You are on page 1of 1284

iManager U2000 Unified Network Management

System
V100R009C00
Operation Guide for Common
Features
Issue 03
Date 2014-05-15
HUAWEI TECHNOLOGIES CO., LTD.


Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.






Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: support@huawei.com
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
About This Document
Related Version
The following table lists the product version related to this document.
Product Name Version
iManager U2000 V100R009C00

Intended Audience
This document describes the operations for common features on the U2000.
This document guides the user to understand basic operations of the U2000.
The document is intended for:
l Data configuration engineers
l NM administrators
l System maintenance engineers
Symbol Conventions
The following symbols may be found in this document. They are defined as follows.
Symbol Description
Indicates an imminently hazardous situation
which, if not avoided, will result in death or
serious injury.
Indicates a potentially hazardous situation
which, if not avoided, could result in death or
serious injury.
iManager U2000 Unified Network Management System
Operation Guide for Common Features About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ii
Symbol Description
Indicates a potentially hazardous situation
which, if not avoided, may result in minor or
moderate injury.
Indicates a potentially hazardous situation
which, if not avoided, could result in
equipment damage, data loss, performance
deterioration, or unanticipated results.
NOTICE is used to address practices not
related to personal injury.
Calls attention to important information, best
practices and tips.
NOTE is used to address information not
related to personal injury, equipment damage,
and environment deterioration.

Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Boldface The keywords of a command line are in
boldface.
Italic Command arguments are in italic.
[ ] Items (keywords or arguments) in square
brackets [ ] are optional.
{ x | y | ... } Alternative items are grouped in braces and
separated by vertical bars. One is selected.
[ x | y | ... ] Optional alternative items are grouped in
square brackets and separated by vertical
bars. One or none is selected.
{ x | y | ... } * Alternative items are grouped in braces and
separated by vertical bars. A minimum of one
or a maximum of all can be selected.
[ x | y | ... ] * Optional alternative items are grouped in
square brackets and separated by vertical
bars. A maximum of all or none can be
selected.

iManager U2000 Unified Network Management System
Operation Guide for Common Features About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iii
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Boldface Buttons, menus, parameters, tabs, window,
and dialog titles are in boldface. For example,
click OK.
> Multi-level menus are in boldface and
separated by the ">" signs. For example,
choose File > Create > Folder.

Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes in earlier issues.
Changes in Issue 03 (2014-05-15) Based on Product Version V100R009C00
The third release. It has the following updates:
In the section "Alarm Management", optimized the description of some topics.
Changes in Issue 02 (2014-01-05) Based on Product Version V100R009C00
The second release. It has the following updates:
l In the section "Security Management", added "Users and User Groups".
l In the section "Topology Management", added "Configuring the NAT Address
Translation".
Changes in Issue 01 (2013-08-20) Based on Product Version V100R009C00
Initial field trail release.
iManager U2000 Unified Network Management System
Operation Guide for Common Features About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iv
Contents
About This Document.....................................................................................................................ii
1 Getting Started...............................................................................................................................1
1.1 Precautions for Using the U2000 Safely........................................................................................................................4
1.2 Starting the U2000 System.............................................................................................................................................4
1.2.1 Starting the U2000 Server in a Windows Single-Server System................................................................................5
1.2.1.1 Powering On the Server Safely................................................................................................................................5
1.2.1.2 Starting the Database................................................................................................................................................6
1.2.1.3 Starting the U2000 Server Processes........................................................................................................................7
1.2.2 Starting the U2000 Server in a Solaris Single-Server System.....................................................................................9
1.2.2.1 Powering On the Server Safely................................................................................................................................9
1.2.2.2 Starting the Database..............................................................................................................................................12
1.2.2.3 Starting the U2000 Server Processes......................................................................................................................14
1.2.3 Starting the U2000 Server in a SUSE Linux Single-Server System.........................................................................16
1.2.3.1 Powering On the Server Safely..............................................................................................................................16
1.2.3.2 Starting the Database..............................................................................................................................................17
1.2.3.3 Starting the U2000 Server Processes......................................................................................................................19
1.2.4 Starting the U2000 Server in a Solaris High Availability System............................................................................20
1.2.4.1 Powering On the Server Safely..............................................................................................................................20
1.2.4.2 Starting the Database..............................................................................................................................................24
1.2.4.3 Starting the U2000 Server Processes......................................................................................................................26
1.2.5 Starting the U2000 Server in a SUSE Linux High Availability System...................................................................28
1.2.5.1 Powering On the Server Safely..............................................................................................................................28
1.2.5.2 Starting the Database..............................................................................................................................................29
1.2.5.3 Starting the U2000 Server Processes......................................................................................................................32
1.2.6 Logging In to a U2000 Client....................................................................................................................................33
1.3 Shutting Down a U2000...............................................................................................................................................36
1.3.1 Shutting Down U2000 Clients...................................................................................................................................37
1.3.2 Shutting Down the U2000 Server (Single Server System, Windows)......................................................................37
1.3.2.1 Stopping the U2000 Server Processes....................................................................................................................37
1.3.2.2 Shutting Down the Database..................................................................................................................................38
1.3.2.3 Powering Off the Server Safely..............................................................................................................................39
1.3.3 Shutting Down the U2000 Server (Single Server System, Solaris)..........................................................................40
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
v
1.3.3.1 Stopping the U2000 Server Processes....................................................................................................................40
1.3.3.2 Shutting Down the Database..................................................................................................................................41
1.3.3.3 Power Off the Server Safely...................................................................................................................................42
1.3.4 Shutting Down the U2000 Server (Single Server System, SUSE Linux).................................................................42
1.3.4.1 Stopping the U2000 Server Processes....................................................................................................................42
1.3.4.2 Shutting Down the Database..................................................................................................................................43
1.3.4.3 Powering Off the Server Safely..............................................................................................................................45
1.3.5 Shutting Down the U2000 Server in a High Availability System (Solaris)..............................................................45
1.3.5.1 Stopping the U2000 Server Processes....................................................................................................................45
1.3.5.2 Shutting Down the Database..................................................................................................................................47
1.3.5.3 Stopping the VCS Service......................................................................................................................................48
1.3.5.4 Power Off the Server Safely...................................................................................................................................48
1.3.6 Shutting Down the U2000 Server in a High Availability System (PC Linux)..........................................................49
1.3.6.1 Stopping the U2000 Server Processes....................................................................................................................49
1.3.6.2 Shutting Down the Database..................................................................................................................................51
1.3.6.3 Stopping the VCS Service......................................................................................................................................52
1.3.6.4 Power Off the Server Safely...................................................................................................................................52
1.4 Using the Workbench and Favorites Folder.................................................................................................................53
1.4.1 Placing a Shortcut Icon on the Workbench...............................................................................................................53
1.4.2 Adding a Common Function to the Favorites Folder................................................................................................53
1.4.3 Viewing Common Functions.....................................................................................................................................54
1.5 Setting the Character Set of an NE...............................................................................................................................55
1.5.1 Character Set..............................................................................................................................................................55
1.5.2 Setting or Modifying Character Sets.........................................................................................................................58
1.6 Main Windows and Common Operations of the U2000..............................................................................................59
1.6.1 Client GUI in the Application Style..........................................................................................................................59
1.6.2 Quick Start for Clients in the Application Style........................................................................................................66
1.6.3 Client GUI in the Traditional Style...........................................................................................................................69
1.6.4 Key GUI Components...............................................................................................................................................71
1.6.5 Frequently Used Buttons...........................................................................................................................................72
1.6.6 Frequently Used Shortcut Icon..................................................................................................................................74
1.6.7 Keyboard Shortcuts...................................................................................................................................................80
1.6.8 Main Windows..........................................................................................................................................................82
1.6.8.1 Workbench..............................................................................................................................................................82
1.6.8.2 Main Topology.......................................................................................................................................................83
1.6.8.3 NE Explorer............................................................................................................................................................87
1.6.8.4 Clock View.............................................................................................................................................................88
1.6.8.5 NE Panel.................................................................................................................................................................96
1.6.8.6 WDM NE Signal Flow Diagram............................................................................................................................97
1.6.8.7 Browse Alarm.........................................................................................................................................................98
1.6.8.8 Browse Event..........................................................................................................................................................99
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vi
1.6.9 Operations Frequently-Performed on the User Interface.........................................................................................100
1.6.9.1 Filtering Operation Objects in a View..................................................................................................................100
1.6.9.2 Searching for NEs in a View................................................................................................................................102
1.6.9.3 Collecting Statistics on the Number of NEs.........................................................................................................103
1.6.9.4 Customizing Parameter Display...........................................................................................................................104
1.6.9.5 Copying Table Texts Quickly...............................................................................................................................105
1.6.9.6 Monitoring Alarms...............................................................................................................................................105
1.7 How to Obtain Version Information About the U2000..............................................................................................106
1.8 Customizing the Client GUI Effect............................................................................................................................107
1.8.1 Setting the Client Skin.............................................................................................................................................108
1.8.2 Setting the Client Display Style...............................................................................................................................108
1.8.3 Setting the Main Window Title...............................................................................................................................109
1.8.4 Setting the Topology View Display........................................................................................................................110
1.8.5 Setting the Font Size................................................................................................................................................113
1.8.6 Setting the Output Information................................................................................................................................113
1.8.7 Setting the Workbench............................................................................................................................................115
1.8.8 Setting the Menu Collapse.......................................................................................................................................118
1.8.9 Setting the Colors of Alarms...................................................................................................................................119
1.8.10 Setting the Alarm Highlighting.............................................................................................................................120
1.8.11 Setting the Alarm Font..........................................................................................................................................121
1.8.12 Setting the Alarm Display Mode...........................................................................................................................122
1.8.13 Setting the Display Properties of New Alarm/Event.............................................................................................124
1.8.14 Setting the Alarm Display in the Topology View.................................................................................................125
1.8.15 Setting the Number Format of the Client..............................................................................................................128
1.8.16 Setting Board Color...............................................................................................................................................129
1.8.17 Setting the Time and Date Formats of the Client..................................................................................................130
1.8.17.1 Setting the Time Format of the Client................................................................................................................130
1.8.17.2 Setting the Date Format of the Client.................................................................................................................131
1.8.17.3 Setting the Time Mode of the Client..................................................................................................................132
1.8.18 Setting the Toolbar................................................................................................................................................133
1.9 Setting the Alert at Network Disconnection...............................................................................................................134
1.10 Checking Whether the Client Needs Upgrade..........................................................................................................135
1.11 Setting the Interval of Client Upgrade Check..........................................................................................................135
1.12 Locking the Client....................................................................................................................................................136
1.13 Unlocking the Client.................................................................................................................................................137
1.14 Setting the Level of Operation Logs Recorded by the Client...................................................................................137
1.15 Setting a Scheduled Task..........................................................................................................................................138
1.16 Broadcast Messages..................................................................................................................................................139
1.16.1 Setting Broadcast Parameters................................................................................................................................139
1.16.2 Sending Broadcast Messages.................................................................................................................................140
1.17 Applying for and Updating the U2000 License........................................................................................................141
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vii
1.17.1 U2000 License Precautions...................................................................................................................................142
1.17.2 Applying for a U2000 License..............................................................................................................................142
1.17.3 Updating the U2000 License.................................................................................................................................144
1.17.4 Checking the Status of the U2000 License............................................................................................................153
1.17.5 Revoking a License on the U2000.........................................................................................................................153
1.17.6 Querying the License Revocation Code on the U2000.........................................................................................155
1.17.7 Setting Periodic Export of the U2000 License......................................................................................................155
1.17.8 Setting the NE Capacity Threshold for the U2000 License..................................................................................157
1.17.9 Collecting Port Statistics of Service Licenses.......................................................................................................157
1.18 Starting the Web Client............................................................................................................................................158
1.19 Starting the NE Data Collection...............................................................................................................................159
1.20 Customizing Naming Rule.......................................................................................................................................160
1.21 U2000 Process List...................................................................................................................................................162
1.22 GUI Input and Display Conventions........................................................................................................................260
1.23 Mutual Exclusion List for Multiclient Operations...................................................................................................262
2 Network Management Process...............................................................................................266
2.1 MSTP Network Management Process........................................................................................................................267
2.2 WDM Network Management Process........................................................................................................................268
2.3 RTN Network Management Process..........................................................................................................................272
2.4 PTN Network Management Process...........................................................................................................................273
2.5 Router and Switch Network Management Process....................................................................................................274
2.6 Access Network Management Process.......................................................................................................................280
2.7 Core Network Management Process..........................................................................................................................283
2.8 Security NE Network Management Process..............................................................................................................283
3 Security Management...............................................................................................................285
3.1 User Security..............................................................................................................................................................287
3.2 Managing User Rights................................................................................................................................................293
3.2.1 Getting to Know Operation Rights Management....................................................................................................293
3.2.1.1 Right Components................................................................................................................................................293
3.2.1.2 U2000 Authorization Principles...........................................................................................................................294
3.2.1.3 Users and User Groups.........................................................................................................................................301
3.2.1.4 Objects and Object Sets........................................................................................................................................303
3.2.1.5 Operation and Operation Set................................................................................................................................304
3.2.2 Scenarios for Operation Right Management...........................................................................................................308
3.2.3 Authorization Plan...................................................................................................................................................310
3.2.4 Assigning Rights to Users.......................................................................................................................................322
3.2.4.1 Authorization Process...........................................................................................................................................322
3.2.4.2 Creating User-Defined Object Sets......................................................................................................................323
3.2.4.3 Creating User-defined Operation Sets..................................................................................................................325
3.2.4.4 Creating and Authorizing U2000 User Groups....................................................................................................328
3.2.4.5 Creating Users and Adding the Users to User Groups.........................................................................................331
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
viii
3.2.5 Transferring Operation Sets.....................................................................................................................................333
3.2.5.1 Exporting Operation Sets......................................................................................................................................334
3.2.5.2 Adding Operation Sets or Changing Operation Set Members in Batches............................................................335
3.2.5.3 Importing Files Containing Operation Set Information.......................................................................................337
3.2.6 Operation Right Adjustment After Device Addition or Deletion............................................................................339
3.2.6.1 Adjusting Operation Rights After an NE Is Added..............................................................................................339
3.2.6.2 Adjusting Operation Rights After a Subnet Is Added..........................................................................................342
3.2.6.3 Adjusting Operation Rights After the Networking Structure Is Changed............................................................344
3.2.7 Operation Right Adjustment After Personnel's Responsibilities Change...............................................................345
3.2.7.1 Adjusting Operation Rights After the Scope of Managed Objects Is Changed...................................................345
3.2.7.2 Adjusting Operation Rights After the Scope of Operation Rights Is Changed....................................................347
3.2.7.3 Adjusting Operation Rights After Management Personnel's Posts Change.........................................................348
3.2.8 Querying Authorization...........................................................................................................................................349
3.2.8.1 Viewing a User or User Group's Domain.............................................................................................................349
3.2.8.2 Viewing Operation Rights of a User or User Group............................................................................................351
3.2.8.3 Viewing User Groups To Which a User Belongs.................................................................................................352
3.2.8.4 Querying User and User Group Authorization Details.........................................................................................353
3.2.8.5 Viewing Operations Contained in an Operation Set............................................................................................354
3.2.8.6 Viewing Objects Contained in an Object Set.......................................................................................................355
3.2.8.7 Comparing U2000 User Rights............................................................................................................................356
3.2.9 FAQs About Authorization.....................................................................................................................................358
3.2.9.1 How Do I Determine an Operation Right Type?..................................................................................................358
3.2.9.2 How Do I Adjust Operation Rights After an NE Is Added?................................................................................359
3.2.9.3 How Do I Adjust Operation Rights After a Subnet Is Added?............................................................................362
3.2.9.4 How to Adjust Operation Rights After the Scope of Managed NEs Is Changed?...............................................364
3.2.9.5 How Do I Assign User Operation Rights That Do Not Belong to the User's User Group?.................................370
3.2.10 Configuration Examples of Security Management...............................................................................................371
3.2.10.1 Assigning Specific Operation Rights to an NMS User......................................................................................371
3.2.10.2 Adjusting User Rights........................................................................................................................................375
3.2.10.3 Example for Creating U2000 User Accounts and Allocating Rights in the Rights- and Domain-based Management
Scenario............................................................................................................................................................................380
3.3 User Security Policy Management.............................................................................................................................384
3.3.1 Security Policy Management...................................................................................................................................384
3.3.1.1 Setting the System ACL.......................................................................................................................................384
3.3.1.2 Setting the User ACL...........................................................................................................................................385
3.3.1.3 Setting the Proxy Service ACL............................................................................................................................386
3.3.1.4 Setting Account Policies.......................................................................................................................................388
3.3.1.5 Setting Password Policies.....................................................................................................................................389
3.3.1.6 Setting the Maximum Number of Sessions..........................................................................................................390
3.3.1.7 Setting the U2000 Login Mode............................................................................................................................391
3.3.1.8 Setting Auto-Locking for a Client........................................................................................................................393
3.3.2 Setting U2000 Data Transmission Security.............................................................................................................394
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ix
3.3.2.1 Setting a Secure Connection Between the U2000 Client and Server...................................................................394
3.3.2.2 Setting the FTP Transfer Policies Between the Client and Server.......................................................................395
3.3.3 Managing Passwords and Locking Clients..............................................................................................................396
3.3.3.1 Changing the Password of the Current User........................................................................................................396
3.3.3.2 Resetting the Password of an NMS user..............................................................................................................396
3.3.3.3 Modifying NMS user Information in Batches......................................................................................................397
3.3.3.4 Locking the Client Immediately...........................................................................................................................399
3.3.3.5 Unlocking the Client.............................................................................................................................................400
3.3.3.6 Setting Auto-Locking for an U2000.....................................................................................................................400
3.3.4 Monitoring U2000 Users.........................................................................................................................................401
3.3.4.1 Monitoring NMS User Sessions...........................................................................................................................401
3.3.4.2 Monitoring NMS User Operations.......................................................................................................................402
3.3.4.3 Forcing U2000 Users to Log Out.........................................................................................................................403
3.3.4.4 Unlocking Users...................................................................................................................................................403
3.3.4.5 Sending Messages to Online Users......................................................................................................................404
3.3.5 Managing the Remote Maintenance User................................................................................................................405
3.4 Managing NE Security...............................................................................................................................................406
3.4.1 NE Security Management........................................................................................................................................406
3.4.2 Setting the NE ACL.................................................................................................................................................408
3.4.2.1 Overview of ACL.................................................................................................................................................408
3.4.2.2 Setting Basic ACL Rules......................................................................................................................................409
3.4.2.3 Setting the Advanced ACL Rules.........................................................................................................................410
3.4.3 Setting the Security Access of an NE......................................................................................................................410
3.4.3.1 Setting Ethernet Access for NEs..........................................................................................................................411
3.4.3.2 Setting Serial Port Access for NEs.......................................................................................................................411
3.4.3.3 Setting the OAM Access to NEs..........................................................................................................................412
3.4.3.4 Setting the COM Access to NEs...........................................................................................................................412
3.4.3.5 Setting the LCT Access to NEs............................................................................................................................413
3.4.4 Managing NE Login................................................................................................................................................414
3.4.4.1 Locking Out NE Login.........................................................................................................................................414
3.4.4.2 Locking Out NE Settings......................................................................................................................................415
3.4.4.3 Querying the Information About an Online NE User...........................................................................................416
3.4.4.4 Switching a Logged-In NE User..........................................................................................................................417
3.4.4.5 Forcing an NE User to Log Out of the U2000.....................................................................................................418
3.4.4.6 Setting NE Login Prompt Message......................................................................................................................418
3.4.5 Managing NE Users.................................................................................................................................................419
3.4.5.1 Querying the Additional Information of NE User................................................................................................419
3.4.5.2 Creating an NE User.............................................................................................................................................420
3.4.5.3 Modifying NE Users.............................................................................................................................................422
3.4.5.4 Changing an NE User Password...........................................................................................................................423
3.4.5.5 Querying NE Security Parameters........................................................................................................................424
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
x
3.4.5.6 Querying NE User Groups...................................................................................................................................425
3.4.5.7 Deleting NE Users................................................................................................................................................425
3.4.6 Configuring an NE As an SSH Server.....................................................................................................................426
3.5 Configuring NE RADIUS..........................................................................................................................................429
3.5.1 Overview.................................................................................................................................................................429
3.5.2 Setting an NE as an RADIUS Client or Proxy Server.............................................................................................432
3.5.3 Adding an RADIUS Server.....................................................................................................................................433
3.5.4 Setting NE RADIUS Parameters.............................................................................................................................434
3.6 Change Audit..............................................................................................................................................................434
3.6.1 Viewing Information About Change Audit.............................................................................................................435
3.6.2 Dumping Information About Change Audit............................................................................................................435
3.6.3 Deleting Information About Change Audit.............................................................................................................436
3.7 Database Security Policy............................................................................................................................................437
4 Log Management.......................................................................................................................438
4.1 Log Management Overview.......................................................................................................................................440
4.1.1 Log Management Policy..........................................................................................................................................440
4.1.2 Log Type..................................................................................................................................................................441
4.1.2.1 U2000 System Logs..............................................................................................................................................441
4.1.2.2 U2000 Security Logs............................................................................................................................................442
4.1.2.3 U2000 Operation Logs.........................................................................................................................................444
4.1.2.4 Syslog Run Logs of IP NEs..................................................................................................................................445
4.1.2.5 Syslog Operation Logs of Access NEs.................................................................................................................446
4.1.2.6 Security Logs of Transport NEs...........................................................................................................................447
4.1.3 Syslog Service.........................................................................................................................................................448
4.2 Managing U2000 System Logs..................................................................................................................................452
4.2.1 Querying U2000 System Logs................................................................................................................................452
4.2.2 Collecting Statistics on U2000 System Logs..........................................................................................................453
4.3 Managing U2000 Security Logs.................................................................................................................................455
4.3.1 Querying U2000 Security Logs...............................................................................................................................455
4.3.2 Collecting Statistics on U2000 Security Logs.........................................................................................................457
4.4 Managing U2000 Operation Logs..............................................................................................................................460
4.4.1 Querying U2000 Operation Logs............................................................................................................................460
4.4.2 Collecting Statistics on U2000 Operation Logs......................................................................................................462
4.5 Setting U2000 Log Templates....................................................................................................................................464
4.6 Managing U2000 Log Data........................................................................................................................................466
4.6.1 Setting U2000 Log Dump........................................................................................................................................466
4.6.2 Setting U2000 Log Overflow Dump.......................................................................................................................467
4.6.3 Manually Dumping U2000 Logs.............................................................................................................................468
4.6.4 Setting U2000 Log Export.......................................................................................................................................469
4.6.5 Setting Device Log Dump.......................................................................................................................................470
4.6.6 Setting U2000 Log Forwarding...............................................................................................................................471
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xi
4.6.6.1 Understanding Log Forwarding............................................................................................................................471
4.6.6.2 Enabling Logging to U2000 Syslog Database......................................................................................................471
4.6.6.3 Setting the Interconnection Between the U2000 and the Syslog Server..............................................................473
4.6.6.4 Managing the Connection Between the U2000 and Syslog Server......................................................................475
4.7 Managing Logs of the IP NE Side..............................................................................................................................476
4.7.1 Configuring the Information Center on the NEs.....................................................................................................476
4.7.1.1 Enabling the Information Center..........................................................................................................................477
4.7.1.2 Configuring the Syslog Source Interface..............................................................................................................477
4.7.1.3 Adding a Syslog Host...........................................................................................................................................478
4.7.1.4 Configuring the Advanced Attributes of the Syslog Service...............................................................................479
4.7.2 Browsing the NE Syslog Run Logs.........................................................................................................................479
4.8 Managing Logs of the Access NE Side......................................................................................................................480
4.8.1 Browsing NE Syslog Operation Logs.....................................................................................................................481
4.8.2 Browsing Login Logs of NE Users.........................................................................................................................482
4.9 Managing Transport NE Logs....................................................................................................................................483
4.9.1 Transferring NE Logs to a Syslog Server................................................................................................................483
4.9.1.1 Setting a Syslog Server.........................................................................................................................................484
4.9.1.2 Setting a Syslog GNE...........................................................................................................................................485
4.9.1.3 Setting the Syslog Type and Severity...................................................................................................................485
4.9.1.4 Starting the Syslog Service...................................................................................................................................486
4.9.2 Viewing Security Logs of NEs................................................................................................................................486
4.9.3 Viewing Operation Logs of NEs.............................................................................................................................487
5 Topology Management.............................................................................................................489
5.1 Overview of Topology Management..........................................................................................................................491
5.1.1 Topology Management Function.............................................................................................................................491
5.1.2 Types of Topology Views.......................................................................................................................................493
5.1.3 Objects in a Topology View....................................................................................................................................497
5.1.4 Automatic Topology Discovery..............................................................................................................................502
5.1.5 Alarm Indication in a Topology View.....................................................................................................................503
5.2 Network Topology Construction Process...................................................................................................................504
5.3 Designing a Physical Topology..................................................................................................................................508
5.4 Creating a Subnet........................................................................................................................................................509
5.5 Setting Parameters for the Communication Between the U2000 and NEs................................................................510
5.5.1 Protocols for Communication Between the U2000 and NEs..................................................................................511
5.5.2 Setting SNMP Parameters.......................................................................................................................................516
5.5.2.1 Configuring the Default SNMP Parameters Template.........................................................................................516
5.5.2.2 Setting NE SNMP Parameters..............................................................................................................................517
5.5.3 Setting Telnet/STelnet Parameters..........................................................................................................................520
5.5.3.1 Configuring a Telnet/STelnet Parameter Template..............................................................................................520
5.5.3.2 Setting Telnet/STelnet Parameters with a Template............................................................................................522
5.5.3.3 Manually Setting Telnet/STelnet Parameters.......................................................................................................524
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xii
5.5.4 Configuring the xFTP Service.................................................................................................................................526
5.5.4.1 Testing Local xFTP Information..........................................................................................................................526
5.5.4.2 Configuring the NAT Address Translation..........................................................................................................528
5.6 Creating NEs...............................................................................................................................................................530
5.6.1 Creating NEs in Batches..........................................................................................................................................531
5.6.1.1 Creating Transport/PTN NEs in Batches..............................................................................................................531
5.6.1.2 Creating SNMP/ICMP NEs in Batches................................................................................................................534
5.6.1.3 Creating Core Network NEs in Batches...............................................................................................................540
5.6.1.4 Importing/Exporting NEs in Batches...................................................................................................................542
5.6.2 Creating a Single NE...............................................................................................................................................545
5.6.2.1 Creating Optical NEs............................................................................................................................................546
5.6.2.2 Creating a Single Transport NE............................................................................................................................546
5.6.2.3 Creating a Single PTN NE....................................................................................................................................550
5.6.2.4 Creating a Single Router NE................................................................................................................................553
5.6.2.5 Creating a Single Switch NE................................................................................................................................555
5.6.2.6 Creating a Single Security NE..............................................................................................................................557
5.6.2.7 Creating an Access NE.........................................................................................................................................558
5.6.2.8 Creating a Single BITS NE..................................................................................................................................560
5.6.2.9 Creating a Single Third-Party NE........................................................................................................................562
5.6.2.10 Creating Virtual NEs..........................................................................................................................................562
5.6.2.11 Creating a Single NGN NE................................................................................................................................563
5.6.2.12 Creating a Single IMS NE..................................................................................................................................564
5.6.3 Setting the Time Discovery Policy for NEs............................................................................................................567
5.6.4 Setting the Security SSL Connection Mode for Transport NEs..............................................................................569
5.7 Configuring the NE Data............................................................................................................................................576
5.7.1 Synchronizing NE Configuration Data....................................................................................................................576
5.7.2 Configuring the NE Data Manually.........................................................................................................................578
5.7.3 Replicating the NE Data..........................................................................................................................................580
5.7.4 Uploading the NE Data............................................................................................................................................582
5.7.5 Configuring Virtual NE Data..................................................................................................................................584
5.7.6 Adding Boards.........................................................................................................................................................585
5.8 Creating Connections.................................................................................................................................................586
5.8.1 Creating Fibers Manually........................................................................................................................................586
5.8.2 Creating Fibers/Cables Automatically.....................................................................................................................589
5.8.3 Creating Fiber/Cable Connections in Batches.........................................................................................................590
5.8.4 Creating a Link Manually........................................................................................................................................591
5.8.5 Creating Links Automatically.................................................................................................................................593
5.8.6 Creating Inter Fibers Inside a WDM NE.................................................................................................................598
5.8.7 Synchronizing Fiber/Cable Connection Data Inside a WDM NE...........................................................................599
5.8.8 Automatically Creating Microwave Links..............................................................................................................600
5.8.9 Manually Creating Microwave Links......................................................................................................................602
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xiii
5.8.10 Creating Cables Manually.....................................................................................................................................604
5.8.11 Creating Virtual Fibers..........................................................................................................................................605
5.8.12 Restoring the Fiber Connection.............................................................................................................................608
5.9 Maintaining a Network Topology View.....................................................................................................................608
5.9.1 Creating Custom Views...........................................................................................................................................608
5.9.2 Adjusting Topology Objects....................................................................................................................................610
5.9.2.1 Balancing Load of an NE Management Process..................................................................................................610
5.9.2.2 Modifying the NE ID and the Extended ID..........................................................................................................613
5.9.2.3 Modifying the NE Name......................................................................................................................................614
5.9.2.4 Modifying the NE IP Address..............................................................................................................................615
5.9.2.5 Modifying the Optical NE Name..........................................................................................................................615
5.9.2.6 Adjusting Optical NE Resource...........................................................................................................................616
5.9.2.7 Modifying the Status of Preconfigured NEs in Batches.......................................................................................616
5.9.2.8 Modifying the NMS Name...................................................................................................................................617
5.9.2.9 Modifying Fiber/Cable Information.....................................................................................................................618
5.9.2.10 Naming a Fiber/Cable/Microwave Link.............................................................................................................618
5.9.2.11 Copying Topology Objects.................................................................................................................................619
5.9.2.12 Moving Topology Objects..................................................................................................................................620
5.9.2.13 Modifying Topology Objects.............................................................................................................................622
5.9.3 Setting the NE Maintenance Information................................................................................................................622
5.9.4 Setting the Maintenance Personnel Information.....................................................................................................623
5.9.5 Deleting Topology Objects......................................................................................................................................624
5.9.5.1 Deleting a Subnet..................................................................................................................................................624
5.9.5.2 Deleting Boards....................................................................................................................................................625
5.9.5.3 Deleting Sub-boards.............................................................................................................................................625
5.9.5.4 Deleting Connections...........................................................................................................................................626
5.9.5.5 Deleting NEs.........................................................................................................................................................627
5.9.5.6 Deleting an Optical NE.........................................................................................................................................628
5.10 Viewing Topology Information................................................................................................................................629
5.10.1 Searching for NEs in a View.................................................................................................................................629
5.10.2 Browsing Fibers/Cables.........................................................................................................................................630
5.10.2.1 Viewing the Connection Status..........................................................................................................................630
5.10.2.2 Querying Fiber/Cable/Microwave Link Information.........................................................................................631
5.10.2.3 Querying Relevant Trails of a Fiber/Cable.........................................................................................................632
5.10.2.4 Querying Relevant Optical Power of a Fiber/Cable...........................................................................................633
5.10.2.5 Querying the Performance Data of a Microwave Link......................................................................................634
5.10.3 Setting the Topology Background.........................................................................................................................635
5.10.4 Selecting the Current Topology View...................................................................................................................637
5.10.5 Filtering Operation Objects in a View...................................................................................................................637
5.10.6 Viewing the Meanings of Topology Icons............................................................................................................640
5.10.7 Viewing Topology Object Detail Information......................................................................................................641
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xiv
5.10.8 Viewing the Topology Aerial View......................................................................................................................642
5.10.9 Zooming In/Out in a Topology View....................................................................................................................643
5.10.10 Returning to the Upper-Level Subnet..................................................................................................................643
5.10.11 Sorting Topology Objects....................................................................................................................................644
5.10.12 Setting Startup subnet..........................................................................................................................................644
5.11 Topology Management Examples............................................................................................................................645
5.11.1 Creating a Transport Network Topology...............................................................................................................645
5.11.2 Creating an IP Network Topology.........................................................................................................................650
5.11.3 Creating an Access Network Topology.................................................................................................................655
5.11.4 Creating a Security Network Topology.................................................................................................................661
5.11.5 Creating a NGN Network Topology.....................................................................................................................670
5.11.6 Creating an IMS Network Topology.....................................................................................................................674
5.11.7 Moving an NE from One Subnet to Another.........................................................................................................679
6 Time Localization Management.............................................................................................681
6.1 Time Localization.......................................................................................................................................................682
6.2 Setting Time Localization on the U2000....................................................................................................................683
6.2.1 Setting the Time Display Format.............................................................................................................................683
6.2.2 Setting the Time Mode of the Client.......................................................................................................................683
6.3 Setting Time Localization on NEs..............................................................................................................................684
6.3.1 Setting a Time Zone for an NE................................................................................................................................684
6.3.2 Setting DST on NEs................................................................................................................................................685
7 Alarm Management...................................................................................................................687
7.1 Basic Concepts...........................................................................................................................................................689
7.1.1 Alarms and Events...................................................................................................................................................689
7.1.2 Alarm Severities......................................................................................................................................................689
7.1.3 Alarm Status............................................................................................................................................................690
7.1.4 Alarm Category.......................................................................................................................................................691
7.1.5 Alarm Notification...................................................................................................................................................692
7.1.6 Current Alarms and Historical Alarms....................................................................................................................696
7.1.7 Alarm Basic Operations...........................................................................................................................................697
7.1.8 Alarm Setting Operations........................................................................................................................................700
7.2 Overview of Fault Operations....................................................................................................................................706
7.3 Setting Remote Alarm or Event Notification.............................................................................................................707
7.3.1 Commissioning the SMS Gateway..........................................................................................................................707
7.3.1.1 Setting Parameters for Alarm Notification by the SMS Gateway........................................................................707
7.3.1.2 Verifying the SMS Gateway.................................................................................................................................709
7.3.2 Commissioning Alarm Notification by Email.........................................................................................................710
7.3.2.1 Setting Parameters for Alarm Notification by Email...........................................................................................710
7.3.2.2 Verifying Remote Alarm Notification by Email..................................................................................................712
7.3.3 Commissioning the Wireless Modem......................................................................................................................713
7.3.3.1 Installing the Wireless Modem.............................................................................................................................713
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xv
7.3.3.2 Commissioning the Wireless Modem in Solaris or SUSE Linux.........................................................................716
7.3.3.3 Commissioning the Wireless Modem in Windows..............................................................................................716
7.3.3.4 Setting Parameters for Alarm Notification by the Wireless Modem....................................................................723
7.3.3.5 Verifying the Wireless Modem............................................................................................................................724
7.3.4 Setting the Format of Remote Alarm or Event Notification Messages...................................................................725
7.3.5 Setting Delay Delivery of Remote Alarm or Event Notification Messages............................................................726
7.3.6 Setting the Remote Alarm or Event Notification Rule............................................................................................727
7.3.7 Downloading Remote Notification Logs.................................................................................................................728
7.4 Analyzing Alarm Correlation.....................................................................................................................................729
7.4.1 Introduction to Correlation Rules............................................................................................................................729
7.4.2 Analyzing Root Alarms Based on Customized Rules.............................................................................................731
7.4.2.1 Setting the Default Alarm Correlation Rules.......................................................................................................731
7.4.2.2 Analyzing Root Alarms and Events According to Customized Rules.................................................................732
7.4.3 Trail Alarm Correlation Analysis - Analyzing Root Alarms..................................................................................733
7.4.3.1 Trail Root Alarm Analysis...................................................................................................................................733
7.4.3.2 Setting the Rules for Trail Alarm Correlation Analysis.......................................................................................736
7.4.3.3 Analyzing Root Alarms Based on Trail Alarm Correlation Rules.......................................................................737
7.4.4 Setting an Alarm or Event Frequency Analysis Rule..............................................................................................738
7.4.5 Setting an Intermittent Alarm or Repeat Event Analysis Rule................................................................................739
7.4.6 Setting an Acknowledged and Uncleared Alarm Time Analysis Rule....................................................................740
7.4.7 Example of Analyzing Root Alarms According to Customized Rules...................................................................741
7.4.8 Example of Alarm or Event Frequency Analysis....................................................................................................743
7.4.9 Example of Intermittent Alarm or Repeat Event Analysis......................................................................................744
7.4.10 Example of Acknowledged and Uncleared Alarm Time Analysis........................................................................745
7.5 Setting Automatic Alarm/Event Processing...............................................................................................................745
7.5.1 Setting Rules for Automatic Reporting Alarms or Events......................................................................................745
7.5.1.1 Setting Automatic Reporting Status for Alarms of an NE...................................................................................745
7.5.1.2 Setting Automatic Reporting Status for Alarms of a Board.................................................................................746
7.5.2 Setting Alarm Automatic Synchronization..............................................................................................................747
7.5.3 Setting an Alarm or Event Mask Rule.....................................................................................................................748
7.5.4 Setting an Automatic Alarm Acknowledgment Rule..............................................................................................751
7.5.5 Modifying Alarm Severity.......................................................................................................................................753
7.5.5.1 Setting an Alarm or Event Redefinition Rule.......................................................................................................753
7.5.5.2 Modifying the Alarm Severity for an NE.............................................................................................................755
7.5.5.3 Modifying the Alarm Severity for a Board..........................................................................................................756
7.5.6 Setting Alarm/Event Suppression Rules..................................................................................................................756
7.5.7 Setting an Alarm or Event Postprocessing Rule......................................................................................................758
7.5.8 An Instance of the Alarm or Event Postprocessing Script......................................................................................758
7.5.9 Setting Summarized Parallel Alarm Rules..............................................................................................................759
7.5.10 Setting Conversion from an Event to an ADMC Alarm.......................................................................................761
7.5.11 Setting the Lifecycle of the Current Alarm...........................................................................................................762
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xvi
7.5.12 Configuring Fiber-Related Alarms........................................................................................................................762
7.5.13 Setting an Alarm or Event Northbound Filtering Rule..........................................................................................763
7.6 Setting Alarm or Event Notification...........................................................................................................................765
7.6.1 Introduction to the Alarm Panel..............................................................................................................................765
7.6.2 Setting the Alarm Panel...........................................................................................................................................767
7.6.3 Setting the Alarm Sound..........................................................................................................................................769
7.6.4 Setting Prompt Colors of Alarms............................................................................................................................771
7.6.5 Setting the Alarm Box.............................................................................................................................................772
7.6.6 Disable the Alarm Sound.........................................................................................................................................773
7.6.7 Setting the Alarm Highlighting...............................................................................................................................775
7.6.8 Setting the Alarm Font............................................................................................................................................776
7.6.9 Setting the Alarm Display Mode.............................................................................................................................777
7.6.10 Setting the Format of the Alarm Lamp ToolTip....................................................................................................779
7.6.11 Setting the Display Properties of New Alarms/Events..........................................................................................780
7.6.12 Setting the Alarm Display in the Topology View.................................................................................................781
7.7 Managing an Alarm/Event Template.........................................................................................................................784
7.7.1 Alarm/Event Template............................................................................................................................................784
7.7.2 Creating an Alarm/Event Template.........................................................................................................................786
7.7.3 Setting Template Status for the Current User..........................................................................................................788
7.7.4 Customizing Alarm/Event Attribute Template........................................................................................................790
7.8 Monitoring Network Alarms/Events..........................................................................................................................791
7.8.1 Alarm Reporting Process.........................................................................................................................................791
7.8.2 Setting Trap Parameters on an NE..........................................................................................................................794
7.8.3 Synchronizing Alarms.............................................................................................................................................795
7.8.3.1 Synchronizing NE Alarms Manually...................................................................................................................795
7.8.3.2 Synchronizing Current Alarms on NEs................................................................................................................796
7.8.4 Monitoring Alarms Using the Alarm Panel.............................................................................................................797
7.8.5 Monitoring Alarms by Using the Topology View...................................................................................................798
7.8.6 Monitoring Alarms by Using the Alarm Bar Chart.................................................................................................799
7.8.7 Monitoring Events by Using the Event Indicator....................................................................................................800
7.8.8 Monitoring NMS Alarms/Events Using Emergency Maintenance Notifications...................................................801
7.8.9 Setting Columns to Be Displayed in an Alarm/Event Window..............................................................................802
7.8.10 Browsing the Current Alarms................................................................................................................................804
7.8.11 Querying Alarm Logs............................................................................................................................................806
7.8.12 Browsing the Historical Alarms............................................................................................................................808
7.8.13 Querying Event Logs.............................................................................................................................................810
7.8.14 Browse Current Alarm by Severity.......................................................................................................................811
7.8.15 Browse Current Alarm by Status...........................................................................................................................812
7.8.16 Querying Alarms at the Opposite Port..................................................................................................................814
7.8.17 Setting Maintenance Regions................................................................................................................................815
7.8.18 Setting the Time Display Mode for Queried Alarms or Events............................................................................817
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xvii
7.8.19 Locating Objects with Alarms/Events...................................................................................................................818
7.8.20 Collecting Statistics on Alarm Logs......................................................................................................................820
7.8.21 Collecting Statistics on Event Logs.......................................................................................................................822
7.8.22 Setting an NE Object Group..................................................................................................................................824
7.8.23 Setting an Alarm or Event Name Group...............................................................................................................826
7.9 Handling Alarms.........................................................................................................................................................827
7.9.1 Alarm Handling Procedure......................................................................................................................................827
7.9.2 Viewing Alarm Details............................................................................................................................................829
7.9.3 Acknowledging an Alarm........................................................................................................................................830
7.9.4 Locating Objects with Alarms/Events.....................................................................................................................831
7.9.5 Checking NE Alarms...............................................................................................................................................832
7.9.6 Rectifying a Fault....................................................................................................................................................833
7.9.7 Masking Alarms......................................................................................................................................................834
7.9.8 Suppressing Alarms.................................................................................................................................................836
7.9.9 Clearing an Alarm Manually...................................................................................................................................837
7.9.10 Recording Alarm or Event Maintenance Experience............................................................................................838
7.10 Managing Alarm or Event Data................................................................................................................................839
7.10.1 Alarm/Event Data Dumping..................................................................................................................................839
7.10.2 Setting a Scheduled Alarm/Event Log Dump Task...............................................................................................840
7.10.3 Setting Alarm/Event Overflow Dump...................................................................................................................841
7.10.4 Manually Dumping Alarms/Events.......................................................................................................................842
7.10.5 Setting Alarm or Event Log Scheduled Export.....................................................................................................843
7.11 Managing Maintenance Experience.........................................................................................................................844
7.11.1 Recording Alarm/Event Maintenance Experience................................................................................................844
7.11.2 Exporting Alarm or Event Maintenance Experience.............................................................................................845
7.11.3 Importing Alarm or Event Maintenance Experience.............................................................................................846
7.12 Managing the Alarm Maintenance Status................................................................................................................847
7.12.1 Configure a Construction Task for NEs................................................................................................................849
7.12.2 Configuring a Construction Task..........................................................................................................................850
7.12.3 Configuring Objects for a Construction Task........................................................................................................852
7.12.4 Setting the Alarm Maintenance Status..................................................................................................................854
7.13 Alarm Management (MSTP&WDM&RTN&PTN NE)...........................................................................................856
7.13.1 Suppressing Alarms...............................................................................................................................................856
7.13.1.1 Suppressing NE Alarms......................................................................................................................................856
7.13.1.2 Suppressing Alarms of a Board or Port..............................................................................................................857
7.13.1.3 Suppressing the Alarms on an ATM Connection...............................................................................................858
7.13.1.4 Checking Path Alarm Suppression Status..........................................................................................................859
7.13.2 Setting Alarm Reversion.......................................................................................................................................859
7.13.2.1 Setting the Alarm Reversion Mode of an NE.....................................................................................................859
7.13.2.2 Setting the Alarm Reversion for Specified Resources.......................................................................................861
7.13.2.3 Setting Alarm Reversion for a Specified Port....................................................................................................864
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xviii
7.13.2.4 Setting Alarm Reversion for an SDH Trail........................................................................................................865
7.13.2.5 Checking Path Alarm Reversion Status..............................................................................................................866
7.13.3 Setting the Types of Lower Order Services in the VC4 Path................................................................................866
7.13.4 Monitoring the Alarms and Performance of Lower Order Services in the VC4 Path...........................................867
7.13.5 Setting the Insertion Mode for Channels Not Configured with Services..............................................................868
7.13.6 Specifying the Port QoS Alarm.............................................................................................................................869
7.13.6.1 Specifying Bit Error Alarm Threshold...............................................................................................................869
7.13.6.2 Enabling AIS Insertion for a Specified Channel................................................................................................870
7.13.6.3 Enabling UNEQ Insertion for a Specified Path..................................................................................................870
7.13.7 Configuring Alarm Insertion.................................................................................................................................871
7.13.7.1 Inserting an Alarm at a Specified Path...............................................................................................................871
7.13.7.2 Testing Trail Connectivity by Inserting an Alarm..............................................................................................872
7.13.7.3 Checking Path Alarm Insertion Status................................................................................................................873
7.13.8 Inserting a Maintenance Signal to the ODU Layer...............................................................................................874
7.13.9 Setting NE Alarm Attributes.................................................................................................................................874
7.13.9.1 Setting the Register Mode for NE Alarms..........................................................................................................874
7.13.9.2 Setting the Enabling Status of NE Alarm Correlation Suppression...................................................................875
7.13.9.3 Querying NE Alarm Correlation Rules..............................................................................................................876
7.13.9.4 Setting NE Alarm Delay.....................................................................................................................................876
7.13.10 Setting Triggered Alarm Insertion.......................................................................................................................877
7.13.11 Enabling the Alarm Monitoring for Lower Order Paths.....................................................................................878
7.13.12 Browsing Microwave Link Alarms.....................................................................................................................879
7.13.13 Processing Alarm Threshold-Crossing Notifications..........................................................................................880
7.13.14 Diagnosing Faults................................................................................................................................................880
7.13.14.1 Creating Fault Diagnosis Rules........................................................................................................................881
7.13.14.2 Analyzing and Diagnosing a Service Fault by Wizard.....................................................................................882
7.13.14.3 Starting the Fault Diagnosis Wizard.................................................................................................................883
7.13.15 Configuring Housekeeping..................................................................................................................................884
7.13.15.1 Configuring Environment Property..................................................................................................................884
7.13.15.2 Configuring Control Property...........................................................................................................................885
7.14 Alarm Reliability of Routers and Switches..............................................................................................................886
7.14.1 Alarm Reliability Overview..................................................................................................................................886
7.14.2 Configuring Alarm Reliability in Inform Mode....................................................................................................887
7.14.3 Configuring Alarm Reliability in ESN Mode........................................................................................................889
8 Performance Management (MSTP&WDM&RTN&PTN).................................................892
8.1 Basic Concept.............................................................................................................................................................894
8.1.1 Introduction to Performance Events........................................................................................................................894
8.1.2 Performance Reporting Process...............................................................................................................................897
8.1.3 Current Performance and History Performance......................................................................................................898
8.1.4 Performance Threshold............................................................................................................................................899
8.1.5 Performance Dumping.............................................................................................................................................899
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xix
8.1.6 Performance Analysis..............................................................................................................................................899
8.2 Viewing SDH/WDM Performance Data....................................................................................................................900
8.2.1 Setting Performance Monitoring Parameters..........................................................................................................900
8.2.1.1 Setting Performance Monitoring Time of NE......................................................................................................901
8.2.1.2 Setting the Performance Reporting Status for a Single NE..................................................................................902
8.2.1.3 Setting the NE Performance Event Monitoring Parameters.................................................................................903
8.2.1.4 Setting Performance Threshold............................................................................................................................905
8.2.2 Creating a Browsing Performance Filtering Template............................................................................................907
8.2.3 Viewing Current Performance Data........................................................................................................................908
8.2.4 Viewing Historical Performance Data.....................................................................................................................910
8.2.5 Viewing UAT Records............................................................................................................................................912
8.2.6 Viewing Performance Threshold Crossing..............................................................................................................914
8.2.7 Querying Performance Data of a Microwave Link.................................................................................................916
8.2.8 Collecting the Performance Data.............................................................................................................................917
8.2.9 Analyzing History Performance Data......................................................................................................................920
8.3 Viewing RMON Performance Data...........................................................................................................................921
8.3.1 Setting RMON Performance Monitoring Parameters.............................................................................................922
8.3.1.1 Setting the RMON Performance Monitoring Parameters for NE.........................................................................922
8.3.1.2 Setting the RMON Performance Event Monitoring Parameters..........................................................................923
8.3.1.3 Setting Automatic Reporting of RMON Performance Events.............................................................................926
8.3.1.4 Setting the RMON Performance Threshold.........................................................................................................926
8.3.2 Viewing Statistics Group Performance of an Ethernet Port....................................................................................928
8.3.3 Viewing Historical Group Performance..................................................................................................................930
8.4 Viewing Ethernet Port Flow.......................................................................................................................................933
8.4.1 Setting Ethernet Port Flow Monitoring...................................................................................................................933
8.4.2 Query Ethernet Port Flow........................................................................................................................................933
8.5 Viewing Performance Data of an ATM Port..............................................................................................................934
8.5.1 Setting ATM Performance Monitoring Parameters of an NE.................................................................................934
8.5.2 Viewing Current Performance Data of an ATM Port..............................................................................................935
8.5.3 Viewing History Performance Data of an ATM Port..............................................................................................935
8.6 Viewing Lower Order Performance Data...................................................................................................................936
8.6.1 Setting the Lower Order Performance Monitoring Status.......................................................................................936
8.6.2 Setting the Lower Order Performance Threshold....................................................................................................937
8.6.3 Viewing Current Lower Order Performance Data...................................................................................................938
8.6.4 Viewing History Lower Order Performance Data...................................................................................................938
8.6.5 Viewing UAT Records for a Lower Order Service.................................................................................................939
8.6.6 Viewing Lower Order Performance Threshold-Crossing Records.........................................................................940
8.7 Viewing IP Performance of Ethernet Ports................................................................................................................941
8.7.1 Setting IP Performance Monitoring Parameters of an NE.......................................................................................941
8.7.2 Viewing Current Performance Data of an Ethernet Port.........................................................................................942
8.7.3 Viewing History Performance Data of an Ethernet Port.........................................................................................942
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xx
8.8 Dumping Performance Data.......................................................................................................................................943
8.8.1 Dumping Performance Data Manually....................................................................................................................943
8.8.2 Dumping Performance Data Periodically................................................................................................................944
8.8.3 Dumping Performance Data in the Overflow Way.................................................................................................945
8.9 Forecasting the Failure Time of the Laser..................................................................................................................946
8.10 Resetting Performance Registers..............................................................................................................................946
8.10.1 Resetting Board Performance Registers................................................................................................................946
8.10.2 Resetting ATM Performance Registers.................................................................................................................947
8.10.3 Resetting Ethernet Performance Registers............................................................................................................947
8.11 Configuring the Q Value Performance Monitoring..................................................................................................948
8.11.1 Setting and Querying the Threshold of the Q Value Performance........................................................................948
8.11.2 Querying the Current Q Value Performance.........................................................................................................949
8.11.3 Querying the History Q Value Performance.........................................................................................................950
9 Inventory Management............................................................................................................952
9.1 Telecommunications Room Management..................................................................................................................955
9.1.1 Creating a Telecommunications Room...................................................................................................................955
9.1.2 Installing a Rack or an NMS in a Telecommunications Room...............................................................................956
9.1.3 Querying Telecommunications Rooms...................................................................................................................957
9.1.4 Modifying a Telecommunications Room................................................................................................................957
9.1.5 Deleting a Telecommunications Room...................................................................................................................958
9.1.6 Setting a Flag for a Telecommunications Room.....................................................................................................958
9.1.7 Exporting Information About telecommunications Rooms ....................................................................................959
9.1.8 Collecting Statistics on a Telecommunications Room............................................................................................960
9.2 Rack Management......................................................................................................................................................961
9.2.1 Creating a Rack.......................................................................................................................................................961
9.2.2 Installing a Subrack on a Rack................................................................................................................................962
9.2.3 Querying Racks.......................................................................................................................................................962
9.2.4 Modifying a Rack....................................................................................................................................................963
9.2.5 Deleting a Rack.......................................................................................................................................................964
9.2.6 Setting a Rack Flag..................................................................................................................................................964
9.2.7 Exporting Rack Information....................................................................................................................................965
9.2.8 Collecting Statistics on a Rack................................................................................................................................965
9.3 NE Management.........................................................................................................................................................967
9.3.1 Querying NEs..........................................................................................................................................................967
9.3.2 Setting a Flag for an NE..........................................................................................................................................968
9.3.3 Exporting NE Information.......................................................................................................................................968
9.3.4 Collecting Statistics on an NE.................................................................................................................................969
9.3.5 Collecting Statistics on an Equivalent NE...............................................................................................................970
9.4 Subrack Management.................................................................................................................................................971
9.4.1 Querying Subracks..................................................................................................................................................971
9.4.2 Setting a Flag for a Subrack....................................................................................................................................972
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxi
9.4.3 Exporting Subrack Information...............................................................................................................................973
9.4.4 Collecting Statistics on a Subrack...........................................................................................................................973
9.5 Board Management.....................................................................................................................................................974
9.5.1 Querying Boards......................................................................................................................................................974
9.5.2 Setting a Flag for a Board........................................................................................................................................975
9.5.3 Exporting Board Information..................................................................................................................................976
9.5.4 Collecting Statistics on a Board...............................................................................................................................977
9.6 Subboard Management...............................................................................................................................................978
9.6.1 Querying Subboards................................................................................................................................................978
9.6.2 Setting a Flag for a Subboard..................................................................................................................................979
9.6.3 Exporting Subboard Information.............................................................................................................................979
9.6.4 Collecting Statistics on a Subboard.........................................................................................................................980
9.7 Port Management........................................................................................................................................................981
9.7.1 Querying Ports.........................................................................................................................................................981
9.7.2 Setting a Port Flag...................................................................................................................................................982
9.7.3 Exporting Port Information.....................................................................................................................................983
9.7.4 Collecting Statistics on Ports...................................................................................................................................983
9.8 Optical/Electrical Module Management.....................................................................................................................984
9.8.1 Querying Optical/Electrical Modules......................................................................................................................984
9.8.2 Setting an Optical/Electrical Module Label............................................................................................................985
9.8.3 Exporting Optical/Electrical Module Information...................................................................................................985
9.8.4 Collecting Statistics on Optical/Electrical Module.................................................................................................986
9.9 Collecting Statistics on the Slot Usage.......................................................................................................................987
9.10 Collecting Statistics on the ONU..............................................................................................................................988
9.11 Fiber/Cable/Microwave Link Management..............................................................................................................988
9.11.1 Creating Fiber/Cable Connections in Batches.......................................................................................................988
9.11.2 Importing Link Data..............................................................................................................................................989
9.11.3 Querying Fiber/Cable/Microwave Link Information............................................................................................991
9.11.4 Modifying Fiber/Cable Information......................................................................................................................991
9.11.5 Deleting Connections............................................................................................................................................992
9.11.6 Setting the Line Shape and Width for New Fiber/Cable/Microwave Link ..........................................................993
9.11.7 Modifying the Line Shape and Width for Fiber/Cable/Microwave Link..............................................................994
9.11.8 Exporting Fiber/Cable/Microwave Link Information...........................................................................................995
9.11.9 Creating an Intermediate Office............................................................................................................................995
9.11.10 Checking the Fiber/Cable Connection.................................................................................................................996
9.11.11 Querying the Fiber/Cable Pipe to Which a Fiber/Cable Belongs........................................................................997
9.11.12 Querying Alarms Related to a Fiber/Cable/Microwave Link..............................................................................998
9.12 Fiber/Cable Pipe Management.................................................................................................................................998
9.12.1 Creating a Fiber/Cable Pipe...................................................................................................................................998
9.12.2 Adding a Fiber/Cable to a Fiber/Cable Pipe..........................................................................................................999
9.12.3 Querying a Fiber/Cable Pipe...............................................................................................................................1000
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxii
9.12.4 Modifying Information About a Fiber/Cable Pipe..............................................................................................1001
9.12.5 Removing a Fiber/Cable from a Fiber/Cable Pipe..............................................................................................1001
9.12.6 Deleting a Fiber/Cable Pipe.................................................................................................................................1002
9.13 Link Resource Management...................................................................................................................................1003
9.13.1 Synchronizing Trunk Links.................................................................................................................................1003
9.13.2 Creating a Link....................................................................................................................................................1004
9.13.3 Querying a Link...................................................................................................................................................1005
9.13.4 Viewing Link Alarms..........................................................................................................................................1005
9.13.5 Reverting the Source and Sink NEs of a Link.....................................................................................................1006
9.13.6 Modifying the Line Shape and Width for a Link................................................................................................1006
9.13.7 Creating a Link View..........................................................................................................................................1007
9.13.8 Creating a Link Group.........................................................................................................................................1008
9.13.9 Adding a Link to a Link Group...........................................................................................................................1008
9.14 Interface Resource Management............................................................................................................................1009
9.14.1 Querying Router/Switch Interface Resources.....................................................................................................1009
9.14.2 Setting a Router/Switch Interface Flag................................................................................................................1010
9.14.3 Exporting Router/Switch Interface Information..................................................................................................1011
9.15 Access Service Statistics Management...................................................................................................................1012
9.15.1 Statistics on ports of various types......................................................................................................................1012
9.15.2 Querying Port Statistics.......................................................................................................................................1014
9.15.3 Creating a Port Statistics Collection Task...........................................................................................................1015
9.15.4 Modifying a Port Statistics Collection Task........................................................................................................1016
9.15.5 Deleting a Port Statistics Collection Task...........................................................................................................1016
9.15.6 Starting a Port Statistics Collection Task............................................................................................................1017
9.15.7 Stopping a Port Statistics Collection Task..........................................................................................................1017
9.16 Exporting Electronic Labels of NEs.......................................................................................................................1018
9.17 SDH Report............................................................................................................................................................1020
9.17.1 Collecting Statistics on the SDH Ports................................................................................................................1020
9.17.2 Collecting Statistics on the SDH Lower Order Cross-Connections....................................................................1021
9.17.3 Collecting Statistics on SDH Tributary Port Resources......................................................................................1021
9.17.4 Collecting Statistics on Trails Between SDH NEs..............................................................................................1022
9.17.5 Collecting Statistics on the SDH Protection Subnet Resources..........................................................................1023
9.17.6 Collecting Statistics on SDH Trail Resources.....................................................................................................1023
9.17.7 Collecting Statistics on SDH Fiber Resource Usage...........................................................................................1024
9.17.8 Creating a Timing Task for Collecting Statistics on SDH Resources.................................................................1025
9.18 Microwave Report..................................................................................................................................................1026
9.18.1 Collecting Statistics on the Microwave License Capacity..................................................................................1026
9.18.2 Collecting Statistics on Microwave Links...........................................................................................................1026
9.18.3 Collecting Statistics on Microwave Link Resource Usage.................................................................................1027
9.18.4 Collecting Statistics on Fiber/Cable Occupancy Resources at Scheduled Time.................................................1028
9.19 MSTP Ethernet Report...........................................................................................................................................1029
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxiii
9.19.1 Collecting Statistics on Ethernet Port Resources................................................................................................1029
9.19.2 Collecting Statistics on Service Resources Between Ethernet NEs....................................................................1029
9.20 WDM Statistic Report............................................................................................................................................1030
9.20.1 Collecting Statistics on the WDM Protection Group Switching State................................................................1030
9.20.2 Collecting Statistics on WDM NE Master/Slave Shelf Information...................................................................1031
9.20.3 Collecting Statistics on WDM Client-Side Port Resources.................................................................................1031
9.20.4 Collecting Statistics on Wavelength Resources Between WDM Sites...............................................................1032
9.20.5 Statistics Report of WDM Link Resources.........................................................................................................1033
9.20.6 Collecting Statistics on Wavelength Resource Usage.........................................................................................1034
9.20.7 Creating a Timing Task for Collecting Statistics on WDM Resources...............................................................1034
9.20.8 Viewing WDM Channel Resources....................................................................................................................1035
9.20.9 Viewing WDM Bandwidth Resource Statistics Report......................................................................................1036
9.21 PTN Statistic Report...............................................................................................................................................1040
9.21.1 Querying a PTN Interface Resource Report........................................................................................................1040
9.21.2 Querying a PTN Port Resource Report...............................................................................................................1041
9.21.3 Querying a PTN Network Resource Statistics Report.........................................................................................1041
9.21.4 Query LAG Resource Report..............................................................................................................................1042
9.22 Project Document...................................................................................................................................................1043
9.22.1 Viewing the Board Manufacturer Information Report........................................................................................1043
9.22.2 Viewing Common Manufacturer Information Report.........................................................................................1044
9.22.3 Viewing the Clock Tracing Diagram...................................................................................................................1045
9.22.4 Viewing the Networking Diagram......................................................................................................................1045
9.22.5 Viewing the Timeslot Allocation Diagram.........................................................................................................1047
10 U2000 Server Monitoring.....................................................................................................1048
10.1 Setting the Monitoring Parameters.........................................................................................................................1049
10.1.1 Setting the Parameters for Monitoring the U2000 Server...................................................................................1049
10.1.2 Setting the Parameters for Monitoring the Disk Usage of the U2000 Server.....................................................1051
10.1.3 Setting the Parameters for Monitoring the Database Usage of the U2000 Server..............................................1053
10.1.4 Setting the Parameters for Monitoring the Service Status of the U2000 Server.................................................1054
10.2 Monitoring the Status of the U2000 Server............................................................................................................1055
10.2.1 Monitoring the Service Status of the U2000 Server............................................................................................1055
10.2.2 Monitoring the Process Status of the U2000 Server............................................................................................1056
10.2.3 Monitoring the Disk Status of the U2000 Server................................................................................................1056
10.2.4 Monitoring the Database Status of the U2000 Server.........................................................................................1057
10.2.5 Monitoring the Resource Status of the U2000 Server.........................................................................................1058
10.2.6 Viewing the Component Information of the U2000 Server................................................................................1058
10.2.7 Refreshing the Monitoring Information..............................................................................................................1059
10.2.8 Saving the Monitoring Information.....................................................................................................................1059
11 Task Management.................................................................................................................1061
11.1 Basic Concepts.......................................................................................................................................................1062
11.1.1 Task Management Window.................................................................................................................................1062
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxiv
11.1.2 Periods of Scheduled Tasks.................................................................................................................................1063
11.1.3 Features of Scheduled Tasks...............................................................................................................................1064
11.1.4 Types of Scheduled Tasks...................................................................................................................................1064
11.1.5 Task Scheduling Parameters................................................................................................................................1068
11.1.6 States of a Scheduled Task..................................................................................................................................1069
11.2 Managing Scheduled Tasks....................................................................................................................................1071
11.2.1 Customizing the Interface for Managing Scheduled Tasks.................................................................................1071
11.2.2 Viewing Scheduled Tasks...................................................................................................................................1071
11.2.3 Creating User Scheduled Tasks...........................................................................................................................1073
11.2.4 Modifying Scheduled Tasks................................................................................................................................1074
11.2.5 Deleting Scheduled Tasks...................................................................................................................................1075
11.2.6 Suspending Scheduled Tasks...............................................................................................................................1076
11.2.7 Resuming Scheduled Tasks.................................................................................................................................1076
12 Backing Up and Restoring the U2000 Data......................................................................1078
12.1 Basic Concepts and Application Scenarios............................................................................................................1079
12.2 Methods of Backing Up and Restoring the U2000 Data........................................................................................1080
12.3 U2000 Database List..............................................................................................................................................1082
12.3.1 List of Minimum-Size U2000 Databases............................................................................................................1082
12.3.2 List of Small-Size U2000 Databases...................................................................................................................1085
12.3.3 List of Medium-Size U2000 Databases...............................................................................................................1088
12.3.4 List of Extra-Large-Size U2000 Databases.........................................................................................................1091
12.4 Suggestions on Data Backup and Restoration........................................................................................................1094
12.5 Backing Up and Restoring All Data in U2000 Database.......................................................................................1094
12.5.1 Immediately Backing Up the U2000 Data to a Local Server Through the U2000 Client...................................1094
12.5.2 Periodically Backing Up the U2000 Data to a Local Server Through the U2000 Client....................................1096
12.5.3 Periodically Backing Up the U2000 Data to a Remote Server Through the U2000 Client................................1099
12.5.4 Restoring a U2000 Database...............................................................................................................................1101
12.6 Backing Up and Restoring the U2000 Network Configuration Data by Using Scripts.........................................1102
12.6.1 Script Files...........................................................................................................................................................1104
12.6.2 Immediately Backing Up the U2000 Data by Script...........................................................................................1117
12.6.3 Backing Up the U2000 Data Through Script Exporting in a Scheduled Manner...............................................1119
12.6.4 Restoring the U2000 Data by Using the Script...................................................................................................1120
12.7 Dumping Performance Data...................................................................................................................................1122
12.7.1 Dumping Performance Data Manually................................................................................................................1122
12.7.2 Dumping Performance Data Automatically........................................................................................................1124
13 Keeping Data Consistency Between the U2000 and NEs...............................................1126
13.1 Data Management Policy of the U2000.................................................................................................................1128
13.2 Checking Consistency of Configuration Data Between an NE and the U2000.....................................................1134
13.3 Viewing the Asynchronous Information................................................................................................................1135
13.4 Synchronizing NE Configuration Data...................................................................................................................1136
13.5 Uploading NE Configuration Data.........................................................................................................................1138
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxv
13.6 Downloading NE Configuration Data....................................................................................................................1139
13.7 Configuration Data Management Information List................................................................................................1140
13.7.1 Configuration Data Management Specifications of the General Operations......................................................1140
13.7.2 Configuration Data Management Specifications of the SDH..............................................................................1142
13.7.3 Configuration Data Management Specifications of the PTN..............................................................................1153
13.7.4 Configuration Data Management Specifications of the WDM...........................................................................1156
13.7.5 Configuration Data Management Specifications of the NG WDM.....................................................................1172
13.7.6 Configuration Data Management Specifications of the WDM (NA)..................................................................1182
13.7.7 Configuration Data Management Specifications of the NG WDM (NA)...........................................................1188
13.7.8 Configuration Data Management Specifications of the Ethernet........................................................................1195
13.7.9 Configuration Data Management Specifications of the ATM.............................................................................1212
13.7.10 Configuration Data Management Specifications of the ASON.........................................................................1215
13.7.11 Configuration Data Management Specifications of the alarm and performance..............................................1216
14 Backing Up and Restoring the NE Data............................................................................1218
14.1 Comparing Methods for Backing Up and Restoring NE Data...............................................................................1220
14.2 Backing Up the NE Database to the SCC Board....................................................................................................1223
14.3 Backing Up Historical Alarms to the Flash Memory.............................................................................................1224
14.4 Backing Up the NE Database to a CF Card............................................................................................................1225
14.4.1 Automatically Backing Up the NE Database to a CF Card.................................................................................1225
14.4.2 Manually Backing Up the NE Database to a CF Card........................................................................................1225
14.5 Restoring the NE Database From the SCC Board..................................................................................................1226
14.6 Restoring the NE Database from the CF Card.......................................................................................................1227
15 Customer Management........................................................................................................1229
15.1 Relationships Between Customers and Users........................................................................................................1231
15.2 Creating a Customer...............................................................................................................................................1231
15.3 Creating a Customer Group....................................................................................................................................1232
15.4 Authorizing a Customer to a U2000 User..............................................................................................................1232
15.5 Browsing Customer Information............................................................................................................................1233
15.6 Viewing Relevant Trails of a Customer.................................................................................................................1233
15.7 Browsing Current Alarms of a Customer...............................................................................................................1234
15.8 Browsing Historical Alarms of a Customer...........................................................................................................1235
15.9 Modifying Customer Information..........................................................................................................................1236
15.10 Deleting a Customer.............................................................................................................................................1236
15.11 Viewing the Customers Affected by an Alarm....................................................................................................1237
15.12 Specifying the Customer of a Service..................................................................................................................1238
15.13 Enabling VCN Status of a Customer....................................................................................................................1239
16 Managing NE Communication in the DCC View...........................................................1240
16.1 DCC View..............................................................................................................................................................1241
16.2 General Operations in the DCC View....................................................................................................................1242
16.2.1 Synchronizing Network-wide DCC Data............................................................................................................1242
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxvi
16.2.2 Synchronizing DCC Subnet Data........................................................................................................................1243
16.2.3 Viewing Data in the DCC View..........................................................................................................................1244
16.2.4 Troubleshooting NE Communication Faults.......................................................................................................1245
16.3 GUI Reference: DCC View....................................................................................................................................1249
16.4 DCC Link Attributes..............................................................................................................................................1255
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxvii
1 Getting Started
About This Chapter
The following topics introduce some preparation operations that will ensure a smooth, trouble-
free launch of the U2000.
1.1 Precautions for Using the U2000 Safely
This topic describes the precautions for using the U2000 safely. Take the following precautions
to ensure correct operations:
1.2 Starting the U2000 System
This topic describes how to start the U2000 system. The procedure for starting the U2000 system
varies according to deployment solutions.
1.3 Shutting Down a U2000
This topic describes how to shut down the U2000 server and U2000 clients. The shutdown
procedure varies according to the deployment scheme.
1.4 Using the Workbench and Favorites Folder
This topic describes how to use the workbench and the favorites folder of commonly used
functions to rapidly locate the commonly used functions of the U2000.
1.5 Setting the Character Set of an NE
To meet global requirements, the U2000 provides the function of setting or modifying NE
character sets to prevent garbled characters caused by language change.
1.6 Main Windows and Common Operations of the U2000
This topic describes the main windows of the U2000 client. Learning about the main windows
helps you locate entrances to operations quickly, which increase your operation efficiency.
1.7 How to Obtain Version Information About the U2000
This topic describes how to obtain version information about the U2000.
1.8 Customizing the Client GUI Effect
You can customize the GUI effect of the U2000 client as required.
1.9 Setting the Alert at Network Disconnection
After you set the disconnection alert on the U2000 client, the sound box connected to the client
plays the sound if the U2000 client is disconnected from the server.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1
1.10 Checking Whether the Client Needs Upgrade
You can perform this operation to check whether the version of the client matches that of the
server. If the versions do not match, you must upgrade the client.
1.11 Setting the Interval of Client Upgrade Check
After the server is upgraded, the server version and the client version do not match. Therefore,
the client has to be upgraded accordingly. After the interval for upgrade checking is set, the
U2000 periodically checks whether the client needs to be upgraded.
1.12 Locking the Client
You can lock the U2000 client to prevent unauthorized operations.
1.13 Unlocking the Client
After a client is locked by the current login user or by the system automatically, the current user
can unlock it, or ask a user in the SMManagers group to reset the password and then log in
again, or ask a user in the Administrators group to unlock the client.
1.14 Setting the Level of Operation Logs Recorded by the Client
You can set the level of operation logs recorded by the client, which enables you to focus on
desired operation logs.
1.15 Setting a Scheduled Task
The U2000 can automatically execute certain tasks in a scheduled time without manual
intervention. You can set and modify these scheduled tasks as required.
1.16 Broadcast Messages
The broadcast message function includes setting the broadcast parameters and sending the
broadcast messages. The broadcast message function of the U2000 enables you to send messages
to other users with ease.
1.17 Applying for and Updating the U2000 License
This topic describes the license file of the U2000, and how to apply for, install, and use the
U2000 license.
1.18 Starting the Web Client
Certain NEs must be configured by using the Web LCT. Before you configure services for these
NEs, you need to first start the Web LCT client.
1.19 Starting the NE Data Collection
When an NE is faulty, you can collect the NE data for fault identification and analysis. There
are fast fault collection and full fault collection.
1.20 Customizing Naming Rule
When you create fibers or trails, the U2000 automatically creates the names of the fibers, trails,
ASON trails, Tunnel, Tunnel protection group PWE3 Service and Native Ethernet E-Line
Service based on the naming rule. The settings can be modified according to actual requirements.
This section takes the fiber naming rule as an example to illustrate how to customize the naming
rule.
1.21 U2000 Process List
This topic describes the information about U2000 processes,such as the functions and dependent
processes of each process and the port occupied by each process.
1.22 GUI Input and Display Conventions
The topic describes the input conventions for the text boxes and display conventions for GUI
elements on the U2000. These rules specify the typing requirements for the text boxes in the
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2
U2000 operation interface. These text boxes are used to enter character strings, file names, IP
addresses, MAC addresses, numerals, passwords, dates, time, and so on.
1.23 Mutual Exclusion List for Multiclient Operations
The mutual exclusion list for multiclient operations is given below.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3
1.1 Precautions for Using the U2000 Safely
This topic describes the precautions for using the U2000 safely. Take the following precautions
to ensure correct operations:
l Do not modify the system time when the U2000 is running. Set the time before installing
the U2000.
To modify the system time of the server, exit the U2000 server and restart it after the
modification.
To modify the system time of the client, exit the U2000 client and restart it after the
modification.
l Avoid modifying the name and IP address of the U2000 server computer.
l Log in to the U2000 server as user ossuser on Solaris. Log in to the U2000 server as user
ossuser on SUSE Linux. On Windows, log in to the U2000 server with the same user ID
that you have chosen when installing the U2000. Do not change the Windows user name.
l The data created on the NE is consistent with that on the U2000. After an NE is configured
and runs properly, ensure data consistency between the NE and the U2000 by means of
manual or automatic synchronization.
l Back up the U2000 database periodically to minimize the loss caused by system
malfunction.
l Synchronize the NE configuration data to the NMS and query the latest NE data before
setting the parameters.
l When a potentially service-affecting operation is performed, the U2000 asks the user for
confirmation. For example, the U2000 displays a message indicating that services will be
interrupted when you download the U2000 data to the NE.
l The installation directory of the U2000 must contain only letters, digits and underscores.
Otherwise, the U2000 Online Help cannot be used.
l If you select a non-English language for an NE when maintaining it, garbled characters are
returned after you query information about the NE.
l Ensure that no other data communication or transmission process is running on the OS of
the U2000 server.
l The default passwords for the default U2000 client user, server OS user, and database user
are all Changeme_123. To ensure the security of the U2000, change the default passwords
after the first login and change the non-default passwords regularly. Meanwhile, the
passwords must be complex enough. For example, a password must contain six or more
characters of different types. The allowed character types are digits, letters, and special
characters.
1.2 Starting the U2000 System
This topic describes how to start the U2000 system. The procedure for starting the U2000 system
varies according to deployment solutions.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4
1.2.1 Starting the U2000 Server in a Windows Single-Server System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.1.1 Powering On the Server Safely
This topic describes how to power on the server in a Windows single-server system safely.
Power on the IBM X3650 M4, IBM X3650 M3, IBM X3850 X5 or Huawei Tecal RH2288H
V2 on condition that the power supply is normal.
1. Power on a Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3/IBM X3650 M4/
IBM X3650 M3/IBM X3850 X5 server.
NOTICE
l Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3 server supports 100 to 240
VAC input voltage.
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops.
2. Press the power buttons on the peripherals and monitor connected to a server.
3. Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks every
1s, press the power button on the shelf of the server.
NOTE
If the power button is steady on, the server has been successfully powered on. For details about IBM
server indicators, see the manual for IBM servers or log in to the official IBM website. For details
about Huawei server indicators, see the manual for Huawei servers or log in to the official Huawei
website.
The red boxes in the following figures show the positions of power buttons on Huawei
Tecal RH2288H V2, Huawei Tecal RH5885H V3, IBM X3650 M4, IBM X3650 M3 and
IBM X3850 X5.
Figure 1-1 Position of the power button on Huawei Tecal RH5885H V3 server
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5

