USG2110-A-W USG2100 Unified Security Gateway USG2110-A-GW-W USG2100 Unified Security Gateway USG2110-A-GW-C USG2100 Unified Security Gateway USG2110-A-GW-T USG2100 Unified Security Gateway USG50 USG50 Unified Security Gateway USG2110 USG2100 Unified Security Gateway USG2210 USG2100 Unified Security Gateway USG2220 USG2100 Unified Security Gateway USG2230 USG2100 Unified Security Gateway USG2250 USG2100 Unified Security Gateway USG2250-D USG2100 Unified Security Gateway USG2205BSR USG2200 Unified Security Gateway USG2220BSR USG2200 Unified Security Gateway USG2220BSR-D USG2200 Unified Security Gateway E200E_C E200E Unified Security Gateway E200E_F E200E Unified Security Gateway E200E-F-D E200E Unified Security Gateway USG2220BSR USG2200 Unified Security Gateway Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 17-29 .. Issue 05 (2010-11-19) ..iManager U2000 Unified Network Management System Product Description 17 Management Capability Category SRG 17-30 Device Description USG2205BSR USG2200 Unified Security Gateway USG2220HSR USG2200 Unified Security Gateway USG2205HSR USG2200 Unified Security Gateway USG5150 USG5100 Unified Security Gateway USG5120 USG5100 Unified Security Gateway USG5150BSR USG5100 Unified Security Gateway USG5120BSR USG5100 Unified Security Gateway USG5150HSR USG5100 Unified Security Gateway USG5120HSR USG5100 Unified Security Gateway USG2205HSR USG2200 Unified Security Gateway USG2220HSR-D USG2200 Unified Security Gateway USG2220TSM USG2200 Unified Security Gateway USG2250TSM USG2200 Unified Security Gateway USG5120-D USG5100 Unified Security Gateway USG5120BSR-D USG5100 Unified Security Gateway USG3040 USG3040 Unified Security Gateway USG3030 USG3030 Unified Security Gateway SRG2220 SRG2200 Secure Routing Gateway SRG2220-D SRG2200 Secure Routing Gateway SRG2210 SRG2200 Secure Routing Gateway SRG3230 SRG3200 Secure Routing Gateway SRG3240 SRG3200 Secure Routing Gateway SRG3240-D SRG3200 Secure Routing Gateway SRG3250 SRG3200 Secure Routing Gateway SRG3260 SRG3200 Secure Routing Gateway SRG20-20 SRG20 Secure Routing Gateway SRG20-21 SRG20 Secure Routing Gateway SRG20-30 SRG20 Secure Routing Gateway SRG20-31 SRG20 Secure Routing Gateway SRG20-31-D SRG20 Secure Routing Gateway Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. .iManager U2000 Unified Network Management System Product Description Category EGW 17 Management Capability Device Description SRG2220 SRG2200 Secure Routing Gateway SRG2220-D SRG2200 Secure Routing Gateway SRG20-10 SRG20 Secure Routing Gateway SRG1210 SRG1200 Secure Routing Gateway SRG1210W SRG1200 Secure Routing Gateway SRG1220 SRG1200 Secure Routing Gateway SRG1220W SRG1200 Secure Routing Gateway SRG1210-S SRG1200 Secure Routing Gateway SRG1210-S SRG1200 Secure Routing Gateway SRG20-11 SRG20 Secure Routing Gateway SRG20-12 SRG20 Secure Routing Gateway SRG20-15 SRG20 Secure Routing Gateway SRG20-15W SRG20 Secure Routing Gateway SRG20-12W SRG20 Secure Routing Gateway EGW2160 EGW2100 series Enterprise Gateway EGW2160W EGW2100 series Enterprise Gateway EGW2130 EGW2100 series Enterprise Gateway EGW2130W EGW2100 series Enterprise Gateway EGW2220 EGW2200 series Enterprise Gateway EGW2220-D EGW2200 series Enterprise Gateway EGW2210 EGW2200 series Enterprise Gateway EGW3260 EGW3200 series Enterprise Gateway EGW3250 EGW3200 series Enterprise Gateway EGW3240 EGW3200 series Enterprise Gateway EGW3240-D EGW3200 series Enterprise Gateway EGW3230 EGW3200 series Enterprise Gateway EGW2112GW EGW2100 series Enterprise Gateway 17. Ltd.3.17 Manageable DPI Equipment Manageable DPI equipment are listed as follows: Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 17-31 . 18 Manageable SVN Series Equipment Manageable SVN series equipment are listed as follows: Table 17-22 Manageable SVN series equipment Category Device Description SVN SVN3000 SVN3000 17. Ltd.3.3.iManager U2000 Unified Network Management System Product Description 17 Management Capability Table 17-21 Manageable DPI equipment Category Device Description SIG SIG9810 SIG9810 DPI Equipment SIG9820 SIG9820 DPI Equipment NE40E-DPI NE40E-DPI DPI Equipment NE80E-DPI NE80E-DPI DPI Equipment SIG Server SIG DPI Equipment DPI Server DPI DPI Equipment RADIUS Server RADIUS DPI Equipment URL Classify Server URL Classify DPI Equipment 17. Issue 05 (2010-11-19) .19 Manageable OP-Bypass Equipment Manageable OP-Bypass equipment are listed as follows: Table 17-23 Manageable OP-Bypass equipment 17-32 Category Device Description OP-Bypass OP-Bypass OP-Bypass Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. TMF 608. RFC 2011. RFC 2572. the U2000 has good expandability and reusability. Complying with multiple standards. RFC 2578. RFC 3412.) l The XML service delivery and inventory query are based on the MTOSI standards as follows: TMF 518. RFC 2013. RFC 3416. and TMF 864 l CORBA 2. 18-1 .3020.1 standards l The CORBA alarm northbound interface complies with the MTNM standards as follows: TMF 513. TMF 612. M. RFC 2573. RFC 1212. The U2000 complies with the following international standards and protocols: l RFC 793 Telnet/TCP/IP standards l RFC 1155. RFC 2574. RFC 3413. etc. 3010. GR-831. RFC 1907. RFC 3415.3100.5 protocol l ISO 8824 and ISO 8825 ASN. RFC 1157. and RFC 2580 SNMP V2 series standards l RFC 3411. RFC 2012. RFC 2571. and TMF 814 Table 18-1 lists the details of the standards and protocols. and RFC 3418 SNMP V3 series standards l RFC 3164 Syslog standards l ISO 8824 and ISO 8825 ASN.1/WSDL l TL1 (Telcordia GR-811. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.3400 (without accounting) l HTTP and JAVA interface protocols and standards l W3C SOAP 1. Ltd. RFC 1906. The information model is constructed based on the object-oriented concept. RFC 3414.. RFC 2576. M. M. The U2000 is developed according to the network management system model that the ITU-T TMN series standards define. and M.1 standards l ITU-T standards for managing the telecommunications management network: M. RFC 2579. RFC 1213 and RFC 1215 SNMP V1 series standards l RFC 1905. RFC 3417. RFC 1908.3000.iManager U2000 Unified Network Management System Product Description 18 18 Standards Compliance Standards Compliance This topic describes the standards that the U2000 is compliant with. Ltd. Version 2..iManager U2000 Unified Network Management System Product Description 18 Standards Compliance Table 18-1 Details of the Standards and Protocols Standards and Protocols 18-2 Description RFC 793 Transmission Control Protocol (Darpa Internet Program Protocol Specification) RFC 1155 Structure and Identification of Management Information for TCP/IP-based Internets RFC 1212 Concise MIB Definitions RFC 1213 Management Information Base for Network Management of TCP/IP-based Internets: MIB-II RFC 1215 A Convention for Defining Traps for use with the SNMP RFC 1905 Protocol Operations for Version 2 of the Simple Network Management Protocol RFC 1906 Transport Mappings for Version 2 of the Simple Network Management Protocol RFC 1907 Management Information Base for Version 2 of the Simple Network Management Protocol RFC 1908 Coexistence between Version 1 and Version 2 of the Internet-standard Network Management Framework RFC 2011 SNMPv2 Management Information Base for the Internet Protocol using SMIv2 RFC 2012 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 RFC 2013 SNMPv2 Management Information Base for the User Datagram Protocol using SMIv2 RFC 2571 An Architecture for Describing SNMP Management Frameworks RFC 2572 Message Processing and Dispatching for the Simple Network Management Protocol RFC 2573 SNMP Applications RFC 2574 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol RFC 2576 Coexistence between Version 1. Issue 05 (2010-11-19) . and Version 3 of the Internetstandard Network Management Framework RFC 2578 Structure of Management Information Version 2 (SMIv2) RFC 2579 Textual Conventions for SMIv2 RFC 2580 Conformance Statements for SMIv2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Abstract Syntax Notation One (ASN.1 Specifications Amendment 1: ASN. Amendment 1: 12/01/2000 ITU-T M. 3101 Managed Object Conformance statements for the generic network information model Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1 semantic model ISO 8825-2-199 8 Information Technology . 18-3 .1): Parameterization of ASN. 3017 Framework for the integrated management of hybrid circuit/packet networks ITU-T M. Ltd. 3100 Generic network information model ITU-T M. 3000 Overview of TMN recommendations ITU-T M.. 3013 Considerations for a telecommunications management network ITU-T M.ASN.1 Encoding Rules: Specification of Packed Encoding Rules (PER) Second Edition. Technical Corrigendum 1: 12/15/1999. 3020 TMN interface specification methodology ITU-T M. 3010 Principles for a telecommunications management network ITU-T M.iManager U2000 Unified Network Management System Product Description Standards and Protocols Issue 05 (2010-11-19) 18 Standards Compliance Description RFC 3411 An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks RFC 3412 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) RFC 3413 Simple Network Management Protocol (SNMP) Applications RFC 3414 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) RFC 3415 View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP) RFC 3416 Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP) RFC 3417 Transport Mappings for the Simple Network Management Protocol (SNMP) RFC 3418 Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) RFC 3164 BSD syslog Protocol ISO 8824-4-200 0 Information Technology . 1 Enterprise viewpoint for simple subnetwork connection management Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 803 Architecture of transport networks based on the synchronous digital hierarchy (SDH) ITU-T G. 04) Synchronous digital hierarchy (SDH) . 783 Characteristics of synchronous digital hierarchy (SDH) equipment functional blocks ITU-T G. 3180 Catalogue of TMN management information ITU-T M.Systems Management: alarm reporting function ITU-T X. 852. 3400 TMN management functions ITU-T X. 721 Definition of management information ITU-T X. 784 Synchronous digital hierarchy (SDH) management ITU-T G. 831 Management capabilities of transport networks based on the synchronous digital hierarchy (SDH) ITU-T G. 774 (01. 733 Information technology . 722 Guidelines for the definition of managed objects ITU-T X. 707 Network node interface for the synchronous digital hierarchy (SDH) ITU-T G. 3300 TMN F interface requirements ITU-T M. 03.Application of the RM-ODP framework ITU-T G.Management information model for the network element view ITU-T G.Open Systems Interconnection .Reference Model: architecture ITU-T G. 903 Information technology ..Open distributed processing . 3200 TMN management services and telecommunications managed areas: overview ITU-T M. 851. 02. 720 Management information model ITU-T X. Issue 05 (2010-11-19) .1 Management of the transport network . 773 Protocol suites for Q-interfaces for management of transmission systems ITU-T G. Ltd.iManager U2000 Unified Network Management System Product Description 18 Standards Compliance Standards and Protocols 18-4 Description ITU-T M. 6 Information viewpoint for trail management ITU-T G. 852. 854.0 TMF608 V2. 18-5 .0 Multi-Technology Network Management Business Agreement NML-EML Interface Version 2.5 Rational Unified Process Sif99025 EML-NML interface models TMF513 V2.0 Multi Technology Network Management Solution Set Conformance Document Version 2.0 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 854. 853.3 Computational viewpoint for topology management ITU-T G. 853.6 Computational viewpoint for trail management Rational Unified Process 5.1 Common elements of the information viewpoint for the management of a transport network ITU-T G.0 TMF814 V2. 