Figure 1-2 Position of the power button on Huawei Tecal RH2288H V2 server

Figure 1-3 Position of the power button on IBM X3650 M4

Figure 1-4 Position of the power button on IBM X3650 M3

Figure 1-5 Position of the power button on IBM X3850 X5

1.2.1.2 Starting the Database
This topic describes how to start the database in a Windows single-server system. The U2000
can start properly only after the database is started.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
6
Prerequisites
The OS has been started.
Context
Generally, the database starts along with the OS.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > All Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL
Server Configuration Manager > SQL Server Services.
Step 3 Right-click SQL Server (MSSQLSERVER) and choose Start from the shortcut menu.
NOTE
If the SQL Server 2000 database is installed on Windows Server 2003, choose Start > Programs >
Microsoft SQL Server > Service Manager. In the SQL Server Service Manager dialog box, click Start/
Continue.
----End
Result
In the SQL Server (MSSQLSERVER), if Start is dimmed, Microsoft SQL Server 2008 is
running.
NOTE
If the SQL Server 2000 database is installed on Windows Server 2003, in the SQL Server Service
Manager dialog box, if Start/Continue is dimmed, Microsoft SQL Server 2000 is running.
1.2.1.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a Windows single-server system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.
Context
l Generally, the U2000 server processes start along with the OS.
l Only one default NMS user, admin, is provided during U2000 software installation. The
admin user is a U2000 administrator with the highest rights on the U2000 system.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
7
Step 2 View the startup information about the U2000 server processes.
1. Choose Start > Run. The Run window will be displayed.
2. Enter cmd and click OK.
3. In the CLI, run the daem_ps command to check whether the U2000 process is started.
l If information similar to the following is displayed, the U2000 process has started.
imapwatchdog.exe 7672 Services 0 7,172
K
ResourceMonitor.exe 21280 Services 0 23,756
K
imapmrb.exe 29188 Services 0 32,760
K
imapsysd.exe 9968 Services 0 40,988
K
imapeventmgr.exe 2756 Services 0 18,452
K
imap_sysmonitor.exe 5124 Services 0 34,432
K
httpd.exe 4908 Services 0 13,476
K
httpd.exe 28900 Services 0 14,756
K
javaw.exe 24564 Services 0 72,036
K
l If no command output is displayed, the U2000 process is not started. You can run the
D:\oss\server\platform\bin\startnms.bat command in the CLI to start the U2000
process.
NOTE
l D:\oss specifies the installation path of the U2000.
l Starting the U2000 process takes about 3 minutes.
Step 3 Check the running status of every process on the System Monitor client.
1. Choose Start > All Programs > Network Management System > U2000 System
Monitor or click the shortcut icon on the desktop to start the U2000 System Monitor client.
2. In the Login dialog box, enter a user name and a password.
NOTE
Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). For details, see section How
to Set the Communication Mode on the U2000 server for the Single-Server System (Windows).
The initial password of the admin user is Changeme_123 (It is Admin_123 for a U2000 that comes
preinstalled). The password must be changed during the first login to ensure system security. Keep
the password confidential and change it regularly.
----End
Result
l If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.
l If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.
l If the U2000 does not run properly, contact Huawei engineers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
8
Follow-up Procedure
The network management system maintenance suite is used for U2000 commissioning,
maintenance, and redeployment. Generally, the MSuite server starts along with the OS.
In the Windows Task Manager dialog box, check whether msdaemon.exe and
msserver.exe are listed.
l If the two processes are listed, the MSuite server has started.
l If the two processes are not listed, the MSuite server has not started. Navigate to the C:
\OSSENGR\engineering directory of U2000 server and double-click startserver.bat to
start the MSuite server.
1.2.2 Starting the U2000 Server in a Solaris Single-Server System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.2.1 Powering On the Server Safely
This topic describes how to power on the server in a Solaris single-server system safely. The
procedure for powering on a server varies according to the server type and disk array type.
Netra T4-1/Oracle T4-1/Oracle T4-2/T5220 Server
1. Power on a Netra T4-1/Oracle T4-1/Oracle T4-2/T5220 server.
NOTICE
l Oracle SPARC T4-2 workstations support only 200 ~ 240 VAC input voltage and do
not support 100 ~ 120 VAC input voltage.
l Netra T4-1/Oracle T4-1/T5220/M4000/M5000 server supports 200 to 240 VAC and
100 to 120 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops and the high availability system fails to
trigger an active/standby switchover.
2. Wait about 2 or 3 minutes. Then switch on the power of the Netra T4-1/Oracle T4-1/Oracle
T4-2/T5220 workstation to start the server.
3. After the server is started, check indicators on the front panel. If the power indicator is
steady green, the server is powered on. If another indicator is on or blinks, the server does
not function properly. Contact the server maintenance engineers to solve the problem. The
following figure shows the positions of the power switch and power indicator.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
9
Figure 1-6 Power switch and power indicator on the Netra T4-1 server

Figure 1-7 Power switch and power indicator on the Oracle T4-1 server

Figure 1-8 Power switch and power indicator on the Oracle T4-2 server

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
10
Figure 1-9 Power switch and power indicator on the T5220 server

NOTE
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If the server displays the OK prompt, enter boot. If the server does not respond, no Solaris OS has been
installed on the server.
M4000/M5000 Server
1. Power on an M4000/M5000 server.
NOTE
Configure power supply based on the rated system power requirement, see U2000 Hardware
Installation Guide (Huawei N610E cabinet). If the power supply is insufficient, the server
automatically stops and the high availability system fails to trigger an active/standby switchover.
This issue occurs frequently for the M4000/M5000 with high power consumption.
2. Insert the key delivered with the server into the key slot in the front panel of the M4000/
M5000 server, and turn the rotary switch to the Locked position labeled with , as shown
in the following figure.
Figure 1-10 Power button on the M4000/M5000 server

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
11
3. Press the power switch of the workstation, which is identified by . Wait 2 to 3 minutes.
If front indicator of the server is on (changes to steady green), the server starts up and
performs self-diagnosis.
NOTE
l Ensure that the green LED power indicator on the operation panel is lit.
l During the power-on process, it is recommended that you use a PC to log in to the controller on
an M4000/M5000 server through a serial interface and enter console -d 0 -f to view the server
start status.
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If turn the rotary switch to the Service position labeled with , the server cannot access the
OS automatically, the server displays the ok prompt. Enter boot. If the server does not respond,
no Solaris OS has been installed on the server.
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
NOTE
Power supply must be provided for the two power modules of the OceanStor S2600 and OceanStor
S3900; otherwise, the OceanStor S2600 and OceanStor S3900 fail to be used. Then press the power switch
on the controller A/B. Wait 5 to 10 minutes until the power indicator is steady green, no longer flashing,
indicating the success of the power-on.
1.2.2.2 Starting the Database
This topic describes how to start the database. The U2000 can start properly only after the
database is started.
Prerequisites
The OS has been started.
Context
Generally, the database starts along with the OS.
Procedure
Step 1 Log in to the OS as the dbuser user.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
12
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123.
Step 2 Ensure that the database is running.
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 793 1 0 Sep 16 ? 0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR
dbuser 802 801 0 Sep 16 ? 0:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/insta
dbuser 795 793 0 Sep 16 ? 118:30 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt
dbuser 926 795 0 Sep 16 ? 117:45 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:1,0,0x2005f917, 10000000000, 0xd4be
dbuser 927 795 0 Sep 16 ? 63:59 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:2,0,0x2005f917, 10000000000, 0xd4be
dbuser 930 795 0 Sep 16 ? 145:24 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:5,0,0x2005f917, 10000000000, 0xd4be
dbuser 929 795 0 Sep 16 ? 69:26 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:4,0,0x2005f917, 10000000000, 0xd4be
dbuser 801 1 0 Sep 16 ? 0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR_back
dbuser 932 795 0 Sep 16 ? 56:19 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:7,0,0x2005f917, 10000000000, 0xd4be
dbuser 931 795 0 Sep 16 ? 54:25 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:6,0,0x2005f917, 10000000000, 0xd4be
dbuser 928 795 0 Sep 16 ? 90:08 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:3,0,0x2005f917, 10000000000, 0xd4be
dbuser 28591 28193 0 15:22:07 pts/1 0:00 grep sybase
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
NOTE
Enter the dbuser user password as prompted. The default password is Changeme_123. For system security,
modify the default password and remember the new password. For details, see How to Change the OS User
Password.
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
13
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4664 1 0 Apr15 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 4675 4664 32 Apr15 ? 2-22:42:47 /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/
DBSVR.log -c/opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 4688 1 0 Apr15 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 4692 4688 0 Apr15 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
If the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -sDBSVR and /opt/sybase/
ASE-15_0/bin/backupserver -SDBSVR_back, the Sybase process is running.
1.2.2.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a Solaris single-server system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.
Context
l Generally, the U2000 server processes start along with the OS.
l Only one default NMS user, admin, is provided during U2000 software installation. The
admin user is a U2000 administrator with the highest rights on the U2000 system.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 Run the following command to check whether the U2000 processes have started:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
14
NOTE
If the displayed information contains imap_sysmonitor -cmd start, the U2000 processes have started.
Step 3 Run the following command to start the U2000 processes if they have not started:
$ cd /opt/oss/server/platform/bin
$ ./startnms.sh
Step 4 Perform the following operations to log in to the server GUI as the ossuser user and view the
running status of every process on the System Monitor client:
NOTICE
If the login to the server GUI is unavailable, run the svc_adm -cmd status command as the
ossuser user to view the process status.
1. Double-click the U2000 System Monitor shortcut icon on the desktop.
2. In the dialog box that is displayed, enter a U2000 user name and a password. The initial
password of the admin user is Changeme_123 (It is Admin_123 for a U2000 that comes
preinstalled). The password must be changed during the first login to ensure system
security. Keep the password confidential and change it regularly.
NOTE
Two data transmission modes are available: Common and Security(SSL). The default data
transmission mode is Security(SSL). Security(SSL) is recommended for the high security
requirements. You can run a command on the server to query the data transmission mode.
For details about how to set the communication mode for the U2000 server in a Solaris single-server
system, see How to Set the Communication Mode on the U2000 server for the Single-Server System
(Solaris).
----End
Result
l If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.
l If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.
l If the U2000 does not run properly, contact Huawei engineers.
Follow-up Procedure
The network management system maintenance suite is used for U2000 commissioning,
maintenance, and redeployment. Generally, the MSuite server starts along with the OS. If the
MSuite server does not start, run the following commands:
$ su - root
password: password_of_the_root_user
# cd /opt/OSSENGR/engineering
# ./startserver.sh
Run the following command to switch back to the ossuser user:
# exit
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
15
Run the following command to check whether the network management system maintenance
suite process has started:
$ ps -ef | grep java
root 19913 19907 0 04:04:09 pts/1 0:00 grep java
...
root 18382 18311 0 03:42:33 pts/2 12:20 /opt/OSSJRE/jre_sol/bin/java -server
-Dequinox.conf=engineering/conf/installE
NOTE
If the displayed information contains /opt/OSSJRE/jre_sol/bin/java -server, the network management
system maintenance suite process has started.
1.2.3 Starting the U2000 Server in a SUSE Linux Single-Server
System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.3.1 Powering On the Server Safely
This topic describes how to power on the server in a SUSE Linux system safely. Power on the
IBM X3650M4, IBM X3650M3 or IBM X3850X5 on condition that the power supply is normal.
Server
1. Power on a IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server.
NOTICE
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
For the High Availability System (SUSE Linux), if the power supply is insufficient, the
server automatically stops and the high availability system fails to trigger an active/
standby switchover.
2. Press the power button on the chassis of the server to power on the server. In the following
figures, the power button is marked in a red frame.
NOTE
If the power button is steady green, the server has been successfully powered on. For details about
server indicators, see the manual for IBM servers or log in to the official IBM website.
Figure 1-11 Position of the power button on IBM X3650 M4
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
16

Figure 1-12 Position of the power button of the IBM X3650 M3 server

Figure 1-13 Position of the power button of the IBM X3850 X5 server

Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
NOTE
Power supply must be provided for the two power modules of the OceanStor S3900; otherwise, the
OceanStor S3900 fail to be used. Then press the power switch on the controller A / B. Wait 5 to 10 minutes
until the power indicator is steady green, no longer flashing, indicating the success of the power-on.
1.2.3.2 Starting the Database
This topic describes how to start the database. The U2000 can start properly only after the
database is started.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
17
Prerequisites
The OS has been started.
Context
Generally, the database starts along with the OS.
Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see How to Change the OS User Password.
Step 2 Run the following command to check whether the Sybase database is running.
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4989 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 5003 4989 0 Sep20 ? 00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 5012 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 5016 5012 0 Sep20 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Step 3 Run the following commands to start the Sybase database if it is not running.
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
----End
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
18
dbuser 4989 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 5003 4989 0 Sep20 ? 00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 5012 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 5016 5012 0 Sep20 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
1.2.3.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a SUSE Linux single-server
system. You can log in to the U2000 to manage a network only after starting the U2000 server
processes on the computer on which the U2000 is installed.
Prerequisites
The OS on the PC server on which the U2000 server processes are installed is running properly,
and the database has been started.
Context
Generally, the U2000 server processes start along with the OS.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 Ensure that the U2000 is running.
Run the following command to check whether the U2000 is running:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start. If no
introduction is displayed, the U2000 processes have been stopped.
Run the following command to start the U2000 if it is not running:
$ cd /opt/oss/server/platform/bin
$ ./startnms.sh
Step 3 View the running status of each process through the System Monitor on the SUSE Linux OS,
as follows:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
19
1. On the desktop of the OS, double-click the U2000 System Monitor shortcut icon.
NOTE
You can run the following commands to start the system monitor client through the CLI:
$ cd /opt/oss/client
$ ./startup_sysmonitor_global.sh
2. In the dialog box that is displayed, enter the U2000 user name and password to open the
System Monitor window. The initial password of the admin user is Changeme_123 (It is
Admin_123 for a U2000 that comes preinstalled). The password must be changed during
the first login to ensure system security. Keep the password confidential and change it
regularly.
NOTE
Two data transmission modes are available: Common and Security(SSL). The default data
transmission mode is Security(SSL). Security(SSL) is recommended for the high security
requirements. You can run a command on the server to query the data transmission mode.
For details about how to set the communication mode for the U2000 server in a SUSE Linux single-
server system, see How to Set the Communication Mode on the U2000 server for the Single-Server
System (SUSE Linux).
----End
Result
l If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.
l If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.
l If the U2000 does not run properly, contact Huawei engineers.
1.2.4 Starting the U2000 Server in a Solaris High Availability System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.4.1 Powering On the Server Safely
This topic describes how to power on the server in a HA system (Solaris) safely. The procedure
for powering on a server varies according to the server type and disk array type.
Netra T4-1/Oracle T4-1/Oracle T4-2/T5220 Server
1. Power on a Netra T4-1/Oracle T4-1/Oracle T4-2/T5220 server.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
20
NOTICE
l Oracle SPARC T4-2 workstations support only 200 ~ 240 VAC input voltage and do
not support 100 ~ 120 VAC input voltage.
l Netra T4-1/Oracle T4-1/T5220/M4000/M5000 server supports 200 to 240 VAC and
100 to 120 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops and the high availability system fails to
trigger an active/standby switchover.
2. Wait about 2 or 3 minutes. Then switch on the power of the Netra T4-1/Oracle T4-1/Oracle
T4-2/T5220 workstation to start the server.
3. After the server is started, check indicators on the front panel. If the power indicator is
steady green, the server is powered on. If another indicator is on or blinks, the server does
not function properly. Contact the server maintenance engineers to solve the problem. The
following figure shows the positions of the power switch and power indicator.
Figure 1-14 Power switch and power indicator on the Netra T4-1 server

Figure 1-15 Power switch and power indicator on the Oracle T4-1 server

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
21
Figure 1-16 Power switch and power indicator on the Oracle T4-2 server

Figure 1-17 Power switch and power indicator on the T5220 server

NOTE
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If the server displays the OK prompt, enter boot. If the server does not respond, no Solaris OS has been
installed on the server.
M4000/M5000 Server
1. Power on an M4000/M5000 server.
NOTE
Configure power supply based on the rated system power requirement, see U2000 Hardware
Installation Guide (Huawei N610E cabinet). If the power supply is insufficient, the server
automatically stops and the high availability system fails to trigger an active/standby switchover.
This issue occurs frequently for the M4000/M5000 with high power consumption.
2. Insert the key delivered with the server into the key slot in the front panel of the M4000/
M5000 server, and turn the rotary switch to the Locked position labeled with , as shown
in the following figure.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
22
Figure 1-18 Power button on the M4000/M5000 server

3. Press the power switch of the workstation, which is identified by . Wait 2 to 3 minutes.
If front indicator of the server is on (changes to steady green), the server starts up and
performs self-diagnosis.
NOTE
l Ensure that the green LED power indicator on the operation panel is lit.
l During the power-on process, it is recommended that you use a PC to log in to the controller on
an M4000/M5000 server through a serial interface and enter console -d 0 -f to view the server
start status.
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If turn the rotary switch to the Service position labeled with , the server cannot access the
OS automatically, the server displays the ok prompt. Enter boot. If the server does not respond,
no Solaris OS has been installed on the server.
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
23
NOTE
Power supply must be provided for the two power modules of the OceanStor S2600 and OceanStor
S3900; otherwise, the OceanStor S2600 and OceanStor S3900 fail to be used. Then press the power switch
on the controller A/B. Wait 5 to 10 minutes until the power indicator is steady green, no longer flashing,
indicating the success of the power-on.
1.2.4.2 Starting the Database
This topic describes how to start the database in a Solaris high availability system. The U2000
can start properly only after the database is started.
Prerequisites
l The OS has been started.
l The server is properly connected to the network.
l The VCS service must be properly started. The VCS service has started along with the OS
and the disk is functioning properly.
Procedure
Step 1 Perform the following operations to start the Sybase database:
l GUI mode:
1. Log in to the active site as the root user.
2. Run the following command to start the VCS client:
# hagui&
3. Choose File > New Cluster from the main menu. In the dialog box that is displayed,
enter the server IP address and click OK.
NOTE
If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.
4. Enter the default user name admin and the initial password Changeme_123 for the
VCS client. Then click OK. For system security, modify the default password and
remember the new password. For detail, see How to Change the admin User Password
for Logging In to the VCS Client.
5. Ensure that all Veritas resources are in Enabled state. Use the BackupServer resource
as an example. Perform the following operations:
Expand the AppService node and then the SybaseBk node in the navigation tree, right-
click BackupServer, and check whether Enabled has been selected in the shortcut
menu. If Enabled has not been selected, select it.
6. Right-click BackupServer and choose Online > host name from the shortcut menu.
7. In the dialog box that is displayed, click Yes.
Wait until the BackupServer and DatabaseServer resource icons on the Resources
tab page are bright, which indicates that the Sybase database service has started.
l CLI mode:
1. Log in to the active site as the root user.
2. Run the following commands to query Veritas resource names:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
24
# haconf -makerw
# hares -list
Information similar to the following is displayed in a Solaris high availability system:
BackupServer Primary
DataFilesystem Primary
DatabaseServer Primary
NMSServer Primary
RVGPrimary Primary
datarvg Primary
wac Primary
Information similar to the following is displayed in a PC Linux high availability
system:
APPBOND Primaster
BackupServer Primary
DatabaseServer Primary
NMSServer Primary
RVGPrimary Primary
datarvg Primary
mountRes Primary
wac Primary
3. Run the hares -modify resource name Enabled 1 command to change the status of all
Veritas resources to Enabled. Use the resource names displayed in the previous
command output as an example. Run the following commands to change the status of
all the Veritas resources to Enabled:
For example, execute the following commands in a Solaris high availability system:
# hares -modify BackupServer Enabled 1
# hares -modify DataFilesystem Enabled 1
# hares -modify DatabaseServer Enabled 1
# hares -modify NMSServer Enabled 1
# hares -modify RVGPrimary Enabled 1
# hares -modify datarvg Enabled 1
# hares -modify wac Enabled 1
For example, execute the following commands in a PC Linux high availability system:
# hares -modify APPBOND Enabled 1
# hares -modify BackupServer Enabled 1
# hares -modify DatabaseServer Enabled 1
# hares -modify NMSServer Enabled 1
# hares -modify RVGPrimary Enabled 1
# hares -modify datarvg Enabled 1
# hares -modify mountRes Enabled 1
# hares -modify wac Enabled 1
4. Run the following command to start the Sybase database service:
# hares -online BackupServer -sys hostname
NOTE
hostname specifies the server name. You can run the hostname command to view the server
name.
----End
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4664 1 0 Apr15 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
25
RUN_DBSVR
dbuser 4675 4664 32 Apr15 ? 2-22:42:47 /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/
DBSVR.log -c/opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 4688 1 0 Apr15 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 4692 4688 0 Apr15 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
If the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -sDBSVR and /opt/sybase/
ASE-15_0/bin/backupserver -SDBSVR_back, the Sybase process is running.
1.2.4.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a Solaris high availability system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.
Procedure
Step 1 Log in to the OS on the active site as the root user.
Step 2 Start the U2000 server processes.
l GUI mode:
1. Open a terminal window and run the following command:
# hagui&
NOTE
If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.
2. Choose Connect to cluster name.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
26
NOTE
If you are logging in to the VCS for the first time, create a new cluster.
1. Choose File > New Cluster.
2. Enter an application network IP address.
3. Click OK.
3. Set User Name and Password.
NOTE
The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.
4. Click OK.
5. In the Cluster Explorer window, select the AppService resource group in the
navigation tree, right-click, and choose Online > host name from the shortcut menu to
start the Sybase process and U2000 server processes.
NOTE
Click the Resources tab to view the start status of each resource.
Normally, the value of State for the active site is Online in the Group Status on
Member Systems area on the Status tab page, and the value of Status is Online on
host name in the Resource Status area.
NOTE
l Use the actual host name for real-world configuration.
l If a fault has occurred during the start of the AppService process, right-click AppService and
choose clear fault from the shortcut menu to rectify the fault. Then choose Online > host name
to start the AppService process.
6. In the dialog box that is displayed, click Yes.
l CLI mode:
# hagrp -online AppService -sys hostname
NOTE
l Use the actual host name for real-world configuration.
l If a fault has occurred during the start of the AppService process, run the
# hagrp -clear AppService -sys hostname
command to rectify the fault. Then run the
# hagrp -online AppService -sys hostname
command to start the AppService process.
----End
Result
1. Log in to the OS of the active site as the ossuser user.
2. Run the following command to check whether the U2000 is running:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
27
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd
start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.
1.2.5 Starting the U2000 Server in a SUSE Linux High Availability
System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.5.1 Powering On the Server Safely
This topic describes how to power on the server in a SUSE Linux system safely. Power on the
IBM X3650M4, IBM X3650M3 or IBM X3850X5 on condition that the power supply is normal.
Server
1. Power on a IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server.
NOTICE
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
For the High Availability System (SUSE Linux), if the power supply is insufficient, the
server automatically stops and the high availability system fails to trigger an active/
standby switchover.
2. Press the power button on the chassis of the server to power on the server. In the following
figures, the power button is marked in a red frame.
NOTE
If the power button is steady green, the server has been successfully powered on. For details about
server indicators, see the manual for IBM servers or log in to the official IBM website.
Figure 1-19 Position of the power button on IBM X3650 M4

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
28
Figure 1-20 Position of the power button of the IBM X3650 M3 server