852.6 Enterprise viewpoint for trail management ITU-T G.0 TMF814 V2.iManager U2000 Unified Network Management System Product Description Standards and Protocols Issue 05 (2010-11-19) 18 Standards Compliance Description ITU-T G.. 852.0 Multi Technology Network Management Solution Set Conformance Document Version 2.3 Enterprise viewpoint for topology management ITU-T G. Ltd.0 Multi-Technology Network Management Information Agreement NML-EML Interface Version 2. 854. 853.3 Information viewpoint for topology management ITU-T G.2 Subnetwork connection management information viewpoint ITU-T G.1 Computational interfaces for basic transport network model ITU-T G.2 Enterprise viewpoint description of transport network resource model ITU-T G. 853. . AIS insertion If there are excessive errors in a channel. the result of polling the physical resources differ from the first time. and alarm2 complies with the conditions defined in the alarm correlation analysis rule. For a tributary board at the E1 or T1 level. The physical resources that cannot be polled in the second time are called the abnormal resource. NMS displays the received information on the alarm start on the topological view. subordinate alarm and prompt alarm. the physical resources of some devices. sub-card and port. The alarm state contains four types: urgent alarm. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. you can set whether to insert AIS when there are excessive errors in the B1. For a line board. such as the card. AIS Alarm Indication Signal. warning alarm. important alarm. cannot be accessed because they have been deleted or have some faults. So. after the NMS carries out the operation of device resource polling on the device management module or the module is refreshed manually again. AIS can be inserted in this channel to indicate it is unavailable. For a tributary board at the E3 level or higher. A signal sent downstream in a digital network if an upstream failure has been detected and persists for a certain time. Alarm Level Alarm level is to identify the severity of an alarm or event. Such a process is called alarm correlation analysis. major. B2 and B3 bytes. Auto Discovery Issue 05 (2010-11-19) NMS tests the remote device by using PING or the SNMP parameter module configured in advanced to discover the IP device or the device that supports SNMP and to add the discovered devices automatically. Alarm Status Device reports the trap information to NMS. A-1 . you can either suppress the alarm2 or raise its severity level according to the behavior defined in the alarm correlation rule. Alarm correlation analysis In the case alarm2 is raised within five seconds after alarm1 is raised. you can set whether to insert AIS when there are excessive errors in BIP-2.. minor. you can set whether to insert AIS when there are excessive errors in the B3 byte. Ltd.iManager U2000 Unified Network Management System Product Description A A Glossary and Abbreviations Glossary and Abbreviations A Abnormal Resource When the NMS carries out the operation of device resource polling on the device management module or the module is refreshed manually. It is divided up into four levels: critical. Its service life can be prolonged by decreasing the duration during which laser is on. Baseline collection test One of the test types for submarine line. Ltd. Minor. and provide alerts or alarms for the line. Alarm A visible or an audible indication to notify the person concerned that a failure or an emergency has occurred. Bit error alarm threshold When the bit error reaches a specific limit. a specific NE. or when updating the baseline is required. ALS is turned on when the optical interface board does not carry services or the optical fibre is faulty. The object here may be the networkwide equipment. Baseline Select the test result when the line is in good condition as the line test baseline. this function can be used to avoid generating relevant alarm information. the whole VPG will switch over to quicken the ATM protection switching (as quick as the protection switching of the SDH layer. Major. thus preventing alarm interference. bandwidth specifies the maximum value of the rate when the data passes through some data channel. Binding In virtual concatenated payload configuration. and Warning. called monitoring connections (APS VPCs). Automatic switching When the active board or path fails.iManager U2000 Unified Network Management System Product Description A Glossary and Abbreviations Alarm reversion For the port that has already been configured but not actually loaded with services. In the VP group (VPG). Alarm suppression The suppressed alarm of a specific object is not reported. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. to provide a basis of comparison and analysis for the following line test result. all bound services will switch as a whole. a specific board and even a specific function module of a specific board. B Band Width In the data communication area. Issue 05 (2010-11-19) .. If a fault occurs to one of the bound services. the standby one can automatically take over the job of the active one. This limit is the bit error alarm threshold. the alarm is classified into four severities: Critical. Alarm severity According to ITU-T recommendations. ALS Automatic Laser Shutdown. you need to collect the baseline. The threshold can be divided into crossing threshold and defect threshold. compare the test result with the baseline data in in-service mode. If the monitoring connections switch over. See also Event. Attribute Property of an object. C Comparison test in periodic mode A-2 One of the test types for submarine line. Carry out polling tests for multiple lines on the same LMU board periodically. and alerts or alarms. In the case of deployment or fault restoration. designating one binding number to identify the VC4s of the same virtual concatenated payload is called "bind". ATM protection group An ATM protection group refers to the logically bound ATM VP network or subnetwork connections that share the same physical