Figure 1-21 Position of the power button of the IBM X3850 X5 server

Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
NOTE
Power supply must be provided for the two power modules of the OceanStor S3900; otherwise, the
OceanStor S3900 fail to be used. Then press the power switch on the controller A / B. Wait 5 to 10 minutes
until the power indicator is steady green, no longer flashing, indicating the success of the power-on.
1.2.5.2 Starting the Database
This topic describes how to start the database in a PC Linux high availability system. The
U2000 can start properly only after the database is started.
Prerequisites
l The OS has been started.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
29
l The server is properly connected to the network.
l The VCS service has started along with the OS and the disk is functioning properly.
Procedure
Step 1 Perform the following operations to start the Sybase database:
l GUI mode:
1. Log in to the active site as the root user.
2. Run the following command to start the VCS client:
# hagui&
3. Choose File > New Cluster from the main menu. In the dialog box that is displayed,
enter the server IP address and click OK.
NOTE
If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.
4. Enter the default user name admin and the initial password Changeme_123 for the
VCS client. Then click OK. For system security, modify the default password and
remember the new password. For detail, see How to Change the admin User Password
for Logging In to the VCS Client.
5. Ensure that all Veritas resources are in Enabled state. Use the BackupServer resource
as an example. Perform the following operations:
Expand the AppService node and then the SybaseBk node in the navigation tree, right-
click BackupServer, and check whether Enabled has been selected in the shortcut
menu. If Enabled has not been selected, select it.
6. Right-click BackupServer and choose Online > host name from the shortcut menu.
7. In the dialog box that is displayed, click Yes.
Wait until the BackupServer and DatabaseServer resource icons on the Resources
tab page are bright, which indicates that the Sybase database service has started.
l CLI mode:
1. Log in to the active site as the root user.
2. Run the following commands to query Veritas resource names:
# haconf -makerw
# hares -list
Information similar to the following is displayed in a Solaris high availability system:
BackupServer Primary
DataFilesystem Primary
DatabaseServer Primary
NMSServer Primary
RVGPrimary Primary
datarvg Primary
wac Primary
Information similar to the following is displayed in a PC Linux high availability
system:
APPBOND Primaster
BackupServer Primary
DatabaseServer Primary
NMSServer Primary
RVGPrimary Primary
datarvg Primary
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
30
mountRes Primary
wac Primary
3. Run the hares -modify resource name Enabled 1 command to change the status of all
Veritas resources to Enabled. Use the resource names displayed in the previous
command output as an example. Run the following commands to change the status of
all the Veritas resources to Enabled:
For example, execute the following commands in a Solaris high availability system:
# hares -modify BackupServer Enabled 1
# hares -modify DataFilesystem Enabled 1
# hares -modify DatabaseServer Enabled 1
# hares -modify NMSServer Enabled 1
# hares -modify RVGPrimary Enabled 1
# hares -modify datarvg Enabled 1
# hares -modify wac Enabled 1
For example, execute the following commands in a PC Linux high availability system:
# hares -modify APPBOND Enabled 1
# hares -modify BackupServer Enabled 1
# hares -modify DatabaseServer Enabled 1
# hares -modify NMSServer Enabled 1
# hares -modify RVGPrimary Enabled 1
# hares -modify datarvg Enabled 1
# hares -modify mountRes Enabled 1
# hares -modify wac Enabled 1
4. Run the following command to start the Sybase database service:
# hares -online BackupServer -sys hostname
NOTE
hostname specifies the server name. You can run the hostname command to view the server
name.
----End
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4989 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 5003 4989 0 Sep20 ? 00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 5012 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 5016 5012 0 Sep20 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
31
1.2.5.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a PC Linux high availability
system. You can log in to the U2000 to manage a network only after starting the U2000 server
processes on the computer on which the U2000 is installed.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.
Procedure
Step 1 Log in to the OS on the active site as the root user.
Step 2 Start the U2000 server processes.
l GUI mode:
1. Open a terminal window and run the following command:
# hagui&
NOTE
If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.
2. Click Connect to cluster name.
NOTE
If you are logging in to the VCS for the first time, create a new cluster.
1. Choose File > New Cluster.
2. Enter an application network IP address.
3. Click OK.
3. Set User Name and Password.
NOTE
The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.
4. Click OK.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
32
5. In the Cluster Explorer window, select the AppService resource group in the
navigation tree, right-click, and choose Online > host name from the shortcut menu to
start the Sybase process and U2000 server processes.
NOTE
Click the Resources tab to view the start status of each resource.
Normally, the value of State for the active site is Online in the Group Status on
Member Systems area on the Status tab page, and the value of Status is Online on
host name in the Resource Status area.
NOTE
l Use the actual host name for real-world configuration.
l If a fault has occurred during the start of the AppService process, right-click AppService and
choose clear fault from the shortcut menu to rectify the fault. Then choose Online > host name
to start the AppService process.
6. In the dialog box that is displayed, click Yes.
l CLI mode:
# hagrp -online AppService -sys hostname
NOTE
l hostname specifies the server name. You can run the hostname command to view the server name.
l If a fault has occurred during the start of the AppService process, run the # hagrp -clear AppService
-sys hostname command to rectify the fault. Then run the # hagrp -online AppService -sys hostname
command to start the AppService process.
----End
Result
1. Log in to the OS of the active site as the ossuser user.
2. Run the following command to check whether the U2000 is running:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd
start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.
1.2.6 Logging In to a U2000 Client
Log in to a U2000 using the client, and then perform management operations in the GUI of the
U2000 client.
Prerequisites
Before logging in to a U2000 client, ensure that the following conditions are met:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
33
l The U2000 server has been started.
l The U2000 client communicates with the U2000 server properly.
NOTE
Run the ping peer IP address command to check the network communication.
In a single-server system, the IP address is the system IP address for the server.
In an availability system, the IP address is the NMS application network IP address for
the active site.
l The ports used between the U2000 client and the U2000 server have been enabled. For
details, see U2000 Communication Port Matrix.
l The IP address of the U2000 client is included in the ACL configured on the U2000 server.
NOTE
By default, an ACL contains all IP addresses. Setting an ACL based on security requirements is
recommended. For details, see 3.3.1.2 Setting the User ACL.
l Valid U2000 user account and password are available.
l U2000 licenses have been correctly loaded to the U2000 server.
l Using the resolution 1024 x 768 or higher is recommended. If the resolution is not used,
the U2000 client GUI may be incomplete. If the GUI contains complex elements, use a
higher resolution at the same ratio, such as 1152 x 864.
Context
l By default, if three incorrect passwords are entered consecutively, the associated user
account will be locked by the U2000. The user admin can unlock common user accounts.
The U2000 will also unlock the user account in 30 minutes.
l The password for the U2000 System Monitor must be the same as that for the U2000 client.
l Check whether the version of the client is the same as the version of server. If they are
different, you must upgrade the client or reinstall a client with the same version as the
server.
Procedure
Step 1 Log in to the OS on which the U2000 client is installed.
l On Windows, log in to the OS as the administrator user.
l On Solaris, log in to the OS GUI as the ossuser user.
Step 2 Double-click the U2000 Client shortcut icon on the desktop. The Login dialog box is displayed.
NOTE
l On Windows, double-click the startup_all_global.bat file in the client installation path, for example
D:\oss\client directory to start the U2000 client.
l On Solaris, run the ./startup_all_global.sh command in the /opt/oss/client directory to start the
U2000 client.
Step 3 In the Login dialog box, select a desired server from the Server drop-down list.
If no server has been configured, perform the following operations to add a server:
1. Click the ... button. In the Server List dialog box, click Add.
2. In the Add Server Information dialog box, set parameters for the U2000 server to be
added and click OK.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
34
Table 1-1 Server parameter settings
Parameter Settings
Name Setting this parameter to the login IP address or the related host name
is recommended.
Server name (or
IP address)
Setting this parameter to an IP address is recommended.
l In a single-server system, the IP address is the system IP address
for the server.
l In an availability system, the IP address is the NMS application
network IP address for the active site.
Secondary server
name (or IP
address)
Generally, this parameter is not set. If the U2000 server is running
in a high availability system, set this parameter to the IP address of
the standby site.
Port Two data transmission modes are available: Common and Security
(SSL) (more secure, recommended). By default, port 31037 is used
in Common mode and port 31039 is used in Security(SSL) (more
secure, recommended) mode.
Mode Two data transmission modes are available: Common and Security
(SSL). The default data transmission mode is Security(SSL).
Security(SSL) is recommended for the high security requirements.
You can run a command on the server to query the data transmission
mode.
l about how to set the communication mode for the U2000 server
and client in a Windows single-server system, see How to Set
the Communication Mode on the U2000 server for the Single-
Server System (Windows).
l about how to set the communication mode for the U2000 server
and client in a Solaris single-server system, see How to Set the
Communication Mode on the U2000 server for the Single-Server
System (Solaris).
l about how to set the communication mode for the U2000 server
and client in a SUSE Linux single-server system, see How to Set
the Communication Mode on the U2000 server for the Single-
Server System (SUSE Linux).
l about how to set the communication mode for the U2000 server
and client in a Solaris high availability system, see How to Set
the Communication Mode of the Server in a High Availability
System (Solaris, SUSE Linux).
l about how to set the communication mode for the U2000 server
and client in a SUSE Linux high availability system, see How to
Set the Communication Mode of the Server in a High
Availability System (Solaris, SUSE Linux).
NOTE
A client can log in to the U2000 server only when they work in the same
mode. If the client and server work in different modes, even if they are
installed on the same host, the client cannot log in to the server.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
35

3. In the Server List dialog box, select a server from the list and click OK.
Step 4 Enter valid user name and password, and click Login.
l The default user name is admin. The initial password of the admin user is
Changeme_123 (It is Admin_123 for a U2000 that comes preinstalled). The password must
be changed during the first login to ensure system security. Keep the password confidential
and change it regularly.
l If you attempt to connect to the server in a non-SSL mode, the client displays a dialog box
indicating security risks.
If you want to continue the connection, click Yes. If you do not want the client to display
the dialog box again upon subsequent logins, select Do not remind me next time.
NOTE
The IP address of the server being connected is saved to the allComServer.dat file in Client
installation directory\client\client\plugins\loginui\style\conf\loginui. Therefore, the Do not
remind me next time settings apply only to the connected server. If you want the client to display
the dialog box that indicates the security risks upon subsequent logins, delete the
allComServer.dat file.
If you want to terminate the connection, click No. The Login dialog box is displayed.
You can select the matched communication mode.
l If the client does not trust the server, you need to determine whether the server is trustworthy
using the server certificate.
If you confirm that the server is trustworthy, click Yes and log in to the client. If you do
not want the system to display the dialog box again, contact the system administrator to
configure a trust certificate.
If you confirm that the server is untrustworthy, click No to return to the Login dialog box
and contact the system administrator to process the issue.
l When you log in to the U2000 client, a message will be displayed asking you whether to
upgrade the client if the U2000 detects that the local computer version is earlier than the
server version.
To upgrade the client, click OK.
To return to the login window, click Cancel.
----End
Result
After the U2000 client is successfully logged in to, it automatically obtains associated data from
the U2000 server.
NOTE
After the U2000 client is successfully logged in to, if a certificate problem is prompted, accept this
certificate permanently. Click OK.
1.3 Shutting Down a U2000
This topic describes how to shut down the U2000 server and U2000 clients. The shutdown
procedure varies according to the deployment scheme.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
36
1.3.1 Shutting Down U2000 Clients
You must ensure that all U2000 clients are shut down before you shut down the U2000 server.
This topic describes how to shut down the U2000 clients.
Prerequisites
The U2000 clients must be started properly.
Procedure
Step 1 Choose File > Exit from the main menu.
Step 2 In the Confirm dialog box, click OK.
If certain operations are performed on the Main Topology but not saved, a prompt is displayed,
asking you whether to save them.
----End
1.3.2 Shutting Down the U2000 Server (Single Server System,
Windows)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.
1.3.2.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Windows single-server system.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Ensure that the U2000 is not running.
1. Choose Start > Run. The Run window will be displayed.
2. Enter cmd and click OK.
3. In the CLI, run the daem_ps command to check whether the U2000 process is stopped.
l If no command output is displayed, the U2000 process has stopped.
l If information similar to the following is displayed, the U2000 process is not stopped.
In the CLI, run the D:\oss\server\platform\bin\stopnms.bat command to stop the
U2000 process.
imapwatchdog.exe 7672 Services 0 7,172
K
ResourceMonitor.exe 21280 Services 0 23,756
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
37
K
imapmrb.exe 29188 Services 0 32,760
K
imapsysd.exe 9968 Services 0 40,988
K
imapeventmgr.exe 2756 Services 0 18,452
K
imap_sysmonitor.exe 5124 Services 0 34,432
K
httpd.exe 4908 Services 0 13,476
K
httpd.exe 28900 Services 0 14,756
K
javaw.exe 24564 Services 0 72,036
K
NOTE
l D:\oss specifies the installation path of the U2000.
l Stopping the U2000 process takes about 3 minutes.
----End
Result
If no command output is displayed after the daem_ps command is executed, the U2000 process
has stopped.
1.3.2.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the Windows single-server system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > All Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL
Server Configuration Manager > SQL Server Services.
Step 3 Right-click SQL Server (MSSQLSERVER) and choose Stop to stop the database.
NOTE
If the SQL Server 2000 is installed in Windows Server 2003, choose Start > All Programs > Microsoft
SQL Server > Service Manager. The SQL Server Service Manager dialog box is displayed. Then, click
Stop. Then, click Yes.
----End
Result
Two methods are available for checking whether the SQL Server database can connect normally.
l Through the CLI:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
38
1. Choose Start > Run.
2. In the Run dialog box, enter cmd. A command line interface (CLI) is displayed.
3. Run the following commands:
> isql -Usa -SDBSVR
NOTE
l DBSVR specifies the database name.
l Enter the database sa user password as prompted.
l The prompt C:\> varies according to on-site conditions. If the system is logged in to as
the Administrator user, the default prompt is C:\Users\Administrator>. You can
run the cd command to switch the directory. A command example is
C:\Users\Administrator> cd c:\
The command prompt switches to c:\>.
If the displayed information includes 1>, you can connect to the database normally,
that is, the database is shutted down. Otherwise, the database is started.
l Through the GUI:
1. Click Start > All Programs > Microsoft SQL Server 2008 > SQL Server
Management Studio. The Connect to Server window is displayed.
2. Set parameters according to the following information and then click Connect.
Server type: Database Engine
Server name: DBSVR
Authentication: Windows Authentication
If the displayed SQL Server Management Studio window prompted, you can
connect to the database normally, that is, the database is started. Otherwise, the
database is shutted down.
1.3.2.3 Powering Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Windows single-server system safely.
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > Shut down to shut down the Windows OS.
Step 3 If a KVM is equipped, power off the KVM switcher.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
39
1.3.3 Shutting Down the U2000 Server (Single Server System,
Solaris)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.
1.3.3.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Solaris single-server system.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 To check the running status of the U2000 process, run the following command:
Run the following command to check whether the U2000 is running:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start. If no
introduction is displayed, the U2000 processes have been stopped.
Step 3 Run the following commands to stop U2000 if it is running:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
----End
Result
Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
The process is stopped if the displayed information is empty.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
40
1.3.3.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the Solaris single-server system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123.
Step 2 Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 793 1 0 Sep 16 ? 0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR
dbuser 802 801 0 Sep 16 ? 0:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/insta
dbuser 795 793 0 Sep 16 ? 118:30 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt
dbuser 926 795 0 Sep 16 ? 117:45 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:1,0,0x2005f917, 10000000000, 0xd4be
dbuser 927 795 0 Sep 16 ? 63:59 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:2,0,0x2005f917, 10000000000, 0xd4be
dbuser 930 795 0 Sep 16 ? 145:24 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:5,0,0x2005f917, 10000000000, 0xd4be
dbuser 929 795 0 Sep 16 ? 69:26 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:4,0,0x2005f917, 10000000000, 0xd4be
dbuser 801 1 0 Sep 16 ? 0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR_back
dbuser 932 795 0 Sep 16 ? 56:19 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:7,0,0x2005f917, 10000000000, 0xd4be
dbuser 931 795 0 Sep 16 ? 54:25 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:6,0,0x2005f917, 10000000000, 0xd4be
dbuser 928 795 0 Sep 16 ? 90:08 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:3,0,0x2005f917, 10000000000, 0xd4be
dbuser 28591 28193 0 15:22:07 pts/1 0:00 grep sybase
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Step 3 Run the following commands to stop the Sybase database if it is running:
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE
Enter the database sa user password as prompted.
1> shutdown SYB_BACKUP
2> go
1> shutdown
2> go
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
41
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Enter the database sa user password as prompted.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error: Net-
Library operation terminated due to disconnect
----End
Result
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE
The database is stopped if the displayed information does not contain /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
1.3.3.3 Power Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Solaris single-server system safely.
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
Procedure
Step 1 Log in to the Solaris OS as user root.
Step 2 Run the following commands to power off the server:
# sync;sync;sync;sync
# shutdown -y -g0 -i5
Step 3 If a KVM is equipped, power off the KVM switcher.
----End
1.3.4 Shutting Down the U2000 Server (Single Server System, SUSE
Linux)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.
1.3.4.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
42
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the SUSE Linux single-server system.
Prerequisites
All running U2000 clients have been stopped.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 To check the running status of the U2000 process, run the following command:
$ daem_ps
A message similar to the following will be displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.
Step 3 Run the following commands to stop U2000 if it is running:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
----End
Result
Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
The process is stopped if the displayed information is empty.
1.3.4.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the SUSE Linux single-server system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Log in to the OS as the dbuser user.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
43
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see How to Change the OS User Password.
Step 2 Run the following command to check whether the Sybase database is running.
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4989 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 5003 4989 0 Sep20 ? 00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 5012 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 5016 5012 0 Sep20 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Step 3 Run the following commands to stop the Sybase database if it is running:
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE
Enter the database sa user password as prompted.
1> shutdown SYB_BACKUP
2> go
1> shutdown
2> go
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Enter the database sa user password as prompted.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error: Net-
Library operation terminated due to disconnect
----End
Result
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE
The database is stopped if the displayed information does not contain /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
44
1.3.4.3 Powering Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the U2000 single-server system (SUSE Linux) .
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
Procedure
Step 1 Log in to the OS as the root user.
Step 2 Run the following commands to shut down the OS.
# sync;sync;sync;sync
# shutdown -h now
----End
1.3.5 Shutting Down the U2000 Server in a High Availability System
(Solaris)
Four steps are required to shut down the U2000 server in a high availability system (Solaris):
stop the U2000 server processes, shut down the database, stop the VCS service, and power off
the server safely.
1.3.5.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Solaris HA system.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS of the active site as the root user.
Step 2 Stop the U2000 server processes.
l GUI mode:
1. Open a terminal window, run the following command:
# hagui&
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
45
NOTE
If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.
2. Click Connect to Cluster name.
NOTE
If you are logging in to the VCS for the first time, you need to create a new Cluster.
1. Click File > New Cluster.
2. Enter the IP address of application network.
3. Click OK.
3. Enter the user name and password for VCS login.
NOTE
The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.
4. Click OK.
5. Choose AppService from the navigation tree.
6. Click the Resources tab. Right-click NMSServer and choose Offline > Host name
from the shortcut menu. In the Question dialog box, click Yes.
Wait about 1 minute. If the NMSServer icon changes to grey, the U2000 processes
have been stopped.
l CLI mode:
# hares -offline NMSServer -sys hostname
Step 3 Ensure that the U2000 is not running.
1. Log in to the OS of the active site as the ossuser user.
2. Run the following command to check the running status of the U2000 process:
$ daem_ps
Information similar to the following is displayed:
ossuser 26225 1 0 09:16:02 ? 0:00 imapwatchdog -cmd start -type
standby
ossuser 26225 1 0 09:16:03 ? 0:01 ResourceMonitor -cmd start
3. Run the following commands to stop the U2000 processes:
$ su - root
Password: root user password
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
46
# hares -offline NMSServer -sys hostname
# exit
4. Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
The process is stopped if the displayed information is empty.
----End
1.3.5.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the HA system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Perform the following operations to disable the Sybase database service at the primary site in
the HA system:
NOTE
By default, the Sybase database service at the secondary site is not running.
l GUI mode:
1. Log in to the primary site as user root.
2. Run the following command to start the VCS client at the primary site:
# hagui&
3. Choose File > New Cluster from the main menu. In the window that is displayed, enter
the IP address of the server and click OK.
NOTE
If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.
4. Enter the default user name admin and the initial password Changeme_123 for the
VCS client. For system security, modify the default password and remember the new
password. For detail, see How to Change the admin User Password for Logging In to
the VCS Client. Then click OK.
5. On the VCS client of the primary site, right-click the NMSServer node and choose
Offline > hostname from the shortcut menu.
6. In the confirmation dialog box, click Yes.
7. After the NMSServer node is dimmed, right-click the BackupServer node and choose
Offline > hostname from the shortcut menu.
8. In the confirmation dialog box, click Yes.
9. After the BackupServer node is dimmed, right-click the DatabaseServer node and
choose Offline > hostname from the shortcut menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
47
10. In the confirmation dialog box, click Yes.
l CLI mode:
1. Log in to the primary site as user root.
2. Run the following command to shut down the U2000:
# hares -offline NMSServer -sys hostname
3. Run the following command to disable the Sybase database service:
# hares -offline BackupServer -sys hostname
# hares -offline DatabaseServer -sys hostname
NOTE
hostname specifies the server name. You can run the hostname command to view the server name.
Run the following command to check whether the Sybase database service is disabled:
# ps -ef | grep sybase
If the following message is displayed, the Sybase database service has been disabled:
root 9629 14603 0 07:46:52 pts/3 0:00 grep sybase
----End
1.3.5.3 Stopping the VCS Service
This topic describes how to stop the VCS service.
Prerequisites
The U2000 and database must have been shut down.
Context
Before powering off the server safely, manually stop the VCS service; otherwise, the server may
fail to shut down properly.
Procedure
Step 1 Log in to the OS on the server as the root user.
Step 2 Run the following command to stop the VCS service:
# hastop -all -force
----End
1.3.5.4 Power Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Solaris HA system safely.
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
48
l The VCS services must have been shut down.
Procedure
Step 1 Log in to the Solaris OS as user root.
Step 2 Run the following commands to power off the server:
# sync;sync;sync;sync
# shutdown -y -g0 -i5
Step 3 If a KVM is equipped, power off the KVM switcher.
----End
1.3.6 Shutting Down the U2000 Server in a High Availability System
(PC Linux)
Four steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, stop the VCS service, and power off the server safely.
1.3.6.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the SUSE Linux HA system.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS of the active site as the root user.
Step 2 Stop the U2000 server processes.
l GUI mode:
1. Open a terminal window, run the following command:
# hagui&
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
49
NOTE
If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.
2. Click Connect to Cluster name.
NOTE
If you are logging in to the VCS for the first time, you need to create a new Cluster.
1. Click File > New Cluster.
2. Enter the IP address of application network.
3. Click OK.
3. Enter the user name and password for VCS login.
NOTE
The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.
4. Click OK.
5. Choose AppService from the navigation tree.
6. Click the Resources tab. Right-click NMSServer and choose Offline > Host name
from the shortcut menu. In the Question dialog box, click Yes.
Wait about 1 minute. If the NMSServer icon changes to grey, the U2000 processes
have been stopped.
l CLI mode:
# hares -offline NMSServer -sys hostname
NOTE
hostname specifies the server name. You can run the hostname command to view the server name.
Step 3 Ensure that the U2000 is not running.
1. Log in to the OS of the active site as the ossuser user.
2. Run the following command to check the running status of the U2000 process:
$ daem_ps
Information similar to the following is displayed:
ossuser 26225 1 0 09:16:02 ? 0:00 imapwatchdog -cmd start -type
standby
ossuser 26225 1 0 09:16:03 ? 0:01 ResourceMonitor -cmd start
3. Run the following commands to stop the U2000 processes:
$ su - root
Password: root user password
# hares -offline NMSServer -sys hostname
# exit
4. Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
The process is stopped if the displayed information is empty.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
50
1.3.6.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the HA system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Perform the following operations to disable the Sybase database service at the primary site in
the HA system:
NOTE
By default, the Sybase database service at the secondary site is not running.
l GUI mode:
1. Log in to the primary site as user root.
2. Run the following command to start the VCS client at the primary site:
# hagui&
3. Choose File > New Cluster from the main menu. In the window that is displayed, enter
the IP address of the server and click OK.
NOTE
If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.
4. Enter the default user name admin and the initial password Changeme_123 for the
VCS client. For system security, modify the default password and remember the new
password. For detail, see How to Change the admin User Password for Logging In to
the VCS Client. Then click OK.
5. On the VCS client of the primary site, right-click the NMSServer node and choose
Offline > hostname from the shortcut menu.
6. In the confirmation dialog box, click Yes.
7. After the NMSServer node is dimmed, right-click the BackupServer node and choose
Offline > hostname from the shortcut menu.
8. In the confirmation dialog box, click Yes.
9. After the BackupServer node is dimmed, right-click the DatabaseServer node and
choose Offline > hostname from the shortcut menu.
10. In the confirmation dialog box, click Yes.
l CLI mode:
1. Log in to the primary site as user root.
2. Run the following command to shut down the U2000:
# hares -offline NMSServer -sys hostname
3. Run the following command to disable the Sybase database service:
# hares -offline BackupServer -sys hostname
# hares -offline DatabaseServer -sys hostname
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
51
NOTE
hostname specifies the server name. You can run the hostname command to view the server name.
Run the following command to check whether the Sybase database service is disabled:
# ps -ef | grep sybase
If the following message is displayed, the Sybase database service has been disabled:
root 9629 14603 0 07:46:52 pts/3 0:00 grep sybase
----End
1.3.6.3 Stopping the VCS Service
This topic describes how to stop the VCS service.
Prerequisites
The U2000 and database must have been shut down.
Context
Before powering off the server safely, manually stop the VCS service; otherwise, the server may
fail to shut down properly.
Procedure
Step 1 Log in to the OS on the server as the root user.
Step 2 Run the following command to stop the VCS service:
# hastop -all -force
----End
1.3.6.4 Power Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the U2000 HA System (SUSE Linux, PC Server).
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
l The VCS services must have been shut down.
Procedure
Step 1 Log in to the OS as the root user.
Step 2 Run the following commands to shut down the OS.
# sync;sync;sync;sync
# shutdown -h now
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
52
1.4 Using the Workbench and Favorites Folder
This topic describes how to use the workbench and the favorites folder of commonly used
functions to rapidly locate the commonly used functions of the U2000.
1.4.1 Placing a Shortcut Icon on the Workbench
This topic describes how to place the shortcut icons of the commonly used functions on the
workbench and create function links. You can use the shortcut icons to improve operation
efficiency.
Context
If + is appended to a menu option on the main menu of the NMS, you can create the shortcut of
this menu option on the workbench.
Procedure
Step 1 In the main window of the U2000, click the drop-down arrow next to and select Style of
Desktop to access the workbench.
Step 2 Right-click Workbench and choose Create Shortcut from the shortcut menu.
Step 3 In the Create Shortcut dialog box, select the function to be added with a shortcut icon.
Step 4 Click Create. The shortcut icon of the function is displayed on the workbench.
----End
1.4.2 Adding a Common Function to the Favorites Folder
This topic describes how to add a common function to the favorites folder. You can easily open
a common function view using the customized favorites folder.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
53
Prerequisites
The U2000 client has been started successfully.
Context
When the NMS is started for the first time, the shortcut function view of the favorites folder is
displayed as a floating window on the Workbench. The default shortcut nodes, such as the alarm,
and Main Topology are displayed in the floating window.
Procedure
Step 1 Click the drop-down arrow next to on the toolbar.
Step 2 In the drop-down list that is displayed, select Style of Favorites Folder.
Step 3 In the Workbench window, right-click Default Workbench.
Step 4 Choose Add Menu Shortcut from the shortcut menu.
Step 5 The Add Menu Shortcut window is displayed.
Step 6 Select the node to be added to the favorites folder, and click Create.
----End
Result
The added node is displayed under Default Workbench in the favorites folder.
1.4.3 Viewing Common Functions
This topic describes how to view common functions on the workbench or in the favorites folder.
Prerequisites
The U2000 client has been started successfully.
Context
When the NMS is started for the first time, the shortcut function view of the favorites folder is
displayed as a floating window on the Workbench. The default shortcut nodes, such as the alarm,
and Main Topology are displayed in the floating window.
Procedure
Step 1 Click the drop-down arrow next to on the toolbar.
Step 2 In the drop-down list that is displayed, select Style of Desktop or Style of Favorites Folder.
Step 3 If Style of Desktop is selected, the Workbench window is displayed, and the common functions
are displayed as floating icons.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
54

Step 4 If Style of Favorites Folder is selected, the Workbench dialog box is displayed. If you click
+ in the front of Default Workbench or double-click Default Workbench, the common
functions are expanded.

----End
Follow-up Procedure
Right-click a common function and delete or modify it.
1.5 Setting the Character Set of an NE
To meet global requirements, the U2000 provides the function of setting or modifying NE
character sets to prevent garbled characters caused by language change.
1.5.1 Character Set
This topic describes the character sets on the U2000 and the precautions for setting character
sets.
If the character set that an NE transfers to the U2000 is different from the character set of the
internal data (NE source file) on the U2000, the data transferred to the U2000 is displayed as
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
55
garbled characters. The data that the U2000 applies to the NE is also displayed as garbled
characters, resulting in failure in reading the NE.
Introduction of Character Set on the U2000
Character Set Description
GBK Chinese character set which indicates that the
NEs support only Chinese characters.
ISO-8859-1 Latin character set which indicates that the
NEs support only western-Europe characters.
UTF-8 Unicode encoding mode which indicates that
the NEs support Chinese, English, Spanish,
Russian, German, Portuguese, Italian,
French, and Arabic characters.

Description of Character Sets on the U2000
l Modifying character sets is not allowed. Character sets are set only when garbled characters
are displayed. The setting rules are as follows:
U2000 Language Character Set
Chinese GBK
English ISO-8859-1
Spanish
Russian
German
Portuguese
Italian
French
Arabic
UTF-8

l In the case of the MSTP series, WDM series, RTN series, PTN series, router series, and
switch series NEs, if the character sets on an NE are changed, the U2000 refreshes the
character sets in real time so that the character sets on the U2000 are the same as those of
the NE. At the same time, the U2000 notifies the user by means of an event that the NE
character sets are changed.
l In the case of a new NE, if the data on the U2000 is displayed as garbled characters or the
language changes, you can query and modify the character set attribute of a single NE or
NEs in batches in the NE Character Set Management window.
l In the case of an old NE, the character set cannot be modified because an old NE does not
have the character set attribute interface. In the NE Character Set Management window,
if the queried NE is an old NE, the related record is dimmed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
56
NOTE
l Modifying character sets is not a commonly performed operation. Generally, it is not allowed to modify
character sets. If you change the character set incorrectly, characters may be garbled. If you change the
character set to UTF-8, characters on the NE may be truncated.
l If there is a definite multi-language requirement and the character set needs to be changed to UTF-8,
convert the original character sets according to the guide for related NEs to ensure that the original
data is normally displayed.
Relationship Between Characters and Bytes
Generally, in user manuals, the description of the restrictions on entering characters in text boxes
is specific to English characters. For the restrictions on other languages, see the following table
and calculate the occupied bytes of each language.
Language Bytes occupied by a character
Chinese 3
English 1
Spanish 3
Russian 3
German 3
Portuguese 3
Italian 3
French 3
Arabic 2

List of New NEs
The NEs supporting the preceding nine languages are globalized NEs. The NEs that are
globalized are new NEs, whereas the NEs that are not planned with globalization are old NEs.
The following table lists the NEs that are globalized.
Field NE
Access MA5600T V800R008 and later versions, MxU
V800R308 and later versions, MA5600 V300R003 and
later versions, UA5000V100R019 and later versions
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
57
Field NE
Transport OSN 9800 U32/U64 V100R001 and later versions, OSN
8800 T16/T32/T64 V100R005 and later versions, OSN
6800/3800 V100R005 and later versions, OSN 6800A/
3800A V100R005 and later versions, OSN 1800
V100R002 and later versions, OSN 1600S V100R004
and later versions, OSN 7500/3500/2500/1500
V100R010 and later versions, Metro 1000 V300R007 and
later versions, OSN 500 V100R003 and later versions,
RTN 900 V100R002 and later versions, RTN 600
V100R004 and later versions
IP Router NE40E&80E V300R008 and later versions,
NE40E&80E V300R009 and later versions, NE5000E
V600R001 and later versions
PTN Chassis-shaped (PTN3900/1900) V100R002C02 and
later versions, Box-shaped (PTN950/910/912)
V100R002C01 and later versions
Switch Switch 93 V100R003 and later versions

1.5.2 Setting or Modifying Character Sets
If the character set that an NE transfers to the U2000 is different from the character set of the
internal data (NE source file) on the U2000, the data transferred to the U2000 is displayed as
garbled characters. The data that the U2000 applies to the NE is also displayed as garbled
characters, resulting in failure in reading the NE. The U2000 provides the function of querying
or modifying character sets of NEs to help users manage the NE data.
Prerequisites
You have logged in to the U2000 client as user admin.
Context
NOTICE
The setting of an error character set may cause garbled characters.
l If multiple languages are required when an NE is created, set the character set to UTF-8
to support multiple language entering.
l If multiple languages are required when an NE is upgraded, set the character set of the NE
to UTF-8 to support multiple language entering.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
58
l If garbled characters are displayed after an NE is upgraded and the character set is set on
the NE, you can restore the setting to the original character set.
Procedure
Step 1 Choose Configuration > NE Batch Configuration > NE Charset Management (traditional
style) from the main menu or select Fix-Network NE Configuration in Application Center
and choose Configuration > NE Batch Configuration > NE Charset Management
(application style) from the main menu.
Step 2 In the NE Character Set Management window, select one or more NEs in the left pane and
click .
Step 3 Click Close in the Result dialog box.
Step 4 Click the Query button in the lower right corner.
Step 5 Click Close in the Result dialog box.
Step 6 Select one or more NEs to be modified, right-click in the Character Set column and then choose
the desired character set from the shortcut menu.
NOTE
You can hold down Shift or Ctrl to select multiple NEs, and set or modify character sets in batches.
Step 7 After setting or modifying the character set, click Apply.
Step 8 In the Warning dialog box, click Yes.
Step 9 In the Result dialog box, click Close.
----End
1.6 Main Windows and Common Operations of the U2000
This topic describes the main windows of the U2000 client. Learning about the main windows
helps you locate entrances to operations quickly, which increase your operation efficiency.
1.6.1 Client GUI in the Application Style
The application style is a new GUI style. It improves usability of the U2000 as a whole and
facilitates common function search and management.
Initial Window
Figure 1-22 shows the GUI after you log in to the client.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
59
Figure 1-22 Initial window
NOTE
If you have added functions to the My Favorites tab, the My Favorites tab is displayed after you log in
to the client.
Figure 1-23 shows the GUI after you click . Table 1-2 describes Figure 1-23.
Figure 1-23 Application style window
1
2
3
4
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
60
Table 1-2 Application style window
No. Name Description
1 Menu Bar Shows the main menu of the system.
2 Toolbar Shows the shortcut icons for key operation tasks.
3 Output Pane Displays results of operations performed during the U2000
running.
4 Status Bar Displays the status information of the system, such as the current
user and the IP address of the connected server.

Menu Bar
The U2000 client menu bar consists of the File, My Favorites, Window, and Help menus.
Toolbar
The toolbar provides shortcut icons for system management. Table 1-3 describes the shortcut
icons for system management and their functions.
Table 1-3 Shortcut icons for system management
Icon Name Description
Application
Panel
Switches from the initial window to the application style
window. After you open the main window of a function from the
application window, you can click the application panel icon to
switch back to the application window.
Exit You can terminate client programs and exit the current U2000
client.
Log out You can log out of the current U2000 client without the
termination of client programs.
Lock Terminal If the client is locked, you are not allowed to perform operations
on the client. You must enter the correct password to unlock the
client.
Full Screen By using this icon, the menu bar, toolbar, output window, and
status bar can be hidden, and therefore the main window can
have more space. You can press Esc to exit the full screen mode.

Output Pane
The output pane displays the echo message of the operation performed when the U2000 is
running, such as the initialization message when you log in to the server.
Status Bar
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
61
The status bar displays the information such as the system status, the login users, and the IP
address of the connected server. The information displayed from left to right is as follows:
l Server: Displays the name and IP address used for logging in to the server.
l Login user: Displays the name of the login user.
l Connection duration: Displays the client time in real time.
l System pop-up pane: Displays a message in real time when an operation on the server
affects client operations. For example, after the user opens the Security Management
window, if a user, user group, or operation set is added or deleted on the U2000, the system
pop-up pane displays a message.
NOTE
To enable or disable the function of displaying a message, right-click the icon of the system pop-up
pane and choose Enable or Disable.
l Login mode: Displays the login mode. It can be single-user mode and multi-user mode.
l Connection status: Displays the status of the connection between the client and the server.
When the client is disconnected from the server, the icon on the status bar is changed from
to , and then to . When the status of the alarm indicator changes to , a
disconnection sound is available.
l Logo: Displays the logo of Huawei Technologies Co., Ltd..
Application Center
Figure 1-24 shows the GUI after you log in to the client. The application center provides
common applications, such as fault management applications. Table 1-4 describes the
operations that can be performed on the Application Center tab.
Figure 1-24 Application Center tab
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
62
Table 1-4 Operations on the Application Center tab
Operation Details
Accessing applications Double-click an application to open the main window of the
application.
Browsing application
functions and opening
function windows
Right-click an application to browse all functions of the
application listed on the shortcut menu. Choose a function to open
the main window of the function.
NOTE
You can click next to a function to add the function to the My
Favorites tab.

Table 1-5 shows the functions of applications in the application center.
Table 1-5 Function of the applications
Application Function
Alarm Monitor Allows you to manage alarms and events, for
example, monitoring, querying, and
collecting statistics on alarms and events.
These applications help you promptly
diagnose and troubleshoot network or device
faults.
Topo View Constructs and manages topologies of the
entire network to monitor its running status in
real time. The topology management enables
maintenance personnel to manage NEs and
links.
Fix-Network NE Configuration Configures NEs in batches, configures
profiles, manages access services, deploys
FTTx services, configures NE
communication parameters, manages
inventories, and manages network security.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.
Bearer Network Service Configuration Queries, configures, and manages E2E
services.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
63
Application Function
Fix-Network NE Software Management Backs up NE data, restores NE data, upgrades
NE software, downgrades NE software,
manages NE logs, and manages licenses.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.
System Settings Monitors NMS systems, backs up and
restores NMS data, manages centralized
tasks, manages licenses, and configures NMS
systems.
Security Management Manages NMS user rights, security policies,
NE security, NMS licenses, and logs.
Fix-Network Performance Collects historical performance data,
monitors performance data in real time,
displays statistics, and generates performance
NBI data.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.
IMS&NGN Service Management Manages NGN test beds, query IMS users,
and manages NGN service configuration.
NOTE
Applies to the Core Network NEs.
CN Dual Homing Management Provides a disaster recovery mechanism. It
prevents network services from being
interrupted when softswitches break down or
an unexpected disaster occurs, and ensures
uninterrupted emergent communications.
NOTE
Applies to the Core Network NEs.
Operation Tools Provides O&M tools to manage NEs.
Configuration Views NE configuration and monitors NE
resource status.
NOTE
Applies to the Core Network NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
64
Application Function
Performance Provides the performance measurement and
management function and provides reliable
data for network measurement, design, and
operation management. Users can collect
data for verifying NE security, running status,
and system resource usage. Users can view
and analyze the data.
NOTE
Applies to the Core Network NEs.
Software Management Manages NE upgrades, files and licenses and
backs up files.
NOTE
Applies to the Core Network NEs.

My Favorites
Figure 1-25 shows the GUI after you click My Favorites.
Figure 1-25 My Favorites tab
You can add common functions to the My Favorites tab for quick access to the main windows
of the functions. You can also create folders on the My Favorites tab page to classify the
functions. To create a folder, perform the following steps:
1. On the My Favorites tab page, right-click the My Favorites node in the navigation tree
and choose New Folder from the shortcut menu.
2. In the Create Folder dialog box, enter a folder name and click OK.
NOTE
l You can right-click a function under the My Favorites node and choose Copy from the shortcut menu
to copy the function, and then right-click a function and choose Paste from the shortcut menu to paste
the function to the folder.
l You can right-click a folder and choose Delete or Rename from the shortcut menu to delete or rename
the folder respectively.
l Before deleting a folder under the My Favorites node, delete all the functions contained in the folder.
l You can open the main window of a function that has been added to the My Favorites tab page using
the My Favorites menu on the menu bar.
l You can add a maximum of 20 folders on the My Favorites tab page and the total number of favorite
functions can be 200.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
65
Function Search
On this tab, you can enter a keyword to search for functions. The U2000 supports fuzzy matching
by Function or Menu Path. Figure 1-26 shows the GUI displayed after you conduct a function
search.
Figure 1-26 Function Search tab
Either of the following results is achieved:
l No functions are found.
l Functions that meet the search criteria are listed.
: indicates that a function can be added to the My Favorites tab page. Click
next to the function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
NOTE
If no folder exists under the My Favorites node, the Add to Favorite dialog box does not appear
when you click .
: indicates that a function has been added to the My Favorites tab.
No icon next to a function indicates that the function cannot be added to the My
Favorites tab.
NOTE
You can double-click a function in the list to open the main window of the function.
1.6.2 Quick Start for Clients in the Application Style
This topic provides some suggestions on using clients in the application style the first time.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
66
Context
l If you have added functions to the My Favorites tab, the tab is displayed after you log in
to a client.
l My Favorites is recommended for quick access to the functions that you want. The legends
related to the My Favorites tab are described as follows:
: indicates that a function can be added to the My Favorites tab page. Click
next to the function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
NOTE
If no folder exists under the My Favorites node, the Add to Favorite dialog box does not appear
when you click .
: indicates that a function has been added to the My Favorites tab.
No icon next to a function indicates that the function cannot be added to the My
Favorites tab.
Procedure
Step 1 Log in to a client the first time. On the Application Center tab page, right-click an application
to display its functions on the shortcut menu. Click next to a function. In the Add to
Favorite dialog box, select a folder from the Location drop-down list and click Add.
The function is added to the folder on the My Favorites tab page.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
67

Step 2 Click the Function Search tab and enter a keyword to search for functions.
Click next to a function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
NOTE
You can double-click a function in the list to open the main window of the function.

Step 3 Optional: Open the main window of an application. Choose an item on the menu bar and click
next to a function listed on the menu. In the Add to Favorite dialog box, select a folder
from the Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
68

Step 4 Log in to the client again. On the My Favorites tab, click a function to directly open its main
window.
You can choose My Favorites from the main menu and choose a function on the menu to quickly
launch the function.

----End
1.6.3 Client GUI in the Traditional Style
This topic describes the components of the client GUI in the traditional style.
Figure 1-27 shows the client GUI in the traditional style.
NOTE
For how to switch the client to other style, see 1.8.2 Setting the Client Display Style.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
69
Figure 1-27 Client GUI
1
2
3
4
6
5
1: Menu bar 2: Toolbar 3: Workbench list
4: Output pane 5: Status bar 6: Workbench

Menu Bar
The menu bar provides the entries to all the functions of the U2000 client. It consists of the
following menus: File, Edit, View, Fault, Performance, Configuration, Service, Inventory,
Administration, Window, and Help.
NOTE
The menu items and sub-items displayed on the U2000 vary according to the components deployed on the
U2000 server.
Toolbar
The toolbar provides the shortcut icons for major operation tasks. For details, see 1.6.6
Frequently Used Shortcut Icon.
Workbench list
You can create or modify a workbench using the shortcut icons.
Output Pane
The output pane displays the returned information and other relevant information.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
70
Status Bar
The status bar displays information such as the system status, the login users, and the IP address
of the connected server. The information displayed from left to right is as follows:
l Server and communication mode: Displays the name and IP address used for logging in to
the server and the communication mode between the client and server.
l Login user: Displays the name of the login user.
l Connection duration: Displays the client time in real time.
l System pop-up pane: Display a message in real time when the operation on the client is
affected. It can be disable and enable.
l Login mode: Displays the login mode. It can be single-user mode and multi-user mode.
l Connection status: Displays the status of the connection between the client and the server.
l Logo: Displays the logo of Huawei Technologies Co., Ltd..
Workbench
The shortcut icons on the workbench help you perform operations.
1.6.4 Key GUI Components
This topic describes the key GUI components. The key U2000 GUI components are as follows:
Component Example
Button
Shortcut icon
Radio button
Check box
Tab
Field
Drop-down
menu
Menu
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
71
Component Example
Function Tree
Dialog box

1.6.5 Frequently Used Buttons
This topic describes the frequently used buttons. The frequently used buttons on the U2000 GUI
are as follows:
Button Function
Selects the objects.
Selects the objects in a batch.
Expands all available options.
Collapses all available options.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
72
Button Function
Displays or hides a dialog box.
Selects the objects.
Selects the objects in a batch.
Increases the priority of the selected object.
Decreases the priority of the selected object.
Displays a dialog box.
Queries results from the NE.
Enables the current settings.
Displays the latest result(s).
Exports the selected scheduled tasks to the
browser of the operating system for printing.
Saves selected data to the specified file.
Enables the current setting and closes the
dialog box.
Cancels the current setting and closes the
dialog box.
Closes the operation wizard.
Views the selected data.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
73
Button Function
Deletes the selected data or icon.
/
Creates a new service, protection or physical
inventory information etc.
Adds existing data or objects.
Proceeds to the next step.
Returns to the previous step.
Closes the dialog box.
Expands the Object Tree.
Collapses the Object Tree.
Enables the current setting and closes the
dialog box.
Cancels the current setting and closes the
dialog box.
Search the related information.
Sets the related condition.
Sets filter criteria and views the filter result.

1.6.6 Frequently Used Shortcut Icon
This topic describes the frequently used shortcut icons on the U2000 client.
NOTE
You can customize the toolbar to display only the frequently-used shortcut icons. To customize the toolbar,
right-click the toolbar and choose a menu item from the shortcut menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
74
Table 1-6 The shortcut icons on the Main Topology
Button Name Description
Workbench l Style of Favorites Folder: By
selecting it, you can modify or
delete the workbench.
l Style of Desktop: By selecting it,
you can return to the workbench.
Exit Exits the U2000 client.
Log Out Logs out of the current user.
Lock Terminal Locks the current client.
Full Screen Displays the Main Topology in full
screen mode.
NMS User
Management
Manages user information on the
U2000.
Maintain SDH
Protection Subnet
Displays the Maintenance SDH
Protection Subnet window.
Manage SDH Trail Displays the Manage SDH Trail
window.
Create SDH Trail Displays the Create SDH Trail
window.
Manage WDM Trail Displays the Manage WDM Trail
window.
Browse Current
Alarm
Displays the Filter dialog box. After
the filter criteria is set, displays the
Browse Current Alarm window.
Browse Alarm Logs Displays the Filter dialog box. After
the filter criteria is set, displays the
Browse Alarm Logs window.
Stop the Current
Alarm Sound
Clicks this shortcut to stop the current
alarm sound on the U2000. The alarm
sound starts again when a new alarm
is generated. To permanently stop the
alarm sound, choose Fault > Stop the
Alarm Sound Permanently from
the main menu.
Main Topology Switches to the Main Topology.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
75
Button Name Description
NE Explorer Displays the NE Explorer window.
Create Fiber Creates fiber.
Browse SDH
Performance
Displays the Browse SDH
Performance window.
Browse WDM
Performance
Displays the Browse WDM
Performance window.
WDM Optical Power
Commissioning
Displays the WDM Optical Power
Commissioning window.
IPA Management Displays the presence of the IPA that
is in the disabled state. This icon
blinks if a disabled IPA exists. When
you click this icon, the IPA
Management window is displayed.
NM Tasks
Management
Progress
Displays the process of NMS tasks
management. When you click this
icon, the Configuration Data
Management Progress window is
displayed.
Networkwide
Maintenance Status
Performs centralized monitoring over
the maintenance and operating status
of the equipment managed by the
U2000, including:
l Alarm Reversion
l DCC Enabling Status
l Path Loading
l Alarm Suppression
l Alarm Insertion
l Optical (Electrical) Interface
Loopback
l Cross-Connection Loopback
l Laser Status
Show alarm panel Displays the Alarm Panel dialog
box. The statistics of all current
alarms are displayed by default.
Critical Alarm Dynamically displays critical alarms.
When you click this icon, all critical
alarm information is displayed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
76
Button Name Description
Major Alarm Dynamically displays major alarms.
When you click this icon, all major
alarm information is displayed.
Minor Alarm Dynamically displays minor alarms.
When you click this icon, all minor
alarm information is displayed.
Warning/Not
Alarmed Alarm
Dynamically displays warnings/not
alarmed. When you click this icon, all
warning or /not alarmed alarm
information is displayed.
No new events Dynamically displays abnormal
events. This icon indicates that there
are no newly reported events. When
you click this icon, the Query Event
Logs window is displayed.
New events Dynamically displays abnormal
events. This icon indicates that there
are newly reported events. When you
click this icon, the Query Event
Logs window is displayed.
New To create a custom view, subnet, NE,
and link.
NOTE
The NE cannot be created in the custom
view.
Modify View To modify the name of custom view,
add NEs, subnets or links to the
custom view, and delete NEs, subnets
or links from the custom view.
NOTE
This shortcut icon is displayed only when
the current view is a custom view.
Delete View To delete a custom view.
NOTE
This shortcut icon is displayed only when
the current view is a custom view.
Previous To go back to view or subnet that you
viewed last time.
NOTE
The icon is not displayed by default. Set
this icon on the topology toolbar. For
details, see 1.8.18 Setting the Toolbar.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
77
Button Name Description
Next To go to the view or subnet before
you click .
NOTE
The icon is not displayed by default. Set
this icon on the topology toolbar. For
details, see 1.8.18 Setting the Toolbar.
Back to Parent To return the parent interface.
Select To select a topology object.
Move View To move the topology view.
Search Displays the Search dialog box. You
can locate objects in the topology.
Print To print the topology view.
Print Preview To preview the print effect of the
topology view.
Overview To provide a general view of
topology.
NE Statistics l To collect statistics on the NE
types and number of the objects
selected in the current topology
view.
l If no object is selected in the
current topology view, the system
collects statistics on the types and
number of all NEs in the current
topology view.
Refresh Refreshes the current view after you
click the button when the data in the
view is changed. For example, if an
IP link is changed in the link
management window, you can click
this button to display the latest IP link
data in the Main Topology.
Save Position To save the position information of
the topology objects in the current
Legend & Filter &
Attribute
To display the legend/filter/attribute
panel.
Current Alarm To display the current Alarms.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
78
Button Name Description
Layout To arrange the topology objects in the
topology view.
Zoom In Zooms in topology view.
Zoom Out Zooms out topology view.
Local Amplification To enlarge the selected area. In the
topology view, drag the mouse to
generate a rectangle. Topology
objects in this rectangle are
magnified.
Lock View/Unlock
View
Locks/Unlocks the current NE(s).
Ascending Lists the objects on the Object Tree
in an ascending or a descending
order.
NOTE
Topology objects in the navigation tree
are sorted according to the following
rules:
l No matter whether topology objects
are sorted in ascending or descending
order, the order of the types of
topology objects is unchanged,
namely, local NMS, subnets, NEs
with subnodes, and NEs without
subnodes. The local NMS is always
displayed on the top.
l The types of topology objects are
sorted by name alphabetically.
Object names are case insensitive.
Descending

Table 1-7 The shortcut icons on the other GUI
Button Name Description
Shrink all Shrinks Alarm/Event Name.
Classify by group id Classifies alarms by group ID.
Classify by severity Classifies alarms by severity.
Classify by type Classifies alarms by type.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
79
Button Name Description
Classify by
category
Classifies alarms by category.
NE Time
Synchronization
Synchronizes the NE time and NMS
time.
Synchronize
Current Alarms
Synchronizes the current alarms of an
NE.
Browse Current
Alarms
Browses the current alarms of an NE.
Clear Alarm
Indication
Clears the current alarm indications of
an NE.
Refresh NE Panel
Status
Refreshes the NE panel status to enable
the NE panel to display the latest data.
Back Up NE
Database To SCC
Backs up NE data to the SCC.
Display/Hide
Extended Slot
Displays or hides the extended slot on
the Extended Slot tab.
Legend Displays a legend and its description.

1.6.7 Keyboard Shortcuts
The U2000 client provides keyboard shortcuts for some operations. You can perform these
operations more quickly by using the keyboard shortcuts than using the mouse.
Keyboard Shortcuts of Controls on GUIs
Table 1-8 describes keyboard shortcuts of controls on GUIs. You can use keyboard shortcuts
instead of the mouse to perform operations on GUIs conveniently.
Table 1-8 Controls and corresponding keyboard shortcuts
Control Description
Menu For a menu whose name is followed by an underscore _, you can press
Alt+_ to choose the menu item.
Drop-down menu For a drop-down menu whose name is followed by an underscore _, you
can press Alt+_ to choose the menu item.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
80
Control Description
Button l For a button whose name is followed by an underscore _, you can
press Alt+_ instead of clicking the button.
l When a dialog box is open and the focus is on a button, this button is
the default button. If the focus is not on any button, OK is the default
button.
l When the focus is on a button, you can press Enter or space bar
instead of clicking the button.
l If the focus is on a control that does not respond when you press
Enter, then the effect is the same when you press Enter or when you
click the default button.
Drop-down list When the focus is on a drop-down list, you can press the Down arrow
key to expand the drop-down list. You can press the Up, Down arrow
keys to switch between the options in a drop-down list, and press
Enter to select the current option.
Option button If the focus is on an option button, you can press the space bar to select
the option button.
Check box If the focus is on a check box, you can press the space bar to select or
clear the check box.
Navigation tree When the focus is on the navigation tree, you can press the Down arrow
key or Up arrow key to switch between the nodes in the tree. And you
can press the Left arrow key or Right arrow key to expand or collapse a
node that contains subnodes.
Switching
between controls
When there are multiple controls in a window, dialog box, or tab page,
you can press Tab to switch from one control to another, and press Shift
+Tab to switch to the previous control.

Other Key Combinations
Table 1-9 describes other key combinations provided by the U2000 client. You can use these
key combinations to perform operations quickly.
Table 1-9 Shortcut keys
Operation Shortcut keys
Exit a dialog box or prompt Esc
Unlock a terminal Ctrl+Alt+U
Open the Help F1
Exit the system Alt+F4
Find Ctrl+F
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
81
Operation Shortcut keys
Cut Ctrl+X
Copy Ctrl+C
Paste Ctrl+V
Save Ctrl+S
Display full screen F11
Select all Ctrl+A
Close the current window Ctrl+F4
Restore down (when the service window in the
public window is maximized)
Ctrl+F5
Minimize the window (applied to the service
window in the public window)
Ctrl+F9
Maximize the window (when the service window
in the public window is restored)
Ctrl+F10
Zoom in the topology view Ctrl++
Zoom out the topology view Ctrl+-

NOTE
The common area is under the toolbar on the U2000 client interface.
1.6.8 Main Windows
This topic describes the main windows of the U2000 client.
1.6.8.1 Workbench
This topic describes the workbench. After a client is started, the system automatically accesses
the default workbench. The default shortcut icons are displayed on the workbench.
l In the main window of the U2000, click the drop-down arrow next to and select Style
of Desktop to access the workbench.
l You can click to hide the left list of the workbench, then click to display the left list of
the workbench.
l You can view the description of the function of the workbench in the background picture
of the workbench and press F1 to view the Help.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
82
l You can perform operations on the workbench. For details, see1.8.7 Setting the
Workbench.

1.6.8.2 Main Topology
All topology management functions can be accessed in the Main Topology of the U2000.
Topological relationships between NEs, subnets and connections are displayed in the Main
Topology of the U2000. You can browse, create, search for, configure, maintain and manage
NEs, subnets, connections and trails in the Main Topology.
Navigation Path
l In the Workbench Window, double-click the Main Topology icon.
l Choose View > Main Topology (traditional style) from the main menu or select Topo
View in Application Center and choose Topology > Main Topology (application style)
from the main menu.
l Click the shortcut icon to open the Main Topology.
GUI Description
l Open the Main Topology to ensure that main menu items are available.
l The U2000 provides multiple display modes of the client. For example, you can set an
alarm display mode for an object. For details about the meanings and setting methods of
display modes, see 1.8 Customizing the Client GUI Effect.
l The U2000 provides the focus display function. When the pointer stays over a shortcut
button for about 2 seconds, the U2000 will provide a focus display, presenting its meaning.
l The U2000 provides a variety of view windows according to different functions, and the
views can be switched.
Select Physical Root from the Current View drop-down list. For details, see Physical
Root.
Select Clock View from the Current View drop-down list. For details, see Clock
View. Alternatively, right-click in a blank area of the current subnet in the physical root
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
83
view and choose Switch to Clock View from the shortcut menu to switch to the subnet
in the clock view.
Select Custom View from the Current View drop-down list. For details, see 5.9.1
Creating Custom Views.
Main Topology
Figure 1-28 shows the Main Topology of the U2000.
Figure 1-28 Main Topology
3 4 5
6 7 8 9 10
1 2
12 13 11

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
84
1: Network management
system (NMS) name
2: Menu bar
You can perform operations on
the NMS and NEs with the
submenu bar, including
configuring and managing
tasks.
3&4: Shortcut icon
By clicking a shortcut icon, you
can:
l Perform a simple task
quickly. For example, exit
the NMS, lock terminals, log
out, manage NMS users,
stop the current alarm sound,
1.6.8.3 NE Explorer,
1.6.8.7 Browse Alarm, and
5.8 Creating Connections.
l Perform a simple task
quickly in the Main
Topology. For example,
zoom in or zoom out in the
view, refresh or save the
view, show or hide the
navigators, search for
objects, view object
attributes, and lock or
unlock the view.
For details, see 1.6.6
Frequently Used Shortcut
Icon.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
85
5: Alarm panel, Alarm
button bar and Event button
The Alarm panel collects
statistics on alarms of the
managed objects by alarm
severity and state according
to the current alarm
template. The alarm panel
provides the fault status of
the entire network. It can
work as a monitoring panel.
The Alarm buttons for
alarms with different
severities are in different
colors. You can click the
button to view the number
of the uncleared alarms
generated on the current
U2000. You can click the
button to view current
alarms.
When there are abnormal
events on the U2000, the
Abnormal event indicator
turns red from green. You
can click the indicator to
view current abnormal
events.
6: Legend, Filter and Attribute
In this area, you can set the
display modes of the objects in
a view, view the descriptions
of legends and NE attributes in
the view. For details about how
to locate an operation object
quickly, see 1.6.9.1 Filtering
Operation Objects in a
View.
7: Displays the client time in
real time.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
86
8: Views the name of the
logged-in U2000 user.
9: Views the name which is set
by the current U2000 client,
the IP address of the current
U2000 server and the
communication mode between
the client and server.
10: Main Topology
Views NEs.
In the Main Topology, you can
perform operations such as 5.6
Creating NEs, 5.7
Configuring the NE Data, 5.8
Creating Connections, 5.10.2
Browsing Fibers/Cables, 5.9.5
Deleting Topology Objects,
7.8.10 Browsing the Current
Alarms, and 1.19 Starting the
NE Data Collection; enter the
1.6.8.3 NE Explorer to
configure the service for the NE
and so on.
You can check the NE status
and communication status in the
Filter Tree or on the Legend tab.
11: Displays the mouse
coordinate in the Main
Topology.
12: Topology navigation tree
In this area, all NEs managed
by the U2000 are displayed.
You can locate the desired NE
quickly.
NE types and quantity are
displayed in the NE Statistics
table below the navigation tree.
13: Browse Current Alarm
In this area, you can browse the
alarms that require attention and
processing by setting the
filtering criteria of the current
alarm.
1.6.8.3 NE Explorer
The NE Explorer is the main user interface used to manage equipment. In the NE Explorer, a
user can configure, manage and maintain the NE, boards, and ports on a per-NE basis. The NE
Explorer is the main user interface for commissioning and configuration on a per-NE basis. The
NE Explorer contains a Function Tree that makes the operations easy. To display the
configuration window for an object, select the object and choose a desired function in the
Function Tree.
NOTE
l For NEs of MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except PTN 6900
series) and marine series NEs, you can open a maximum of ten NE Explorer windows at the same time.
l Currently, NEs such as the OptiX OSN 1800, OptiX OSN 1832, OptiX OSN 6800, OptiX OSN 8800
series, OptiX OSN 9800 series can be managed individually or in optical NEs.
Navigation Path
l Right-click an NE in the Main Topology and choose NE Explorer from the shortcut menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
87
l In the left-hand pane of the Main Topology, right-click an NE and choose NE Explorer
from the shortcut menu.
l In the Main Topology, select an NE and click .
l Double-click an optical NE in the Main Topology. In the window that is displayed, right-
click an NE in the left-hand pane and choose NE Explorer from the shortcut menu.
Related Operation
l Click in NE Explorer window to display the 1.6.8.5 NE Panel.
l Click in NE Explorer window to switch to other NEs.
1.6.8.4 Clock View
The clock view provides a visualized platform to enable users to set NE clocks, query network-
wide clock synchronization status, trace and search for clocks. Physical clock, PTP clock, PON
clock and ACR clock are supported. The functions provided by the clock view apply to MSTP
series, RTN series, NG WDM series, PTN series NEs, OLT series NEs, ONU series NEs, MxU
series NEs, router NE40E V600R002/V600R003 NEs, ATN series, CX600 series, and their REG
NEs, REG logical systems and REG boards.
Navigation Path
In the Main Topology, select Clock View from the Current View drop-down list. Select the
NE to be queried or configured from the Object Tree. Figure 1-29 shows the clock view.
NOTE
For optical NE, in the clock topology right-click the NE and choose Browse WDM Clock Graph. You
can query clock NEs, clock tracing relationships, and clock synchronization status in the displayed window.
Figure 1-29 Clock view

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
88
Clock link
NOTE
l Green lines represent PTP, PON or ACR clock links.
l Blue lines represent physical clock links.
l Solid lines represent working clock links.
l Dashed lines represent standby clock links.
l External Clock Source: the origin of network-wide clocks. This icon is displayed only for one or two
NEs (one active and the other standby), such as BITS NEs.
l Local Clock Source: a local physical clock or PTP clock. This icon is displayed only for the clock
sources that have been configured as local clock sources and are currently being traced. NEs trace local
clock sources only when clock links and external clock sources are faulty.
l Clock Alarm: This icon is displayed for the NE with a clock alarm. You can right-click this NE and
choose View Current Clock Alarm from the shortcut menu to view and handle the alarm.
l Physical clock contains SDH clock, PDH clock, Synchronous ETH clock, NTR clock, Radio clock and
WDM clock.
Legends
l After you choose View > Display Setting > Legend from the main menu, various legends
are displayed in different colors in the clock view.
l After you choose View > Display Setting > Filter from the main menu, the required
elements are displayed in the clock view based on the filter function. Virtual clock devices
cannot be filtered by clock type.
l After you choose File > Preferences > Topology Display Settings from the main menu,
the Preferences window is displayed and you can set the width of clock link by modifying
Link distance (pixels).
l The clock view uses continuous lines to represent the tracing relationships between NEs.
The number displayed on the continuous line indicates the priority of the traceable clock.
The smaller the number, the higher the priority. The clock view displays the line clock
source IDs only. Internal clock sources are numbered, but their IDs are not displayed in the
clock view.
l The arrow direction in the clock view indicates the clock tracing direction. For example,
if NE(9-722) points to NE(9-218), NE(9-218) traces the clock information transmitted from
NE(9-722).
l In the clock view, you can search for clock tracing relationships.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
89
NOTE
The rule of verifying an invalid clock tracing relationship is as follows: Verify whether a clock source
is in the SSM protocol mode.
l In the non-SSM protocol mode, verify the status of a clock source. The status determines whether
a clock tracing relationship is valid.
l In the SSM protocol mode, verify the status of a clock source. If the status is unavailable, the
clock tracing relationship is invalid. If the status is available, you also need to verify the S1 byte
(clock quality). When you manually cancel settings of the quality of the S1 byte and the quality
of the S1 byte is unknown, the clock tracing relationship is invalid.
l In the clock view, there are indicators on an NE to indicate the time or lock lockout status.
When the lockout status of an NE is changed, you can search for clock links to update the
status.
l The clock view can display NEs copied in the physical root view and their clock tracing
relationships. NEs copied from an NE own the same clock tracing relationships as the NE.
l When you move the pointer over a clock NE, a tooltip pops up, displaying the NE's clock
mode, master clock ID, port status, and other information.
NOTE
The following modes are private working modes of PTP clocks:
l OC mode: In this mode, the communication with the network is performed through only one
IEEE 1588 port.
l BC mode: In this mode, the communication with the network is performed through multiple IEEE
1588 ports, which can be used for connections to multiple subdomains.
l TC mode: In this mode, a device that measures the time taken for a PTP event message to transit
the device and provides this information to clocks receiving this PTP event message. That is, the
clock device functions as an intermediate clock device to transparently transmit the clock and
process the delay, but does not recover the clock. It can effectively deal with the accumulated
error resulted from the master and slave hierarchical architecture. In this manner, the TC ensures
that the clock/time synchronization precision meets the application requirement.
l TC+BC mode: In this mode, the NE has the BC feature and handles only the delay, instead of
time synchronization.
l TC+OC mode: In this mode, the NE can transmit PTP packets transparently and process PTP
packets. The TC+OC mode is a combination of the TC and OC modes.
Related Concepts
Clock link: A clock link represents the clock tracing relationships between clock NEs. For
example, a clock link from NE A to NE B represents that NE B follows the clock signal from
NE A.
Related Operations
In the clock view, you can query and configure NE clocks network-wide. For details about the
clock operations, see Table 1-10.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
90
Table 1-10 Querying and configuring clocks network-wide
Operation Navigation Path Description
Querying clock topology Clock View In the clock topology, you
can query clock NEs, clock
tracing relationships, and
clock synchronization status.
You are advised to search
clock link before querying
clock topology.
Creating a virtual clock
device
In the clock view, right-click
in the blank area and choose
Create Virtual Clock
Device from the shortcut
menu.
You can create a virtual clock
device to identify a device
that is outside the managed
domain.
A virtual clock device
represents a clock device that
exits on the network but not
within the local managed
domain. Generally, virtual
clock devices are relevant to
NEs in the local managed
domain in terms of tracing
relationships. In this case,
you need to create virtual
clock links on the U2000 to
help engineers view and
identify the clock tracing
relationships between NEs.
Creating a virtual clock link In the clock view, right-click
in the blank area and choose
Create Virtual Clock Link
from the shortcut menu.
You can create a virtual clock
link to identify the tracing
relationships between a local
NE and a device that is
outside the managed domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
91
Operation Navigation Path Description
Searching for clock links In the clock view, right-click
in the blank area and choose
Search Clock Link from the
shortcut menu.
You can search for clock
links of NEs network-wide to
learn the clock tracing
relationships between NEs.
By using this function, you
can specify the search scope
based on the NE or clock link
types.
When the clock source traced
by an NE has changed, re-
search for the clock trace
relationship.
NOTE
To search for clock links, you
must obtain the license for the
clock management function.
Querying Clock-
Unsynchronized/Unlocked
NE
In the clock view, right-click
in a blank area and choose
Query Clock-
Unsynchronized/Unlocked
NE from the shortcut menu.
You can search for the clock
NEs in the unsynchronized or
unlocked state. Such NEs are
listed in the lower pane. In
this list, you can select
desired NEs and export their
data.
NOTE
l If the Display NEs in the
current subnet only check
box is selected, the search is
performed within the
current subnet.
l You can click Filter to set
the search scope.
l This operation applies to
ATN series, CX series, NE
series, PTN series, and
access NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
92
Operation Navigation Path Description
Synchronize with Physical
View
In the clock view, right-click
in the blank area and choose
Synchronize with Physical
View from the shortcut
menu.
You can synchronize the
coordinate positions of NEs
and subnets in the clock view
with the corresponding
coordinate positions in the
Physical View.
In addition, after the
synchronization:
l The subnets that have
clock NEs are
synchronized from the
Physical View to the
clock view.
l The empty subnets in the
clock view are deleted.
Configuring clocks Right-click an NE and
choose Configure Clock
from the shortcut menu.
In the NE Explorer, you can
configure NE clocks on the
GUI for configuring clocks.
The NE clocks can be the
IEEE 1588 clock, SDH
clock, synchronous Ethernet
clock, and PON clock, but
different clocks are
supported by different NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
93
Operation Navigation Path Description
Browsing real-time or
historical clock performance
Right-click an NE and
choose View Clock Real-
time Performance or View
Clock History
Performance from the
shortcut menu.
You can query clock
performance status in the
performance monitoring
window displayed.
On live networks, when the
clock performance of an NE
deteriorates, service
transmission quality is
affected. However, the clock
tracing relationship of the NE
may still exist. You can check
the clock performance of
each NE traversed by the
clock link based on the CSG
in the clock view to find the
fault point.
NOTE
l To perform this operation, a
clock tracing relationship
must have been correctly
configured, and a clock link
must have been searched
out in the clock view.
l IP NEs, PTN6900 can
query the real-time and
historical performance of
Physical Clock and PTP
Clock.
l PTN series NEs (excluding
PTN6900) can only query
the historical performance
of System Clock.
Switching between clock
links
Right-click the standby clock
link and choose Switch to
this Clock Link from the
shortcut menu.
By switching between clock
links, you can change the
current clock tracing
relationships between NEs.
This operation applies only to
transport and PTN series
NEs.
Clearing Switching In the clock view, right-click
a clock link and choose Clear
Switching from the shortcut
menu.
Cancels clock link switching
so that NEs can select clocks
to trace based on the clock
source priority.
This operation applies only to
transport and PTN series
NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
94
Operation Navigation Path Description
Clock Attribute Right-click an NE and
choose Clock Attribute
from the shortcut menu.
You can query the type of the
clock that the current NE
traces, hop count of the clock
tracing path, and the clock
compensation setting at the
clock tracing port.
View Clock Status Right-click an NE and
choose View Clock Status
from the shortcut menu.
You can view specific
configurations of the NE. If
the NE is in the abnormal
state, this operation helps you
diagnose and troubleshoot
the fault.
Query Clock Loop In the clock view, right-click
in the blank area and choose
Query Clock Loop from the
shortcut menu.
You can query clock loops
for network-wide NE clock
tracing relationships. In the
query results, you can view
loop information.
If there are clock loops,
double-click a record in the
query result list to locate it on
NEs in the clock view. Then,
you can modify incorrect
configurations on the NEs.
Switch to Physical View In the clock view, right-click
in the blank area and choose
Switch to Physical View
from the shortcut menu.
The GUI switches to the
corresponding subnet in the
physical view. If the subnet
does not exit in the physical
view, the GUI will switch to
the root of physical view.
Synchronize the physical
view before performing this
operation.
Querying the clock tracing
path
In the clock view, right-click
an NE and choose Display
Current Tracing Path.
The U2000 highlights the
current clock tracing paths of
clock NEs. When a fault
occurs, users do not need to
draw the clock tracing path
between NEs manually. This
improves fault diagnosis
efficiency.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
95
Operation Navigation Path Description
View Cable Transmitting
Warp Report
Choose Inventory > Clock
Report > Cable
Transmitting Warp
Report (traditional style)
from the main menu or select
Fix-Network NE
Configuration in
Application Center and
choose Inventory > Clock
Report > Cable
Transmitting Warp
Report (application style)
from the main menu.
In routine maintenance, users
often need to measure clock
delays on chain and ring
networks. However,
instrument-aided onsite
measurement is costly. To
address this issue, the
U2000 allows users to query
cable transmission warp
values for PTP clock links
between NEs. Users can
easily find the sites with large
warp values and perform
measurement only for these
sites. This function
effectively reduces site visits
and costs.

1.6.8.5 NE Panel
The NE Panel displays boards and ports in different colors indicating their current status. On
the U2000, most operations such as equipment configuration, monitoring, and maintenance are
performed in the NE Panel window.
Navigation Path
Double-click an NE in the Main Topology to display the NE Panel.
GUI Description
l For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
PTN 6900 series) and marine series NEs, click on the toolbar to view the legends of
the boards and ports on the right of the Slot Layout.
l For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
PTN 6900 series) and marine series NEs, right-click the NE Panel window and choose
Always On Top, the NE Panel window to always remain on top.
l When a board occupies multiple slots, the slot ID of the main slot is displayed in boldface,
and the slot ID of the slave slot is dimmed.
l In the NE panel, when you click the processing board equipped with an interface board,
the slot ID of this interface board is orange.
l For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
PTN 6900 series) and marine series NEs, when you move the cursor to the installed board,
the board remarks is displayed. For the WDM series, WDM (NA) series, and Marine
series NEs, if you configure the wavelength informations on the installed board, when you
move the cursor to the board, the optical ports, band type, and wavelength is displayed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
96
l To perform an operation related to an installed board, right-click the installed board and
choose the corresponding submenu item from the shortcut menu. For example, you can add
a remark of the board in the Modify Remark dialog box by right-clicking the installed
board and choosing Remark.
1.6.8.6 WDM NE Signal Flow Diagram
WDM NE signal flow diagram provides a signal flow diagram for the optical layer trails of each
WDM NE. The signal flow diagram is one of the views where you configure, monitor and,
maintain the WDM equipment.
Navigation Path
l Double-click an optical NE in the Main Topology. In the window that is displayed, select
an NE and click Signal Flow Diagram. See Figure 1-30.
l Double-click an NE in the Main Topology. In the displayed window, click Signal Flow
Diagram. See Figure 1-30.
Figure 1-30 Signal flow diagram
Menu on the Board Menu on the View Menu on the Fiber/Cable

GUI Description
l As in the NE Panel, you can perform operations on each board such as viewing alarms,
viewing WDM performance data, querying versions, and configuring a WDM NE in the
signal flow diagram. More importantly, the signal flow diagram provides the relationship
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
97
of fiber connections between each board of the ONE. It visually shows the direction of
traffic and improves the ability of the U2000 to maintain optical NEs.
l In the signal flow diagram, you can also create a fiber connection, query information about
the wavelength and port of each board, and rotate a board icon by 90, 180 or 270 degrees.
You can classify the same boards into a group, and print the signal flow diagram and so
on. The smallest unit of the signal flow diagram is a board. Boards of different types have
different icons. See legends for more information.
l Signal flow diagram is not applied to idle resource optical NEs.
l You can add a remark of the board in the Modify Remark dialog box by right-clicking the
installed board and choosing Remark.
l After an OSC board reports an R_LOS alarm, the fiber connected to the IN port of the FIU
board that is connected to the OSC board turns red. After the OSC board reports the
notification of clearing the R_LOS alarm, the fiber turns green.
1.6.8.7 Browse Alarm
This topic describes the user interface for viewing the current and historical alarms and Alarm
Logs. In this user interface, buttons are provided, such as Filter, Synchronize, Refresh, and
Acknowledge, to help you quickly locate the alarm cause.
Context
l Current alarm displays the merged alarms. The rules for merging alarms are as follows:
The alarms whose alarm group IDs, alarm IDs, alarm location information, and alarm
sources are the same, and whose maintenance status is Normal are merged into another
current alarm record.
The alarms whose alarm group IDs, alarm IDs, alarm location information, and alarm
sources are the same, and whose maintenance status is not Normal are merged into a
current alarm record.
l For a newly reported alarm, if the current alarm contains the record that meets the alarm
merging rule, the alarm is merged into the previous record in the current alarm regardless
of the acknowledgment and clearance status of the record. After merging, the frequency of
the record is added by 1. The displayed acknowledgment and clearance status of the record
is subject to that of the latest alarm. After the current alarm is changed to historical alarms,
the frequency recorded for the current alarm is reduced by 1.
l You can query details of each alarm log in the Browse Alarm Logs window.
l Alarm log records all the alarms received by the U2000. In the alarm log, each alarm is
displayed as a record.
l Alarms are not displayed in the current alarm list after they are acknowledged and cleared
and their life cycles end. However, you can query these alarms in the alarm logs and
historical alarms. For details about how to set the lifecyle of an alarm, see 7.5.11 Setting
the Lifecycle of the Current Alarm.
Navigation Path
l Choose Fault > Browse Current Alarm (traditional style) from the main menu or select
Fault Management in Application Center and choose Browse Alarm > Browse Current
Alarm (application style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
98
l Choose Fault > Browse Historical Alarm (traditional style) from the main menu or select
Fault Management in Application Center and choose Browse Alarm > Query
Historical Alarm (application style) from the main menu.
l Choose Fault > Browse Alarm Logs (traditional style) from the main menu or select Fault
Management in Application Center and choose Browse Alarm > Query Alarm Logs
(application style) from the main menu.
Figure 1-31 shows the alarm window.
Figure 1-31 Browsing alarms

1.6.8.8 Browse Event
In the Browse Event Logs window, you can view events at different levels. This window
provides buttons, such as Filter by Template, Filter and Refresh, to help you quickly locate
the alarm cause.
GUI
Choose Fault > Browse Event Logs (traditional style) from the main menu or select Fault
Management in Application Center and choose Browse Alarm > Query Event Logs
(application style) from the main menu.
Figure 1-32 shows the window of Event.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
99
Figure 1-32 Browse Event Logs

1.6.9 Operations Frequently-Performed on the User Interface
This topic describes the operations that are frequently performed on the U2000 user interface.
1.6.9.1 Filtering Operation Objects in a View
The topology view displays objects such as subnets, links, and NE nodes. When a large number
of objects are displayed in the topology view, these objects may be overlapped. In this case, you
can set filter criteria to filter some of the objects. After the filtering, the topology view displays
only the required objects.
Context
l The topology view displays the objects selected in the Topology Filter navigation tree,
such as subnets, NEs, background images.
l When the U2000 is started, the filter criteria are blank by default, and all the topology
objects are displayed.
l When you deselect a filter criterion, the objects matching the criterion are not displayed.
l Parent nodes in the Topology Filter navigation tree have three types of icons. indicates
that some topology filter items under a parent nodes are selected; indicates none of the
topology filter items under a parent nodes is selected; indicates that all topology filter
items under this node are not displayed in the topology view.
l Modified topology filter criteria take effect for the current user only. After this user logs
in next time, the settings still take effect.
Procedure
Step 1 Choose Topology > Main Topology (application style) or View > Main Topology (traditional
style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
100
Step 2 Choose View > Show > Filter (application style) or View > Display Setting > Filter (traditional
style) from the main menu, or click on the toolbar. Click the Filter tab in the right pane.
Step 3 In the Topology Filter navigation tree, select the topology objects to be displayed in the topology
view.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
101
NOTE
l Topology objects that are not selected are unavailable in the topology view.
l Click Other Conditions. In the displayed panel, specify the values for NE Name, Link Name, or
Subnet Name, and click Filter to filter objects again. The NEs, links, or subnets containing this string
(case insensitive) are displayed.
After the operations are successful, current view displays topology objects based on the filter
criteria.
Step 4 Optional: Click Filter Tree and select Switch. In the Switch a Filter Tree dialog box, select
the filter tree template, and click Open.
NOTE
Filter tree templates displayed in the Switch a Filter Tree dialog box indicate that filter trees have been
used and saved as filter tree templates. If no filter tree has been saved, no filter tree template is available
in the dialog box. To save a filter tree as a template, click Filter Tree and choose Save As. In the displayed
dialog box, enter a template name and click OK.
Step 5 Optional: To close the Legend/Filter/Properties panel, choose View > Show > Filter
(application style) or View > Display Setting > Filter (traditional style) from the main menu,
or click on the toolbar.
----End
1.6.9.2 Searching for NEs in a View
This operation enables you to search for NEs quickly.
Context
l If you search for NEs in the Physical Root or Clock View navigation tree in the Main
Topology, the search operation applies to the current view.
l If you search for NEs in the window outside the Main Topology, the search operation
applies to the Physical Root navigation tree.
l You can search out only the NEs for which you have management rights.
l During NE search, the U2000 searches for NEs in dynamic and fuzzy matching mode. That
is, the Search window displays search results in real time as you specify the search criteria.
l Transport NEs can be also searched out in Remarks mode.
Procedure
Step 1 Choose File > Find (traditional style) from the main menu or select Topo View in Application
Center and choose Topology > Search (application style) from the main menu.
The Search dialog box is displayed.
NOTE
You can also perform he following operations to access the Search dialog box.
l Press Ctrl+F in the Main Topology.
l Right-click in the Main Topology, and choose Find from the shortcut menu.
l Click .
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
102
Step 2 Select the search criteria, which are Search Type and Search Mode.
Step 3 Enter a keyword in the Keyword combo box or choose a keyword record from the drop-down
list.
Step 4 Optional: You can select Match whole word only, Case Sensitive or Auto search with
specified keyword as required.
NOTE
l Match whole word only: If you select this check box, only the results that exactly meet the conditions
are displayed.
l Case Sensitive: If you select this check box, the keyword is case-sensitive during search.
l Auto search with specified keyword: If you select this check box, when you enter the keyword, the
result is displayed dynamically.
Step 5 Click Search.
All the found records are displayed in the Search window.
Step 6 The NE is located in the topology view and navigation tree.
l click Locate and select Locate to NE Panel from the menu to directly locate the NE panel.
l Click Locate and select Locate to Topo from the menu or double-click in the query result
area to search for NE to locate the Main Topology.
l click Locate and select Locate to NE Partition from the menu to directly locate the NE
partition.
Step 7 Optional: Select the Minimized after locating check box, the Search window is minimized
after the location.
----End
1.6.9.3 Collecting Statistics on the Number of NEs
By collecting statistics on the number of NEs, you can learn the number of NEs that are created
on the U2000. The NEs contain real, preconfigured, and virtual NEs.
Context
l By default, the NE Statistics list is displayed on the left lower corner of the Main Topology
view of the client. If it is not displayed, Choose View > Display Setting > NE Statistics
(traditional style) from the main menu or select Topo View in Application Center and
choose View > Show > NE Statistics (application style) from the main menu.
l If certain objects are selected in the current topology view, the system collects statistics on
the NE types and quantity of the selected objects.
l If no object is selected in the current topology view, the system collects statistics on the
types and number of all NEs in the current topology view.
Procedure
Step 1 Choose View > Display Setting > NE Statistics (traditional style) from the main menu or select
Topo View in Application Center and choose View > Show > NE Statistics (application style)
from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
103
Step 2 Check the number of NEs in the NE Statistics list displayed on the left lower corner of the Main
Topology view.
----End
1.6.9.4 Customizing Parameter Display
The U2000 provides the function of customizing the layout of tables. Users can customize the
sequence and width of columns, and whether to display or hide a column in the table. When a
user reopens some windows, the table layout, including the column sequence and width, is the
same as that specified by the user.
Procedure
l Right-click on the top of a parameter list, and choose the desired items from the shortcut
menu. The unselected items are not shown in the parameter list.
l Choose Column Settings from the shortcut menu. The Column Settings dialog box is
displayed. You can set whether to show a column in the parameter list, set the sequence of
columns and the column width.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
104
----End
1.6.9.5 Copying Table Texts Quickly
The U2000 allows you to copy and paste table text. You can copy text from a table to other
programs quickly.
Procedure
Step 1 Select the text in a table, and press Ctrl+C.
NOTE
l Select all texts in the table by pressing Ctrl+A. Only the current screen of the table is supported.
l To view all data in the current table, click Print or Save As.
Step 2 Switch to another program, and press Ctrl+V. The selected text is copied to the system clipboard.
----End
1.6.9.6 Monitoring Alarms
You can learn about the number of alarms of specified severities on NEs using the alarm panel
on the U2000 client. In addition, you can learn about the current alarm by using the alarm panel
or alarm indicator. In Alarm Panel, you can double-click an alarm template to open the window
for browsing alarms.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
105
Procedure
Step 1 Choose Browse Alarm > Display Alarm Panel (application style) or Fault > Display Alarm
Panel (traditional style) from the main menu or click the icon on the toolbar to open the
alarm panel.
The U2000 displays the Alarm Panel window, as shown in Figure 1-33. You can add a current
alarm template to the alarm panel if you want to monitor the alarms of specified severities on
NEs. For details, see 7.6.2 Setting the Alarm Panel. The alarm panel then displays alarm
information according to the preset template.
Figure 1-33 Alarm panel

NOTE
l The bar charts in the Query Alarm Bar Chart window correspond to the template displayed on the
alarm panel. When you add or delete an alarm bar chart (alarm template) in the Query Alarm Bar
Chart window, the corresponding alarm template is automatically added to or deleted from the alarm
panel. In the same way, when you perform the add or delete operation on the alarm panel, the bar chart
in the Query Alarm Bar Chart window is modified accordingly.
l If a user changes the name, status, or search criteria of a template in the alarm panel on client B, the
changes can be synchronized to client A only after the user restarts client A.
Step 2 Double-click specific current alarm templates on the alarm panel.
The U2000 displays the Browse Current Alarm window. In the Browse Current Alarm
window, you can query alarm occurrence time, alarm source, and alarm logs. In addition, you
can acknowledge and clear alarms. For details, see 7.8.10 Browsing the Current Alarms.
NOTE
You can click an alarm indicator to view an alarm of a corresponding severity. For details about the alarm
indicator, see 7.6.1 Introduction to the Alarm Panel.
----End
1.7 How to Obtain Version Information About the U2000
This topic describes how to obtain version information about the U2000.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
106
Procedure
l View the U2000 SPC version on the System Monitor.
1. Log in to the U2000 System Monitor.
2. Click the Component Information tab to view the component version information
about the U2000.
NOTE
Only the U2000 SPC version number can be viewed on the System Monitor. To view more version
information about the U2000 software, perform View the CP version of the U2000.
l View the U2000 SPC version on the U2000 client.
1. Log in to the U2000 client.
2. Choose Help > About from the Main Menu.
3. Click the About or Component tab to view the component version information about
the U2000.
NOTE
Only the U2000 SPC version number can be viewed on the U2000 client. To view more version
information about the U2000 software, perform View the CP version of the U2000.
l View the U2000 CP version on the U2000 server.
The version information is stored on the U2000 server as a configuration file named the
version number. Access the following directory to view all version information:
In Windows: %IMAP_ROOT%\patch, such as D:\oss\server\patch
In Solaris and Linux: $IMAP_ROOT/patch, such as /opt/oss/server/patch
NOTE
The CP version number can be obtained only by accessing the directory. One version can have either
0 patch or multiple CP patches.
For example, if the directory contains the V100R009C00CP3011.cfg,
V100R009C00CP3013.cfg, and V100R009C00SPC301.cfg files, the version has been
installed with two CP patches and one SPC patch.
----End
1.8 Customizing the Client GUI Effect
You can customize the GUI effect of the U2000 client as required.
Context
The ranges of client GUI effect are for Current User and for Client. On the setting page, the
effect range is displayed on the topics of all items.The two types of ranges are described as
follows:
l for Current User: The current user can view the GUI effect after logging in to the
configured server from any client.
l for Client: All users can view the GUI effect after logging in to any server from the current
client.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
107
1.8.1 Setting the Client Skin
The U2000 client provides the gray and green skin colors. You can set the skin color as required.
Context
l After setting the skin color, you need to restart the U2000 client for the setting to take effect.
l The setting takes effect for all the users that log in to different clients.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Skin in the navigation tree on the left.
Step 3 In Skin color, select a skin color for the client.
Step 4 Click OK.
----End
1.8.2 Setting the Client Display Style
The U2000 client provides the function of setting the client display style. You can set the client
display style as required.
Context
l Users can switch the client display style to change the overall usability of the client and the
way client is launched. User can use either of the following two styles to launch the client:
Application style
Traditional style
l After setting the client display style, you must re-log in to the U2000 client for the settings
to take effect.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
NOTE
The U2000 displays the navigation path of the Online Help in the Traditional style.
The Table 1-11 table describes the differences between the traditional style and application style.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
108
Table 1-11 Differences between the traditional style and application style
Traditional Style Application Style
Menu items cannot be searched for. Users can search for menu items.
The Favorites feature is not supported. You can add functions and menu items that
are frequently used to the Favorites tab.

Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Client Display Style in the navigation tree on the left.
Step 3 Select Application style or Traditional style for the client.
Step 4 Click OK.
----End
1.8.3 Setting the Main Window Title
This topic describes how to set the main window title displayed in the title bar.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, select Main Window Title.
Step 3 In Main Window Title, enter the title you want to display.
Step 4 Click OK.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
109
Result
The title that you set is displayed as the main window title.
1.8.4 Setting the Topology View Display
In the Topology Display Settings dialog box, you can set the view background color, subnet
display effect, link display mode, node icon, and node label displayed in the Main Topology.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose the Topology Display Settings node in the left navigation
tree.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
110
Step 3 In the Topology Display Settings dialog box, set Background Color, Subnet, Link, Node
Icon, and Node Label.
NOTE
Only the Label items settings in the Node Label area are synchronized to the topology tree. Other settings
do not take effect in the topology tree. Other settings are invalid for the topology tree.
The Display each label item in separate lines in the topology view option allows you to quickly
view the node information such as node name, IP address, and alias in the topology view. You
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
111
can refer to Table 1-12 to set Abridged label and Display each label item in separate lines
in the topology view.
Table 1-12 Set the Abridged label and Display each label item in separate lines in the
topology view check boxes
Operation Display Effect for the Topology View
Select Abridged label and
Display each label item in
separate lines in the topology
view.
l If you do not select any topology objects or if you right-
click a topology object, the labels of all topology
objects are displayed in abridged mode. The items in
each node label are separated by colons (:).
l If you click a node, the node label is completely
displayed. This indicates that the items in the node
label are displayed in separated lines.
l If you click a link, the link label is completely
displayed in one line, regardless of the length of the
link label.
l If you press Ctrl to select multiple topology objects at
the same time, the items in the node label for the first
topology object are displayed in separated lines, but
the node labels for the remaining topology objects are
displayed in abridged mode.
Deselect Abridged label but
select Display each label item
in separate lines in the
topology view.
The labels for each node and link are completely
displayed. This indicates that the items in each node label
are displayed in separated lines.
Select Abridged label but
deselect Display each label item
in separate lines in the
topology view.
l If you do not select any topology objects or if you right-
click a topology object, the labels of all topology
objects are displayed in abridged mode. The items in
each node label are separated by colons (:).
l If you click a node, the node label is completely
displayed. If the label length exceeds the abridged
label length, the node label is displayed in new lines.
l If you click a link, the link label is completely
displayed in one line, regardless of the length of the
link label.
l If you press Ctrl to select multiple topology objects at
the same time, the items in the node label for the first
topology object are displayed in separated lines, but
the node labels for the remaining topology objects are
displayed in abridged mode.
Deselect Abridged label and
Display each label item in
separate lines in the topology
view.
The labels of each node and link are displayed in one line,
and the items in each node label are separated by colons
(:).

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
112
Step 4 Click OK.
Open the Main Topology and view the display effect.
----End
1.8.5 Setting the Font Size
You can set the font size on the U2000 client.
Context
l After setting the font size, you need to restart the U2000 client for the settings to take effect.
l The setting takes effect for all the users that log in to different clients.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, select Font.
Step 3 Select an option in Font Size.
NOTE
Font Size can be as follows:
l Small: The font size is 11 points.
l Medium (Default): The font size is 12 points.
l Large: The font size is 13 points.
Step 4 Click OK.
----End
1.8.6 Setting the Output Information
The output window is at the bottom of the U2000 client. It displays the prompt messages and
feedback information of the events that affect the running of the U2000.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
113
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, select Output Window.
Step 3 Set relevant parameters in the Output Window area.
Step 4 Click OK.
----End
Follow-up Procedure
You can perform the following operations in the information output area at the bottom of the
interface.
Operations Description
Copy 1. Choose the displayed output information.
2. Right-click and choose Copy to copy the information to the clipboard.
Select All 1. Right-click in the output window and choose Select All.
2. Right-click again and choose Copy to copy all the displayed output
information to the clipboard.
Clear Right-click in the output window and choose Clear to clear all the displayed
output information.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
114
Operations Description
Find 1. Right-click in the output window and choose Find.
2. In the Find dialog box, type the key words to be searched for in Find
what.
NOTE
l Match case: To set whether the search content is case sensitive. The default is case
insensitive.
l Match whole word only: To perform a fuzzy search, clear Match whole word
only. To perform a precise search, select Match whole word only.
l Direction: To set the direction for a key word search.
Save As Right-click to choose Save As. In the Save dialog box, save the current output
to a .txt file.
NOTE
Code formats ISO-8859-1 and UTF-8 are supported. The default encoding format is
ISO-8859-1. You are advised to use the default encoding format if the saved file does
not need to support multiple languages; otherwise, UTF-8 is recommended.
For .txt files, code formats ISO-8859-1 and UTF-8 are supported. The default encoding
format is ISO-8859-1. You are advised to use the default encoding format if the saved
file does not need to support multiple languages; otherwise, UTF-8 is recommended.
AutoScroll Right-click in the output window and choose AutoScroll. The output
information scrolls automatically to the latest information. Right-click in the
output window again and choose AutoScroll, the auto scroll is disabled.
Parameter
Settings
Right-click in the output window and choose Parameter Settings. The
Output Window pane is displayed in the Preferences window.

1.8.7 Setting the Workbench
This topic describes how to set the workbench display for the client. In addition, you can create
function links on the workbench to access operation GUIs quickly.
Prerequisites
You have logged in to a client in the traditional style.
Context
l After setting the workbench display, you must re-log in to the U2000 client for the settings
to take effect.
l The maximum number of links on the workbench is 100.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
l You can perform the following operations on the workbench.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
115
Option Description
Enable/disable the workbench Enable/disable the workbench
1. Choose File > Preferences from the main
menu.
2. In the Preferences window, choose
Workbench in the navigation tree on the left.
3. Select or deselect Enable workbench.
4. Click OK.
NOTE
l After enabling the workbench, the workbench
page is directly displayed when you log in to the
U2000 client next time.
l After disabling the workbench, the workbench
page is not displayed when you log in to the
U2000 client next time. In this case, you can
choose Help > Workbench from the main menu
to enable the workbench.
Create workbench 1. Log in to the U2000 client to go to the workbench
operation interface.
2. Right-click in a blank area of the workbench list
and choose Create Workbench from the
shortcut menu.
3. In the Create Workbench dialog box, enter the
workbench name and description, and select a
workbench icon and background.
NOTE
Clients support a maximum image size of 100 KB.
However, you are advised to use the default icon size
of 4 KB.
4. Click Create.
Modify workbench 1. Right-click a workbench in the workbench list
and choose Modify Workbench from the
shortcut menu.
2. In the Modify Workbench Link dialog box,
modify the workbench information such as the
workbench name, description, and icon.
NOTE
Clients support a maximum image size of 100 KB.
However, you are advised to use the default icon size
of 4 KB.
3. Click Modify.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
116
Option Description
Remove workbench 1. Right-click a workbench in the workbench list
and choose Remove Workbench from the
shortcut menu.
2. In the Confirm dialog box, click Yes.
Import Workbench The U2000 provides the function of importing the
workbench data from a file. You can import the
workbench data from a file to a new workbench of
the U2000. This facilitates workbench creation.
1. Right-click a workbench in the workbench list
and choose Import Workbench from the
shortcut menu.
2. In the Import Workbench dialog box, select the
workbench file to be imported, and then click
Import.
Export Workbench The U2000 provides the function of exporting the
workbench data. You can export the data on the
workbench to a file on the local client for future
maintenance and browse.
1. Right-click a workbench in the workbench list
and choose Export Workbench from the
shortcut menu.
2. In the Export Workbench dialog box, set the
name and format of the export file, and click
Export.
Create a shortcut for U2000
function
In the Workbench window, you can create
shortcuts for U2000 functions.
1. In the right pane of the Workbench window,
right-click in a blank area and choose Create
Shortcut from the shortcut menu.
2. In Create Shortcut dialog box, select a function.
3. Click Create.
Modify a shortcut of U2000
function
1. In the right pane of the Workbench window,
right-click the shortcut icon of an U2000
function and choose Modify from the shortcut
menu.
2. In the Modify Shortcut dialog box, change the
name, description, icon or move to.
3. Click Modify.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
117
Option Description
Arrange Icons by Name In the right pane of the Workbench window, right-
click in a blank area and choose Arrange Icons by
Name from the shortcut menu to sort shortcut icons.
After sorting, icons are listed horizontally.
Delete a shortcut of U2000
function
1. In the right pane of the Workbench window,
right-click the shortcut icon of an U2000
function and choose Remove from the shortcut
menu.
2. In the Confirm dialog box, click Yes. The
function link icon is deleted from the
Workbench window.
Copy an icon Copy the selected workbench icon to the clipboard.
Choose the shortcut menu Paste to copy the icon to
another workbench.
Cut an icon Cut the selected workbench icon to the clipboard.
Choose the shortcut menu Paste to move the icon to
another workbench.
Drag an icon to another position In the Workbench window, drag an icon to a proper
position.
----End
1.8.8 Setting the Menu Collapse
This function allows you to display the frequently used menu items and hide the seldom used
menu items. This helps you quickly find the menu to perform common operations.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Menu Settings in the navigation tree on the left.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
118
Step 3 Select Enable folding menus to enable the menu folding feature.
NOTE
By default, menu folding is enabled after the U2000 client is installed.
Step 4 Set the parameters for menu folding.
Table 1-13 Parameters for menu folding
Parameter Description Setting
Default number of
visible menu items
Default number of visible menu
items in each main menu.
Within the configured login times,
if the number of used menu items
exceeds this value, menus are
displayed based on the actual
number.
Value range: 1-50
Default value: 5
Hide menu items if
they are not used for X
consecutive logins
- Value range: 1-50
Default value: 10

Step 5 Click OK.
----End
1.8.9 Setting the Colors of Alarms
You can set a color for each alarm severity. This helps you browse the alarms of different
severities clearly.
Context
l After setting, the alarm icon in the topology view, the alarm record you have queried, and
the alarm indicator on the alarm panel are displayed in the specified colors.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
119
l By default, the U2000 provides four types of colors for alarms. critical: , major:
, minor: , and warning: .
l The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose Color Settings in the navigation tree on the left.

NOTE
For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.
Step 3 In the Color Settings area, click in each row to select the colors of alarms.
Step 4 Click OK.
----End
1.8.10 Setting the Alarm Highlighting
After you set the alarm highlighting, alarms that are not cleared within a specified period of time
are highlighted in the query result window. The highlighting prompts you to pay attention to the
alarms.
Context
l For the alarm that meets the highlighting condition, if the difference between the local time
of the client and the alarm occurrence time reaches the threshold time for highlighting, the
alarm is highlighted.
l The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
120
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
Highlighting in the navigation tree on the left.