transmission channel. to provide reference for comparison tests. a pair of VP connections (working connection and its protection connection) is used for monitoring the automatic protection switching. the equipment will report an alarm. The typical configuration data includes board configuration. links. Cluster The cluster is an administrative domain composed of a set of switches. Configuration File Text file. the configuration and the mapping. Networkwide clock synchronisation status query3. Clock View The Clock View provides a visible platform to enable:1. Connection point A reference point where the output of a trail termination source or a connection is bound to the input of another connection. Current performance data The performance data stored in the current register is called current performance data. If an alarm is included in the current alarms on the NE. Real-time inventory change report can also be provided through this resource. Clock tracing and search functions Configuration data The data that configures the NE hardware for coordination between this NE and other NEs in the entire network and operation of specified services. including various configuration on the device. See also server. NE. it will be timely reported to the upper NMS to notify the carrier of the current network operation status and ensure data consistency of the upper NMS or SNMS. NE clock settings2. equipment. SNC. clock configuration and protection relationship. or where the output of a connection is bound to the input of a trail termination sink or another connection. It changed within the monitor period. including relevant configuration of NMS or SNMS. Ltd. and provide alerts or alarms for the line. compare the test result with the baseline data. The current 15-minute or 24-hour register (only one for each) is applied to collect the performance data in the current monitoring period. Check alarms The check feature compares one (or more) uncleared alarm on the NMS with that on the NE. A-3 .. route. Test a line by using test parameters of the baseline collection test in in-service mode. Configure To set the basic parameters of an operation object. TP. Current alarms Alarms that do not clear. subnet. Every application program records these changes in the database and ensures that these changes in the database are reflected on other applications. The management over all the switches within the cluster is realized through a public IP address. The connection point is characterized by the information which passes across it.iManager U2000 Unified Network Management System Product Description A Glossary and Abbreviations Comparison test in single-test mode One of the test types for submarine line. Client A kind of terminal (PC or workstation) connected to a network that can send instructions to a server and get results through a user interface. Change Audit Service Change Audit Service is developed to record the change on the network device. or has cleared but is not acknowledged. it will be removed from the NMS. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. It consists of a command switch and multiple member switches. edge point. Configuration management Configuration management enables inventory query of network configuration resources. and it is the key for efficient network running. and so on. It provides one integrated database. it is kept on the NMS. A bidirectional connection point is formed by the association of a contradirectional pair. Configuration data is the instruction file of NEs. If not. including the changes on the information about the device. Connection A "transport entity" which consists of an associated pair of "unidirectional connections" capable of simultaneously transferring information in opposite directions between their respective inputs and outputs. the change of environment can be monitored timely and accurately. Dump Dump is a process of exporting alarm data from the database to the customized file and meanwhile the exported data is cleared in the database. As one type of power and environment monitoring unit. Domain The domain of the NMS specifies the scope of address or functions which are available to a certain user. A-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.A Glossary and Abbreviations iManager U2000 Unified Network Management System Product Description D DCC Within an STM-N signal there are two DCC channels. services can also be protected. By using the recommended protection modes. The DCC-M is not the regenerator section overhead and does not support communications among regenerators. unless the protection channels are satisfying a higher priority bridge request. one is the 192 kbit/s DCC-R channel composed of bytes D1-D3. Forced switch This command performs the ring switch from working channels to the protection channels. and so on can be monitored as well. a fault has now been detected.channel composed of bytes D4-D12. Issue 05 (2010-11-19) . If some operation authorities over one equipment set are assigned to a user (user group). utilising a data communications channel (DCC) as its physical layer. in case of fibre failure or node failure. F Failure The fault cause persisted long enough to consider the ability of an item to perform a required function to be terminated. fire alarm. and it is used to support communication channels of more universal purpose. E ECC Embedded Control Channel. DNI Dual Node Interconnection. these operation authorities over all equipment of the equipment set are assigned to the user (user group). Equipment set An aggregate of multiple managed equipment. the protection of the interconnecting service between two ring networks composed of the devices from different manufacturers and in different protection modes can be realised. Fault A fault is the inability of a function to perform a required action. Displayed on the NMS. or planned actions. lack of external resources. This switch occurs regardless of the state of the protection channels. EMU Environment Monitoring Unit. All NEs can communicate with one another through the DCC-R. The item may be considered as failed. Ltd. and the other is the 576 kbit/s DCC. Equipment set facilitates the user authority management on equipment in the management domain of the NMS. An ECC provides a logical operations channel between SDH NEs. such as the power supply and temperature. burglary alarm.. The protection mode defined in G. smoke alarm. Filter The filter is used to filter the matched logs and have the unmatched one left. With external signal input through the relay. This does not include an inability due to preventive maintenance. 842 Recommendation for the inter-ring service . Moreover. EMU is installed on the top of the OptiX 155/622H equipment cabinet to monitor the environment variables. so as to configure and maintain a single NE. Usually the licence consists of encrypted codes. The LCT provides the user with single-layer management network solutions to the transmission network of up to five NEs to realise integrated management of multi-service transmission network. The physical optical fibre path connecting the transmission equipment can comprise two or more sections of optical fibre cascaded via the intermediate office. It has multiple pairs of interfaces for the optical fibre connection. Link The link is responsible to transmit the data from one station to next neighbour station correctly. Layer A concept used to allow the transport network functionality to be described hierarchically as successive levels. Image (OS) Binary file.. A-5 . History performance data The performance data stored in the history register and the auto-report performance data stored on the NMS are called history performance data in a unified way. 129. LCT Local Craft Terminal. you can test submarine cables and repeaters without damaging the existing services of the submarine system. There is an intermediate office information list for some fibre & cable connections.iManager U2000 Unified Network Management System Product Description A Glossary and Abbreviations H History alarms Alarms that have cleared and been acknowledged. See also U2000 LCT. I Intermediate office It refers to the equipment used for optical fibre management and dispatch in the metropolitan area.161. By using the in-service test mode .55. equivalent to the OS of the device and a part of the device version. which shows the section information about the fibre & cable. which consists of four bytes in decimal digits. IP address In the TCP/IP protocol. J Jitter This index shows the delay stability of many Ping operations with the unit of ms. Ltd. In-Service Mode One of the test modes for submarine line. Every two interfaces in a pair are connected with each other to form a longer physical optical fibre path. and the operation authority varies with different level of licence. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. for example. or a cabinet for identification. Lock NE login This function prohibits the users at lower levels from logging in NE and forces logged NE users with lower level to log out. L Label A mark on a cable.9. it is used to uniquely identify the address of the communication port. Usually it uses the cross-over cable or serial port cable to connect one NE. a subrack. each layer being solely concerned with the generation and transfer of its characteristic information. Licence A permission provided by a vendor to authorise the use of specific functions of a product. . NE includes the hardware unit and the software running on it. MSP Multiplex section protection. The device is displayed with the node icon on the topological view. and regenerator section. plug-in card. and save the test result as the baseline of the in-service mode. transmit port. which can supports all functions at NE level and part of the network level management functions. MS Multiplex Section. The type of the node includes the router. the switch and the 3rd-party device and the virtual node. NE Explorer NE Explorer is the main operation interface of the NMS. Usually. Manual switch When the protection channel is efficient and there is no higher-level switching request. (3) FDB0. Ltd. See also SDH NNI. The nodes online achieve protection switching through the K1 and K2 bytes in the multiplex section. In efficient operation. Management information The signal passing across an access point. multiplex section. receive port. including linear 1+1 MS protection switching link. In the telecommunication management network structure. N NE database There are three types of database on NE SCC board as following: (1) DRDB: a dynamic database in a dynamic RAM. powered by battery. The management view of a resource within the telecommunication environment that may be managed via the agent. NNI identifies the interface between the ATM network nodes. Manual test One of the test types for submarine line.A Glossary and Abbreviations iManager U2000 Unified Network Management System Product Description M Main Topology The default NMS client interface and all topology management functions are accessed here. power supply. Backing up an NE database means backing up the NE configuration data from SDB to FDB0 and FDB1. The configuration. FDB0: permanently saved databases in a Flash ROM. See also U2000. the NMS is located between the NE level and network level. management and maintenance of the equipment are accessed here. The NE software runs on the SCC board. one NE has at least an SCC (system control and communication) board which responsible for the management and monitoring of the NE. the NE Explorer window presents an expandable directory tree (Function Tree) in the lower left pane. A multiplex section is the trail between and including two multiplex section trail termination functions. For easy navigation. thus testing whether network still has the protection capability. Node Node is one of the topology