NOTE
For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.
Step 3 In the Highlighting area, set the time and alarm status for alarms of a certain severity, and then
select Enable.
NOTE
The validity period ranges from 1 to 1000000 minutes.
Step 4 Click OK.
----End
1.8.11 Setting the Alarm Font
You can set font, size, style, and color for alarms displayed in the current alarm, alarm logs,
event logs, and other windows to distinguish alarms that are not viewed from alarms that are
already viewed.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, in the navigation tree on the left, expand the Alarm Local
Terminal Settings node, and then select Alarm Fonts.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
121
Step 3 In the Alarm Fonts area, set fonts, sizes, styles, and colors for alarms that are not read and that
are already read.
Step 4 Click OK.
----End
1.8.12 Setting the Alarm Display Mode
You can set the alarm and event background colors of windows such as the current alarm, alarm
log, and event log windows.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
Alarm Display Mode in the navigation tree on the left.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
122
NOTE
For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.
Step 3 In the Alarm Display Mode area, select an alarm display mode, and set background colors for
different alarm states.
Table 1-14 Alarm background colors in different display modes
Display Mode Field Alarm Background Color
Icon Severity The background color is displayed based on the
state. The severity icon is displayed in the
Severity field, and the color of the severity icon
is displayed based on the severity.
All the other fields The background colors of all the other fields are
displayed based on the state.
Cell Background Severity The background color is displayed based on the
severity.
All the other fields The background colors of all the other fields are
displayed based on the state.
Row Background Severity The background color is displayed based on the
severity.
All the other fields The background colors of the unacknowledged
and uncleared alarms are displayed by severity,
and users cannot change the color. Whereas the
background colors of the alarms in other states
are displayed based on the state.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
123

NOTE
The first column of the current alarm is not rendered, because it is not affected by the setting of the alarm
display mode.
Step 4 Click OK.
----End
1.8.13 Setting the Display Properties of New Alarm/Event
You can set the display properties of new alarms or events to view newly reported alarms or
events clearly.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
New Alarm/Event in the navigation tree on the left.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
124
NOTE
For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.
Step 3 In the New Alarm/Event group box, select Alarm Severities Shown at Top of Screen and the
alarm severity.
Step 4 In the New Alarm/Event group box, select Display at the top or Display at the bottom.
Step 5 In the Alarm Severities Shown in Alarm Lamps group box, select the severity to be displayed
on the alarm indicator.
Step 6 In the Others group box, set the display properties.
Step 7 Click OK.
----End
1.8.14 Setting the Alarm Display in the Topology View
After you set the alarm display in the topology view, when the devices in the network generate
alarms, the alarms of the highest severity will be displayed on the corresponding topology objects
in the topology view. This helps you learn about the device faults timely.
Context
l Acknowledged and cleared alarms are not displayed in the topology view, because they
indicate that the faults are already rectified. For details about the meaning of each alarm
state, see 7.1.3 Alarm Status.
l A subnet does not generate alarms. However, when the NEs or links in the subnet generate
alarms, the subnet displays the alarms of the highest severity. The alarm display mode for
subnets is the same as that for NEs.
l A container NE can generate alarms. The alarm status display mode for a container NE is
the same as that for an NE. When an NE in a container NE generates an alarm, an alarm
icon appears on the container NE in the topology view. For details, see Icons Indicating
That Alarms Are Contained.
l The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree in the Preferences dialog box, choose Topology Status Display.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
125
Step 3 In Topology Status Display, set the alarm display properties in the topology view.
Set the Alarm Display in the
Topology View
Operations
Display Style of Alarm States In Display Style of Alarm States, set the display style of
alarm states.
NOTE
Links support only the Use icon colors display style regardless of
the value of Display Style of Alarm States.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
126
Set the Alarm Display in the
Topology View
Operations
Alarm States to Display in the
Topology View
In Alarm States to Display in the Topology View, set the
alarm state to be displayed in the topology view.
l If you select only Unacknowledged alarms, only the
unacknowledged alarms of the highest severity are
displayed.
For NEs, if Use icon colors is selected, the alarm
state is displayed in the color of NE icon frame. If
Use state icons is selected, the alarm state is
displayed in the round icon.
For links, the links are rendered.
l If you select only Uncleared alarms, only the uncleared
alarms of the highest severity are displayed.
For NEs, if Use icon colors is selected, the alarm
state is displayed in the color of NE icon. If Use state
icons is selected, the alarm state is displayed in the
triangle icon.
For links, the links are rendered.
l If you select both Unacknowledged alarms and
Uncleared alarms, for NEs, unacknowledged alarms of
the highest severity and uncleared alarms of the highest
severity generated on NEs are displayed; for links,
unacknowledged alarms and uncleared alarms of higher
severity generated on links are displayed.
NOTE
The unacknowledged alarms and uncleared alarms generated
on links are displayed by rendering the links. Therefore, if you
select both Unacknowledged alarms and Uncleared
alarms, you cannot determine the whether generated alarms
are unacknowledged alarms or uncleared alarms. To check
whether unacknowledged alarms or uncleared alarms are
generated on a link, you can select this link, click on the
topology toolbar, and check the alarm information displayed
on Properties tab page on the Legend & Filter &
Properties panel.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
127
Set the Alarm Display in the
Topology View
Operations
Additional Display Effects In Additional Display Effects, set additional display
effects.
l When you select only Show alarm prompt, for NEs, a
pop-up message that contains the number and highest
severity of alarms is displayed if uncleared alarms are
generated on NEs, for links, no pop-up message is
displayed even if uncleared alarms are generated on
links.
l When you select only Blink, the icon that displays the
alarm status blinks.
l You can select Show alarm prompt and Blink at the
same time.
NOTE
Show alarm prompt is available only when Display Style of
Alarm States is set to Use icon colors.
Example In Example, check the display effect of the alarm state.
Step 4 Click OK.
----End
1.8.15 Setting the Number Format of the Client
You can customize the number display format of the client, such as, the display mode of the
system monitoring data.
Context
l After setting the number format, you must re-log in to the U2000 client for the settings to
take effect.
l After you modify the number settings, the display of the number may be changed. You can
view the display effect in the Positive number text box and Negative number text box.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, select Number Format from the navigation tree on the left.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
128
Step 3 Set the number display format in the Number Format area.
NOTE
l Digits after decimal point: To set the number of digits after the decimal point. The value ranges from
0 to 3, and the default value is 2.
l Number separator: To select the separator for the integer part of a number. The value can be empty
or comma (,), and the default value is comma (,).
l 0 before decimal point: whether to add 0 before the decimal point. By default, 0 is added before the
decimal point.
Step 4 Click OK.
----End
1.8.16 Setting Board Color
On the U2000, you can customize a board color, which indicates that the board works in the
normal state.
Context
The U2000 provides two colors, which indicate that a board works in the normal state: gray and
green.
Procedure
Step 1 Choose Administration > NE Software Management > FTP Settings (traditional style) from
the main menu or select Fix-Network NE Software Management in Application Center and
choose NE Software Management > FTP Settings (application style) from the main menu.
Step 2 In the Preferences window, choose Board State from the navigation tree.
Step 3 In Normal State, select a skin color for the board.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
129
Step 4 Click OK.
----End
1.8.17 Setting the Time and Date Formats of the Client
You can set the time format, time mode, and date format that are displayed on the client.
1.8.17.1 Setting the Time Format of the Client
This topic describes how to set the time format of the client.
Context
l After setting the time format, you must re-log in to the U2000 client for the settings to take
effect.
l Next time when you log in to the client, the U2000 client automatically uses the settings
that you set last time.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, expand the Region Settings
node and choose Time.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
130
Step 3 In the Time group box, set the time format. The time display effect that you set is displayed in
the Time example.
Step 4 Click OK.
----End
1.8.17.2 Setting the Date Format of the Client
This topic describes how to set the date format of the client.
Context
l After setting the date format, you must re-log in to the U2000 client for the settings to take
effect.
l Next time when you log in to the client, the U2000 client automatically uses the settings
that you used last time.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree on the left of the Preferences window, expand the Region Settings node
and select Date.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
131
Step 3 In the Date group box, set the date format.
NOTE
l Date separator: symbol to separate the date. There are three symbols for you to select: "/", "-", and
".". The default is "/".
l Date format: display format of the date. It can be set to "yyyy/MM/dd", "MM/dd/yyyy", or "dd/MM/
yyyy". The default is "MM/dd/yyyy".
Step 4 Click OK.
----End
1.8.17.3 Setting the Time Mode of the Client
After you set the time mode of the client, the time on the U2000 is displayed based on the
specified time mode (U2000 server time mode or U2000 client time mode).
Context
l After setting the time mode, you must re-log in to the U2000 client for the settings to take
effect.
l Next time when you log in to the client, the U2000 client automatically uses the settings
that you used last time.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree on the left of the Preferences window, select Time Mode.
Step 3 In the Time Mode group box, select Time Mode.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
132
NOTE
l Server time mode: If you select this option, the time on the U2000 client is displayed based on the
time zone where the server is located. For example, if the time of the client in UTC +08:00 is 10:00,
and the server is in the UTC +07:00, the time displayed on the U2000 client is 9:00. Server time
mode is used by default.
l Client time mode: If you select this option, the time on the U2000 client is displayed based on the
client OS time.
Step 4 Click OK.
----End
1.8.18 Setting the Toolbar
You can set toolbars and shortcut buttons that are displayed on the toolbar tray and the positions
of the toolbars.
Procedure
Step 1 Choose File > Customize Toolbar from the main menu.
Step 2 In the Customize Toolbar dialog box, select System, Security, Fault or Main Topology in the
Toolbars group box.
Step 3 Click Advanced.
The Customize Toolbar dialog box displays the Toolbar Buttons group box.
NOTE
l Click Advanced again. The Toolbar Buttons group box is hidden.
l The Toolbar Buttons group box consists of two parts: Available Tools and Customized Tools. All
the buttons in Customized Tools are displayed on the toolbar, and the buttons in Available Tools are
not displayed on the toolbar.
Step 4 In the Toolbar Buttons group box, set the buttons you want to display on the toolbar.
l In the Available Tools group box, select one button or hold down Ctrl or Shift to select
multiple buttons you want to display. Click to move the selected buttons to the
Customized Tools group box.
l In the Customized Tools group box, select one or hold down Ctrl or Shift to select multiple
buttons you do not want to display. Click to move the selected buttons to the
Available Tools group box.
NOTE
You can click Reset or Reset All to restore the selected or all toolbars to their initial state. These operations
help you adjust the display mode of buttons on the toolbar based on the initial state.
Step 5 Click OK.
The selected toolbars are displayed in the toolbar tray based on your settings.
Step 6 Optional: Adjust the positions of the toolbars in the toolbar tray.
1. Right-click in the blank area and choose Lock Toolbar from the shortcut menu. If Lock
Toolbar is not selected, you can skip this step.
2. Drag the toolbars to change their positions.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
133
3. After that, right-click in the blank area and choose Lock Toolbar from the shortcut menu.
The toolbars are locked, which prevent the toolbars from being moved by mistake.
NOTE
Right-click in the blank area and choose Reset Toolbar from the shortcut menu. The toolbars are restored
to their initial states.
----End
1.9 Setting the Alert at Network Disconnection
After you set the disconnection alert on the U2000 client, the sound box connected to the client
plays the sound if the U2000 client is disconnected from the server.
Context
l The audio files used for prompting network disconnection support only the audio files of
the WAV type in the PCM format. The audio files of the WAV type can be recorded in two
formats: PCM and Microsoft ADPCM.
l The setting takes effect for all the users that log in to different clients.
l Some computers in the sleep mode may close network connections automatically, the
U2000 plays the sound. You can change the sleep mode to solve the problem.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, select Disconnection Alert from the navigation tree on the left.
Step 3 In the Disconnection Alert group box, select Sound an alert when the client is disconnected
from the server.
Step 4 Click . In the Open dialog box, select an audio file, and then click Open.
Step 5 Click to play the sound.
Step 6 Click OK.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
134
1.10 Checking Whether the Client Needs Upgrade
You can perform this operation to check whether the version of the client matches that of the
server. If the versions do not match, you must upgrade the client.
Context
If the U2000 server is upgraded but the client is not upgraded, it may cause the version of the
client does not match that of the server.
Procedure
Step 1 Choose OSS Security > Check for Upgrades (application style) or Help > Check for
Upgrades (traditional style) from the main menu to check whether the client version matches
the server version.
l When the versions match, the client does not need to be upgraded. In this case, click OK.
l When the versions do not match, you must upgrade the client. In this case, perform the
following operations to upgrade the client:
1. Click OK.
2. In the Update Wizard: Update Applications window, click Continue. The upgrade
progress is displayed.
3. In the Update Wizard: Update Applications window, click Finish.
----End
1.11 Setting the Interval of Client Upgrade Check
After the server is upgraded, the server version and the client version do not match. Therefore,
the client has to be upgraded accordingly. After the interval for upgrade checking is set, the
U2000 periodically checks whether the client needs to be upgraded.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, in the navigation tree on the left, select Upgrade.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
135
Step 3 Select the interval for upgrade checking in the Interval drop-down list box.
Step 4 Click OK.
----End
1.12 Locking the Client
You can lock the U2000 client to prevent unauthorized operations.
Prerequisites
The U2000 client is not locked.
Context
In the Preferences dialog box, select Show main window when terminal locked in the Lock
Settings area. Thus, after the client is locked, the main window of the client is visible.
Procedure
l The following table describes how to set the client to be locked manually or automatically.
Lock Mode Operations
Automatically After you set the client to be locked automatically, the client is
automatically locked if it does not receive any operation
instructions in the specified period.
To set the client to be locked automatically, see 3.3.1.8 Setting
Auto-Locking for a Client.
Manually To ensure U2000 system security, if you do not perform operations
on the U2000 client for a period, you can lock the client to prevent
others from performing illegal operations on the U2000 client. You
can lock the client manually by using the following method:
l Choose File > Lock Terminal from the menu bar.
l Click on the toolbar.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
136
1.13 Unlocking the Client
After a client is locked by the current login user or by the system automatically, the current user
can unlock it, or ask a user in the SMManagers group to reset the password and then log in
again, or ask a user in the Administrators group to unlock the client.
Prerequisites
The U2000 client is locked.
Procedure
The following table describes how to unlock the client in different scenarios.
Operation
Scenarios
Operation Method
If the current user
remembers the
password
1. Press Ctrl+Alt+U or click .
2. Enter the current user name and password, and click OK.
If the current user
forgets the password
l A user in the SMManagers group need to reset the current user
password. For details, see 3.3.3.2 Resetting the Password of an
NMS user. Then log in to the client again using the user name and
the new password.
NOTE
A user in the SMManagers group cannot reset the password of the
admin user. If the current user is admin, only a user in the
Administrators group can unlock the client.
l The current user must ask a user in the Administrators group to
unlock the client. After the client is unlocked, the current user is
logged out.
1. Press Ctrl+Alt+U or click .
2. Enter the user name and password of the user in the
Administrators group, and click OK.

NOTE
If the number of password retries reaches the upper limit (3 by default), the user account is locked for a
specified period (30 minutes by default). The U2000 user is automatically unlocked after the auto-unlocking
duration. The U2000 user can also be unlocked by security administrators manually. For details, see 3.3.4.4
Unlocking Users.
1.14 Setting the Level of Operation Logs Recorded by the
Client
You can set the level of operation logs recorded by the client, which enables you to focus on
desired operation logs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
137
Context
l The settings take effect only for the current client. You need to set the log level again if the
client is restarted.
l The log file records the client running information, such as user login and logout time,
helping the maintenance personnel locate the problems on the live network.
Procedure
Step 1 Press Ctrl+Alt+Shift+L.
Step 2 Select Enable Logging in the Log Settings dialog box.
NOTE
If you clear the Enable Logging check box, the log level cannot be set and the client does not record logs.
Step 3 In the Log Settings dialog box, click the drop-down icon next to Log Level and select the level.
NOTE
The available log levels are described as follows:
l Detail: This is the lowest and default log level. It indicates that the client records all operation logs.
l Debug: This log level is higher than Detail, and it indicates that the client records all operation logs
except those at the Detail level.
l Warning: This log level is higher than Debug, and it indicates that the client records operation logs
at the Warning and Error/Exception levels.
l Error/Exception: This is the highest log level, and it indicates that the client records logs only at the
Error/Exception level.
Step 4 Click OK.
----End
Result
After you set the log level, the client record operation logs in Client installation directory\client
\client\var\log.
1.15 Setting a Scheduled Task
The U2000 can automatically execute certain tasks in a scheduled time without manual
intervention. You can set and modify these scheduled tasks as required.
Prerequisites
You are an NMS user with Operator Group authority or higher.
Context
If a large number of performance data need to be collected, this may cause communication
congestion and thus the communication between the U2000 and NEs stops. Hence, observe the
following rules to collect the performance data:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
138
l When creating a single performance data collection task, the number of NEs related to the
same GNE does not exceed 5.
l Run the performance data collection task when network traffic is low.
Procedure
Step 1 Choose Administration > Task Schedule > Task Management (traditional style) from the
main menu or select System Management in Application Center and choose Task
Schedule > Task Management (application style) from the main menu.
Step 2 Optional: Create a scheduled task.
1. Click New and the New Task is displayed.
2. Enter a task name and select the task type of the scheduled task and the run type. Then,
click Next.
3. Set the Time Setting or the Period Setting. Click Next.
NOTE
If the Run now check box is selected, a scheduled task will run immediately.
At other time except DST, the option DST is unavailable.
4. Follow the task creation wizard to set the parameters of the scheduled task and click
Next for several times until the Finish button is displayed.
5. Click Finish. A scheduled task is successfully created.
Step 3 Optional: Double-click a scheduled task to modify the parameters of the task.
Step 4 Optional: Right-click a scheduled task and choose Suspend/Resume Schedule to set the
suspend time or the resume time for the task. Click OK.
Step 5 Optional: Right-click a scheduled task and choose Run now to start executing the task.
NOTE
Run now means to immediately execute the task, no matter the scheduled time comes or not. Resume
means to start the scheduled task. The task is executed at the scheduled time.
----End
1.16 Broadcast Messages
The broadcast message function includes setting the broadcast parameters and sending the
broadcast messages. The broadcast message function of the U2000 enables you to send messages
to other users with ease.
1.16.1 Setting Broadcast Parameters
You can set the number of historical broadcast messages displayed on the client and the number
of messages stored in the buffer on the server as required.
Procedure
Step 1 Choose System > Broadcast Message (application style) or Administration > Broadcast
Message (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
139
Step 2 In the Broadcast Message dialog box, click Options.
Step 3 In the Options dialog box, enter the values in Max. messages to display and Max. messages
to save, click Save.
NOTE
l Max. messages to display is valid only for the current client, not for the server.
l Max. messages to save is valid for all clients that are connected to the same server. The parameter
configured by a user affects the experience of other users.
l You are advised to set Max. messages to display only for your computer, and Max. messages to
save is set by the administrator of the U2000 server.
l The displayed messages are read from the buffer on the server, therefore, you need to set Max. messages
to display to a value that is less than or equal to Max. messages to save.
Step 4 In the Information dialog box, click OK.
----End
1.16.2 Sending Broadcast Messages
You can send broadcast messages so that online users on other clients can view messages sent
from the local client.
Context
l The client can receive its own broadcast messages. The output area in the lower part of the
U2000 client displays corresponding prompts.
l You have both permissions to set broadcast message parameters and send broadcast
messages.
l Only the online U2000 client can receive the broadcast messages.
Procedure
Step 1 Choose System > Broadcast Message (application style) or Administration > Broadcast
Message (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
140
Step 2 In the Broadcast Message dialog box, enter the message content in the New Message field.
CAUTION
Do not enter important information such as passwords.
NOTE
The U2000 automatically adds line feeds according to the length of broadcast messages.
Step 3 Click Send.
Step 4 In the Information dialog box, click OK.
----End
Result
When the sending is complete, the Information dialog box is displayed on other clients. Users
can click Detail to view the message.
1.17 Applying for and Updating the U2000 License
This topic describes the license file of the U2000, and how to apply for, install, and use the
U2000 license.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
141
1.17.1 U2000 License Precautions
This topic describes the U2000 license file. The license file is used to control the functions and
management capabilities of the U2000. If the U2000 license file is unavailable, you cannot log
in to the U2000 client.
l The U2000 license file naming format is: xxxxxxx.dat.
l On Solaris/SUSE Linux OS, the encoding format of the U2000 license file must be UNIX,
not DOS. For details about how to confirm the encoding format of the U2000 license file,
see How to Confirm the Encoding Format of the U2000 License File.
l One license file corresponds to the equipment serial number (ESN) in an NMS computer
and can be used only on the corresponding computer.
l Do not disable the NIC whose corresponding ESN is bound to the U2000 license file.
l The formal U2000 licenses are not OS-specific. That is, U2000 licenses do not need to be
applied for according to OS (SUSE Linux, Solaris, or Windows) differences.
l Do not make any change to the license file. Otherwise, the license becomes invalid.
l The U2000 provides a grace period of 60 days for commercial permanent licenses. No grace
period is specified for other types of licenses.
Within the grace period, overloaded license items are allowed, and the associated
resources can be added and used. The MTOSI XML NBI can be used to synchronize
NE inventory and alarm information on the entire network.
When the grace period ends, the associated message or alarm information will be
displayed. In this case, new access services, including adding NEs or service objects,
are not allowed. You must apply for a license as soon as possible. Otherwise, some
functions may be unavailable. The MTOSI XML NBI can be used to synchronize
network-wide NE inventories and the alarm information indicating that the number of
equivalent NEs exceeds the license restriction.
1.17.2 Applying for a U2000 License
This topic describes how to apply for a U2000 license.
Context
l The license file is not delivered to customers along with the U2000 installation DVD.
Contact Huawei engineers to apply for the licenses according to the contract number and
the equipment serial numbers (ESNs) of the oss server.
l To prevent the failure in finding the license file for possible U2000 reinstallation, save the
license application email and the license file properly.
l Before using the U2000, apply for a formal U2000 license (recommended) or a temporary
U2000 license. The application of a U2000 license takes a long time. Therefore, apply for
it in advance.
l An ESN is a string consisting of 40-digit numerals or letters obtained by encrypted
calculation on the MAC addresses of the U2000 server network interface. The number of
ESNs is the same as the number of network interfaces on the U2000 server. To avoid
applying for a new license due to replacing certain network interface cards (NICs), save
all the ESNs to ensure proper use of the U2000 license.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
142
Generally, the ESN for a server does not change. It can be used for the U2000 license
that is normally applied for.
If the ESN for a U2000 license is changed due to NIC or server replacement or ESN
application error, apply for a U2000 license again and contact Huawei technical support
engineers.
l The requirements for the ESNs of the server to which a license needs to be bound vary
according to the installation scheme. You must obtain ESNs of the server based on the
installation scheme.
In a centralized single-server system scheme, the license needs to be bound to the ESNs
of the server.
In a centralized high availability system (Veritas hot standby) scheme, the license needs
to be bound to the ESNs of the servers on both the primary site and the secondary site.
Procedure
Step 1 Obtain the contract number.
Step 2 Use the ESN tool provided by the U2000 to view ESNs of the server.
NOTE
If the U2000 has been installed, using the ESN tool of the U2000 to view the ESN is recommended.
Mode 1: View the ESN using the ESN tool of the NMS after installing the U2000.
On Solaris OS or SUSE Linux, perform the following steps to obtain ESNs:
1. Log in to the OS of the U2000 server as the root user.
NOTE
When a high availability system scheme is used, you must log in to the OSs of the primary and
secondary sites as the ossuser user.
2. Run the following commands to view ESNs:
# cd /opt/oss/server/platform/bin
# ./esn
A message similar to the following will be displayed:
ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD
ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
.....
NOTE
If a high availability system scheme is used, you must respectively save the ESNs for the primary and secondary
sites. During the application for a formal license, you must provide the ESNs of the network interfaces of the
primary and secondary sites for external communication.
On Windows, perform the following steps to obtain ESNs:
1. Log in to the OS as a user with administrator rights.
2. Choose Start > Run.
3. In the Run dialog box, enter cmd. A command line interface (CLI) is displayed.
4. Run the following commands:
>esn
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
143
A message similar to the following will be displayed:
ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD
ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
.....
Mode 2: Use the ESN tool to generate ESNs before installing the U2000.
NOTE
Make the following preparations:
l Contact Huawei engineers to obtain the ESN tool package. Huawei engineers can go to http://
support.huawei.com to download the ESN tool delivered with the version. The ESN tool is named as
follows:
l Solaris OS: U2000version_ESN_solaris_SPARC.tar
l SUSE Linux OS: U2000version_ESN_sles_x64.tar
l Windows OS: U2000version_ESN_win32_x86.zip
l Copy the ESN tool package to the computer.
Solaris or SUSE Linux is used as an example to describe how to use the downloaded ESN tool
to generate ESNs.
1. Use SFTP to upload the ESN tool to the U2000 server as the root user. For example, upload
the ESN tool to the /opt path. For details, see How to Use the FileZilla to Transfer Files by
SFTP.
2. Run the following commands to decompress the ESN tool package:
# cd /opt
# tar xvf U2000version_ESN_solaris_SPARC.tar
3. Run the following command to view the ESN:
# ./esn
Information similar to the following is displayed:
ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD
ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
...
Step 3 After the esn command is executed, the system automatically generates the Esn.txt path. Send
the contract number and the server ESNs to Huawei engineers or the local Huawei office.
NOTE
Huawei engineers access http://license.huawei.com to obtain the license based on the contract number
and ESNs.
Step 4 Huawei engineers send the license file to you after obtaining it.
NOTE
The license file provided with the U2000 exists as a .dat file.
----End
1.17.3 Updating the U2000 License
This topic describes how to update the U2000 license.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
144
Prerequisites
l The OS and database must run properly. For details on how to start the OS and database,
see 1.2 Starting the U2000 System.
l The processes of the U2000 must be properly started. For details on how to start the
U2000 processes, see 1.2 Starting the U2000 System.
l You must log in to the U2000 client as the admin user.
l The license file of the U2000 must be obtained. The license file name can contain digits,
letters, and special characters excluding the space or \ /:*?"<>|.
Through the GUI of the client: Save the new U2000 license to the server where the
U2000 client is located.
Through the CLI: The new license file must be transferred to the U2000 server through
SFTP.
In the Solaris OS, upload the license file to the /export/home/ossuser path on the
server as the ossuser user.
In the SUSE Linux OS, upload the license file to the /export/home/ossuser path on
the server as the ossuser user.
In the high availability system, upload the new U2000 license file to the /export/
home/ossuser path on the server on the primary site through SFTP.
l After the U2000 is installed, you must load the U2000 license to ensure that the U2000 is
available.
For details, see the updated contents about the U2000 license in this topic.
l Confirm that the license file is transferred in text mode, that is, in ASCII mode.
Context
l If the U2000 license file is unavailable, you cannot log in to the U2000 client. Update the
U2000 license file in time.
l During the update of the U2000 license file, you can replace the formal U2000 license file
with the temporary one; It is recommended to use the formal U2000 license as soon as
possible.
l The licenses of different R versions of the U2000 are incompatible. For example, the license
of V100R001 cannot be used by V100R002.
l Determine whether to update the U2000 license file based on the U2000 license use
conditions.
In the case that the device types supported by the new license are different from those
supported by the original license, the license is updated as follows:
If the device types supported by the new license are more than the device types
supported by the original license and the added device types are supported by the
current version, the license can be updated. If the added device types are not
supported by the current version, the license cannot be updated.
If the device types supported by the new license are less than the device types
supported by the original license and no NEs of the reduced device types are created
in the NMS, the license can be updated. If certain NEs of the reduced device types
are created in the NMS, the license cannot be updated.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
145
For IP domain, if the function items supported by the new license are less those
supported by the original license, the license cannot be updated.
In the case that the number of clients supported by the new license is different from that
supported by the original license, the license is updated as follows:
If the number of clients supported by the new license is less than that supported by
the original license but the number of online clients is less than the number of clients
supported by the new license, the license can be updated. If the number of online
clients is greater that the number of clients supported in the new license, the license
cannot be updated.
If the number of clients supported by the new license is greater than that supported
by the original license, the license can be updated.
NOTE
If NE license items for the IP domain are deleted from the updated license, restart the license service
after license update. The service and process names are LicenseService and lic_agent respectively.
For details about how to restart the service, see chapter Starting and Stopping a Process in U2000
Administrator Guide.
l In scenarios where you can change the license, you can update the U2000 license and then
restart the server.
You can update the U2000 license through the GUI or CLI.
Restart the client after you replace a license. Then, the client automatically reloads the
menu items according to the control items defined in the new license.
Through the GUI of the Client:
Application scenario: This method is recommended if you can log in to the
U2000 client and access the GUI.
Operation method: Log in to the U2000 client, and then click Update License
to update the license.
Restart the client after you update the license. Then, the client automatically
reloads GUI elements according to control items defined in the new license.
Through the CLI:
Application scenario: This method is applicable to the scenario where you need
to remotely update the license through commands because logging in to the
U2000 client is not allowed and the client does not provide any GUI.
Operation method: Check that the processes of the U2000 are properly started,
and then run the updateLicense -file filename command to update the license
file.
It is recommended that you update the U2000 license through the GUI of the client.
If the license updated through the GUI of the client requires deploying the NE Explorer
or other processes, a message will be displayed when you start the U2000 processes
after updating the license. Viewing the process startup status on the System Monitor
client and performing operations after all the processes have been started are
recommended.
To ensure the normal running of the U2000, do not manually replace the license file.
NOTE
To make both the U2000 commercial and temporary licenses take effect, use the GUI mode.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
146
Procedure
l Through the GUI of the Client
For the single-server system:
1. On the U2000 workstation, back up the original license file.
In the Windows OS: Create the backup folder in the default directory D:\oss
\server\etc\conf\license. Copy the original license file to the created folder.
In the Solaris or SUSE Linux OS:
run the following commands to back up the any other license file to the /opt/oss/
server/etc/conf/license path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup
NOTE
After SetSolaris is enabled, only the SSH service for the ossuser user has the login right. The
SSH login mode is recommended for your system security. To use another login mode such as
Telnet, you must enable the access right for the Telnet service and the login user. For details,
see How to Start/Stop the FTP, SFTP, and Telnet Services and How to Enable and Disable the
FTP/Telnet Authority of user root on Solaris OS.
2. Update the U2000 License file through the GUI of the U2000 Client.
a. Choose Help > License Management > License Information (traditional style)
from the main menu or select System Management in Application Center and
choose License Management > License Information (application style) from
the main menu.
b. In the License Information dialog box, click Update License.
c. Select the new license file and click Open.
d. Click Next.
e. Select a scenario and perform the associated operations as required:
If Incremental is unavailable, click Next.
If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
If Incremental is available and both the new and in-use U2000 licenses need
to be effective, select Incremental and click Next. If the in-use U2000 license
has a commercial license and a temporary license, the new license will replace
the license of the same type. For example, if the new license is a commercial
license, the commercial license in the in-use U2000 license will be replaced.
f. Click Finish.
g. Click Yes and confirm the updated license.
h. Click Yes to close all windows.
i. Click Yes to log out of the system.
3. Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.
For the HA system:
1. Log in to the U2000 server on the primary and secondary sites.
2. Back up the original U2000 license file on the primary and secondary sites.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
147
Create the backup folder in the default path. Then, copy the original license file to
this folder.
NOTE
l The default path of U2000 license file in the Solaris or SUSE Linux OS is /opt/oss/server/
etc/conf/license.
l The default path of U2000 license file in the Windows OS is D:\oss\server\etc\conf
\license.
3. Update the license file on the primary site.
a. Log in to the OS where the U2000 client is installed.
In Windows, log in to the OS as a user with administrator rights.
In Solaris, log in to the OS as the ossuser user.
b. Save the license to be loaded to the server where the U2000 client is installed.
c. On the desktop, double-click U2000 Client. The Login dialog box is displayed.
d. In the Server drop-down list, select the server (server on the primary site) to be
logged in to. Then, set User Name and Password to the valid values, and click
Login. The initial password of the admin user is Changeme_123 (It is
Admin_123 for a U2000 that comes preinstalled). The password must be
changed during the first login to ensure system security. Keep the password
confidential and change it regularly.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
148
NOTE
l If a message indicating that no license is available is displayed when you log in to
the U2000 client.
1. In the Confirm dialog box, click Yes. The Open dialog box will be displayed.
2. In the Open dialog box that is displayed, select the new license file and click
Open. The License Comparison Results dialog box will be displayed.
3. Click OK.
4. Click Yes and confirm the loaded license.
5. Click OK.
l If U2000 license is loaded before.
1. Choose Help > License Management > License Information (traditional style)
from the main menu or select System Management in Application Center and
choose License Management > License Information (application style) from
the main menu.
2. In the License Information dialog box, click Update License.
3. Select the new license file and click Open.
4. Click Next.
5. Select a scenario and perform the associated operations as required:
l If Incremental is unavailable, click Next.
l If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
l If Incremental is available and both the new and in-use U2000 licenses need
to be effective, select Incremental and click Next. If the in-use U2000
license has a commercial license and a temporary license, the new license
will replace the license of the same type. For example, if the new license is
a commercial license, the commercial license in the in-use U2000 license
will be replaced.
6. Click Finish.
7. Click Yes and confirm the updated license.
8. Click Yes to close all windows.
9. Click Yes to log out of the system.
4. Update the license file on secondary site.
a. On the primary site, log in to the VCS client.
b. Right-click the AppService resource group and choose Switch to > Remote
switch from the shortcut menu.
NOTE
During data synchronization between the primary and secondary sites, do not perform
this operation.
c. Select the Clusters and Systems to be switched.
d. Click OK.
e. In the Confirm dialog box, click Yes to switch U2000 services to the secondary
site.
f. Use the U2000 client to reconnect to the system IP address of the secondary site.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
149
NOTE
l If a message indicating that no license is available is displayed when you log in to
the U2000 client.
1. In the Confirm dialog box, click Yes. The Open dialog box will be displayed.
2. In the Open dialog box that is displayed, select the new license file and click
Open. The License Comparison Results dialog box will be displayed.
3. Click OK.
4. Click Yes and confirm the loaded license.
5. Click OK.
l If U2000 license is loaded before.
1. Choose Help > License Management > License Information (traditional style)
from the main menu or select System Management in Application Center and
choose License Management > License Information (application style) from
the main menu.
2. In the License Information dialog box, click Update License.
3. Select the new license file and click Open.
4. Click Next.
5. Select a scenario and perform the associated operations as required:
l If Incremental is unavailable, click Next.
l If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
l If Incremental is available and both the new and in-use U2000 licenses need
to be effective, select Incremental and click Next. If the in-use U2000
license has a commercial license and a temporary license, the new license
will replace the license of the same type. For example, if the new license is
a commercial license, the commercial license in the in-use U2000 license
will be replaced.
6. Click Finish.
7. Click Yes and confirm the updated license.
8. Click Yes to close all windows.
9. Click Yes to log out of the system.
5. Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.
l Through the CLI
For the single-server system:
1. On the U2000 workstation, back up the original license file.
In the Windows OS: Create the backup folder in the default directory D:\oss
\server\etc\conf\license. Copy the original license file to the created folder.
In the Solaris or SUSE Linux OS:
run the following commands to back up the any other license file to the /opt/oss/
server/etc/conf/license path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
150
NOTE
After SetSolaris is enabled, only the SSH service for the ossuser user has the login right. The
SSH login mode is recommended for your system security. To use another login mode such as
Telnet, you must enable the access right for the Telnet service and the login user. For details,
see How to Start/Stop the FTP, SFTP, and Telnet Services and How to Enable and Disable the
FTP/Telnet Authority of user root on Solaris OS.
2. Update the U2000 license.
In the Windows OS:
a. Log in to the OS as a user with administrator rights.
b. Run the following command to update the U2000 license file:
> updateLicense -file License_file_name
NOTE
In the command, License_file_name indicates the combination of an absolute path
and a file name. For example, if the license fine is named license123.dat and stored
in d:\, the command to rename the U2000 license file is > updateLicense -file d:
\license123.dat.
If illegible characters are displayed, set the environment variable:
FILEIO_LOCAL_CHARSET=1.
Information similar to the following is displayed:
state product feature item name
old value new value
no change: U2000 COMMON LSW1CAPA01
Client 500 500
no change: U2000 COMMON LSW1CAPA01
Client 1 1
no change: U2000 COMMON LSW1FMCLT01 Alarm
Export 1 1
no change: U2000 COMMON LSW1RENOTI01
Client 1 1
Are you sure to update the license?(Y/N)
c. Enter Y, and then press Enter.
In the Solaris OS:
a. log in to the OS of the U2000 server as the ossuser user.
b. Run the following command to update the U2000 license file:
$ cd /export/home/ossuser
$ updateLicense -file License_file_name.dat
NOTE
In the command, License_file_name indicates a file name or the combination of an
absolute path and a file name.
Information similar to the following is displayed:
state product feature item name
old value new value
no change: U2000 COMMON LSW1CAPA01
Client 500 500
no change: U2000 COMMON LSW1CAPA01
Client 1 1
no change: U2000 COMMON LSW1FMCLT01 Alarm
Export 1 1
no change: U2000 COMMON LSW1RENOTI01
Client 1 1
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
151
Are you sure to update the license?(Y/N)
c. Enter Y, and then press Enter.
In the SUSE Linux OS:
a. log in to the OS of the U2000 server as the ossuser user.
b. Run the following command to update the U2000 license file:
$ cd /export/home/ossuser
$ updateLicense -file License_file_name.dat
Information similar to the following is displayed:
state product feature item name old
value new value
used value
new: iManager U2000 VALUET LNSDAASC01 Alarm
Application Software license-Transmission
Network 1
new: iManager U2000 VALUET LNSDAEASC01 SDH-ASON
Management Function Component-Transport
Network 1
new: iManager U2000 VALUET LNSDAEASC02 license Per
Equivalent VC4 for SDH ASON Service 10
new: iManager U2000 VALUET LNSDAEASC03 ASON NG WDM
Application Software license-Transmission Network
1
...
Are you sure to update the license?(Y/N):
c. Enter Y, and then press Enter.
3. Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.
For the HA system:
1. Log in to the U2000 server on the primary and secondary sites.
2. Back up the original U2000 license file on the primary and secondary sites.
Create the backup folder in the default path. Then, copy the original license file to
this folder.
NOTE
l The default path of U2000 license file in the Solaris or SUSE Linux OS is /opt/oss/server/
etc/conf/license.
l The default path of U2000 license file in the Windows OS is D:\oss\server\etc\conf
\license.
3. Run the updateLicense command to update the license file on the primary site. For
details, see Step 2.
4. Transfer the updated license file on the primary site to the /opt/oss/server/etc/conf/
license path on the server on the secondary site in text mode, that is, ASCII mode.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
152
NOTE
l The default path of U2000 license file in the Solaris or SUSE Linux OS is /opt/oss/server/
etc/conf/license.
l The default path of U2000 license file in the Windows OS is D:\oss\server\etc\conf
\license.
l In the Solaris or SUSE Linux OS: You should transfer the updated license file on the
primary site to the server on the secondary site in text mode, that is, ASCII mode. In the
Windows OS: Copy and paste the updated license file on the primary site to the server on
the secondary site.
5. Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.
----End
Result
After the preceding operations are performed, the license file is automatically loaded to the /opt/
oss/server/etc/conf/license path.
1.17.4 Checking the Status of the U2000 License
This topic describes how to check the status of the U2000 license. By checking the license status,
you can learn the usage of the license, so as to apply for a new license file from Huawei in time
before the NMS needs to be expanded or the validity of the license is due.
Context
By checking the U2000 license status, you can learn whether the U2000 license control items
are correct. If a license control item is incorrect, the related functional module is unavailable.
For example, if the license control item for the U2000 E2E module is absent, tunnels cannot be
created.
Procedure
Step 1 Log in to the U2000 Client.
Step 2 Choose Help > License Management > License Information (traditional style) from the main
menu or select System Management in Application Center and choose License
Management > License Information (application style) from the main menu.
Step 3 In the License Information dialog box that is displayed to view the condition of the license.
----End
1.17.5 Revoking a License on the U2000
The U2000 supports the function of revoking a License. You can revoke the License that is not
in use to obtain the revocation code and then use the code to apply for a new License.
Prerequisites
You have logged in as a user who belongs to the Administrators or SMManagers user group.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
153
Context
The Revoke License dialog box displays only available License files and does not display
revoked and invalid Licenses.
Procedure
Step 1 Choose License Management > Revoke License (application style) or Help > License
Management > Revoke License (traditional style) from the main menu.
Step 2 In the Revoke License dialog box, select the License that is not used any more, and then click
Revoke License.
NOTE
l Product: Name of the product.
l License SN: SN of a License file.
l License File: Name of a License file.
Step 3 In the Confirm dialog box, click Yes.
The License file is revoked.
----End
Result
If you revoke a License file but do not apply a new License, the U2000 displays a dialog box
every hour, prompting you to update the License. The U2000 also displays License SN,
Revocation Time, Valid Date (indicating the date before which the revoked License can still
be used) of the License, and License File.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
154
1.17.6 Querying the License Revocation Code on the U2000
This topic describes how to view the License revocation code on the U2000 client. When
applying for a new License, you need to provide the revocation code of the old License.
Procedure
Step 1 Choose License Management > Query License Revocation Code (application style) or
Help > License Management > Query License Revocation Code (traditional style) from the
main menu.
Step 2 In the Query License Revocation Code dialog box, view the License SN, License revocation
code, and revocation setting time.
NOTE
l License SN: SN of a License file.
l License Revocation Code: A string generated after a License file is revoked. According to this unique
string, you can check that its corresponding License file is revoked. When changing the equipment
serial number (ESN) or License capacity, you need to provide the License revocation code.
l Revocation Time : Time when you set a License file to be revoked.
Step 3 Right-click the information about the revocation code and choose Copy to copy the information.
The copied information about the revocation code can be used to apply for a certificate.
NOTE
You can also select the information about the queried revocation code, and then press Ctrl+C to copy the
information.
----End
1.17.7 Setting Periodic Export of the U2000 License
When the upper-layer NMS needs to collect statistics on Licenses used by U2000 recently (for
example, usage of License items and License update time), you can perform U2000 License
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
155
export tasks periodically or instantly to dump the Licenses information used by the U2000, and
save them as an XML file to the specified folder.
Context
If the current License file used by the U2000 becomes invalid due to the License initialization
failure, the exporting task is not executed, and users need to contact Huawei technical support
to update the License.
Procedure
Step 1 Choose Task Schedule > Task Management (application style) or Administration > Task
Schedule > Task Management (traditional style) from the main menu.
Step 2 In the Take Type navigation tree, choose File Interface > OSS License Export.
Step 3 In the task list on the right, double-click the OSS License Export task.
Step 4 In the Attribute dialog box, set the parameters on the Common Parameters and Extended
Parameters tab pages, and then click OK.
Step 5 Perform the OSS License Export task.
l If Status of the task is Suspend, right-click the task and choose Resume from the shortcut
menu. Then right-click the task again and choose Run Now from the shortcut menu.
l If Status of the task is Idle, right-click the task and choose Run Now from the shortcut
menu.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
156
1.17.8 Setting the NE Capacity Threshold for the U2000 License
When the number of accessed NEs reaches the threshold of the License capacity, the U2000
generates alarms and displays an Information dialog box periodically.
Procedure
Step 1 Choose Settings > Management Capacity Alarm Settings (application style) or
Administration > Settings > Management Capacity Alarm Settings (traditional style) from
the main menu.
Step 2 In the Management Capacity Alarm Settings dialog box, enter the License threshold in
Threshold.
Step 3 Optional: Select the Display periodical warning check box. In Warning interval(minutes),
set the interval.
Step 4 Click OK.
----End
Result
When the proportion of the number of accessed NEs to the License capacity reaches the threshold
specified for the License capacity, the U2000 generates The NE Capacity Reached the
Threshold Alarm and periodically displays an Information dialog box. When the proportion
is less than the threshold specified for the License capacity, the U2000 clears The NE Capacity
Reached the Threshold Alarm and the Information dialog box is not displayed any more.
1.17.9 Collecting Port Statistics of Service Licenses
This topic describes how to use the U2000 to collect port statistics of service licenses
automatically. The number of service license items that are consumed and charged is measured
by the number of ports that network services occupy. The automatic statistics collection enables
you to quickly obtain the service license usage.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
157
Prerequisites
This operation applies only to the service licenses that are consumed and charged based on ports.
Context
l License items are subtracted when you add a board rather than when you create a service.
The number of service license items is subtracted by the number of ports on the new board.
l The U2000 checks the number of service license items at scheduled time every day and
enters the grace period when the number of remaining license items reaches the threshold.
During the grace period, there is no restriction on your operations. When the grace period
expires, you cannot create services. However, existing services are still functioning
properly. Because the deleted services cannot be recreated, excise caution when deleting
the services.
l The grace period ends for the U2000 when you update the service license with a new valid
one. If resources are still insufficient, the start and end time of the grace period are
recalculated.
l The U2000 reports ALM-801 OSS License Beyond Limitation when it enters the grace
period. Contact your Huawei engineers for new licenses.
l Service licenses do not restrict NE functions. That is, NE licenses are not affected by service
licenses.
Procedure
Step 1 Choose Help > License Management > Statistics of Service Ports (traditional style) from the
main menu or select System Management in Application Center and choose License
Management > Statistics of Service Ports (application style) from the main menu.
Step 2 In the Statistics of Service Ports dialog box, view the number of ports consumed in each service
license.
NOTE
Choose Help > License Management > License Information (traditional style) from the main menu or
select System Management in Application Center and choose License Management > License
Information (application style) from the main menu. In the License Information dialog box, click the
Resource Control Item tab and view Capacity, Consumption, and Overflow Time of different resource
control items in the current licenses.
Step 3 Optional: Click Advanced. In the Advanced Settings dialog box, view the number of free
inventory resources.
Step 4 Optional: Click Export and save the port statistics to a TXT, CSV, HTML, or XLS file.
----End
1.18 Starting the Web Client
Certain NEs must be configured by using the Web LCT. Before you configure services for these
NEs, you need to first start the Web LCT client.
Prerequisites
l You are an NMS user with Operator Group authority or higher.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
158
l It is applicable to the OptiX OTU 40000, and OptiX OSN 900A.
Procedure
Step 1 Optional: Double-click an optical NE on the topology. The NE Panel is displayed. Select an
NE from the object tree on the left.
Step 2 Right-click an NE and choose Start WEB Client from the shortcut menu. The Web LCT user
interface is displayed.
NOTE
Enter the default user name proxyuser and password Changeme_123. If the user name and password need
to be changed, see Security Management > User Security Policy Management > Managing Web Proxy
Users in the U2000 System Administrator Guide.
----End
1.19 Starting the NE Data Collection
When an NE is faulty, you can collect the NE data for fault identification and analysis. There
are fast fault collection and full fault collection.
Prerequisites
l You are an NMS user with Guests authority or higher.
l It is applicable to the MSTP series, WDM series, WDM (NA) series, RTN series, PTN
series (except PTN 6900 series) and marine series NEs.
Context
NOTE
The product feature you have purchased may use personal information of users when providing services
or maintenance. Therefore, you are obligated to take considerable measures, in compliance with the laws
of the countries concerned and the user privacy policies of your company, to ensure that the personal data
of users is fully protected.
Procedure
Step 1 In the Main Topology, right-click an NE and choose Collect NE Data from the shortcut menu.
The Datacollector window is displayed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
159
NOTE
In the Datacollector window, press F1 to display the Online Help topic relevant to data collection
operations and troubleshooting methods of common problems.
----End
1.20 Customizing Naming Rule
When you create fibers or trails, the U2000 automatically creates the names of the fibers, trails,
ASON trails, Tunnel, Tunnel protection group PWE3 Service and Native Ethernet E-Line
Service based on the naming rule. The settings can be modified according to actual requirements.
This section takes the fiber naming rule as an example to illustrate how to customize the naming
rule.
Context
l Applies to the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series,
ATN series, Marine series, NE series, CX series and Access series NEs.
l The naming rule is a string that comprises a series of fields. The U2000 provides some
fields by default. The user can add new fields, modify or delete the existing fields and adjust
the field position according to the actual requirements, to customize the naming rule.
Procedure
Step 1 Choose Administration > Settings > Naming Define Rule (traditional style) from the main
menu or select System Management in Application Center and choose Settings > Naming
Define Rule (application style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
160
The Naming Define Rule dialog box is displayed.
Step 2 Choose the fiber or trail which want to be named from the Function Tree of Function
Configuration. The naming rule is displayed on the right-hand pane.
Step 3 Optional: Click Refresh to obtain the latest naming rule customized by other users.
Step 4 Click Create Rule and enter the name of the newly created rule in the first row.
Step 5 Add new fields.
1. Right-click on the Field Descriptions list, and choose Add Field from the shortcut menu
to add a new field.
2. Select the field type in the Type list and define its value.
There are four types of fields.
l Fixed Field: This type of field defines fixed strings contained in all names. Enter the
string in Fixed Field field.
l Connector Field: This type of field defines the connector used in the name. Select the
connector in the Connector Field field.
l Dynamic Field: In this type of field, you can select some attributes of the fiber or cable
and add the value to the name, for example, contain the name of Source NE in the
naming rule. Select the attributes in the Dynamic Field field.
l Digital Field: In this type of field, the numerals contained in the naming rule can be set
to change regularly so that the names of fibers or cables following the same rule is not
repeated. In the Digital Field field, set Current Value, Min. Value, Max. Value and
Step Length.
NOTE
It is recommended that there is only one Digital Field in the naming rule. If there are multiple digital
fields, it is recommended to set others to Fixed Field.
3. Define the field name in the Name list.
4. Define the field length in the Length list.
Step 6 Optional: Delete fields. Select the field to delete in the Field Descriptions list. Right-click it
and choose Delete Field from the shortcut menu.
Step 7 Optional: Set how the field is sequenced in the naming rule. Select the field and click
to move the field forward and click to move it backward.
Step 8 Click Apply to set the current naming rule as the default rule on the client.
Step 9 In the Such As field, you can preview the current naming rule.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
161
Step 10 Click Save to save the current naming rule and set it as the default rule.
Step 11 Click Apply to set whether to apply the current naming rule as the naming rule of the current
client.
----End
1.21 U2000 Process List
This topic describes the information about U2000 processes,such as the functions and dependent
processes of each process and the port occupied by each process.
l The name of a multi-instance process contains numbers to distinguish from a process with
the same function. Table 1-15 shows a process with numbers omitted. For example,
ds_agent refers to the ds*_agent process, with the asterisk character (*) indicating a number.
l Every instance is responsible for some independent service data. Stopping an instance will
certainly affect related services.
Table 1-15 shows the description of U2000 services and processes. Required Process specifies
the processes that a specified process depends on during startup. The System Monitor displays
the direct and indirect dependencies.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
162
Table 1-15 U2000 process list
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Activ
eMQ
ActiveMQ ST_ActiveM
Q,server/
platform/
sacscript/
standalone
None 816
1,
616
16,
616
17,
615
5
TCP,
TCP,
TCP,
UDP
serv
er/
cbb/
nbi/
nbic
bb_3
p/
activ
emq/
data/
activ
emq.
log.*
ActiveMQ
Service. Provides
the northbound
interface which
supports JMS
notifications.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
163
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Agent
_COR
BA
Agent_CORB
A
Agent_CORB
A,server/nbi/
corba/bin
Licen
seSer
vice,
Secur
itySe
rvice,
LogS
ervic
e,mc
120
03,
220
03
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_cor
bade
bug_
%y
%m
%d_
%H
%M
%
S_*.
*
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_cor
bano
tify_
%y
%m
%d_
%H
CORBA Service.
This process
provides the
CORBA NBI
management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
164
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
%M
%
S_*.
*
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_cor
basy
s_%
y%
m%
d_%
H%
M%
S_*.
*
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_deb
ug_
%y
%m
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
165
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
%d_
%H
%M
%
S_*.
*
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_sys
_%y
%m
%d_
%H
%M
%
S_*.
*
Agent
Integr
ate
AgentIntegrat
e
java,server/$
{IMAP_JAV
A_HOME}/
bin
None No
ne
None Non
e
Integrate
Interface Service.
Provide integrate
interface service
to other systems
in U2000
solution.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
166
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
agt_cs
t_xml
agt_cst_xml java,server/$
{IMAP_JAV
A_HOME}/
bin
None 301
02
TCP serv
er/
var/
logs/
Dev
elop/
nbi/
xml2
tl1/
xml2
tl1.*
XML northbound
interface (non
MTOSI). This
process provides
XML NBI
Management
service for
Access NE(non
MTOSI).
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
167
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsA
ccess
BmsAccess BmsAccess,se
rver/nemgr/
nemgr_access
/bin
mc 131
62,
161
TCP
UDP
serv
er/
var/
logs/
Dev
elop/
Bms
Acce
ss_*/
Bms
Acce
ss_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Bms
Acce
ss_*/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
Access Device
Manager. This
process provides
the equipment
management of
the access
domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
168
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
Bms
Acce
ss_*
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
169
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsA
tur
BmsAtur BmsAtur,serv
er/nemgr/
nemgr_access
/bin
mc 161 UDP serv
er/
var/
logs/
Dev
elop/
Bms
Atur
_*/
Bms
Atur
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Bms
Atur
_*/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
Access Device
ATUR Manager.
This process
provides the
xDSL terminal
management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
170
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Bms
Atur
_*_p
86_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
171
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsC
ommo
n
BmsCommon BmsCommon
,server/
nemgr/
nemgr_access
/bin
mc,Li
cense
Servi
ce
131
62,
161
TCP
UDP
serv
er/
var/
logs/
Dev
elop/
Bms
Com
mon/
Bms
Com
mon
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Bms
Com
mon/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
Access Device
Common
Service. This
process provides
license, task
scheduling,etc.
management of
the access
domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
172
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p2
42_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
173
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsH
GMP
Dm
BmsHGMPD
m
BmsHGMPD
m,server/
nemgr/
nemgr_access
/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Bms
HG
MP
Dm/
Bms
HG
MP
Dm_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p2
34_
%y
%m
%d_
%H
%M
%
S.*
HGMP Manager
Process. HGMP
manager service
provides the
function of
managing HGMP
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
174
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsP
onAla
rmTL
1
None BmsPonAlar
mTL1,/
nemgr/
nemgr_access
/bin
mc,Li
cense
Servi
ce
130
28
TCP serv
er/
var/
logs/
Dev
elop/
Bms
Pon
Alar
mTL
1
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p4
008_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
PON TL1 Alarm
Process. This
process provides
PON TL1 Alarm
NBI
Management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
175
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
176
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsP
onEm
sTL1
BmsPonEms
TL1
BmsPonEms
TL1,server/
nemgr/
nemgr_access
/bin
mc,Li
cense
Servi
ce
130
27
TCP serv
er/
var/
logs/
Dev
elop/
Bms
Pon
Ems
TL1
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p4
007_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
Access PON TL1
Process. Provides
service
provisioning and
fault diagnosis
for PON TL1
services.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
177
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
178
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsT
est
BmsTest BmsTest,serv
er/nemgr/
nemgr_access
/bin
mc 161 UDP serv
er/
var/
logs/
Dev
elop/
Bms
Test
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p7
9_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
Access Device
Line Test. This
process provides
line test of the
access domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
179
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsT
iming
Task
BmsTimingT
ask
BmsTimingT
ask,server/
nemgr/
nemgr_access
/bin
mc No
ne
None serv
er/
var/
logs/
Dev
elop/
Bms
Timi
ngTa
sk/
Bms
Timi
ngTa
sk_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Bms
Timi
ngTa
sk/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
TL1 Timing Task
Manager. This
process provides
TL1 timing task
management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
180
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
var/
logs/
mrbl
og/
iMA
PBas
e_p3
8_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
181
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BoxS
WMg
rDm
BoxSWMgrD
m
BoxSWMgrD
m,server/
nemgr/
nemgr_switch
mgr/
switchmgr_bo
x/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Box
SW
Mgr
Dm/
Box
SW
Mgr
Dm_
%y
%m
%d_
%H
%M
%
S.*
Case-shaped
Switch NE
Management.
Manages case-
shaped Quidway
switches.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
182
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BulkC
ollect
orDm
BulkCollector
Dm
BulkCollector
Dm,server/
common/
pmscollector/
bin
None 21 TCP serv
er/
var/
logs/
Dev
elop/
Bulk
Coll
ector
Dm_
1/
Bulk
Coll
ector
Dm_
%y
%m
%d_
%H
%M
%
S.log
Bulk Collector.
This process
provides the
function of
collecting
performance data
in batches.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
183
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
CFM
SiDm
CFMSiDm CFMSiDm,se
rver/common/
access_comm
on/pccw112/
bin
mc 800
1,
900
1
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
CF
MSi
Dm/
CF
MSi
Dm_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
CF
MSi
Dm/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
Customer Feature
Management
NBI. This process
provides
Customer Feature
Management
NBI service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
184
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p8
1_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
185
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
cltsi None cltsi,server/
common/
access_comm
on/pccw112/
bin
mc 900
0
TCP serv
er/
var/
logs/
Dev
elop/
cltsi/
cltsi
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
cltsi/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
Access 112 Test
(CLTSi). This
process provides
the CLTSi 112
test.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
186
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
dam dam dam,server/
common/
frame/dam/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
dam/
dam
_%y
%m
%d_
%H
%M
%
S.*
Device Access
Manager. Creates
SNMP NEs.
dataco
llector
svr
datacollectors
vr
datacollectors
vr,server/
tools/
datacollector/
bin
None No
ne
None serv
er/
tools
/
data
colle
ctor/
log/
Data
colle
ctorl
og/
*.*
serv
er/
tools
/
data
colle
ctor/
log/
Scri
ptLo
g/*.*
NE Data
Collector
Process. The
Datacollector is
mainly used for
collecting the
complete and
correct fault data
in case of NE
failure and helps
to locate faults
quickly
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
187
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
DCSe
rver
DCServer DCServer,ser
ver/common/
dc/bin
None 22,
69,
23,
140
0
TCP,
UDP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
DCS
erver
*.log
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
Boot
Log
*.log
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
Bms
_ne*
_%y
%m
%d_
%H
%M
%
S.*
DC. This process
provides the
function of NE
software
management and
disaster recovery
management.
The detailed
functions are NE
software
upgrade, patch
installation, data
backup and
recovery for
disaster recovery,
and plug-andplay
automatic
upgrade of case-
shaped
equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
188
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
Dms
_ne*
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
tkdll
_log/
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
back
up*/
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
189
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
DmsB
aseD
m
DmsBaseDm DmsBaseDm,
server/
common/ip/
base/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Dms
Base
Dm/
*.log
Basic IP Service.
Provides basic IP
services, such as
link search,
system log,
interface
inventory, and
change audit.
DmsN
etAcl
Dm
DmsNetAclD
m
DmsNetAclD
m,server/
common/ip/
base/acl/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Dms
Net
Acl
Dm/
Dms
Net
Acl
Dm_
%y
%m
%d_
%H
%M
%
S.*
NetACL.
Configures ACLs
for multiple NEs
in batches.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
190
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
DrlD
m
DrlDm DrlDm,server
/common/
syslog/bin/
None No
ne
None serv
er/
var/
logs/
iMA
P.log
_age
nt.tra
ce
serv
er/
var/
logs/
mrbl
og/
DrlD
m_p
499_
%y
%m
%d_
%H
%M
%
S.*
NE Run Log. NE
Run Log
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
191
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
ds_ag
ent
DesktopServi
ce
None None 310
37,
310
38,
310
39,
310
40,
310
41~
310
50,
308
00~
308
49
TCP,
TCP,
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
ds/
ds*/
desk
top_
ds*_
YY
YY
MM
DDh
hmm
ss*.l
og
serv
er/
var/
logs/
ds/
ds*/
desk
top_
start
up_d
s*.lo
g
Desktop Service
Process. Supports
data presentation
and operations on
various types of
client interfaces,
such as Java and
Web interfaces.
Multiple DSs can
be deployed to
reduce pressure
on the server to
connect to a large
number of clients.
eam_a
gent
EAMService imapsvcd,serv
er/platform/
bin
None 310
49,
310
99
TCP,
TCP
serv
er/
var/
logs/
iMA
P.ea
m_a
gent.
trace
EAM Process.
Maintains a
global NE list for
NE management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
192
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
eam_a
gent
TopoService imapsvcd,serv
er/platform/
bin
EAM
Servi
ce
No
ne
None serv
er/
var/
logs/
iMA
P.ea
m_a
gent.
trace
serv
er/
var/
logs/
mrbl
og/
eam
_age
nt_p
51_
YY
YM
MD
D_h
hmm
ss.lo
g
Topology
Process. Provides
the functions of
creating and
deleting subnets,
nodes, topology
nodes, links, and
topology links,
and moving
nodes among
subnets.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
193
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
EmfG
nlDev
Dm
EmfGnlDevD
m
EmfGnlDevD
m,server/
common/
topo/lbin
None No
ne
None var/
logs/
iMA
P.E
mfG
nlDe
vDm
.trac
e
var/
logs/
mrbl
og/
iMA
PGnl
Dev
_p48
_YY
YM
MD
D_h
hmm
ss.lo
g
General Device
Process. Provides
the function of
managing third-
party NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
194
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_
DCC
View
Eml_DCCVie
w
Eml_DCCVie
w,server/
tools/
dccview/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Eml
_DC
CVi
ew/
Eml
_DC
CVi
ew_
%y
%m
%d_
%H
%M
%
S.*
DCC View Tool.
Transmit Ne
communication
DCC view
Management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
195
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_f
aultdi
ag
Eml_faultdiag java,$
{IMAP_JAV
A_HOME}/
bin/java
None No
ne
None serv
er/
var/
logs/
Dev
elop/
uflig
ht_n
emgr
_dia
gnos
is/
com
muni
cate-
%y.
%m.
%d-
%H.
%M.
%
S.*
serv
er/
var/
logs/
Dev
elop/
uflig
ht_n
emgr
_dia
gnos
is/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*
Diagnosis of
transport packet
services.
Provides fault
diagnosis for
transport packet
services,
covering the
PWE3 E-Line
services of the
OptiX RTN 905,
OptiX RTN 910,
OptiX RTN 950,
OptiX RTN 980,
OptiX OSN 500,
OptiX OSN 550,
OptiX OSN 3500,
OptiX OSN 7500,
OptiX OSN
7500II, and
OptiX OSN 8800,
and the Native
Ethernet E-Line
services of the
OptiX RTN 310,
OptiX RTN 905,
OptiX RTN 910,
OptiX RTN 950,
OptiX RTN 980,
OptiX OSN 500,
and OptiX OSN
550.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
196
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_f
aultdi
agtsk
Eml_faultdiag
tsk
java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None No
ne
None serv
er/
var/
logs/
Dev
elop/
trans
_faul
tdiag
/
com
muni
cate-
%y.
%m.
%d-
%H.
%M.
%
S.*
serv
er/
var/
logs/
Dev
elop/
trans
_faul
tdiag
/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*
---. Provides the
function to
diagnose
transport packet
services. Only
PWE3 E-Line
service of the
Optix RTN910,
RTN950 and
RTN980
equipment is
supported.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
197
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_
mml
Eml_mml Eml_mml,ser
ver/nbi/mml/
bin
None 150
00,
150
01
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
Eml
_mm
l/
Eml
_mm
l_%
y%
m%
d_%
H%
M%
S.*
MML Service.
This process
provides the
MML NBI
service.
Eml_
PerfS
vr
Eml_PerfSvr Eml_PerfSvr,
server/
common/
trans_core/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Eml
_Per
fSvr/
Eml
_Per
fSvr
_%y
%m
%d_
%H
%M
%
S.*
Transmit
Performance
Service. This
process provides
the transfer-
domain
performance
management
function.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
198
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_
PubSv
r
Eml_PubSvr Eml_PubSvr,s
erver/
common/
trans_core/bin
None 101
62
UDP serv
er/
var/
logs/
Dev
elop/
Eml
_Pub
Svr/
Eml
_Pub
Svr_
%y
%m
%d_
%H
%M
%
S.*
Transmit
Common
Service. This
process provides
the function of
inter-NE
management on
transferdomain
NEs and reports.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
199
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Enpo
werD
m
EnpowerDm EnpowerDm,s
erver/
common/env/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Enp
ower
Dm/
back
up*/
serv
er/
var/
logs/
Dev
elop/
Enp
ower
Dm/
Enp
ower
Dm_
%y
%m
%d_
%H
%M
%
S.*
Access
environment and
power monitor.
This process
provides the
function of
centralized
monitoring on the
access NE
environment
status and the
power supply
status.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
200
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Frame
SWM
grDm
FrameSWMg
rDm
FrameSWMg
rDm,server/
nemgr/
nemgr_switch
mgr/
switchmgr_fr
ame/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Fra
meS
WM
grD
m/
Fra
meS
WM
grD
m_
%y
%m
%d_
%H
%M
%
S.*
Chassis-Shaped
Switch NE
Management.
Manages chassis-
shaped Quidway
switches.
ftpd None ftpd,/usr/sbin None No
ne
None /var/
logs/
vsftp
d.log
/var/
log/
vsftp
dlog
bak/
*.*
FTP Service. This
process provides
the FTP service.
Gcli Gcli java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None 130
61,
130
62
TCP,
TCP
Non
e
IP Graphical CLI.
Provides GUI
command line
functions for
switches and
routers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
201
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Healt
h_che
ck
Health_check java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None No
ne
None serv
er/
var/
logs/
Dev
elop/
uflig
ht_h
ealth
_che
ck/
com
muni
cate-
%y.
%m.
%d-
%H.
%M.
%
S.*
serv
er/
var/
logs/
Dev
elop/
uflig
ht_h
ealth
_che
ck/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*
PTN Health
Check. PTN
Health Check,
support Optix
PTN 905, Optix
PTN 910, Optix
PTN 910-F,
Optix PTN 950,
Optix PTN 960,
Optix PTN 1900,
Optix PTN
3900-8, Optix
PTN 3900.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
202
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
hedex
_agen
t
None None None No
ne
None var/
logs/
hede
x/
hede
x*.lo
g
Help Process.
Provides help
document.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
203
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
httpd apache httpd,server/
3rdTools/
apache/bin
None 130
80,
808
0
TCP,
TCP
serv
er/
var/
logs/
apac
he/
apac
he.lo
g
serv
er/
var/
logs/
apac
he/
moni
torap
ache.
log
serv
er/
var/
logs/
apac
he/
apac
hectl
.log
serv
er/
3rdT
ools/
apac
he/
logs/
*.log
Apache Http
Service.
Distribute Http
Request.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
204
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
ifms_
agent
FaultService imapsvcd,serv
er/platform/
bin
None 310
11,
310
61
TCP,
TCP
var/
logs/
iMA
P.if
ms_
agen
t.trac
e
var/
logs/
iMA
P.if
ms_
agen
t_pr
oduc
t.trac
e
var/
logs/
iMA
P.if
ms_
agen
t_db
err.tr
ace
var/
logs/
mrbl
og/
ifms
_age
nt_p
56_
YY
YY
MM
DD_
hhm
mss.l
og
Fault Process.
Collects and
saves fault
information from
managed devices
using NE
engines, and
queries and
analyzes the fault
information.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
205
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
imap_
sysmo
nitor
None imap_sysmon
itor,server/
platform/bin
None No
ne
None serv
er/
var/
logs/
iMA
P.im
apsy
smo
nitor
_per
f.trac
e
serv
er/
var/
logs/
iMA
P.im
ap_s
ysm
onito
r.trac
e
serv
er/
var/
logs/
iMA
P.im
apsy
smo
nitor
_per
f.trac
e
serv
er/
var/
logs/
mrbl
og/
imap
System Monitor.
Provides service
to monitor the
process of the
system. This
process monitors
resources, which
include CPUs,
memory, hard
disks, services,
processes,
databases, and
generates alarms
when faults
occur.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
206
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
_sys
moni
tor_
p66_
%y
%m
%d_
%H
%M
%
S.log
imape
ventm
gr
None imapeventmg
r,server/
platform/bin
None No
ne
None serv
er/
var/
logs/
iMA
P.im
apev
entm
gr.tr
ace
serv
er/
var/
logs/
iMA
P.im
apev
ents.
trace
Daemon Process
(Event Manager
Process). This
process forwards
events.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
207
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
imap
mrb
None imapmrb,serv
er/platform/
bin
None 310
30,
310
80
TCP,
TCP
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.log
Daemon Process
(mrb Process).
This process
forwards
messages. This
process is a
daemon process.
imaps
ysd
None imapsysd,serv
er/platform/
bin
None 310
50,
310
00
TCP,
TCP
var/
logs/
iMA
P.im
apsy
sd.tr
ace
var/
logs/
mrbl
og/
iMa
pSys
d_p6
5_Y
YY
MM
DD_
hhm
mss.l
og
Daemon Process.
This process is a
daemon process.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
208
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
imap
watch
dog
None imapwatchdo
g,server/
platform/bin
None No
ne
None Non
e
Daemon Process
(watchdog
Process). This
process monitors
daemons.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
209
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
inTL1
NBiD
m
inTL1NBiDm inTL1NBiDm
,server/
nemgr/
nemgr_access
/bin
mc 982
0
TCP serv
er/
var/
logs/
Dev
elop/
inTL
1NB
iDm/
inTL
1NB
iDm
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
inTL
1NB
iDm/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
TL1 Proxy Inner
Interface. This
process provides
the XML NBI
Proxy,Service
Provisioning
Profile
management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
210
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p2
37_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
211
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Invent
oryD
M
InventoryDM InventoryDM,
server/
common/
inventory/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Inve
ntor
yD
M/
Inve
ntor
yD
M_
%y
%m
%d_
%H
%M
%
S.*
Inventory
Manager.
Provides the
management of
inventory data,
such as physical
resources, fibers/
cables, and
customers.
ipcom
mon
ipcommon ipcommon,ser
ver/common/
ip/common/
bin
Secur
itySe
rvice
No
ne
None serv
er/
var/
logs/
Dev
elop/
ipco
mmo
n/
ipco
mmo
n_%
y%
m%
d_%
H%
M%
S.*
Common IP
Application
Management.
Provides
common IP
services, such as
the diagnosis
function.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
212
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
ipfpm
_cfg
ipfpm_cfg ipfpm_cfg,ser
ver/common/
pms/bin
None 130
81
TCP Non
e
IP Flow
Peformance
Management
Configuration.
Provide
configuration for
IPFPM (IP Flow
Peformance
Management).
itm_a
gent
ItmService imapsvcd,serv
er/platform/
bin
None 310
15,
310
65
TCP,
TCP
serv
er/
var/
logs/
iMA
P.it
m_a
gent.
trace
serv
er/
var/
logs/
mrbl
og/
itm_
agen
t_p9
992_
%y
%m
%d_
%H
%M
%
S.*
Integrated Task
Management.
Provides the
functions of
integrated task
management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
213
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
javaw tomcat startup,server/
3rdTools/
tomcat/bin
None 800
9,
800
5,
130
29
TCP,
TCP,
TCP
3rdT
ools/
tomc
at/
logs/
*.log
var/
logs/
tomc
at/
*.txt
Tomcat Service.
This process
provides the web
application
deployment
function.
lic_ag
ent
LicenseServic
e
imapsvcd,serv
er/platform/
bin
None 310
01,
310
51
TCP,
TCP
serv
er/
var/
logs/
iMA
P.lic
_age
nt.tra
ce
License Process.
A service
interface is
provided to check
the validity of the
license file of the
current version
log_a
gent
DolService imapsvcd,serv
er/platform/
bin
LogS
ervic
e
310
05,
310
55,
310
06
TCP,
TCP,
TCP
serv
er/
var/
logs/
iMA
P.log
_age
nt.tra
ce
Log Process.
Records
operation logs of
devices.
log_a
gent
LogService imapsvcd,serv
er/platform/
bin
None No
ne
None serv
er/
var/
logs/
iMA
P.log
_age
nt.tra
ce
Log Process.
Records and
manages
operation logs,
system logs, and
security logs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
214
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
log_a
gent
ForwardingSe
rvice
imapsvcd,serv
er/platform/
bin
LogS
ervic
e
No
ne
None serv
ervar
/
logs/
iMA
P.log
_age
nt.tra
ce
serv
er/
var/
logs/
mrbl
og/
log_
agen
t_p4
6_Y
YY
YM
MD
D_h
hmm
ss.lo
g
Syslogagent
Process.
Forwards OSS
logs to third-party
Syslog servers
over the BSD
Syslog protocol.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
215
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
mana
ger_a
gent
SystemServic
e
imapsvcd,serv
er/platform/
bin
None 310
13,
310
63
TCP,
TCP
serv
er/
var/
logs/
iMA
P.ma
nage
r_ag
ent.tr
ace
serv
er/
var/
logs/
mrbl
og/
man
ager
_age
nt_p
9990
_%y
%m
%d_
%H
%M
%
S.log
System
Management
Process. Provides
OSS
management
functions, for
example, version
checks for CAU
and management
of preferences
and broadcast
messages.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
216
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
mc mc mc,server/
common/
frame/mc/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
mc/
mc_
%y
%m
%d_
%H
%M
%
S.*
Distribution
Manager.
Provides basic
NE distribution
services.
msser
ver
msserver msserver,/opt/
OSSENGR
None 122
15,
122
13,
122
14,
122
12,
122
12,
122
13,
122
14,
122
15
TCP,
TCP,
TCP,
TCP,
TCP,
TCP,
TCP,
TCP
Non
e
Engineering
Process. This
process provides
the function of
component
installation,
package
deployment,
system upgrade,
patch installation,
data backup and
recovery for
iManager
System.
Nami
ng_Se
rvice
Naming_Serv
ice
Naming_Serv
ice,server/
cbb/nbi/
nbicbb_3p/
share/bin
None 120
01,
220
01
TCP,
TCP
serv
er/
var/
logs/
tao.tr
ace
CORBA Naming
Service(TAO).
Provides Naming
Service for
CORBA
interface(TAO)
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
217
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nelicS
erver
nelicServer neLicServer,s
erver/
common/
nelic/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
neLi
cSer
ver/
back
up*/
serv
er/
var/
logs/
Dev
elop/
neLi
cSer
ver/
neLi
cSer
ver_
%y
%m
%d_
%H
%M
%
S.*
NE License
Management.
Provide the
function of NE
license
Management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
218
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_bits
nemgr_bits nemgr_bits,se
rver/nemgr/
nemgr_bits/
bin
None 161 UDP serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p2
36_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_b
its/
BITS NE
Manager. This
process provides
the equipment
management of
BITS.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
219
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nem
gr_b
its_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_b
its/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
220
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_ext
nemgr_ext nemgr_ext,ser
ver/nemgr/
nemgr_ext/
bin
mc,li
c_age
nt
No
ne
None serv
er/
var/
logs/
Dev
elop/
nem
gr_e
xt_*/
nem
gr_e
xt_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_e
xt_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
EXT NE
Manager. This
process provides
the function of
managing the
OSN900A and
OTU40000.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
221
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_mari
ne
nemgr_marin
e
nemgr_marin
e,server/
nemgr/
nemgr_marin
e/bin
mc,li
c_age
nt
110
00~
111
00,
140
0,
543
2,
131
01~
131
50
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_
mari
ne_*
/
nem
gr_
mari
ne_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_
mari
ne_*
/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
MARINE NE
Manager. This
process provides
the function of
managing
submarine cable
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
222
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_naot
n
nemgr_naotn nemgr_naotn,
server/nemgr/
nemgr_naotn/
bin
mc,li
c_age
nt
110
00~
111
00,
131
01~
131
50
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_n
aotn
_*/
nem
gr_n
aotn
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_n
aotn
_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
OTN(TL1). This
process provides
the function of
managing North
America OTN
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
223
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_naw
dm
nemgr_nawd
m
nemgr_nawd
m,server/
nemgr/
nemgr_nawd
m/bin
mc,li
c_age
nt
110
00~
111
00,
131
01~
131
50
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_n
awd
m_*/
nem
gr_n
awd
m_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_n
awd
m_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
WDM(TL1).
This process
provides the
function of
managing North
America WDM
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
224
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_otn
nemgr_otn nemgr_otn,ser
ver/nemgr/
nemgr_otn/
bin
mc,li
c_age
nt
110
00~
111
00,
140
0,
543
2,
131
01~
131
50
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_o
tn_*/
nem
gr_o
tn_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_o
tn_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
OTN NE
Manager. This
process provides
the function of
managing OTN
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
225
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_ptn
nemgr_ptn nemgr_ptn,ser
ver/nemgr/
nemgr_ptn/
bin
mc,li
c_age
nt
110
00~
111
00,
543
2,
131
01~
131
50
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_p
tn_*/
nem
gr_p
tn_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_p
tn_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
PTN NE
Manager. This
process provides
the function of
managing Metro
Ethernet PTN
frame-shaped and
caseshaped NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
226
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_rtn
nemgr_rtn nemgr_rtn,ser
ver/nemgr/
nemgr_rtn/bin
mc,li
c_age
nt
110
00~
111
00,
140
0,
543
2,
131
01~
131
50
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_rt
n_*/
nem
gr_rt
n_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_rt
n_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
RTN NE
Manager. This
process provides
the function of
managing RTN
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
227
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_sdh
nemgr_sdh nemgr_sdh,se
rver/nemgr/
nemgr_sdh/
bin
mc,li
c_age
nt
110
00~
111
00,
140
0,
543
2,
131
01~
131
50
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_s
dh_*
/
nem
gr_s
dh_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_s
dh_*
/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
SDH NE
Manager. This
process provides
the function of
managing SDH/
MSTP/OSN
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
228
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nemg
r_vmf
Nemgr_vmf Nemgr_vmf,s
erver/nemgr/
nemgr_vmf/
bin
None 131
54,
131
52,
131
53,
22
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
uflig
ht_n
emgr
_vm
f_ser
ver/.
*
Router
Management
(VRP V8).
Manages VRP
V8 routers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
229
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_wdm
nemgr_wdm nemgr_wdm,s
erver/nemgr/
nemgr_wdm/
bin
mc,li
c_age
nt
140
0,
543
2
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_w
dm_
*/
nem
gr_w
dm_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_w
dm_
*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
WDM NE
Manager. This
process provides
the function of
managing
LHWDM/Metro
WDM series
equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
230
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nepro
xy
neproxy neproxy,serve
r/tools/
datacollector/
bin
None No
ne
None serv
er/
tools
/
data
colle
ctor/
log/
nepr
oxyl
og/
*.*
Data Collector
NE Proxy
Process. Data
Collector NE
Proxy Process
Nml_
ason_
otn
Nml_ason_ot
n
Nml_ason_ot
n,server/nml/
ason_otn/bin
Eml_
PubS
vr,lic
_age
nt
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_aso
n_ot
n/
Nml
_aso
n_ot
n_%
y%
m%
d_%
H%
M%
S.*
OTN ASON
Network
Manager. This
process provides
the OTN ASON
network
management
function.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
231
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
ason_
sdh
Nml_ason_sd
h
Nml_ason_sd
h,server/nml/
ason_sdh/bin
Eml_
PubS
vr,lic
_age
nt
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_aso
n_sd
h/
Nml
_aso
n_sd
h_%
y%
m%
d_%
H%
M%
S.*
SDH ASON
Network
Manager. This
process provides
the SDH ASON
network
management
function.
Nml_
comm
on
Nml_commo
n
Nml_commo
n,server/nml/
nmlcommon/
bin
Secur
itySe
rvice
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_co
mmo
n/
Nml
_co
mmo
n_%
Y%
m%
d_%
H%
M%
S.log
Network
Common
Service. This
process provides
the E2E common
management
service. The other
E2E processes all
depend on this
process.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
232
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
cps
Nml_cps Nml_cps,serv
er/nml/
nmlcps/bin
lic_a
gent,s
m_ag
ent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_cps
/
Nml
_cps
_%Y
%m
%d_
%H
%M
%
S.log
Composite
Service Manager.
Supports
management of
composite
services and
Router/Switch/
PTN/MSTP/
MSTP NEs.
Nml_
eow
Nml_eow Nml_eow,ser
ver/nml/
nmleth/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_eo
w/
Nml
_eo
w_%
Y%
m%
d_%
H%
M%
S.*
EoW and EoO.
Provides the end-
to-end Ethernet
service
management
function for the
EoW/EoO
equipment,
which helps to
quickly configure
or maintain EPL,
EVPL, EPLAN,
RPR EVPL, RPR
EVPLAN, and
ATM services.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
233
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
eth
Nml_eth Nml_eth,serv
er/nml/
nmleth/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_eth/
Nml
_eth
_%Y
%m
%d_
%H
%M
%
S.*
MSTP ETH and
ATM. Supports
end-to-end
configuration of
EPL, EVPL,
EPLAN, RPR
EVPL, RPR
EVPLAN, and
ATM services.
Nml_i
p
Nml_ip Nml_ip,server
/nml/nmlip/
bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_ip/
Nml
_ip_
%Y
%m
%d_
%H
%M
%
S.log
IP Service
Manager.
Supports
management of
IP services and
Router/Switch/
PTN/MSTP+/
RTN NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
234
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
native
eth
Nml_nativeet
h
Nml_nativeet
h,server/nml/
nmlvlan/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_vla
n/
Nml
_vla
n_%
Y%
m%
d_%
H%
M%
S.*
Nativeeth Service
Manager.
Provides the end-
to-end nativeeth
management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
235
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
otn
Nml_otn Nml_otn,serv
er/nml/
nmlotn/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_otn/
Nml
_otn
_%Y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Nml
_otn/
Nml
_otn
_wd
mtra
ilsea
rchlo
g*.*
OTN Network
Manager.
Supports end-to-
end configuration
of WDM services
of OCh, ODUk
and Client levels.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
236
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
sdh
Nml_sdh Nml_sdh,serv
er/nml/
nmlsdh/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_sdh
/
Nml
_sdh
_%Y
%m
%d_
%H
%M
%
S.*
SDH Network
Manager.
Supports end-to-
end configuration
of microwave
services and SDH
services of VC12,
VC3, VC4, and
VC4-Xc levels.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
237
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nmsl
ogzip
Dm
NmslogzipD
m
NmslogzipD
m,server/
common/
nmslogzip/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Nms
logzi
pDm
/
Nms
logzi
pDm
_dis
kPro
t.log
serv
er/
var/
logs/
Dev
elop/
Nms
logzi
pDm
/
Nms
logzi
pDm
_tran
sfer.l
og
serv
er/
var/
logs/
Dev
elop/
Nms
logzi
pDm
/
Zip Server.
Provides the
function of
compressing
files.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
238
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nms
logzi
pDm
_unn
orma
l.log
serv
er/
var/
logs/
Dev
elop/
Nms
logzi
pDm
_1/
Nms
logzi
pDm
_%y
%m
%d_
%H
%M
%
S.*lo
g
Notify
_Servi
ce
Notify_Servic
e
Notify_Servic
e,server/cbb/
nbi/
nbicbb_3p/
share/bin
None 120
02,
220
02
TCP,
TCP
serv
er/
var/
logs/
tao.tr
ace
CORBA
Notification
Service(TAO).
Provides Notify
Service for
CORBA
interface(TAO)
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
239
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
oams oams oams,server/
tools/
oamsserver/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
oam
s/
oam
s_%
y%
m%
d_%
H%
M%
S.*
Optical fiber line
Automatic
Monitoring
System. Monitor
fiber connect
state
PathV
iewer
Dm
PathViewerD
m
PathViewerD
m,server/
common/ip/
path/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Path
Vie
wer
Dm/
Path
Vie
wer
Dm_
%y
%m
%d_
%H
%M
%
S.*
Visualized IP
Trail. Provides
visualized IP
service trails.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
240
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
PMDa
taRefi
ner
PMDataRefin
er
PMDataRefin
er,server/
common/pms/
bin
None No
ne
None /var/
logs/
Dev
elop/
PM
Data
Refi
ner/
PM
Data
Refi
ner_
%Y
%m
%d_
%H
%M
%
S.log
Performance
Data Refiner.
This process
provides the
function to
generate big
time-granularity
performance data
through
aggregating small
time-granularity
performance
data.
PMS
Dm
PMSDm PMSDm,serv
er/common/
pms/bin
None 302
00
TCP serv
er/
var/
logs/
Dev
elop/
PMS
Dm/
PMS
Dm_
*.log
Performance
Service. This
process provides
the collector
management
function.
PMS
Web
PMSWeb com.huawei.p
msweb.frame
work_1.0.0,se
rver/common/
pms/pmsweb/
plugins/
com.huawei.p
msweb.frame
work_1.0.0
mc 130
42
TCP Non
e
Performance
Web Service.
Provide web
access to browse
performance data
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
241
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
porttr
unk_a
gent
PortTrunking
Service
imapPortTrun
kSvc,server/
platform/bin
None 310
35
TCP serv
er/
var/
logs/
iMA
P.Po
rtTru
nkSe
rvice
.trac
e
serv
er/
var/
logs/
mrbl
og/
imap
Port
Trun
kSvc
_p98
98_
%y
%m
%d_
%H
%M
%
S.log
Port Trunk
Service . The port
trunking service
is used to have the
ports of
independent
services converge
at one port.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
242
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
profil
e
profile profile,server/
common/
frame/profile/
bin
mc No
ne
None serv
er/
var/
logs/
Dev
elop/
profi
le/*_
%y
%m
%d_
%H
%M
%
S.*
Global Profile
Manager.
Manages
profiles..
Quick
Displa
y
QuickDisplay java,server/$
{IMAP_JAV
A_HOME}/
bin
None 134
43
TCP Non
e
QuickDisplay.
Provides
QuickDisplay
web service.
Resou
rceMo
nitor
None ResourceMon
itor,server/
platform/bin
None 230
01
UDP var/
logs/
iMA
P.res
ourc
emo
nitor
.trac
e
Daemon Process
(Resource
Monitor). This
process is a
resource
monitoring agent
used to monitor
resources. This
process must be
deployed on
nodes whose
resources are to
be monitored.
This process is a
daemon process.
It is not
monitored by the
System Monitor.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
243
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Route
rMgr
Dm
RouterMgrD
m
RouterMgrD
m,server/
nemgr/
nemgr_router/
routermgr/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Rout
erM
grD
m/
Rout
erM
grD
m_
%y
%m
%d_
%H
%M
%
S.*
Router NE
Management.
Manages
Quidway routers.
secde
vregd
m
secdevregdm secdevregdm,
server/vsm/
seccomm/
secdevreg/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
secd
evre
gdm/
secd
evre
gdm
_%y
%m
%d_
%H
%M
%
S.*
Security Device
Register
Manager.
Security Device
Register Manager
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
244
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
secpol
icymg
r
secpolicymgr secpolicymgr,
server/vsm/
secpolicymgr/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
secp
olicy
mgr/
secp
olicy
mgr
_%y
%m
%d_
%H
%M
%
S.*
Policy Manager.
This process
provides the
functions such as
centralized policy
configuration and
attack defense
configuration.
Securi
tyMgr
Dm
SecurityMgr
Dm
SecurityMgr
Dm,server/
nemgr/
nemgr_securit
ymgr/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Secu
rity
Mgr
Dm_
180/
Secu
rity
Mgr
Dm_
%y
%m
%d_
%H
%M
%
S.*
Security NE
Manager. This
process provides
the function of
managing FW/
USG, SIG, and
SVN series
security
equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
245
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
secvp
nmgr
secvpnmgr secvpnmgr,se
rver/vsm/
secvpnmgr/
bin
None 161 UDP serv
er/
var/
logs/
Dev
elop/
secv
pnm
gr/
secv
pnm
gr_
%y
%m
%d_
%H
%M
%
S.*
VPN Manager.
This process
provides the
IPSec/L2TP VPN
management
function.
sm_ag
ent
SecurityServi
ce
imapsvcd,serv
er/platform/
bin
Licen
seSer
vice,
EAM
Servi
ce
310
08,
310
58
TCP,
TCP
serv
er/
var/
logs/
iMA
P.sm
_age
nt.tra
ce
Security Process.
Manages OSS
users, OSS user
rights, and NE
user rights.
smlda
p_age
nt
SMLDAPSer
vice
sm_ldapServe
r,server/
platform/bin
Secur
itySe
rvice
No
ne
None serv
er/
var/
logs/
iMA
P.sm
_lda
pSer
ver.t
race
SMLDAPService
. Provides the
LDAP
northbound
interfaces for
managing OSS
accounts.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
246
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
snmpa
gent
SnmpAgent ST_SNMPAg
ent,server/
platform/
sacscript/
standalone
Secur
itySe
rvice
666
6,
981
2,
310
62,
310
12
UDP,
UDP,
TCP,
TCP
serv
er/
var/
logs/
nbi/
snm
p/
Snm
pAg
ent*.
log
serv
er/
var/
logs/
nbi/
snm
p/
Snm
pAg
ent*.
zip
SNMP
Northbound
Interface.
Provides the
northbound
interface which
adopts the SNMP
protocol.
SNM
PColl
ector
Dm
SNMPCollect
orDm
SNMPCollect
orDm,server/
common/
pmscollector/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
SN
MP
Coll
ector
Dm/
SN
MP
Coll
ector
Dm_
*.log
SNMP Collector.
This process
provides the
function of
collecting
performance data
through SNMP.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
247
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
SNM
PServ
er
SNMPServer SNMPServer,
server/
common/ip/
base/bin
None No
ne
None Non
e
SNMP Service
(H3C). Forwards
SNMP services
for H3C switches.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
248
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
StdClt
siDm
StdCltsiDm StdCltsiDm,s
erver/
common/
access_comm
on/std112/bin
Bms
Test
900
2,
900
3
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
StdC
ltsiD
m/
StdC
ltsiD
m_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
StdC
ltsiD
m/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
Access 112 Test .
This process
provides the 112
test.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
249
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p8
8_%
y%
m%
d_%
H%
M%
S.*
Syslo
gColl
ector
DM
SyslogCollec-
torDM
SyslogCollect
orDM,server/
common/
syslog/bin
None 514 UDP serv
er/
var/
logs/
mrbl
og/
Sysl
ogC
ollec
torD
m_p
3021
_%y
%m
%d_
%H
%M
%
S.log
System Log
Collector. This
process provides
the function of
collecting NE
operation and
running log data,
and managing
files.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
250
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
textag
ent
textagent textagent,serv
er/nbi/text/bin
None 21,
120
04,
302
02
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nbi/
texta
gent/
text_
debu
g-%
y.%
m.%
d-%
H.%
M.%
S.*
serv
er/
var/
logs/
Dev
elop/
nbi/
texta
gent/
com
muni
cate
_text
-%y.
%m.
%d-
%H.
%M.
%
S.*
serv
er/
var/
logs/
Text Service.
This process
provides the Text
NBI management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
251
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Dev
elop/
nbi/
texta
gent/
dom
ain_
debu
g_te
xt-%
y.%
m.%
d-%
H.%
M.%
S.*
serv
er/
var/
logs/
Dev
elop/
nbi/
texta
gent/
uflig
ht_te
xt-%
y.%
m.%
d-%
H.%
M.%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
252
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
TL1N
BiDm
TL1NBiDm TL1NBiDm,s
erver/nemgr/
nemgr_access
/bin
Licen
seSer
vice,
mc
981
9
TCP serv
er/
var/
logs/
Dev
elop/
TL1
NBi
Dm/
TL1
NBi
Dm_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
TL1
NBi
Dm/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
TL1NBiDm
Process. This
process provides
TL1 NBI
Management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
253
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p4
7_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
toolkit ToolkitServic
e
toolkit,server/
common/
toolkit/server
None 899
9,
130
06,
23,
140
0
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
tkser
ver_l
og/
debu
g*.lo
g
Toolkit. This
process provides
the service of
upgrading
boardlevel
transmission
equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
254
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
trapdi
spatch
er
trapdispatcher trapdispatcher
,server/
common/
trapdispatcher
/bin
None 163
~16
5,
321
62,
162
,
134
43
UDP,
UDP,
UDP,
TCP
serv
er/
var/
logs/
iMA
P.Tr
apDi
spatc
her.t
race
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p4
5445
_%y
%m
%d_
%H
%M
%
S.log
Trap Dispatcher.
Receives and
dispatches traps.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
255
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
trapr_
agent
TrapReceiver EmfTrapRece
iver,server/
common/
trapreceiver/
bin
Fault
Servi
ce
163
~16
5,
321
62,
162
,
111
01~
111
04
UDP,
UDP,
UDP,
TCP
var/
logs/
iMA
P.E
mfTr
apRe
ceiv
er*.t
race
var/
logs/
mrbl
og/
iMA
PTra
pRec
eiver
_p10
000_
r*_Y
YY
YM
MD
D_h
hmm
ss.lo
g
Trap Receiver
Process.
Receives traps
that are sent to the
server over
SNMP.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
256
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
TrapT
ransPr
oxy
TrapTransPro
xy
TrapTransPro
xy,server/
nemgr/
nemgr_access
/bin
None 131
62
TCP serv
er/
var/
logs/
Dev
elop/
Trap
Tran
sferP
roxy
/
Trap
Tran
sPro
xy_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Trap
Tran
sferP
roxy
/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
Access Trap
Transfer Proxy
Service. This
process provides
trap transfer
proxy
management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
257
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
TXT
NBID
m
TXTNBIDm TXTNBIDm,
server/
common/pms/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
TXT
NBI
Dm/
TXT
NBI
Dm_
*.log
Text Export. This
process provides
the NBI function.
It is used to
transmit
performance data
in the text format
through FTP.
ufligh
t_disp
atcher
uflight_dis-
patcher
java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None 131
54,
301
01,
130
31,
130
61
TCP,
TCP,
TCP,
TCP
serv
er/
com
mon/
uflig
htdis
patc
her/
log/
*-%
y.%
m.%
d-%
H.%
M.%
S.*
Java Application
Server
Dispatcher.
Dispatches
UFlight web
requests.
UTraf
ficAd
apter
UTrafficAdap
ter
java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None 131
70
TCP Non
e
Unisight adapter.
Support data
adapter interface
Between the
U2000 and
Unisight
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
258
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Unite
UitlD
M
UniteUitlDM UniteUitlDM,
server/
common/
unitedmgr/bin
None 130
05
UDP serv
er/
var/
logs/
Dev
elop/
Unit
eUitl
DM/
Unit
eUitl
DM
_%y
%m
%d_
%H
%M
%
S.*
United Manager.
Provides basic
functions for the
inter-domain
NMS, such as
importing and
exporting scripts,
managing NE
time,
synchronizing
NEs, and
managing NE
objects.
VmfD
iag
VmfDiag VmfDiag,serv
er/nemgr/
nemgr_vmf/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Vmf
Diag
/
Vmf
Diag
_%y
%m
%d_
%H
%M
%
S.*
Router (V8) NE
Test and
Diagnosis.
Provides
diagnosis
functions for
VRP V8 routers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
259
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
xmlag
ent
XMLAgent ST_XMLAge
nt,server/
platform/
sacscript/
standalone
Secur
itySe
rvice
999
7,
310
29,
310
79
TCP,
TCP,
TCP
serv
er/
var/
logs/
nbi/
xml/
fram
e*.lo
g
serv
er/
var/
logs/
nbi/
xml/
fram
e*.zi
p
XML
Northbound
Interface.
Provides the
northbound
interface which
adopts the SOAP
protocol.