objects and the minimum unit that represents the device displayed on the topological view. virtual container. NM Network Management. (2) SDB: a static database in a powerdown RAM. A-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. this mode switches the service from the working channel to the protection channel. NE Network Element. MO Managed Object. You need to set test parameters manually. Issue 05 (2010-11-19) . Examples of SDH managed objects are: equipment. the NE configuration data is saved in DRDB and SDB at the same time. NNI Network Node Interface. linear 1:n MS protection switching link. dedicated MS protection ring and shared MS protection ring. start the test. PMU One type of power and environment monitoring unit. When the performance event count value exceeds the upper threshold. performance jitter caused by some sudden events can be shielded. By transmitting detection light with high power. where each node is equipped with an OWSP. There are two channels (λ1 and λ2) in the main optical path on the internal and external rings in each span on a ring.iManager U2000 Unified Network Management System Product Description A Glossary and Abbreviations O Online help An indexed collection of information on all aspects of the NMS. Process A generic term for a collection of actions. A-7 . The color LCD display and backlight design makes testing work more comfortable and convenient. In this way. Ltd. and the hardware of the tributary board will selectively receive the signal from the two groups of buses automatically according to the AIS number of the lower order path. Protection path A specific path that is part of a protection group and is labeled protection. Meanwhile. the tributary signal is sent simultaneously to the east and west lines. OWSP Optical Wavelength Shared Protection. They can be accessed at any time from the Help menu or by pressing the F1 key. Through the tributary unit and cross-connect unit.. to realize the status detection and fault point location after fiber cut. The fibre and the OWSP on the main optical path are connected with the optical ports inputting λ1 and λ2 on the mux/ demux board (unnecessary to be connected with the OTU). Out-of-Service Mode One of the test modes for submarine line. Performance threshold Performance events usually have upper and lower thresholds. UAT register and CSES register. Performance register Performance register is the memory space for performance event counts. OWSP is a bidirectional ring. Private line Both communication parties are connected permanently. the PDH path uses the dual-fed and signal selection mode. P Path protection The working principle of path protection: When the system works in path protection mode. hand-held design with an intelligent user interface that is easy and quick to use. the performance threshold-crossing event is ended. Procedure A generic term for an action. a performance threshold-crossing event is generated. when the performance event count value is below the upper threshold for a period of time. and thus λ1 and λ2 can be added and dropped at every node. the out-of-service test can detect the fiber status and repeater status. compact. 15-min history performance register. Optical time domain reflectormeter OTDR is an optical fault locator and analysis tool for optical fiber networks. the cross-connect matrix sends the signal dually sent from the opposite end to the tributary board through the active and standby buses. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The OTDR features a light. 24-hour current performance register. you can carry out a test in out-of-service mode to locate the fault. In general. whether during daylight or at night. Path A trail in a path layer. when detecting that a line is abnormal during a test in in-service mode. 24-hour history performance register. including 15min current performance register. S Script file A-8 It is the text file describing the physical information and configuration information of the entire network.A Glossary and Abbreviations iManager U2000 Unified Network Management System Product Description Protection strategy In case the service route provides multiple service protections. and extra traffic. The polling status contains normal. end-to-end configuration file. Ethernet static routing in ET1 refers to the mapping relationship between the Ethernet port and the bound path. Report The report that is generated manually in a real-time fashion. Poll Status The NMS polls the device status and other configuration data periodically and displays the polling results on the topology view. Issue 05 (2010-11-19) . important fault and urgent fault. Packets Loss Ratio This index shows the packet loss ratio after many Ping operations with the unit of %. and thus adjusts power for pass-through paths in a better way than a band-based dynamic gain equalizer (DGE) does. Protection subnet The resources that form a protection subnetwork include NEs and fiber cables. including the NE configuration file. off-line. and then these independent logical systems are connected with one another to form a complete network structure. Port routing: It means configuring a route between the Ethernet port and the bound path port. Of the above. VLAN routing: It means configuring a route between the Ethernet port and the bound path port based on the VLAN service. NE physical view script file. In each host and each router of the Internet. ROADM enables power equalization at path level through a built-in power equalization function. The implementation is to divide and converge the data stream according to the VLAN flag of the packet. At the same time. ROADM helps you to terminate or pass through any one wavelength at every node without affecting the existing services. As a VLAN flag can be added to the Ethernet port.. In addition. the optical interfaces (or VC4) of each board are mapped into the logical system. ROADM can change wavelengths through the