1.22 GUI Input and Display Conventions
The topic describes the input conventions for the text boxes and display conventions for GUI
elements on the U2000. These rules specify the typing requirements for the text boxes in the
U2000 operation interface. These text boxes are used to enter character strings, file names, IP
addresses, MAC addresses, numerals, passwords, dates, time, and so on.
Types of Character Strings
The character string is a kind of descriptive text and usually there is no limitation for the
characters typed in. But, when you enter the names in the U2000 (including the names of the
PDH path, MSTP path, NE, subnet, virtual NE board, telecommunications room, subrack, card,
Transmission NM, optical fiber, NE user, protection subnet, circuit, logical system, J0, J1, PM
(C)U relay, DIP switch, EMU input and output paths and Ethernet user) and all remarks, or when
some functions involve typing in characters that are subject to naming rules, you are
recommended to use the standard characters listed as follows:
l Languages used in nine countries, namely, China, America, Italy, Spain, France, UAE,
Germany, Russia, and Portugal.
l Input of various types of characters.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
260
NOTE
l The name of a rule, trail, fiber, subnet, or customer can contain "+" and ":",
l The name of an NE or a subnet can contain "+".
l The Tab key input cannot be contained in the above names or the values of overheads J0, J1, and J2.
l These rules are made in order to avoid database operation errors or errors occurred when an HTML
report is generated. The Tab key input cannot be contained in command lines.
NOTICE
When you enter characters in Microsoft Pinyin IME and keep pressing a key, too many characters
will be typed in. This leads to the exit of the U2000 client.
Directory
l When files are transferred between different OSs, both Chinese and English directories are
supported.
l When performance data is dumped at the server end, both Chinese and English directories
are supported. In other cases, only English directories are supported.
File Name
The general rule is file name + extension name. The extension name consists of letters, numerals
or underscores, and should not exceed three characters.
The naming rule is that a file name consists of letters, numerals or underscores. It cannot exceed
eight characters. A file name cannot contain spaces or any of the following characters: \ " . * ;
> [ ] ( ) ! $ { } < >. If you need to separate two characters, you may use "_".
Nine languages are supported, with each language corresponding to a naming rule.
Folder Name Language
zh_CN China
en_US America
it_IT Italy
es_ES Spain
fr_FR France
ar_SA Saudi Arabia
de_DE Germany
ru_RU Russia
pt_PT Portugal

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
261
IP Address
The IP address is decimal, for example, 129.9.0.254:9801 (9801 is the port ID, and can be
omitted).
MAC Address
The MAC address is hexadecimal, for example, 00-06-5B-84-50-84.
Types of Numerals
Integer type: In this mode, only integral numbers can be typed in.
Decimal fraction type: In this mode, besides numerals, characters f and e, as well as the decimal
point are allowed.
Password
Each time you enter a character in the password text box, a dot is displayed instead. The password
cannot be copied.
Date and Time
Generally, the date and time can be selected from or typed in the Time/Date Attribute dialog
box.
To navigate to the window for customizing the type of the date and time, choose File >
Preferences > Region Settings from the main menu and click the Time or Date tab.
The default format of time and date is as follows:
l Time: 16:06:06 (Hour:Minute:Second)
l Date: 06-06-2000 (Month-Day-Year)
Table
The parameters on the GUI are presented in tables to display parameter values of different
objects.
l If -- or - is displayed in the table cell of a selected record, it indicated that the parameter is
not supported. This type of table cell in not editable.
l If / or Unknown is displayed in the table cell of a selected record, the parameter is supported
but the parameter value is unavailable for a certain reason at the moment.
1.23 Mutual Exclusion List for Multiclient Operations
The mutual exclusion list for multiclient operations is given below.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
262
Figure 1-34 Mutual exclusion list for multiclient operations

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
263
Figure 1-35 Mutual exclusion list for multiclient operations on ASON SDH trails

Figure 1-36 Mutual exclusion list for multiclient operations on ASON WDM trails

iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
264
Example
The "script import" and "upload" operations are mutually exclusive. If "script import" is being
performed on one client, "upload" cannot be performed on another client.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
265
2 Network Management Process
About This Chapter
This topic describes the process of managing network equipment on the U2000.
2.1 MSTP Network Management Process
The MSTP network management process describes the operation tasks of managing an MSTP
network by using the U2000, and the relationships between the operation tasks.
2.2 WDM Network Management Process
The WDM network management process describes the operation tasks of managing a WDM
network by using the U2000, and the relationships between the operation tasks.
2.3 RTN Network Management Process
The RTN network management process describes the operation tasks of managing a RTN
network by using the U2000, and the relationships between the operation tasks.
2.4 PTN Network Management Process
The PTN network management process describes the operation tasks of managing an PTN
network by using the U2000, and the relationships between the operation tasks.
2.5 Router and Switch Network Management Process
This topic describes the operation tasks of managing a router and switch network with the
U2000 and the relationships between these operation tasks.
2.6 Access Network Management Process
This topic describes the operation tasks of managing an access network with the U2000 and the
relationships between these operation tasks.
2.7 Core Network Management Process
This topic describes the operation tasks of managing a core network with the U2000 and the
relationships between these operation tasks.
2.8 Security NE Network Management Process
This topic describes the operation tasks of managing a security NE network with the U2000 and
the relationships between these operation tasks.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
266
2.1 MSTP Network Management Process
The MSTP network management process describes the operation tasks of managing an MSTP
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the MSTP network by referring to the processes as shown in Figure
2-1.
NOTE
The landscape orientation of the configuration flow chart shows the main phases of managing the MSTP network
by using the U2000. The phases include network deployment, service configuration, network maintenance, and
SDH ASON feature management. In the case of the service configuration, the end-to-end service configuration
mode requires a license that supports the end-to-end SDH management, and the SDH ASON feature management
requires a license that supports the SDH ASON feature.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
267
Figure 2-1 MSTP network management process
Deploying a
Network
Maintaining a
Network
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Topology
Management
DCN
Management
Configuring
Board
Parameters
Configuring
Orderwire
Configuring
Protection
Configuring
Feature
Configuring SDH
Services
Configuring
Ethernet
Services
Configuring RPR
Services
Configuring ATM
Services
Configuring
Broadcast Data
Port Services
Configuring DDN
Services
Configuring SAN
Services
Configuring F1
Data Port
Services
Configuring Built-
in WDM
Configuring
QoS
Configuring
LPT
Configuring
LCAS
Configuring
QinQ Service
Configuring
STP and RSTP
Configuring
LAG/DLAG
Configuring
BPS/RPS
Configuring
SNCTP
Configuring
Transmux
Configuring
TCM
Configuring
AU3
Configuring
IPA
Configuring
SDH ASON
Networks
Routine
Maintenance
for an ASON
Network
Handling ASON
Network
Failures
Manage SDH
Protection
Subnet
Manage SDH
Trail
Configuring
Data Test
Frame
Configuring
IGMP Snooping
Configuring
OAM
Configuring
BPS/RPS/PR
BS
Adjusting
Networks
Configuring Services
Configuring Services
on a Per-NE Basis
Configuring End-
to-End Services
Deploying
VPLS Services
Deploying
PWE3 Services
Deploying E-
AGGR Services
Customer
Management
Deploying a
Tunnel
Deploying
Composite
Services
Configuring
CES/ATM
Services
Configuring
MSTP
Configuring
MPLS Tunnel
Configuring PW
APS/MS-PW
Configuring
Ethernet
Services

2.2 WDM Network Management Process
The WDM network management process describes the operation tasks of managing a WDM
network by using the U2000, and the relationships between the operation tasks.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
268
Configure and manage the Metro WDM&LH WDM network by referring to the processes as
shown in Figure 2-2.
NOTE
The landscape orientation of the configuration flow chart shows the main phases of managing the WDM network
by using the U2000. The phases include network deployment, service configuration, WDM feature
configuration, network maintenance, and WDM ASON feature management. In the case of the service
configuration, the end-to-end service configuration mode requires a license that supports the end-to-end WDM
management, and the WDM ASON feature management requires a license that supports the WDM ASON
feature. The WDM ASON feature is unique to the NG WDM. An NG WDM NE can use the WDM ASON
feature management function only after the WDM ASON feature is enabled.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.
Figure 2-2 Metro WDM&LH WDM network management process
Configuring Services
Deploying a
Network
Maintaining a
Network
Configuring
WDM Features
Managing the
Optical Power
Configuring Fiber
Link Check
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring DCN
Configuring
Orderwire
Configuring Services
on a Per-NE Basis
Configuring Optical
Cross-Connections
Configuring WDM
Services
Configuring
Overhead
Configuring
Ethernet Services
Configuring
Broadcast Data
Port Services
Configuring F1 Data
Port Services
Configuring End-
to-End Services
Customer
Management
Configuring
EAPE
Configuring
ROADM
Configuring IPA
Configuring ALC
Configuring APE
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring
Protection
Configuring
Board
Parameters

For the detailed process for managing the OptiX OSN 6800, refer to Figure 2-3.
NOTE
The procedure for managing the OptiX OSN 3800 is similar to the procedure for managing the OptiX OSN
6800.
For the detailed process for managing the OptiX OSN 6800A, refer to Figure 2-3.
NOTE
The procedure for managing the OptiX OSN 3800A is similar to the procedure for managing the OptiX
OSN 6800A.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
269
Figure 2-3 OptiX OSN 6800/6800A equipment management process
Deploying a
Network
Configuring Services
Maintaining a
Network
Configuring
WDM Features
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring
DCN
Configuring
Orderwire
Configuring
Services on a Per-
NE Basis
Configuring
Optical Cross-
Connections
Configuring WDM
Services
Configuring
Overhead
Configuring
Ethernet Services
Configuring
End-to-End
Services
Customer
Management
Configuring
EAPE
Configuring
ROADM
Configuring IPA
Configuring
ALC
Configuring
APE
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring WDM
ASON Networks
Configuring
Protection
Configuring
Board
Parameters
Routine
Maintenance for an
ASON Network
Handling ASON
Network Failures
Deploying a
Network
Configuring Services
Maintaining a
Network
Configuring
WDM Features
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring
DCN
Configuring
Services on a Per-
NE Basis
Configuring
Optical Cross-
Connections
Configuring WDM
Services
Configuring
Overhead
Configuring
Ethernet Services
Configuring
End-to-End
Services
Customer
Management
Configuring
EAPE
Configuring
ROADM
Configuring IPA
Configuring
ALC
Configuring
APE
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring
Protection
Configuring
Board
Parameters

For the detailed process of managing the OptiX OSN 8800 series equipment, see Figure 2-4.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
270
NOTE
The OptiX OSN 8800 T32 V100R001 does not support orderwire and Ethernet service configuration.
The OptiX OSN 8800 T32 V100R002 or a later version supports the SDH-related functions, including
configuring SDH protection, SDH features, and SDH-ASON feature management.
Figure 2-4 OptiX OSN 8800 series equipment management process
Deploying a
Network
Configuring WDM Services
Maintaining a
Network
Configuring
WDM Features
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring
DCN
Configuring
Orderwire
Configuring
Services on a Per-
NE Basis
Configuring
Optical Cross-
Connections
Configuring WDM
Services
Configuring
Overhead
Configuring
Ethernet Services
Configuring
End-to-End
Services
Customer
Management
Configuring
EAPE
Configuring
ROADM
Configuring IPA
Configuring
ALC
Configuring
APE
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring WDM
ASON Networks
Routine
Maintenance for an
ASON Network
Handling ASON
Network Failures
Configuring
Board
Parameters
Configuring
SDH Protection
Configuring
WDM Protection
Configuring
SDH Features
Configuring
SDH Services
Configuring
Ethernet Services
Configuring
Overhead
Configuring SDH
ASON Networks
Configuring Packet Services
Configuring the
Ethernet
Boards
Configuring
Ethernet Services
Configuring MPLS
Tunnel
Configuring
Configuring the
QoS Policy
Configuring
Services on a Per-
NE Basis
Configuring
End-to-End
Services
Deploying a
Tunnel
Deploying PWE3
Services
Deploying VPLS
Services
Deploying
Composite
Services

For the detailed process for managing the OptiX OSN 1800, refer to Figure 2-5.
For the detailed process for managing the OptiX OSN 1800(NA), refer to Figure 2-5.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
271
Figure 2-5 OptiX OSN 1800/1800(NA) equipment management process
Deploying a
Network
Configuring Services
Maintaining a
Network
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring
DCN
Configuring
Services on a Per-
NE Basis
Configuring WDM
Services
Configuring
Overhead
Configuring
End-to-End
Services
Customer
Management
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring
Protection
Configuring
Board
Parameters

2.3 RTN Network Management Process
The RTN network management process describes the operation tasks of managing a RTN
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the RTN network by referring to the processes as shown in Figure 2-6.
NOTE
The landscape orientation of the configuration flow chart shows the main phases of managing the RTN network
by using the U2000. The phases include network deployment, service configuration, and network maintenance.
In the case of the service configuration, the end-to-end service configuration mode requires a license that supports
the end-to-end RTN and SDH management.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
272
Figure 2-6 RTN network management process
Deploying a
Network
Maintaining a
Network
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Topology
Management
DCN
Management
Configuring
Board
Parameters
Configuring
Orderwire
Configuring
Protection
Configuring
Feature
Configuring SDH
Services
Configuring
Packet-Based
Ethernet
Services
Configuring
MPLS Tunnel
Configuring
EoS/EoPDH-
Based Ethernet
Services
Configuring
PWE3 Services
(CES/ATM/ETH)
Configuring LPT
Configuring
Physical LAG
Deploying a
Tunnel
Deploying
VPLS Services
Deploying
PWE3 Services
Configuring
LAG
Configuring
The Ethernet
Port OAM
Configuring
Radio Links
Configuring IF
Protection
Configuring
ATPC
Configuring
XPIC
Configuring
Hybird/AM
Configuring Services
Configuring Services
on a Per-NE Basis
Configuring End-
to-End Services
Diagnosis &
Maintenance
Configuring QoS
Deploying
Composite
Services
Configuring
The Ethernet
Service OAM
Deploying
Native Ethernet
Services

2.4 PTN Network Management Process
The PTN network management process describes the operation tasks of managing an PTN
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the PTN network by referring to the processes as shown in Figure 2-7.
NOTE
The landscape orientation of the configuration flow chart shows the main phases of managing the PTN network
by using the U2000. The phases include network deployment, service configuration, configuring feature and
network maintenance.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
273
Figure 2-7 PTN network management process
Deploying a
Network
Configuring
Feature
Configuring
the MSTP
Configuring
the BFD
Configuring
the LPT
Configuring
the IGMP
Snooping
Configuring
the NE Time
Configuring
Clocks
Creating
Network
Configuring
Communicatio
ns
Configuring
Interfaces
Hop
Management
Maintaining a
Network
Configuring
End-to-End
Services
Configuring
Services on a
Per-NE Basis
Configuring the
Control Plane
Configuring the
QoS Policy
Configuring
CES Services
Configuring
Services for
the Offload
Solution
Configuring an
ATM Service
Configuring an
Ethernet
Service
Configuring
Tunnel
Configuring
PWE3
Service
Configuring
VPLS Service
Configuring
L3VPN
Service
OAM
Management
Configuring
Orderwire
Configuring
Inband DCN
Configuring
PTP Clock
Configuring a
TOP Clock
Configuring the
Equipment-
Level Protection
Configuring
MPLS /IP/GRE
Tunnel
Configuring
Network Level
Protection
802.1X/
RADIUS
Authentication
Port Mirror
Configuring Services
Configuring
Composite
Service
Common
Maintenance
Operations

2.5 Router and Switch Network Management Process
This topic describes the operation tasks of managing a router and switch network with the
U2000 and the relationships between these operation tasks.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
274
IP Network Deployment
Figure 2-8 IP network deployment flowchart
Service
deployment
Deploy tunnels.
Deploy service
guarantee.
Software commissioning engineers
Network planning
engineers
Network
planning
Generate the port
information table
Generate the NE
information table
Import the
BoQ
Deploy VPN
services.
Scenario
stage
Role
Tool and
module
UniStar U2000
Network
deployment
Method 2: Deploy the network
using the plug-and-play
management.
Method 1: Deploy the network
using the NE Explorer.
NOTE
After network planning engineers obtain the LLD document (including the port information table and NE
configuration table) based on the Bill of Quantity (BoQ) list, software commissioning engineers can use the
U2000 to complete IP network deployment. This topic does not contain network planning information. For
details about network planning, see the network planning guide associated with the solution used by the site.
Table 2-1 Quick navigation for deployment tasks
Task Descri
ption
Function Module and
Usage Scenario
Navigation Path Reference
Chapter
Netw
ork
deplo
ymen
t
Deploy
basic
configur
ations,
such as
configur
ations
for the
manage
ment
channel,
device
interfac
e, IGP
and
Deployment scenario: Use the
U2000 Plug-and-Play
Management to deploy
configurations.
The U2000 Plug-and-Play
Management can be used to
remotely launch multiple NEs
and perform basic
configurations for multiple
NEs; therefore, on-site software
commissioning is not required
and this greatly improves the
deployment efficiency.
Configuration >
Router/Switch/
Security
Configuration >
Plug-and-Play
Management
Router and
Switch
Network
Management >
Network
Deployment >
Deploying a
Network Using
the Plug-and-
Play
Management
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
275
Task Descri
ption
Function Module and
Usage Scenario
Navigation Path Reference
Chapter
BGP
route,
MPLS,
tunnel
policy,
and
routing
policy.
Applies to the following
scenarios:
l Deploy configurations
during network deployment
or routine maintenance
when not so many devices
are located on the live
network.
l Check configurations. After
the U2000 Plug-and-Play
Management is used to
deploy basic configurations,
the U2000 NE Manager can
be used to check whether the
deployed configurations are
correct.
l Modify basic configuration
for a single NE.
Right-click a
desired NE in the
Main Topology and
choose NE
Explorer from the
shortcut menu.
Router and
Switch
Network
Management >
Network
Deployment >
Deploying a
Network Using
the NE
Explorer
Servi
ce
deplo
ymen
t
Rapidly
deploy
services
on the
U2000
accordi
ng to the
service
plan.
Applies to the following
scenarios:
l Deployment scenario in
which tunnels and VPN
services need to be created.
The service management
module provides a
simplified GUI for you to
complete all configuration
operations in this GUI.
l Routine maintenance
scenario in which VPN
services need to be
monitored, diagnosed, or
tested and checked.
l Service >
Tunnel >
Manage
Tunnel
l Service >
L3VPN
Service >
Manage
L3VPN
Service
l Service >
VPLS Service
> Manage
VPLS Service
l Service >
PWE3 Service
> Manage
PWE3 Service
l Service >
Composite
Service >
Manage
Composite
Service
l Router and
Switch
Network
Managemen
t > Service
Deployment
> Deploy
Tunnel
l Router and
Switch
Network
Managemen
t > Service
Deployment
> Deploy
VPN
Service

iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
276
IP Network Maintenance
Figure 2-9 IP Network Maintenance Process
Table 2-2 Monitoring and maintenance process
Task Description Reference Chapter
Perfor
mance
monito
ring
The U2000 supports real-time network
quality monitoring. The monitoring
results can be used for trend analysis and
identifying areas and nodes where
network quality deteriorates, helping
monitoring engineers proactively respond
to network faults.
Router and Switch Network
Management > Network Monitoring
and Maintenance > Performance
Monitoring
Alarm
monito
ring
The U2000 supports alarm monitoring for
immediate identification of network
faults and rapid response to the faults.
Router and Switch Network
Management > Network Monitoring
and Maintenance > Monitoring
Network Status
Report
statisti
cs
collecti
on
The U2000 allows you to analyze and
collect statistics about network running
status in different ways.
l Router and Switch Network
Management > Network
Monitoring and Maintenance >
NE Routine Maintenance >
Collecting Network Resource
Statistics > Using the U2000
Report System to Collect
Network Resource Statistics
l Router and Switch Network
Management > Network
Monitoring and Maintenance >
NE Routine Maintenance >
Collecting Performance
Monitoring Results
NE
config
uration
file
backup
The U2000 backs up NE configuration
files on a regular basis to provide
assistance in fault rectification.
Router and Switch Network
Management > Network
Monitoring and Maintenance > NE
Routine Maintenance > Backing Up
NE Configuration Files
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
277
Task Description Reference Chapter
U2000
mainte
nance
The U2000 is maintained on a regular
basis, which ensures healthy U2000
operation.
Router and Switch Network
Management > Network
Monitoring and Maintenance >
U2000 Routine Maintenance

Table 2-3 Fault diagnosis process
Task Descri
ption
Usage Scenario Navigation
Path
Reference
Chapter
Locate
faults
based
on
alarm
inform
ation.
If the
U2000
receive
s an
alarm
from an
IP NE,
rectify
the
fault
accordi
ng to
the
alarm
inform
ation.
The U2000 receives alarms
from IP NEs.
Fault > Browse
Current Alarm
Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Common Alarm
Locating
Performance alarms or TCAs
are generated on the U2000.
NOTE
The names of these alarms
contain Performance or
threshold, for example, Port
Performance Minor Alarm or
The number of BRAS accesses
exceeds the threshold.
Fault > Browse
Current Alarm
Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Locating
Performance
Faults
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
278
Task Descri
ption
Usage Scenario Navigation
Path
Reference
Chapter
NOTE
This
task is
applic
able to
the
NEs
for
which
the
value
of
Alar
m
Sourc
e is the
name
of an
NE
\CX
\ATN
\PTN
6900
\ME\S
series
NE.
Service-related alarms are
generated on the U2000.
Refer to the Trail Domain to
check whether the alarm
affects services, as shown in
Figure 2-10.
Fault > Browse
Current Alarm
Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Locating Service
Faults
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
279
Task Descri
ption
Usage Scenario Navigation
Path
Reference
Chapter
Locate
faults
based
on IP
networ
k
trouble
shootin
g.
If the
U2000
does
not
receive
any
alarm
but the
voice
service
quality
on the
manage
d
mobile
bearer
networ
k
deterior
ates,
locate
and
resolve
the
quality
deterior
ation
issue.
IP network troubleshooting
can be used to locate and
troubleshoot faults including
incontinuous calls or voice
services of poor quality caused
by packet loss or delay.
Fault > IP
Network
Troubleshooting
Fault Diagnosis
> Locating
Faults Based on
IP Network
Troubleshooting

Figure 2-10 Viewing the trail domains of faults

2.6 Access Network Management Process
This topic describes the operation tasks of managing an access network with the U2000 and the
relationships between these operation tasks.
It is recommended that you configure and manage an access network in accordance with the
flowchart shown in Figure 2-11.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
280
NOTE
The horizontal direction of the flowchart shows the primary stages of managing an access network with the
U2000, which include:
l Network deployment
l Feature configuration
l Network maintenance
l Bulk network configuration
The vertical direction of the flowchart shows the relationships between the operation tasks of these stages.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
281
Figure 2-11 Flowchart of managing an access network
Network deployment
Network
maintenance
Feature
configuration
Bulk network
configuration
Alarm
management
Inventory
management
Performance
management
NE software
management
Test diagnosis
FTTx pre-
deployment
Topology
management
General
configuration
template
Device
management
Interface
management
Ethernet feature
management
Ethernet OAM
management
GPON
management
EPON
management
xDSL management
Multicast
management
TDM management
VoIP management
PWE3
management
ACL management
BFD management
QoS management
DHCP Relay
management
MSTP
management

iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
282
2.7 Core Network Management Process
This topic describes the operation tasks of managing a core network with the U2000 and the
relationships between these operation tasks.
It is recommended that you configure and manage a core network in accordance with the
flowchart shown in Figure 2-12.
NOTE
The horizontal direction of the flowchart shows the primary stages of managing a core network with the U2000,
which include:
l Network deployment
l Feature configuration
l Network maintenance
l Bulk network configuration
The vertical direction of the flowchart shows the relationships between the operation tasks of these stages.
Figure 2-12 Flowchart of managing a core network

Authority and domain


based management
of sub-resources
NE data configuration
Topology
management
NE information
collection
Network health check
Subscriber signaling
tracing
Service management
Dual homing
management
Network deployment Feature configuration Network maintenance
Bulk network
configuration
Device panel
Test management
Software
management
Performance
management
Inventory
management
Alarm management
Security
management
iSStar

2.8 Security NE Network Management Process
This topic describes the operation tasks of managing a security NE network with the U2000 and
the relationships between these operation tasks.
It is recommended that you configure and manage a security NE network in accordance with
the flowchart shown in Figure 2-13.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
283
NOTE
The horizontal direction of the flowchart shows the primary stages of managing a security NE network with the
U2000, which include:
l Network deployment
l Feature configuration
l Network maintenance
l Security service
l Network security management
The vertical direction of the flowchart shows the relationships between the operation tasks of these stages.
Figure 2-13 Flowchart of managing a security NE network
Network
deployment
Topology
management
Single-point
Web
configuration
Feature
configuration
Device
management
Interface
management
Network
maintenance
Alarm
management
Inventory
management
Performance
management
NE software
management
Security
service
IPSec end-to-
end service
management
Remote
access service
management
Network Security
Management
Security policy
Attack defense
Port mapping
NAT
SSL VPN
service
management
IPS
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
284
3 Security Management
About This Chapter
Security management is a crucial function to prevent an unauthorized user from logging in to
the network and ensure network data security. Security management includes the NMS user
rights management, user security policy management, NE security management, and other
security policy management.
3.1 User Security
U2000 user security management mainly involves user rights management, password and
account policies, access control management, and user monitoring.
3.2 Managing User Rights
Security administrators assign proper rights to U2000 and NE maintenance personnel and adjust
rights based on service changes, which ensure that maintenance personnel have sufficient rights
to regularly maintain the U2000 and NEs and prevent unauthorized operations.
3.3 User Security Policy Management
User security policies can efficiently strengthen U2000 system security and prevent
unauthorized user operations. The policies include setting access control rules, managing
passwords and locking clients, and monitoring login users.
3.4 Managing NE Security
With the NE security management function provided on the U2000, logins to NEs and the
running of NEs are monitored effectively. Therefore, the U2000 can protect NEs against
unauthorized logins and operations.
3.5 Configuring NE RADIUS
Remote authentication dial-in user service (RADIUS) is an industrial standard. RADIUS
provides the authentication functions for the remote access to a network or dialup access to a
network.
3.6 Change Audit
If changes occur on a device in the network, information about the changes can be queried
through the U2000.
3.7 Database Security Policy
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
285
The U2000 data is saved in the database. Therefore, ensure the database security with priority,
including protecting the security of the database password, backing up the database
periodically, viewing the database status, and dumping the database.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
286
3.1 User Security
U2000 user security management mainly involves user rights management, password and
account policies, access control management, and user monitoring.
Security Management Entities
Concept Description
Object Set A collection of managed objects.
Object sets facilitate user rights management. If a user or user
group is assigned the operation rights of an object set, the user
or users from the user group can perform authorized
operations on all the objects in the object set. This obviates
the need to set operation rights for NEs one by one.
Object sets can be created by geographical area, network
layer, and device type.
Operation Set A collection of operations.
Operation sets facilitate user rights management. Operations
that have similar impacts on system security are assigned to
an operation set. If a user or user group is assigned the rights
of an operation set, the user or users from the user group can
perform all the operations in the operation set.
The U2000 provides default operation sets. If the default
operation sets do not meet right assignment requirements,
create operation sets as required.
By default, the U2000 operation sets are classified into the
following types by operation object:
l All Object Operations contains operations that can be
performed on all network devices.
l All Application Operations contains operations that can
be performed on all network management applications
except security applications.
Security object U2000 objects on which only users that are authorized by
users from the SMManagers group can perform operations.
Security objects, such as devices, object sets, and subnets, are
managed by the U2000.
NOTE
Not all devices in the Main Topology are managed by the U2000. If
a user from the SMManagers group creates a common user and does
not assign any operation rights to the common user, the common user
can view some objects in the Main Topology after logging in to the
U2000. However, these objects are not security objects because they
are not managed by the U2000.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
287
Concept Description
Domain The scope of security objects (including devices, object sets,
and subnets) that users or user groups can manage. Users can
perform operations only on the security objects in their own
domains.
Operation Rights A collection of rights assigned to users to perform an
operation. Operation rights are associated with domains.
Users can only perform authorized operations on the security
objects in their own domains.
User A U2000 client user. The user name and password of a user
identify the user's U2000 operation and management rights.
After being added to a user group, a user inherits the operation
rights of the user group. A user can be added to multiple user
groups. The operation rights of a user comprise those of the
user and user groups to which the user belongs.
The U2000 provides the default user admin as the system
administrator. The admin user belongs to the
Administrators and SMManagers groups by default and has
more rights than the SMManagers group. You cannot change
the admin user's rights or add this user to other user groups.
NOTE
The admin user's initial password is Changeme_123. (The initial
password is Admin_123 for a preinstalled U2000.) You must change
the password upon the first login as the admin user to ensure system
security. Keep the password secure and change it regularly.
User Group A collection of U2000 users that have the same operation
rights. Adding users to user groups on the U2000 enables the
management of user rights in batches and reduces
management costs.
A user group has the following attributes: details (group name,
description, group type, and maximum number of sessions),
members, domain, operation rights, and current session.
The U2000 provides the following default user groups:
Administrators, SMManagers, Maintenance Group,
Guests, Operator Group, and NBI User Group.
User Group
Type
Administrat
or Group
Only the Administrators group belongs to this type of group.
This administrator group has a domain that contains all
network objects and has all operation rights except security
management rights. The domain and operation rights cannot
be changed, and this type of user group cannot be created.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
288
Concept Description
Security
Manager
User Group
Only the SMManagers group belongs to this type of group.
The security manager user group has a domain that contains
all network objects and has rights related to security
management. For example, a user that belongs to the security
manager user group can manage users, user groups, user
names and passwords, user logins, operation sets, device sets,
and security logs, and can set user security policies. This type
of user group cannot be created.
To ensure U2000 security, passwords of users from the
SMManagers group must be kept secure and changed
regularly.
NOTE
Security administrators (users from the SMManagers group) are
responsible for creating and authorizing users. The SMManagers
group has the following characteristics:
l Rights of the SMManagers group cannot be modified.
l The SMManagers group has only the rights related to security
management.
Subdomain
Security
Administrat
or Group
User groups of this type are created by security administrators,
who also define this user groups' domains. This type of user
group has only the rights related to security management. The
rights cannot be modified.
NOTE
When the U2000 manages a large-scale network that has a large
number of objects, a security administrator can divide the entire
network into several areas, each of which is assigned to a subdomain
security administrator group for management. A subdomain security
administrator can create and authorize users in the corresponding
area.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
289
Concept Description
Default User
Group
The U2000 provides three default user groups: Operator
Group, Guests, and Maintenance Group. The domain of a
default user group is All Objects. The operation rights for the
default user groups are described as follows:
l Users from the Guests group have the rights for default
monitor operation sets. They can perform query
operations, such as querying statistics, but cannot create
or configure objects.
l Users from the Operator Group group have the rights for
default operator operation sets. In addition to the rights of
the Guests group, users from the Operator Group group
have the rights to create, modify, and delete (rights to
perform potentially service-affecting operations are not
involved). For example, they can create NEs, change
alarm severities, and configure SDH trails.
l Users from the Maintenance Group group have the rights
for default maintenance operation sets. In addition to the
rights of the Guests and Operator Group groups, users
from the Maintenance Group group have the rights to
perform configurations that affect the running of the
U2000 and NEs. For example, they can search for SDH
protection subnets and trails, delete composite services,
and reset boards.
The default user groups are listed in descending order of rights
as follows: Maintenance Group, Operator Group, and
Guests. Operation sets of a default user group that has high-
level rights include the operations in operation sets of a user
group that has low-level rights. For example, maintenance
operation sets contain all operations in operator operation
sets.
Common
User Group
User groups of this type are created by security administrators
(belonging to the SMManagers group) or subdomain security
administrators (belonging to subdomain security
administrator groups). Domains and operation rights of
common user groups are also specified by security
administrators or subdomain security administrators.
NBI User
Group
The OSS interconnects with the U2000 through NBIs. The
NBI user group is created on the U2000 to manage access of
the OSS.
NOTE
NBI User Group is available only when the NBI instance is
deployed.

iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
290
Rights- and Domain-based Management
Rights- and domain-based management relies on assignment of operation rights and domains.
Rights-based management enables you to divide U2000 rights into function domains. Domain-
based management enables you to create network domains based on NEs. User rights can be
effectively controlled by granting the rights of any function domain and network domain
portfolio to U2000 users.
You can use the following methods to assign rights to a user or a user group:
l Add a user to a default user group so that the user has all the rights of this group. This
method applies to O&M scenarios in which users require only the basic rights of a
U2000 default user group.
l Create a user group and add a user to this user group. This method applies to scenarios in
which default user groups do not meet O&M requirements. For example, if a default user
group has excessive or insufficient rights, you can create a user group that has appropriate
rights and add a user to this user group.
NOTE
It is recommended that you authorize a user by adding the user to a user group that has appropriate rights.
Authorizing a user directly or by adjusting the rights of the default user groups is not recommended.
Account Policy and Password Policy
Concept Description
Account Policy Specifies the minimum length of a user name, login policy,
and unlocking policy. You can set the account policy to ensure
account security.
Password Policy Specifies the password complexity, update interval, and
character restrictions. The password policy prevents users
from setting simple passwords or using one password for a
long time.

Client Access Control
Concept Description
Remote Maintenance User
Management
The U2000 supports remote maintenance. It allows a remote
maintenance terminal to log in to the U2000 server to perform
operations on NEs that the U2000 manages. Remote
maintenance is commonly used for remote NE fault locating
and periodical checks.
The remote maintenance user is a U2000 user that logs in to
the U2000 server from the remote maintenance terminal. By
default, the remote maintenance user is disabled. Before
starting remote maintenance, enable the remote maintenance
user and set parameters for the user as required.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
291
Concept Description
SSL Protocol The Secure Sockets Layer (SSL) protocol ensures data
security and integrity for network communication. The SSL
protocol configured for the server that communicates with
clients can efficiently protect customers' network information.
Single-User Mode The admin user uses the single-user mode to perform special
operations such as rights assignment. In single-user mode,
only one user is allowed to log in to the U2000 as the
admin user, which prevents other users' interference during
operations. When the login mode is switched to the single-
user mode, all the users except the admin user are forcibly
logged out and cannot log in again.
Client Lockout To ensure network security, the U2000 locks out a U2000
client if a user does not perform any operations on the client
for a specified period. Client lockout does not affect the
running of the U2000.

ACL
Access control lists (ACLs) are a secure access control mechanism. It restricts users to log in to
the U2000 server only from clients that have specified IP addresses.
To improve the security of the U2000, ACLs restrict what client IP addresses users can use to
log in to the U2000. If user accounts and passwords are stolen, unauthorized users cannot log
in to the U2000. The U2000 provides two types of ACLs:
l System ACL
ACL for the U2000. All the users can log in to the U2000 only from the IP addresses or
network segments specified in the system ACL.
l User ACL
ACL for a user. The current user can log in to the U2000 only from the IP addresses or
network segments specified in the ACL for the user.
NOTE
The IP addresses or network segments in a user ACL must be within the range of the IP addresses
or network segments in the system ACL.
User Monitoring
The U2000 monitors user access to resources. User monitoring comprises session monitoring
and operation monitoring. For session monitoring, the U2000 monitors users' online status. For
operation monitoring, the U2000 monitors operation objects, time, and specific operation items.
If a user performs unauthorized operations or operations that potentially affect the system, a
security administrator of the U2000 can forcibly log out the user.
Network Management System Maintenance Suite
The network management system maintenance suite (MSuite for short) is a graphical
maintenance tool developed for the U2000. The MSuite is used to debug, maintain, and redeploy
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
292
the U2000. The password used to log in to the MSuite must be changed regularly to ensure
U2000 security.
3.2 Managing User Rights
Security administrators assign proper rights to U2000 and NE maintenance personnel and adjust
rights based on service changes, which ensure that maintenance personnel have sufficient rights
to regularly maintain the U2000 and NEs and prevent unauthorized operations.
3.2.1 Getting to Know Operation Rights Management
This section describes concepts related to operation right managements, such as operation rights,
object sets, domains, operation sets, and U2000 authorization principles. Knowing these
concepts before authorization helps you understand the purpose of each step in authorization.
3.2.1.1 Right Components
Rights specify operations that can be performed and objects on which operations are performed.
Operations that can be performed vary according to user.
Elements of a right include objects and operations, as shown in Figure 3-1.
Figure 3-1 Elements of a right
Operable objects mainly involve the U2000 and NEs, which are managed as devices.
NMS users can perform operations on the U2000 or NEs only when they are authorized to access
and operate the U2000 or NEs.
Figure 3-2 shows the operations that can be performed on the U2000 and NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
293
Figure 3-2 Operations rights of the U2000 and NEs
U2000 application
operations
Network device
operations
Rights Objects Operations
Login to the NE NEs
Access
rights
Operation
rights
U2000
Login to the U2000 U2000
Rights Operation Description
Access
rights
Logging in to
the U2000
To log in to the U2000, a user must have a valid account and
password.
Logging in to
an NE
To log in to an NE, a user must have a valid account and
password.
Operation
rights
Network
management
application
operations
Network management application operations refer to the
operations irrelevant to NEs, such as querying system logs
and creating topology objects. Before performing such
operations, users must log in to the U2000 first.
Network
device
operations
Network device operations refer to the operations relevant to
NEs, such as querying NE measurement results, connecting
NEs, and synchronizing NEs. Before performing such
operations, users must log in to the U2000 first.

3.2.1.2 U2000 Authorization Principles
This section describes U2000 authorization principles, which help security administrators
understand authorization on the U2000.
Authorization Methods
Security administrators can authorize users using the following methods:
l Authorize users by setting domains and operation rights for users.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
294
l Bind users to a user group. That is, authorize a user group, which includes setting domains
and operation rights of the user group, and add users to the user group so that the users
inherit the user group's rights.
Security administrators are advised to authorize users by binding users to user groups. This
method enables the security administrators to simultaneously authorize all the users who hold
the same post. When users' posts change, the security administrators can authorize new users by
removing original users from and adding the new users to the user groups.
Operation Right Configuration Modes
Multiple devices are deployed on a live network. Adding devices to user groups' domains and
setting operations performed on the devices one by one result in repeated workloads and low
efficiency. To improve efficiency, the U2000 provides various operation right configuration
modes, as shown in Figure 3-3.
Table 3-1 describes operation right configuration modes. The subnet device set mode and user-
defined object set mode are commonly used.
Figure 3-3 Operation right configuration modes
Table 3-1 Operation right configuration modes
NOTE
l The subnet device set mode is the best mode in device management authorization. The subnet device set
is recommended for the networks of all scales.
l Subnets in the domain:
l Under the Subnet Device Set node: If you grant operation rights to the user, the user can view and
perform operations on all devices in the subnet. If a new device is added to the subnet, this device is
added to the domain automatically.
l Under the Subnet node: If you grant operation rights to the user, the user can view the subnet, and
move, modify , or delete the subnet in the Main Topology.
l Under the Device node: If you grant operation rights to the user, the user can view and perform
operations on all devices in the subnet except the subnet itself. If a new device is added to the subnet,
this device is not added to the domain automatically.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
295
Mode Description Method of
Assigning
Operation
Rights
Advantage Disadvantage Appl
icabl
e
Scen
ario
All
Objects
The default
object set All
Objects
provided by
the U2000 is
assigned as a
managed
object to users
or user groups.
The three
modes are
object set
modes. In
these modes,
security
administrators
must assign
operation
rights by
binding
operation sets
to object sets.
If a user group
wants to have
operation
rights for an
object, the
following
conditions
must be met:
l The user
group's
object set
contains
the object.
l The
operation
set bound
to the
object set
contains
the
operations
correspond
ing to the
operation
rights.
The All Objects
mode co-works
with the default
operation set All
Object
Operations
provided by the
U2000 to assign all
operation rights for
all devices to users.
This mode is
rarely used
because few
users except in
Administrators
or SMManagers
group need to
manage all
devices.
This
mode
appli
es to
the
scena
rio
wher
e
users
must
mana
ge all
devic
es.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
296
Mode Description Method of
Assigning
Operation
Rights
Advantage Disadvantage Appl
icabl
e
Scen
ario
Object
set
(user-
defined
object
set)
Though All
Objects and
Subnet
Device Set are
object set, the
object set in
this mode
indicates only
a user-
defined
object set
planned and
created by a
security
administrator.
In user-
defined object
set mode,
security
administrators
add planned
devices to
object sets
defined by
themselves
and assign the
object sets to
users or user
groups.
The combination
of user-defined
object sets and
operation sets can
improve
authorization and
operation right
maintenance
efficiency as
follows:
l If user groups
have the same
managed
objects, a
security
administrator
can use an
object set to set
the user groups'
domains and to
adjust the
domains by
adjusting
objects in the
object set,
which help
avoid repeated
workloads.
l If an object set
contains n
devices of the
same type, a
security
administrator
can assign or
reclaim
operation rights
for these
devices by
adding
operations to or
delete
operations
from the
Authorization
for a user-
defined object
set is less precise
than
authorization for
a single
managed object
from the aspect
of operation
right control.
Authorization
preciseness
relies on security
administrators'
planning.
l If multiple
user groups
use the same
object set or
operation set,
adjustments
to the object
set or
operation set
may affect
user groups
that do not
require
operation
right
adjustments.
l An operation
set bound to
an object set
is apt to lack
operations
that are
performed on
objects in the
object set, or
the object set
is apt to lack
objects on
This
mode
appli
es to
the
scena
rio
wher
e
multi
ple
users
have
the
same
mana
ged
objec
ts but
the
mana
ged
objec
ts are
deplo
yed
on
differ
ent
subne
ts.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
297
Mode Description Method of
Assigning
Operation
Rights
Advantage Disadvantage Appl
icabl
e
Scen
ario
operation set
bound to the
object set
respectively.
Compared with
single-device
authorization,
authorization
based on object
sets
significantly
improves
efficiency.
which
operations
contained in
the operation
set are
performed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
298
Mode Description Method of
Assigning
Operation
Rights
Advantage Disadvantage Appl
icabl
e
Scen
ario
Subnet
device
set
Subnet device
sets are
assigned as
managed
objects to
users or user
groups.
The combination
of subnet device
sets and operation
sets have the same
advantages of
improving
authorization and
operation right
maintenance
efficiency as the
combination of
user-defined
object sets and
operation sets. It
also has the
following
advantages:
l No object set
needs to be
created.
l Objects in
subnet device
sets are
synchronized
with objects on
subnets in
topology views
in real time,
which
facilitates
network
deployment
planning and
avoids frequent
operation right
adjustments
due to object
addition and
deletion.
Authorization
for a subnet
device set is less
precise than
authorization for
a single
managed object
from the aspect
of operation
right control.
Authorization
preciseness
relies on security
administrators'
planning.
l If multiple
user groups
use the same
operation set
that is bound
to a subnet
device set,
adjustments
to the
operation set
may affect
user groups
that do not
require
operation
right
adjustments.
l An operation
set bound to a
subnet
device set is
apt to lack
operations
that are
performed on
objects in the
subnet
device set, or
the subnet
This
mode
appli
es to
the
scena
rio
wher
e
mana
ged
objec
ts are
assig
ned to
users
by
subne
t.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
299
Mode Description Method of
Assigning
Operation
Rights
Advantage Disadvantage Appl
icabl
e
Scen
ario
device set is
apt to lack
objects on
which
operations
contained in
the operation
set are
performed.
device Devices are
assigned to
users or user
groups one by
one.
NOTE
There is the
special device
Operations
Support
System OSS,
which
indicates the
U2000 server.
Users can find
the OSS in
topology
views and
view alarms
reported by
the U2000
server only
after the OSS
is added to the
users'
domains. No
operation right
can be set for
the OSS.
Security
administrators
must assign
operation
rights by
binding
operations to
each device.
Operations are
direct and easy to
understand.
Operation right
control is more
precise.
Security
administrators
must set
operation rights
for each device,
resulting in
heavy
authorization
workloads.
Operation right
maintenance
workloads
increase if rights
are adjusted.
The
mode
appli
es to
small
-
sized
netw
orks.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
300
Mode Description Method of
Assigning
Operation
Rights
Advantage Disadvantage Appl
icabl
e
Scen
ario
Subnet A subnet
(excluding
devices on the
subnet) is
assigned as an
object to users
or user groups.
The subnet
mode enables
users only to
view subnets
on U2000
clients.
Therefore,
subnets can be
added to users'
domains, but
no operation
right can be set
for the
subnets.
N/A None None This
mode
is
rarely
used.

3.2.1.3 Users and User Groups
A user indicates an U2000 user. A user logs in to the U2000 using a user account. A user group
is a collection of user accounts.
Users
By default, U2000 provides the user account admin that can be used to manage all devices and
has all operation rights. By default, the admin user belongs to the Administrators and
SMManagers user groups and has the most operation rights on the U2000.
User Groups
A user group is a collection of user accounts. After a user account is added to a user group, the
user has domains and operation rights of the user group. A user account can belong to multiple
user groups.
Managing users' operation rights based on user groups makes right management convenient and
clear.
The U2000 provides six default user groups. For details, see Table 3-2.
None of the default user groups can be deleted. By default, operation rights of the
Administrators and SMManagers user groups are provided by the U2000 and cannot be
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
301
changed. Default operation rights of the Maintenance Group, Operator Group, Guests, and
NBI User Group user groups can be changed as required by operation and maintenance
personnel.
The U2000 supports user-defined user groups created based on application requirements.
NOTICE
Users in the Administrators or SMManagers user group must perform operations as required.
Any operations that may cause damages or pose risks to the U2000 are forbidden.
Table 3-2 Default user groups on the U2000
User Group Operation Rights Description
Administrators This user group has all operation rights except those of the
SMManagers user group. Users in the Administrators user group
can perform operations such as maintaining U2000 servers and setting
global parameters.
Users in the Administrators and SMManagers user groups can
manage all objects. Other users can manage only authorized objects.
SMManagers This user group has operation rights only for Security
Management, which include permissions to configure a security
policy, query security logs, manage users/user groups/object sets/
operation sets/use permissions/security log templates, monitor user
dialogues/operations, force users to exit, unlock users, and re-set user
passwords. The users added to the user group can manage all the users
on the U2000, except for the admin and other security administrators.
Users in the SMManagers user group are U2000 security
administrators.
Maintenance Group By default, this user group has operation rights for default maintenance
operation sets. In addition to the rights of the Guests and Operator
Group groups, users in this group have the rights to perform
configurations that affect the running of the U2000 and NEs. For
example, they can search for SDH protection subnets and trails, delete
composite services, and reset boards.
Operator Group By default, this user group has operation rights for default operator
operation sets. In addition to the rights of the Guests group, users in
this group have the rights to create, modify, and delete (rights to
perform potentially service-affecting operations are not involved). For
example, they can create NEs, change alarm severities, and configure
SDH trails.
Guests By default, this user group has operation rights for default monitor
operation sets. They can perform query operations, such as querying
statistics, but cannot create or configure objects.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
302
User Group Operation Rights Description
NBI User Group By default, this user group has operation rights related to northbound
Service.

3.2.1.4 Objects and Object Sets
In the security management module on the U2000, an object is an entity on which only users
authorized by security administrators can perform operations. An object set is a collection of
objects.
Objects
Objects are classified into security and non-security objects. This section focuses on security
objects.
On the U2000, a security object is an entity on which only users authorized by security
administrators can perform operations. For example, devices, subnets, and object sets are
security objects.
On the U2000, a non-security object is an entity on which users can perform operations without
the authorization by security administrators. In the Main Topology, not all devices are managed
by the U2000. If the security administrator creates a common user but does not grant any rights
to the user, the user still can view some objects in the Main Topology after logging in to the
U2000. However, these objects are not security objects because they are not managed by the
U2000.
Object Sets
An object set is a collection of objects. The U2000 provides the default object set All Objects
that includes all objects managed by the U2000. The objects in the All Objects set cannot be
modified or deleted.
A maximum number of 99 object sets is recommended in addition to the default object set. The
maximum limit helps prevent performance problems.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
303
Table 3-3 Object sets provided by the U2000
Item Description
Subnet
device set
Object set that the U2000 creates for a subnet in the physical topology view
and that shares the same name as the subnet.
A subnet device set provides the following features:
l A subnet device set contains a subnet in the physical topology view and all
objects on the subnet.
l If a subnet contains a lower-layer subnet in the physical topology view, the
corresponding subnet device set contains the lower-layer subnet and
objects on the lower-layer subnet.
l If objects on a subnet in the physical topology view are adjusted, the
adjustments are synchronized to the corresponding subnet device set in the
security management module. The U2000 does not allow security
administrators to directly adjust objects in a subnet device set in the security
management module.
l A subnet device set cannot be added to a user-defined object set.
l All subnet device sets are displayed only in the window in which security
administrators set domains. They are not displayed under the Object Set
node in the navigation tree in the Security Management window.
All objects The U2000 provides one object set by default, that is, the All Objects set. The
default object set contains all NEs managed by the U2000 and cannot be
modified or deleted.
User-
defined
object set
Object set manually created by a user.
A user-defined object set provides the following features:
l A user-defined object set can contain NEs, subnets, and other user-defined
object sets.
l A user-defined object set contains subnets, excluding objects on the
subnets.
l A user-defined object set cannot contain subnet device sets.
l A user-defined object set that contains subobject sets cannot be added to
another user-defined object set.
l Objects in a user-defined object set can only be manually adjusted.

3.2.1.5 Operation and Operation Set
An operation set is a collection of operations. If the object set mode or subnet device set mode
is selected, you can set operation rights by binding operation sets.
Operation Types
On the U2000, users can perform operations on both the U2000 and NEs. Therefore, operations
are classified into two types: NMS application operations and network device operations.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
304
l NMS application operations are performed on the U2000, such as Acknowledge
Alarms, Add Alarm/Event Mask Rules, Modify Object Position, and Query a Board.
l Network device operations are performed for managed NEs, such as Configure the NE
Type, Reset Board, Suppress Device Alarm, and Modify Routing Policy.
The object of NMS application operations is the U2000. For example, those operations involving
topology objects constitute the Topo Management rights and those alarm-related operations
constitute the Fault Management rights. The following Figure 3-4 shows the Select Operation
Rights window. The NMS application operations are classified into more than 20 types and listed
under the Operation node in the Operation area.
Figure 3-4 NMS application operations
The objects of network device operations are NEs. All operations for an NE on the U2000
constitute the rights for the NE. A Router NE (CX600-144) is used as an example. All rights for
it are listed under the Operation node in the Operation area as shown in the following figure.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
305
Figure 3-5 Network device operations
Operation Set Types
Based on the two types of operation objects, operation sets provided by the U2000 are also
classified into two types: NMS application operation set and network device operation set.
l Network management application operation set: contains various network management
application operations. Network management application operations correspond to
U2000 functions unrelated to NEs, for example, system log query and topology object
creation.
l Network device operation set: contains various network device operations. Network device
operations correspond to U2000 functions related to NEs, for example, NE measurement
result query, NE connection, and NE synchronization.
NOTE
Operation sets that contain operation subsets cannot be added to another operation set because an operation
set cannot contain two levels of operation sets.
The U2000 provides more than 20 types of default NMS application rights (corresponding to
more than 60 types of operation sets) and more than 70 types of network device rights in all
domains (corresponding to more than 200 operation sets). If the default operation sets do not
meet requirements, create operation sets manually.
NOTE
It is not recommended to assign the All Application Operations and All Object Operations operation
sets to common users. All Application Operations contains operations for all U2000 applications except
security applications. All Object Operations contains operations for all NEs managed by the U2000. A
user who is assigned both of the two operation sets has all operation rights for the U2000 and NEs.
Relationships Between Operations and Operation Sets
This section uses topology management as an example to describe relationships between
operations and operation sets.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
306
Topology management belongs to NMS application operations, including about 30 operation
rights that are allocated to operation sets as follows:
l Low-level rights Set Background and Modify Object Position are allocated to the Topo
Monitor Operation Set.
l Medium-level configuration rights Create Link, Export Project Document, Modify
Subnet are allocated to the Topo Operator Operation Set.
l High-level rights Period Discovery and Lock/Unlock View are allocated to the Topo
Maintainer Operation Set.
Users can create an operation set and add the desired topology management operations to it to
facilitate operation rights assignment.
NOTE
l A default operation set of the U2000 contains all operations in the operation sets at lower levels.
l The U2000 may define the high and low levels of operation sets differently from O&M engineers'
expectations. In this situation, O&M engineers can create operation sets based on the actual O&M
scenarios.
Specifically, administrators can assign rights for topology management to a user on the New
User Group > Operation Rights > Select > Select Operation Rights GUI in the following
ways:
l Assign default operation sets to a user. The following operation sets can be assigned: Topo
Monitor Operation Set, Topo Maintainer Operation Set, and Topo Monitor Operation
Set. To view which operations are included in an operation set, right-click it and choose
View Operation Set Member from the shortcut menu. This method is used when the
default operation sets meet the requirement for rights assignment.
l Create operation sets, add desired operations in Topo Management to them, and assign
them to users. This method is used when the default operation sets cannot meet the
requirement for rights assignment.
l Assign operation rights in Topo Management to users directly. This method is
inconvenient for management and maintenance. Therefore, it is not recommended.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
307
Default Operation Sets
The U2000 provides more than 200 default operation sets with different types of operations and
levels of rights. You can query the operations contained in all operation sets by 3.2.5.1 Exporting
Operation Sets or query the operations contained in a single operation set by 3.2.8.5 Viewing
Operations Contained in an Operation Set. If the default operation sets do not meet
requirements, create operation sets manually.
3.2.2 Scenarios for Operation Right Management
This section describes all scenarios for operation right management. You can click a desired
scenario to access the corresponding section and view operation details.
Figure 3-6 Scenarios for operation right management
Performing the Initial
Authorization
Maintaining Operation Rights
Authorization Plan
Operation Right Adjustment
After Device Addition or
Deletion
Operation Right Adjustment
After Personnel's
Responsibilities Change
Assigning Rights to Users
Transferring
Operation Sets
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
308
Scenario Scenario Description Subscenario or Subtask
Performing the
Initial
Authorization
When performing the initial
authorization for the installed
U2000, you need to plan
management personnel for each
device and assign management
rights to corresponding users.
1. 3.2.3 Authorization Plan
A proper domain and operation
set plan before authorization
can reduce authorization and
maintenance workloads.
2. 3.2.4 Assigning Rights to
Users
After operation rights are
planned, security
administrators can authorize
users based on the plan.
3. 3.2.5 Transferring
Operation Sets
If multiple U2000s are
deployed on the global
network (for example, one
U2000 is deployed in each
region to manage devices) and
operation sets required by the
U2000s are similar according
to an authorization plan,
security administrators can use
the operation set import and
export functions provided by
the U2000 to transfer operation
sets from one U2000 to other
U2000s.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
309
Scenario Scenario Description Subscenario or Subtask
Maintaining
Operation Rights
You need to maintain operation
rights after the initial
authorization is performed. When
a device is added or deleted, or
user responsibilities change,
security administrators need to
change operation rights for users.
NOTE
The operation right maintenance
instructions described in this
document are based on the
assumption that users are authorized
by being bound to user groups. For
some sites that use the direct user
authorization, see 3.2.9 FAQs
About Authorization for
processing.
l 3.2.6 Operation Right
Adjustment After Device
Addition or Deletion
After new devices (NEs or
subnets) are deployed for
maintenance, security
administrators must assign
operation rights for the new
devices to user groups. After
devices are deleted, operation
rights for the devices are
automatically deleted from
users or user groups' operation
rights.
l 3.2.7 Operation Right
Adjustment After
Personnel's Responsibilities
Change
If topology positions of
managed objects remain
unchanged whereas
personnel's responsibilities
change, for example, changes
to managed NE scopes,
operation rights, and posts,
security administrators must
adjust users' operation rights.