NMS remotely. unknown. there is a routing table that contains information about how the service is transmitted from the source to the sink. The creation of the protection subnetwork actually means that corresponding logical system is configured for each NE by means of creating the protection subnetwork. point-to-multipoint or multipoint-to-multipoint communication. the equipment can be applied more flexibly. providing a basis for route selection. Its routing type includes port routing and VLAN routing. subordinate fault. RTT RTT is the round trip time. which is the time delay of the ping task. different protection strategies can be selected as required. the protection preference is divided into trail protection and sub-network connection protection. port naming file. Protection strategy refers to the protection mode given the priority in use for the trail: protection. It can be used flexibly in point-to-point. to adjust wavelengths added or dropped in a quick and convenient manner. light fault. R ROADM Reconfiguration Optical Add/Drop Multiplexing. NM information file and service implementation data script file. which is usually used for point-to-point networking communication. Route The IP route selection is in table driving mode. Ltd. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. no protection. which can supports all function of NE-level and part of the network-level management functions. SDH NNI SDH Network Node Interface. the alarms of different NEs. Subnet number Subnetwork number is used to differentiate the different network sections in the subnetwork conference. Synchronise NE time Send the system time of the NMS server to NEs so as to synchronise all NEs with the server. thus suppressing broadcast storm between different network segments. and the NE must be a TM without protection and fibre connection. Topology The NMS topology is a basic component of the man-machine interactive interface. Ltd. TMN Telecommunications Management Network. T T2000 The T2000 is a subnetwork management system (SNMS). An orderwire phone number is composed of the sub-network number and the user number. it is used to define network segments. Subnet Sub-network is the logical entity in the transmission network and comprises a group of network management objects. the communication status as well as the basic network operation status. Settings Parameters of an operation that can be selected by the user. Usually.. T2100 The T2100 is a network level management system for the optical transmission network. written in a scripting language. and is located in the network management layer (NML) in the telecommunication management network (TMN) architecture. TDA clock source TDA is short for Tone Data Access. A sub-network can contain NEs and other sub-networks. It is applied to build communications connection with the equipment beyond the NMS management area. when installing the cabinet on the antistatic floor. A sub-network planning can better the organisation of a network view. Section A trail in a section layer. Actually it is the first several digits (one or two) of the user phone number. subnetworks in the network. See also NM. it can be installed with the external TDA board for which the clock source must be set so that the TDA board can switch according to the set clock source sequence when clock source switching occurs. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Subnet mask Also referred to as the network mask off code. A-9 . For the 2500+ NE equipment.iManager U2000 Unified Network Management System Product Description A Glossary and Abbreviations Schedule Task The report on schedule task that is generated at a interval along with the periodical running of the schedule tasks. so that only the computers in the same network segment can communicate with one another. The entity which provides the means used to transport and process information related to management functions for the telecommunications network. The topology clearly shows the structure of the network. Script A list of instructions for performing a specific task or action. In the TMN architecture. the T2000 is located between the NE level and network level. Severity See Alarm Severity. the NM creates an SDH NNI by creating a logical system on the port of an idle line board. Support The frame on the bottom of a cabinet. query detailed information of a trail. and print a trail report. the trail includes various types (OTS. filter. and monitoring the integrality of the transferred signal. OMS. you can configure end-to-end services. Outloop and Inloop. the data cannot be restored for lack of protection mechanism. Upload Report all or part of the configuration data of the NE to the NM and overwrite the configuration data saved in the NE layer on the NM side. search and locate a trail quickly. UAT Unavailable Time. For the ADM and TM equipment in the SDH network. The attributes of user set include name and detailed description. related with the unit and index. VC4 server trail. VC3 and VC12). The threshold contains the upper and lower one. Ltd. There are three kinds of loopback modes: No loopback. Issue 05 (2010-11-19) . manage and maintain trails in a centralised manner. OCH and OMS represent the trails in a DWDM layer network. including SDH and PDH services. User group User set refers to the set of NMS users with the same management authorities. system maintainer. VC4. It identifies the interface between the user and the ATM network node. the iManager U2000 that is the unifed network management system (NMS) combines all-IP and FMC. and manages carrier equipment and access equipment in a centralized manner. Trail A trail is a kind of transport entity. A UAT event is reported when the monitored object generates 10 consecutive severely errored seconds (SES) and the SESs begin to be included in the unavailable time. manage alarms and performance data by trail. Threshold The alarm range will be defined after the performance data is collected. Among them. UNI UNI is the abbreviation for User Network Interface.. mainly engaged in transferring signal from the input of the trail source to the output of the trail sink. OTS. Inloop. SPI. Outloop. Through trail management. V VC4 loopback A-10 The fault of each VC4 path on the optical fibre can be located by setting loopback for each VC4 path of the line. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Unprotected Services transmitted through an ordinary way. There are three kinds of loopback modes: No loopback. view graphic interface and visual routes of a trail. MS. The event will end when the bit error ratio per second is better than 10-3 within 10 consecutive seconds. RS or MS trail. Tributary loopback A fault can be located for each service path by performing loopback to each path of the tributary board. U U2000 To be oriented to the future network trend. RS. and a trail is the general name for service carriers. once a failure or interruption occurs. User The user of the NMS client. and the user and his/her password define the corresponding authority of operation and management of the NMS. OCH. According to the different levels of the trail.A Glossary and Abbreviations iManager U2000 Unified Network Management System Product Description Trail management function A network level management function of the NMS. system operator and system supervisor. each optical fibre connection corresponds to an SPI. The default user group includes: system administrator. no service is added/dropped. only the higher order cross-connection of VC4 is generated in the intermediate NE. but it is only an NE simulated according to the practical situation. View Organize and display rules and filter conditions of the topology data. One Ethernet port can support 4K VLAN routes. a virtual NE is also displayed with an icon on a view. Issue 05 (2010-11-19) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The topology view can be planned according to the domain. occupies 16 bits in both NNI cell or UNI cell. shorted for Virtual Path Identifier. It can be tailored according to the requirements Virtual fibre A virtual fibre is created between SDH equipment that has WDM equipment in between. and one NE can support up to 8K VLAN routes. The VPI and VCI together indicate a virtual connection.. which can manage the RTN series and NG WDM series equipment. it is the virtual LAN identifier. Virtual NE Like a common NE. creation of virtual fibres disassociates its fibre connection with WDM equipment and prevents impact on the auto fibre search function. Web LCT In the TMN architecture. VPN view and IP view. The wavelength path protection can only work with the correct configuration of the wavelength protection group. It is only the basis for VC3 and VC12 trail creation. and acts as the basic unit of inter-office communication path. VPI The VPI. ensuring independence of SDH trail management. Ltd. shorted for Virtual Channel Identifier. Working path A specific path that is part of a protection group and is labelled working. Its function is similar to that of the protection sub-network in the SDH NE. and 8 bits in the UNI cell. or the equipment is interconnected with other vendors NEs for service configuration. the platform provides the physical view. WDM service The WDM service is accessed at the client side of the OTU board that can access SAN services. It indicates the virtual channel in the path. that is.336Mbit/s. its service bearer layer is a virtual fibre instead of a true one after the virtual fibre is created. From SDH equipment perspective. but no cross-connection is generated at the two ends. VLAN ID Namely. circuit group) for circuit-layer network nodes (for example. the Web LCT is located in the NE management level. which does not represents an actual NE. W Wavelength protection The wavelength protection group is important to describe the wavelength protection group structure.iManager U2000 Unified Network Management System Product Description A Glossary and Abbreviations VC4 server trail The path rate of the VC4 server trail is 150. VCI The VCI. a switch) in a path-layer network. such as the layer 2 view. Customize the view according to requirements of every product and organize the data in the view displayed by the topology module. When the VC4 server trail is configured. Edits and displays the rule of the topology data or the filter conditions. Therefore. occupies 12 bits in the NNI cell. the actual status of this NE cannot be queried and its alarm status cannot be displayed with colours. Deletion of the true fibre does not affect trail management. A-11 . Usually. The VC4 server trail provides transparent channels (that is. maintenance relationship and so on. the VC4 server trail is not a traditional service. Therefore.From WDM equipment perspective. the end-to-end service configuration method and the trail management capability are provided. By default. when the trail management function is used for the NEs or sub-networks the NMS cannot manage. It is a path protection type for ring networks. WXCP Wavelength Cross-Connection Protection.from a fault recovered . services are switched between the primacy and secondary rings through cross-connection based on the dual fed signal selection principle. This command is issued when working channels meet the restoral threshold after an SD or SF condition. Ltd.. A-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. WTR Wait to Restore. Issue 05 (2010-11-19) . In this protection mode. It is used to maintain the state during the WTR period unless it is pre-empted by a higher priority bridge request.A Glossary and Abbreviations iManager U2000 Unified Network Management System Product Description WTR time A period of time that must elapse before a .trail/connection can be used again to transport the normal traffic signal and/or to select the normal traffic signal from.
Copyright © 2024 DOKUMEN.SITE Inc.