3.2.3 Authorization Plan
A proper domain and operation set plan before authorization can reduce authorization and
maintenance workloads.
Authorization Planning Process
Figure 3-7 shows the authorization planning process.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
310
Figure 3-7 Authorization planning process
Start
End
Sort original right
management data.
Plan domains.
Plan operation sets.
Sort data and create a
user group attribute table.
Plan user groups.
Table 3-4 describes the content and rules for each procedure in the process.
Table 3-4 Content and rules for each procedure in the process
Procedure Description Rule
Sorting
original
right
manageme
nt data
Sort data based on a carrier's
organization structure and
networking and obtain the following
data:
l Personnel who manage the same
devices, that is, personnel who
have the same domain
l Personnel who have the same
responsibilities, that is, personnel
who can perform the same
operations on the same devices
-
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
311
Procedure Description Rule
Planning
user
groups
Classify personnel into groups based
on their responsibilities.
l Place personnel who have the
same responsibilities in a user
group.
l Place a person whose
responsibilities are partially
different from others' in a separate
user group.
Planning
domains
Plan modes for adding managed
objects to domains to improve
authorization and maintenance
efficiency.
Plan domains together for personnel
who have the same management
scopes. Plan domains separately for
personnel whose management scopes
are partially different from others'.
The subnet device set mode is
preferred for planning domains.
Devices that are not included in a
subnet device set are added to a user-
defined object set to avoid repeated
authorization for individual devices.
To facilitate future adjustment, it is
recommended that a user-defined
object set not include subobject sets.
Planning
operation
sets
Analyze operation rights required for
personnel to fulfill their
responsibilities and classify the
operation rights into operation sets.
Plan network device operation sets
and network management
application operation sets.
NOTE
If the device modes are used in a domain
management plan, you do not need to plan
operation sets.
l If user groups support the same
network management application
operations, plan the same network
management application
operation set for the user groups.
Otherwise, separately plan
network management application
operation sets for the user groups.
l If user groups support the same
network device operations, plan
the same network device operation
set for the user groups. Otherwise,
separately plan network device
operation sets for the user groups.
Sorting
data and
creating a
user group
attribute
table
Sort data and create a user group
attribute table for reference during
authorization and right management.
The user group attribute table must
include the user group member,
domain, and operation right columns.
l The domain column must specify
the subnet device set, user-defined
object set, or device mode in
which managed objects are added
to a domain.
l If the subnet device set mode and
user-defined object set mode are
used, the operation right column
must specify an operation set that
includes all required operations.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
312

Sorting Original Right Management Data
A carrier provides a device management responsibility table based on the carrier's organization
structure and networking, which serves as original right management data.
The following uses the organization and networking structures for region A as an example to
help you better understand original right management data.
Devices numbered from 01 to 11 of different types are located in region A. Devices numbered
from 01 to 04 are located on Subnet01, devices numbered from 07 to 10 are located on Subnet02,
and Device05, Device06, and Device11 are not located on any subnets. See Figure 3-8.
Figure 3-8 Networking structure in region A
Eight persons are assigned to manage the devices in region A. Figure 3-9 shows device
management division. Table 3-5 describes the division, providing the original right management
data generated based on the organization and networking structures for region A.
Figure 3-9 Device management division
Device11
Device06
Device05
Device02
Device04 Device03
Device01
Subnet01
Subnet02
A B C D
E F G H
Data
configuration
engineer and
part-time system
maintenance
engineer
Network
monitoring
engieer
System maintenance
engineer and part-
time data
configuration
engineer
Network
monitoring
engineer
Data
configuration
engineer and
part-time system
maintenance
engineer
System maintenance
engineer and part-
time data
configuration
engineer
Device07
Device09 Device10
Device08
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
313
Table 3-5 Device management division
Management
Scope
Mana
geme
nt
Perso
nnel
Role and Responsibilities
Subnet01 (Device01,
Device02, Device03,
and Device04),
Device05, Device06,
and Device11
A Network monitoring engineer who monitors the device
running status during the daytime.
B Network monitoring engineer who monitors the device
running status at night.
C l Full-time data configuration engineer who configures
data for managed devices.
l Part-time system maintenance engineer who performs
routine device maintenance when system maintenance
engineer D is absent.
D l Full-time system maintenance engineer who performs
routine device maintenance.
l Part-time data configuration engineer who configures
data for managed devices when data configuration
engineer C is absent.
Subnet02 (Device07,
Device08, Device09,
and Device10),
Device06, and
Device11
E Network monitoring engineer who monitors the device
running status during the daytime.
F Network monitoring engineer who monitors the device
running status at night.
G l Full-time data configuration engineer who configures
data for managed devices.
l Part-time system maintenance engineer who performs
routine device maintenance when system maintenance
engineer H is absent.
H l Full-time system maintenance engineer who performs
routine device maintenance.
l Part-time data configuration engineer who configures
data for managed devices when data configuration
engineer G is absent.

To help the authorization planning later, sort out the following items based on the original right
management data:
l Personnel who manage the same devices, that is, personnel who have the same domain
l Personnel who have the same responsibilities, that is, personnel who can perform the same
operations on the same devices
Sort the data in Table 3-5 based on these two items to generate Table 3-6 and Table 3-7.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
314
Table 3-6 Personnel who manage the same devices
Personnel Managed Devices
A, B, C, and D Subnet01 (Device01, Device02, Device03, and Device04), Device05,
Device06, and Device11
E, F, G, and H Subnet02 (Device07, Device08, Device09, and Device10), Device06, and
Device11

Table 3-7 Personnel who have the same responsibilities
Personn
el
Responsibilities
A and B Manage Subnet01 (Device01, Device02, Device03, and Device04), Device05,
Device06, and Device11.
C and D Work full time or part time to configure data and perform routine maintenance
for Subnet01 (Device01, Device02, Device03, and Device04), Device05,
Device06, and Device11.
l Full-time data configuration engineer C and part-time data configuration
engineer D configure data for the same managed devices.
l Part-time system maintenance engineer C and full-time system maintenance
engineer D perform routine maintenance for the same managed devices.
E and F Monitor Subnet02 (Device07, Device08, Device09, and Device10), Device06,
and Device11.
G and H Work full time or part time to configure data and perform routine maintenance
for Subnet02 (Device07, Device08, Device09, and Device10), Device06, and
Device11.
l Full-time data configuration engineer G and part-time data configuration
engineer H configure data for the same managed devices.
l Part-time system maintenance engineer G and full-time system maintenance
engineer H perform routine maintenance for the same managed devices.

Return to Authorization Planning Process.
Planning User Groups
User group planning aims to classify personnel into groups based on responsibilities. To help
initial authorization and subsequent right maintenance, it is recommended that a person whose
responsibilities are partially different from others' be placed in a separate user group. For
example, personnel who have the same responsibilities in region A, who are described in Table
3-7, are classified into the same user group. There is no person whose responsibilities are partially
different from others' and therefore you do not need to plan a separate user group. Table 3-8
describes the user group plan for region A.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
315
Table 3-8 User group plan
User Group User
Group
Membe
rs
Responsibilities
Network monitoring
engineer group 1
A and B Monitor Subnet01 (Device01, Device02, Device03, and
Device04), Device05, Device06, and Device11.
Data configuration
and system
maintenance
engineer group 1
C and D Configure data and perform routine maintenance for
Subnet01 (Device01, Device02, Device03, and
Device04), Device05, Device06, and Device11.
Network monitoring
engineer group 2
E and F Monitor Subnet02 (Device07, Device08, Device09, and
Device10), Device06, and Device11.
Data configuration
and system
maintenance
engineer group 2
G and H Configure data and perform routine maintenance for
Subnet02 (Device07, Device08, Device09, and
Device10), Device06, and Device11.

Return to Authorization Planning Process.
Planning Domains
Domain planning aims to specify modes for adding managed objects to domains to improve
authorization and maintenance efficiency.
Plan domains together for personnel who have the same management scopes. Plan domains
separately for personnel whose management scopes are partially different from others'. Use the
management personnel in region A as an example. A, B, C, and D have the same management
scope, E, F, G, and H have the same management scope (see Table 3-6), and there is no person
whose management scope is partially different from others'. In this example, only two domains
are required: one for A, B, C, and D, and the other for E, F, G, and H.
Comply with the following rules when planning domains: Use the subnet device set mode as
the first choice. Devices that cannot be included in a subnet device set are included in a user-
defined object set, avoiding authorization for a device. It is recommended that a user-defined
object set not include subobject sets to specify a clear object set structure and facilitate
maintenance.
Table 3-9 describes domains for region A based on the rules. Figure 3-10 shows management
division based on managed objects in each domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
316
Table 3-9 Domains for region A
Personnel Mode for Adding Objects to a Domain
A, B, C, and
D
l Subnet device set Subnet01.
l User-defined object set Objectset01.
Subnet01 contains Device01, Device02, Device03, and Device04.
Objectset01 contains Device05, Device06, and Device11.
E, F, G, and
H
l Subnet device set Subnet02.
l User-defined object set Objectset02.
Subnet02 contains Device07, Device08, Device09, and Device10.
Objectset02 contains Device06 and Device11.

Figure 3-10 Device management division
Subnet01 Subnet02
Objectset01
Objectset02
Domain02 Domain01
Device11
Device06
Device05
Device02
Device04 Device03
Device01
A B C D
E F G H
Data
configuration
engineer and
part-time system
maintenance
engineer
Network
monitoring
engineer
System maintenance
engineer and part-
time data
configuration
engineer
Network
monitoring
engineer
Data
configuration
engineer and
part-time system
maintenance
engineer
System maintenance
engineer and part-
time data
configuration
engineer
Device07
Device09 Device10
Device08
Return to Authorization Planning Process.
Planning Operation Sets
To improve efficiency and simplify maintenance, the U2000 supports authorization only by
binding operation sets to personnel after domains are configured in subnet device set and user-
defined object set modes. Therefore, security administrators must analyze operation rights
required for personnel to fulfill their responsibilities and classify the operation rights into
operation sets.
If the device modes are used in a domain management plan, you do not need to plan operation
sets.
1. Analyze operation rights required for personnel to fulfill their responsibilities.
Analyze operation rights based only on user groups because personnel have been classified
into user groups based on responsibilities during user group planning. Use the user group
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
317
plan for region A described in Table 3-8 as an example. Table 3-10 describes operation
rights required for the user groups in this region.
Table 3-10 Operation rights required for user groups in region A
User Group User
Group
Memb
ers
Responsibilitie
s
Required Operation Rights
Network
monitoring
engineer
group 1
A and
B
Monitor
Subnet01
(Device01,
Device02,
Device03, and
Device04),
Device05,
Device06, and
Device11.
l Rights to monitor Subnet01
(Device01, Device02, Device03, and
Device04), Device05, Device06, and
Device11.
l Rights to perform network
management application operations
during device monitoring.
Data
configuration
and system
maintenance
engineer
group 1
C and
D
Configure data
and perform
routine
maintenance for
Subnet01
(Device01,
Device02,
Device03, and
Device04),
Device05,
Device06, and
Device11.
l Rights to configure data and perform
routine maintenance for Subnet01
(Device01, Device02, Device03, and
Device04), Device05, Device06, and
Device11.
l Rights to perform network
management application operations
during device configuration and
maintenance.
Network
monitoring
engineer
group 2
E and F Monitor
Subnet02
(Device07,
Device08,
Device09, and
Device10),
Device06, and
Device11.
l Rights to monitor Subnet02
(Device07, Device08, Device09, and
Device10), Device06, and Device11.
l Rights to perform network
management application operations
during device monitoring.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
318
User Group User
Group
Memb
ers
Responsibilitie
s
Required Operation Rights
Data
configuration
and system
maintenance
engineer
group 2
G and
H
Configure data
and perform
routine
maintenance for
Subnet02
(Device07,
Device08,
Device09, and
Device10),
Device06, and
Device11.
l Rights to configure data and perform
routine maintenance for Subnet02
(Device07, Device08, Device09, and
Device10), Device06, and Device11.
l Rights to perform network
management application operations
during device configuration and
maintenance.

2. Plan operation sets.
Plan operation sets based on operations that user groups perform on the same type of device.
If user groups support operations on different types of devices, the user groups must be
assigned different operation rights. For example, if user groups have the right to view
Device01 and Device02 and Device01 and Device02 are of different types, the user groups
must be assigned different operation rights.
l If user groups support the same network management application operations, plan the
same network management application operation set for the user groups. Otherwise,
separately plan network management application operation sets for the user groups.
l If user groups support the same network device operations, plan the same network
device operation set for the user groups. Otherwise, separately plan network device
operation sets for the user groups.
For example, network monitoring engineer groups 1 and 2 require the same network
management application operation rights; therefore, the same operation set is planned for
the two groups. Table 3-11 describes the operation set plan for region A.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
319
Table 3-11 Operation set plan for region A
Operation
Set Type
Operation Sets
Network
device
operation
set
l Device monitoring operation set 1: rights to monitor Subnet01
(Device01, Device02, Device03, and Device04), Device05, Device06,
and Device11.
l Device monitoring operation set 2: rights to monitor Subnet02
(Device07, Device08, Device09, and Device10), Device06, and
Device11.
l Device configuration and maintenance operation set 1: rights to
configure and maintain Subnet01 (Device01, Device02, Device03, and
Device04), Device05, Device06, and Device11.
l Device configuration and maintenance operation set 2: rights to
configure and maintain Subnet02 (Device07, Device08, Device09, and
Device10), Device06, and Device11.
Network
manageme
nt
application
operation
set
l Network management application operation set for system monitoring
engineers: rights to perform network management application
operations during device monitoring.
l Network management application operation set for data configuration
and system maintenance engineers: rights to perform network
management application operations during device configuration and
maintenance.
NOTE
The U2000 provides Default Operation Sets. To save operation set creation time,
consider using these operation sets as the first choice when planning user
authorization.

Return to Authorization Planning Process.
Sorting Data and Creating a User Group Attribute Table
After planning user groups, domains, and operation sets, create a user group attribute table for
reference during authorization and right maintenance.
The user group attribute table must include the user group member, domain, and operation right
columns. The domain column must specify modes in which managed objects are added to
domains. The operation right column must specify modes in which rights are assigned to
personnel. Table 3-12 is the user group attribute table generated based on Table 3-8, Table
3-9, Table 3-10, and Table 3-11.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
320
Table 3-12 User group attribute table for region A
User
Group
User
Group
Membe
rs
Responsibili
ties
Domain Operation Rights
Network
monitori
ng
engineer
group 1
A and B Monitor
Subnet01
(Device01,
Device02,
Device03, and
Device04),
Device05,
Device06, and
Device11.
l Subnet device
set Subnet01.
l User-defined
object set
Objectset01.
Subnet01 contains
Device01,
Device02,
Device03, and
Device04.
Objectset01
contains Device05,
Device06, and
Device11.
Device monitoring operation
set 1 of the network device
operation set type: rights to
monitor Subnet01
(Device01, Device02,
Device03, and Device04),
Device05, Device06, and
Device11.
Network management
application operation set for
system monitoring
engineers, which is of the
network management
application operation set
type.
Data
configur
ation and
system
maintena
nce
engineer
group 1
C and D Configure data
and perform
routine
maintenance
for Subnet01
(Device01,
Device02,
Device03, and
Device04),
Device05,
Device06, and
Device11.
Device configuration and
maintenance operation set 1
of the network device
operation set type: rights to
configure and maintain
Subnet01 (Device01,
Device02, Device03, and
Device04), Device05,
Device06, and Device11.
Network management
application operation set for
data configuration and
system maintenance
engineers, which is of the
network management
application operation set.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
321
User
Group
User
Group
Membe
rs
Responsibili
ties
Domain Operation Rights
Network
monitori
ng
engineer
group 2
E and F Monitor
Subnet02
(Device07,
Device08,
Device09, and
Device10),
Device06, and
Device11.
l Subnet device
set Subnet02.
l User-defined
object set
Objectset02.
Subnet02 contains
Device07,
Device08,
Device09, and
Device10.
Objectset02
contains Device06
and Device11.
Device monitoring operation
set 2 of the network device
operation set type: rights to
monitor Subnet02
(Device07, Device08,
Device09, and Device10),
Device06, and Device11.
Network management
application operation set for
system monitoring
engineers, which is of the
network management
application operation set
type.
Data
configur
ation and
system
maintena
nce
engineer
group 2
G and H Configure data
and perform
routine
maintenance
for Subnet02
(Device07,
Device08,
Device09, and
Device10),
Device06, and
Device11.
Device configuration and
maintenance operation set 2
of the network device
operation set type: rights to
configure and maintain
Subnet02 (Device07,
Device08, Device09, and
Device10), Device06, and
Device11.
Network management
application operation set for
data configuration and
system maintenance
engineers, which is of the
network management
application operation set.

Return to Authorization Planning Process.
3.2.4 Assigning Rights to Users
After operation rights are planned, security administrators can authorize users based on the plan.
3.2.4.1 Authorization Process
This section describes the authorization process for users to have an overall understanding of
authorization.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
322
Figure 3-11 shows the authorization process. You can click a procedure in the flowchart to
access the section for more details. The procedures involved in the authorization process are
described based on the example provided in 3.2.3 Authorization Plan.
NOTE
If no user-defined object set or user-defined operation set is involved in the authorization plan, you do not
need to create user-defined object sets or user-defined operation sets. That is, you can skip the first two
procedures in the authorization process.
Figure 3-11 Authorization process
Start
Create user-defined
object sets.
Create user-defined
operation sets.
Create user groups and
authorize them.
Create users and add the
users to the user groups.
End

3.2.4.2 Creating User-Defined Object Sets
If user-defined object sets are involved in the authorization plan, create user-defined object sets
before authorizing user groups.
Prerequisites
l You have logged in as a user in SMManagers.
l You are familiar with user roles and have planned object sets. For details, see 3.2.3
Authorization Plan.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
323
Context
l After creating object sets during the initial phase of site deployment, you can adjust them
or create object sets during site maintenance.
l If an object set is allocated to a user group, all members in the user group can view members
of the object set in the physical topology view.
l The following operation uses the examples in 3.2.3 Authorization Plan to describe how
to create an object set.
Procedure
Step 1 Determine the object set to be created and its members based on the authorization plan.
Object sets to be created and object set members are listed in Domain. For details, see Table
3-12 of 3.2.3 Authorization Plan. The following steps use Objectset01 as an example.
Step 2 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 3 In the NMS User Management navigation tree, right-click the Object Set node and choose
New Object Set.
Step 4 On the Details tab page in the New Object Set dialog box, select the Type as Network
Device, and set Name to Objectset01 and Description to Object set for region A.
Step 5 Set members of the object set.
1. On the Members tab page, click Select.
2. In the Select Object Set Member dialog box, expand the Device node in the Available
Devices and Object Sets area and select members for Objectset01. Click
to add the devices to the Selected Devices and Object Sets area. Click OK.
NOTE
l Members of an object set can be other object sets that do not contain subsets. However, you are not
advised to select object sets as members to simplify operation right maintenance.
l To select objects in existing object sets as members, click Copy Members from Object Sets in the
New Object Set dialog box and select one or more object sets in the Copy Members from Object
Sets dialog box. The members of the selected object sets are copied to the Members tab for the current
object set.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
324
NOTE
l You can click and choose Sort by topology position or Sort by device type to sort available or
selected devices and object sets.
l You can enter the desired information in the Find text box and click or to search for objects
and object sets in the up or down direction.
l You can click to specify whether to set the Match whole word only or Match case rules to
search for objects and object sets.
Step 6 In the New Object Set dialog box, click OK. The object set is created.
----End
Result
The created object set is displayed in the object set list. Double-click the object set. The objects
contained in the object set are listed on the Members tab.
Follow-up Procedure
You can click Select in the lower right corner of the Members tab to adjust the members of the
object set in the dialog box displayed.
3.2.4.3 Creating User-defined Operation Sets
If operation sets are involved in the authorization plan, create operation sets before authorizing
user groups.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
325
Prerequisites
l You have logged in as a user in SMManagers.
l You are familiar with user roles and have planned operation sets. For details, see 3.2.3
Authorization Plan.
Context
l Operation sets can be allocated to users or user groups.
l If an operation set is allocated to a user group, all members of the user group have the
operation rights in the operation set.
l The U2000 provides default operation sets.
l The following steps use the examples in 3.2.3 Authorization Plan to describe how to create
an operation set.
Procedure
Step 1 Determine the operation set to be created and its type and members based on the authorization
planning.
Operation sets to be created, types of operation sets, and operation set members are listed in
Operation Rights. For details, see Table 9 of 3.2.3 Authorization Plan. The following steps
use Device Monitoring Operation Set 1 of the network device operation set type as an example
to describe how to create an operation set.
Step 2 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 3 In the NMS User Management navigation tree, right-click the Operation Set node and choose
New Operation Set.
Step 4 On the Details tab in the New Operation Set dialog box, set Type to Network Device,
Name to Device Monitoring Operation Set 1, and Description to Operation of monitoring
devices in domain A.
Step 5 Set members of the operation set.
1. On the Members tab, click Select.
2. In the Select Operation Set Member dialog box, expand the Operation node in the
Available Rights area and select members for Device Monitoring Operation Set 1. Click
to add the members to the Selected Rights area. Click OK.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
326
NOTE
l Members of an operation set can be other operation sets that do not contain subsets. However, it
is recommended that you not select operation sets as members to simplify operation right
maintenance.
l To select operations in existing operation sets as members, click Copy Members from
Operation Sets in the New Operation Set dialog box and select one or more operation sets in
the Copy Members from Operation Sets dialog box. The members of the selected operation
sets are copied to the Members tab for the current operation set.
NOTE
l You can enter the desired information in the Find text box and click or to search for operations
and operation sets in the up or down direction.
l You can click to specify whether to set the Match whole word only or Match case rules to
search for operations and operation sets.
Step 6 In the New Operation Set dialog box, click OK. The operation set is created.
----End
Result
The created operation set is displayed in the operation set list. Double-click the operation set.
The operations contained in the operation set are listed on the Members tab.
Follow-up Procedure
You can click Select in the lower right corner of the Members tab to adjust the members of the
operation set in the dialog box displayed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
327
3.2.4.4 Creating and Authorizing U2000 User Groups
When the default user groups of the U2000 cannot meet the requirement for user rights, you can
customize user groups according to the operation rights of users so that operation rights of
devices can be conveniently assigned to users in a centralized manner.
Prerequisites
l You have logged in as a user in SMManagers.
l You have planned user groups. For details, see 3.2.3 Authorization Plan.
l You are familiar with the responsibilities of users and the operation rights of the U2000
default user groups.
Procedure
Step 1 Determine the user group to be created based on the authorization planning.
Collect information about the user group to be created, the corresponding domain, and operation
set. For details, see Table 9 of 3.2.3 Authorization Plan. The following steps use Network
monitoring engineer group 1 as an example.
Step 2 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 3 In the NMS User Management navigation tree, right-click the User Group node and choose
New User Group.
Step 4 In the New User Group dialog box, set the properties of the user group.
1. On the Details tab, set the user group name, description, type, and maximum number of
sessions.
Set Name to Network monitoring engineer group 1, Description to rights to monitor
Subnet01 (Device01, Device02, Device03, and Device04), Device05, Device06, and
Device11, User group type to Common User Group, and Maximum sessions to the
default value Unlimited.
NOTE
If the operation rights of the created user group are the same with those of an existing user group,
you can copy operation rights from the existing user group. Click Copy Rights from User
Groups. In the Copy Rights from User Groups dialog box, select one or multiple user groups and
click OK. After the copy is complete, the selected domain rights and operation rights are displayed
on the Domain and Operation Rights tabs. Security administrator can adjust the rights as required.
2. Optional: Select members.
Click Add. In the Add User dialog box, select the desired user and click OK.
NOTE
You can add users to a user group using any of the following methods:
l When creating a user group, select users as its members.
l When creating a user, you can add the user to a user group.
l After a user or user group is created, you can add the user to a user group by setting User
Groups for the user or add users by setting Member for the user group.
3. Click Next.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
328
Step 5 Set the domain for the user group to specify the object scope that the user group manages.
1. On the Domain tab page, click Select.
2. In the Select Domain dialog box, set domain parameters and click OK.
l In the Authorization Mode area, select Object Set. In the Available Objects area,
select Objectset01 and click . The selected object is added to the Selected
Objects area.
NOTE
Only user-defined object sets created by security administrators are displayed under the Object
Set node. If no user-defined object set has been created, no object set is displayed under the
Object Set node.
l In the Authorization Mode area, select Subnet Device Set. In the Available
Objects area, select Subnet01 and click . The selected object is added to
the Selected Objects area.
NOTE
You can select the other authorization modes in the Authorization Mode area as required.
You can click More/Hide to expand or hide the authorization mode.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
329
NOTE
l In the Available Objects area, you can click to view selected object set and subnet device
set members.
l You can enter the desired information in the Find text box. Click to search for objects in the
up direction, click to search for objects in the down direction, and click to specify
whether to set the Match whole word only or Match case rules.
l After clicking and select the Device authorization mode, you can click and choose
Sort by topology position or Sort by device type to sort available or selected objects.
3. Click Next.
Step 6 Set operation rights for the user group to assign U2000 application rights and object operation
rights to users.
1. On the Operation Rights tab page, click Select.
2. In the Select Operation Rights dialog box, set parameters and click OK.
l In the Authorization Objects area, select Network Management Application. In the
Operations area, select Network management application operation set for system
monitoring engineers and click . The selected right is added to the
Selected Rights area.
l In the Authorization Objects area, expand the Subnet Device Set node and select
Subnet01. In the Operations area, select Device monitoring operation set 1 and click
. The selected right is added to the Selected Rights area.
l In the Authorization Objects area, expand the Object Set node and select
Objectset01. In the Operations area, select Device monitoring operation set 1 and
click . The selected right is added to the Selected Rights area.
NOTE
After an authorized object is selected, operations that can be bound to the authorized object are
displayed in the Operations area. For details about the binding relationship between authorized
objects and operations, see Operation Rights.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
330
NOTE
l In the Authorization Objects and Operations area, you can click to view the selected object
set, subnet device set, and operation set members.
l You can click to collapse all expanded information.
l After binding operations to a selected device, you can click and choose Sort by topology
position or Sort by device type to sort rights for the device.
3. Click Finish.
----End
Result
The created user group is displayed in the user group list. Double-click the user group. The
objects managed by the user group are listed on the Domain tab, and the operations that users
in the user group can perform on the objects are listed on the Operation Rights tab.
Follow-up Procedure
You can click Select in the lower right corner of the Domain and Operation Rights tabs
respectively to adjust the managed objects and operations for the user group in the dialog box
displayed.
3.2.4.5 Creating Users and Adding the Users to User Groups
This topic describes how to create a user and add it to the corresponding user group. This helps
you to assign operation rights to the user in a centralized manner.
Prerequisites
l You have logged in as a user in SMManagers.
l You are familiar with the planning of user accounts and password policy. For details, see
Account Policy and Password Policy.
Context
l When you create an U2000 user, attributes of the user must comply with the account policy
and the password policy. For details about how to set an account policy and a password
policy, see 3.3.1.4 Setting Account Policies and 3.3.1.5 Setting Password Policies.
l After the NMS user is created, add it to the corresponding user group so that the operation
rights of the user group are granted to the user. Do not set domains or operation rights for
the user individually.
l You must manually set the user name and password. For the other attributes, you can use
default values or set them after you create the user account successfully.
l The following steps use the examples in 3.2.3 Authorization Plan to describe how to create
a user account and add it to a user group.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
331
Procedure
Step 1 Determine the user account to be created based on the authorization planning.
Collect information about the user account to be created and the corresponding user group. For
details, see Table 3-12 of 3.2.3 Authorization Plan. The following steps use User A as an
example. Because the user name is too short to comply with the U2000 security policy, the user
name is changed to Network monitoring engineer A.
Step 2 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 3 In the NMS User Management navigation tree, right-click the User node and choose New
User.
Step 4 In the New User dialog box, set general attributes of the user account and add it to a user
group. For details, see New User Account.
1. Set general attributes such as the user name, password, and confirm password.
Set User name to Network monitoring engineer A, Full Name to Network monitoring
engineer Tom, and Description to Network monitoring engineer.
NOTE
l Before setting the password, click Password Policy to view the preset password policy.
l On the Password Policy tab, you can also click Advanced to optimize the user policy.
2. Click Add. In the Add User Group dialog box, select the desired user group and click
OK.
In the Add User Group dialog box, select Network monitoring engineer group 1.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
332
Step 5 In the New User dialog box, click OK. The user account is created.
----End
Result
The created user account is displayed in the user list. Double-click the user account. The user
groups to which the user has been added are listed on the User Groups tab.
Follow-up Procedure
To add the user to another user group, click Add in the lower right corner of the User Groups
tab. To delete the user from a user group, select the user group on the User Groups tab and click
Delete in the lower right corner of the tab.
3.2.5 Transferring Operation Sets
If multiple U2000s are deployed on the global network (for example, one U2000 is deployed in
each region to manage devices) and operation sets required by the U2000s are similar according
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
333
to an authorization plan, security administrators can use the operation set import and export
functions provided by the U2000 to transfer operation sets from one U2000 to other U2000, or
add or modify operation sets on one U2000 in batches.
3.2.5.1 Exporting Operation Sets
You can back up all operation sets to your local PC and search out the operation set to which a
right belongs by exporting operation. You can also add or change members in an operation set
and import the changed operation set file to the U2000 using the Import Operation Sets
function.
Prerequisites
You have logged in as user admin.
Context
l For a newly installed U2000, export operation set files about the network management
application and network devices, add new operation sets to the files, and import the changed
files to the U2000 using the Import Operation Sets function. In this way, you can create
operation sets in batches at one time.
l For a U2000 that has being running for a period of time, you can export operation set files
to the local computer. This helps you restore operation sets using the Import Operation
Sets function after upgrading and bulk deleting old operation sets.
l The default U2000 operation sets Security Monitor Operation Set, All Object
Operations and All Application Operations are excluded from exported operation sets.
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 On the top of the NMS User Management navigation tree, click , and then select Export
Operation Sets.
Step 3 In the Save dialog box, rename the exported file and save the file to a specified location, then
click Save.
Step 4 In the Information dialog box, click OK.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
334
Result
l The Network Management Application and Network Device operation sets are saved in
separate files.
NOTE
All operation information is listed from columns A to E in the exported operation set files. The
information listed after column E is information about operation sets that exist on the U2000.
Members in the existing operation sets are indicated by the letter Y in the operation list.
l The formats of default file names are
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device.csv and
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Management_Application.
csv.
NOTE
l You can specify Operation_Sets_YYYY_MM_DD_HH_MM_SS when saving operation set
files.
l An operation set file can contain a maximum of 100 operation sets. When the maximum number
is reached, subsequent data is saved to a new operation set file named in the format
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device@N.csv or
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Management_Application@N.cs
v. N is an integer starting from 1. For example, if exported data includes 300 Network Device
operation sets, the Network Device operation sets is saved into three files named in the following
formats: Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device.csv,
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device@1.csv, and
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device@2.csv.
3.2.5.2 Adding Operation Sets or Changing Operation Set Members in Batches
If you want to add multiple operation sets or adjust the members of multiple operation sets in
batches, you can export the information about all the operation sets in the U2000 system into a
file, add operation sets to the file and change operation set members in the file, and then import
the edited file for it to take effect.
Prerequisites
l You have logged in as user admin.
l The file containing the exported operation set information should be edited by user
admin based on the right-related policy and operation set planning.
l The information about all the operation sets in the U2000 is exported and saved in a file.
For details, see 3.2.5.1 Exporting Operation Sets.
l You are familiar with the planning of system operations or operation sets. For details, see
3.2.3 Authorization Plan.
Context
l This operation does not apply to the change of operation set names.
l The information in columns from A to E in the operation set file cannot be modified. If it
is modified, importing the file will fail. If the information is modified, export operation set
file again.
l In the operation set file, the table cells in line 10 and columns except columns from A to E
contain only operation set names.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
335
l If the operation set name in the file exists in the current U2000, the operation set fails to
import.
l The naming convention of a new operation set is the same as that of an operation set created
in the U2000.
Procedure
Step 1 Open and edit the .csv file containing the exported operation set information.
Figure 3-12 Files containing the U2000 application operation sets
To add an U2000 application operation set, perform the following steps:
l Adding an operation set
1. In the .csv file, add a column next to column E, and enter the name of the new operation
set in the first cell of the new column, such as Figure 3-12. Assume that the U2000
has Operation Set A and Operation Set B, you can add New Operation Set C next
to Operation Set B.
2. Adding members for the new operation set. You can enter Y in the line where an
operation to be performed. See Figure 3-12. The blue area stand for that Create
Subnet and Modify NE are performed for New Operation Set C.
NOTE
Only letter Y is valid.
l Modifying the operations of an operation set. Assume Operation Set A already exists in
the U2000. You can modify the operation set members as follows:
1. Enter Y in the associated table cell of operation set. If you need to delete Query
System Logs of Operation Set A, delete Y of Operation Set A. If you need to add
Create Subnet, type Y in the associated table cell of Operation Set A.
2. To prevent a file import failure due to inconsistency between operation set information
in the file and that on the U2000 client, delete the operation set modified in the previous
step from the client. In this example, delete Operation Set A.
Step 2 Save the file, and import the file by following the procedure provided in 3.2.5.3 Importing Files
Containing Operation Set Information for the file to take effect.
----End
Result
After the file is imported successfully, you can view the change of the rights in an operation set.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
336
3.2.5.3 Importing Files Containing Operation Set Information
This topic describes how to import operation set files for restoring the lost operation sets on the
U2000. By importing operation set files. you can add operation sets in batches or change
members in operation sets on the U2000.
Prerequisites
l You have logged in as user admin.
l The information about all the operation sets in the U2000 is exported and saved in a file.
For details, see 3.2.5.1 Exporting Operation Sets.
l You are familiar with user roles and have planned operation sets. For details, see 3.2.3
Authorization Plan.
Context
l The operation set files to be imported must be exported using the Export Operation
Sets function.
l If the operation set name in the file exists in the current U2000, the operation set fails to
import.
Procedure
Step 1 Optional: In the exported operation set files, add operation sets or modify members in the
operation sets in batches.
NOTICE
l This operation does not apply to the change of operation set names.
l The information in columns from A to E in the operation set file cannot be modified. If it is
modified, importing the file will fail. If the information is modified, export operation set file
again.
l In the operation set file, the table cells in line 10 and columns except columns from A to E
contain only operation set names.
1. Open and edit the .csv file containing the exported operation set information.
Figure 3-13 Files containing the U2000 application operation sets
To add an U2000 application operation set, perform the following steps:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
337
Operation Name Operation Method
Add an operation set 1. In the .csv file, add a column next to column E, and enter the
name of the new operation set in the first cell of the new
column, such as Figure 3-13. Assume that the U2000 has
Operation Set A and Operation Set B, you can add New
Operation Set C next to Operation Set B.
NOTE
The operation set name contains a maximum of 100 characters.
2. Adding members for the new operation set. You can enter
Y in the line where an operation to be performed. See Figure
3-13. The blue area stand for that Create Subnet and Modify
NE are performed for New Operation Set C.
NOTICE
Only letter Y is valid.
Modify the
operation set
members
Assume Operation Set A already exists in the U2000. You can
modify the operation set members as follows:
1. Enter Y in the associated table cell of operation set. If you
need to delete Query System Logs of Operation Set A,
delete Y of Operation Set A. If you need to add Create
Subnet, type Y in the associated table cell of Operation Set
A.
2. To prevent a file import failure due to inconsistency between
operation set information in the file and that on the U2000
client, delete the operation set modified in the previous step
from the client. In this example, delete Operation Set A.

2. Save the file.
Step 2 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style).
Step 3 On the top of the NMS User Management navigation tree, click and select Import
Operation Sets.
Step 4 In the Open dialog box, select the .csv file to be imported and click Open.
Step 5 In the Confirm dialog box, click Yes.
Step 6 In the Information dialog box, click OK.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
338
Result
Operation sets contained in the imported file are listed under the Operation Set node in the
navigation tree on the left. After you choose an operation set, members of the operation set are
displayed in the right pane, which are the same as those specified in the imported file.
3.2.6 Operation Right Adjustment After Device Addition or
Deletion
After new devices (NEs or subnets) are deployed for maintenance, security administrators must
assign operation rights for the new devices to user groups. After devices are deleted, operation
rights for the devices are automatically deleted from users or user groups' operation rights.
3.2.6.1 Adjusting Operation Rights After an NE Is Added
After an NE is added, a security administrator must assign operation rights for the NE to the
user group that manages the NE.
Prerequisites
l You have logged in as a user in SMManagers.
l A user group has been planned to manage the new NE.
Context
If initial authorization has met the following conditions, users in the user group automatically
have the operation rights for the new NE, and no adjustment is required.
The subnet device set to which the new NE belongs has been added to the user group's domain.
The operation set bound to the subnet device set contains all required operations on the new NE.
Figure 3-14 shows the process of adjusting operation rights after an NE is added.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
339
Figure 3-14 Process of adjusting operation rights after an NE is added
Start
End
Check user groups' domains
and operation rights. Do the user groups
automatically have operation rights
for the new NE?
After the subnet device set
to which the new NE belongs is added
to the user groups' domains, do the user
groups lack operations performed
on the new NE?
No
No
Add the operations performed on the new NE
to the user groups' operation sets.
Add the new NE to the user groups' domains.
Assign the operations performed on the
new NE to the user groups.
Yes
Yes

Procedure
Step 1 Viewing the Domain of a User or User Group and Viewing Operation Rights of a User or
User Group. Determine whether the user group automatically has the operation rights for the
new NE based on the context information mentioned above.
l If yes, the procedure ends.
l If the subnet device set to which the new NE belongs has been added to the user group's
domain, but the user group's operation rights do not contain the operation rights for the NE,
perform Step 2.
l If none of the preceding conditions is met, perform Step 4.
Step 2 Add the operation rights for the new NE to the user group's operation set.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
340
2. In the NMS User Management navigation tree, expand the Operation Set node and select
the user group's operation set.
3. On the Members tab page in the right pane, click Select.
4. In the Available rights area of the Select Operation Set Member dialog box, select
operation rights for the type of the new NE.
5. Click to move the operation rights to the Selected Rights area.
6. Click OK.
The operation rights for the new NE are assigned to the user group.
Step 3 Add the new NE to the user group's domain.
l If the user group is authorized using a user-defined object set, perform the following steps:
1. Choose OSS Security > OSS User Management (application style) or
Administration > NMS Security > NMS User Management (traditional style) from
the main menu.
2. In the NMS User Management navigation tree, expand the Object Set node and select
the user group's object set.
3. On the Members tab page in the right pane, click Select.
4. In the Available Devices and Object Sets area of the Select Object Set Member dialog
box, expand all nodes and select the new NE.
5. Click to move the new NE to the Selected Devices and Object Sets area.
6. Click OK.
l If the user group is authorized using the device mode, perform the following steps:
1. Choose OSS Security > OSS User Management (application style) or
Administration > NMS Security > NMS User Management (traditional style) from
the main menu.
2. In the NMS User Management navigation tree, expand the User Group node and
choose the user group that manages the new NE.
3. On the Domain tab page in the right pane, click Select.
4. In the Select Domain dialog box, click More in the Authorization Mode area and
select Device.
5. In the Available Objects area, select the new NE.
6. Click to move the new NE to the Selected Objects area.
7. Click OK.
Step 4 Verify that the user group's operation rights include the operation rights for the new NE.
l If the user group is authorized using a user-defined object set, perform the following steps:
1. In the NMS User Management navigation tree, expand the Operation Set node and
select the operation set corresponding to the user-defined object set.
2. On the Members tab page in the right pane, check whether the user group's operation
set contains the operation rights for the new NE.
If yes, the procedure ends.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
341
If no, go to the next step.
3. On the Members tab page in the right pane, click Select.
4. In the Available Rights area of the Select Operation Set Member dialog box, select
operation rights for the type of the new NE.
5. Click to move the operation rights to the Selected Rights area.
6. Click OK.
l If the user group is authorized using the device mode, perform the following steps:
1. On the Operation Rights tab page in the right pane, click Select.
2. In the Authorization Objects navigation tree of the Select Operation Rights dialog
box, expand the Device node and select the new NE.
3. In the Operation navigation tree, select required operation rights and add them to
Selected Rights in the right pane.
4. Click OK.
The operation rights for the new NE are assigned to the user group.
----End
3.2.6.2 Adjusting Operation Rights After a Subnet Is Added
After a subnet is added, a security administrator must assign operation rights for the subnet to
the user groups that manage the subnet.
Prerequisites
l You have logged in as a user in SMManagers.
l You have obtained information about user groups that manage the new subnet, types of all
devices on the subnet, and operation rights required for the user groups to manage the
devices.
Context
l Based on the original authorization mode, assign operation rights for the new subnet as
follows:
If the original authorization mode is the device mode, assign operation rights based on
subnet device sets.
If the original authorization mode is the subnet device set mode or user-defined object
set mode, assign operation rights based on subnet device sets.
l If the new subnet is managed by multiple user groups, adjust each user group's operation
rights in a similar way. This section describes the process of adjusting a user group's
operation rights.
Figure 3-15 shows the process of adjusting operation rights after a subnet is added.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
342
Figure 3-15 Process of adjusting operation rights after a subnet is added
Start
Query user groups' authorization modes.
Add the subnet device set corresponding to
the new subnet to the user groups' domains.
Create an operation set. Add operations
performed on objects on the new subnet to
the operation set.
Assign the operation set to the user groups.
Add the subnet device set corresponding to
the new subnet to the user groups' domains.
Do the user
groups' operation sets contain
operations performed on various
types of devices on the
new subnet?
Bind the operation sets to the
subnet device set.
Add the operations performed on various
types of devices on the new subnet to the
user groups' operation sets.
End
Yes No
User groups are authorized in
single-device mode.
User groups are authorized in subnet
device set or user-defined object set mode.

Procedure
Step 1 Add the subnet device set corresponding to the new subnet to the user group's domain.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the User Group node and choose
the user group that manages the new subnet.
3. On the Domain tab page on the right, click Select.
4. In the Authorization Mode area of the Select Domain dialog box, select Subnet Device
Set.
5. In the Available Objects area, select the subnet device set that corresponds to the new
subnet and has the same name as the new subnet, and click to add the subnet
device set to the user group's domain.
6. Click OK to close the Select Domain dialog box.
Step 2 Query the user group's authorization mode. For details, see 3.2.8.2 Viewing Operation Rights
of a User or User Group.
l If the user group is authorized in device mode, create an operation set for the new subnet.
For details, see 3.2.4.3 Creating User-defined Operation Sets. After an operation set is
created, perform Step 5.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
343
l If the user group is authorized in subnet device set mode or user-defined object set mode,
perform Step 3.
Step 3 Check whether the network device operation set contains all operation rights for various types
of devices on the new subnet. For details, see 3.2.8.5 Viewing Operations Contained in an
Operation Set.
l If the network device operation set does not contain all required operation rights, perform
Step 4.
l If the network device operation set contains all required operation rights, perform Step 5.
Step 4 Modify the network device operation set so that it contains all operation rights for various types
of devices on the new subnet.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the Operation Set node and
choose the network device operation set corresponding to the user group.
3. On the Members tab page in the right pane, click Select.
4. In the Available Rights area of the Select Operation Set Member dialog box, select
operation rights for various types of devices on the new subnet.
5. Click to move the operation rights to the Selected Rights area.
6. Click OK.
Step 5 Bind the network device operation set that contains all required operation rights for the new
subnet to the subnet device set.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the User Group node and choose
the user group that manages the new subnet.
3. On the Operation Rights tab page in the right pane, click Select.
4. In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Subnet Device Set node in the navigation tree and choose the subnet device set
corresponding to the new subnet.
5. In the Operation area, select the network device operation set that contains all required
operation rights for the new subnet. Click to add the network device
operation set to the Selected Rights area.
6. Click OK to close the Select Operation Rights dialog box.
The operation rights for the new subnet are assigned to the user group.
----End
3.2.6.3 Adjusting Operation Rights After the Networking Structure Is Changed
After the networking structure is changed (including NE transfer and global networking structure
modification), management responsibilities may be shifted from one group to another. If this
occurs, security administrators must adjust user groups' operation rights.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
344
Procedure
l During NE transfer (for example, when an NE is transferred from one subnet to another),
a security administrator adjusts user groups' operation rights by deleting the NE from the
transferor user group's domain and adding the NE to the transferee user group's domain.
For details, see 3.2.6.1 Adjusting Operation Rights After an NE Is Added.
If the NEs are assigned to the transferor user group in subnet device set mode, the
security administrator does not need to adjust the transferor user group's operation rights
after NE transfer.
If the NEs are assigned to the transferor user group in object set mode or device mode,
delete the NEs from the user group's domain. For details, see NE Scope Change.
l During global networking structure modification, a security administrator plans
authorization and authorizes users again. For details, see Performing the Initial
Authorization.
----End
3.2.7 Operation Right Adjustment After Personnel's
Responsibilities Change
If the topology of managed objects remains unchanged whereas personnel's responsibilities
change, for example, changes to managed NE scopes, operation rights, and posts, security
administrators must adjust users' operation rights.
3.2.7.1 Adjusting Operation Rights After the Scope of Managed Objects Is Changed
When the topology of managed objects remains unchanged and the management rights are
transferred from a user group to another one, security administrators must adjust the user group
rights.
Prerequisites
You have logged in as a user in SMManagers.
NE Scope Change
In subnet device set mode, user groups are assigned operation rights for devices based on subnets.
Therefore, security administrators do not need to adjust operation rights after the scope of
managed objects is changed if user groups are authorized in subnet device set mode.
Step 1 Delete NEs from the transferor user group's domain.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand User Group and select the user
group that no longer manages NEs.
3. On the Domain tab page in the right pane, delete NEs based on authorization modes.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
345
Operation Right
Configuration Mode
NE Deletion Method
Add an NE to an object
set and assign the object
set to a user group.
1. In the NMS User Management navigation tree, expand
the Object Set node and choose the object set to which
the NE belongs.
2. On the Applicable for tab page in the right pane, check
whether the object set has been assigned to other user
groups.
l If no, perform step 3 to delete the NE from the object
set. The procedure ends.
l If yes, check whether the NE deletion applies to these
user groups.
If yes, perform step 3 to delete the NE from the
object set. The procedure is complete.
If no, perform steps 4, 5, and 6 to change the object
set for the user group that no longer manage the
NE. The procedure is complete.
3. On the Members tab in the right pane, select the NE and
click Delete. In the Confirm dialog box, click OK.
4. Re-create an object set. For details, see Creating User-
Defined Object Sets. Copy the members of the original
object set to the new object set and delete the NE that is
no longer managed by the user group.
5. On the Domain tab for the user group, add the new object
set to the user group's domain. On the Operation
Rights tab for the user group, bind the operation set for
the original object set to the new object set.
6. Delete the original object set from the user group's
domain.
Assign an NE to a user
group in device mode.
1. Expand the Device node, choose the NE, and click
Delete in the lower right corner.
2. In the Confirm dialog box, click OK.

Step 2 Adjust the operation rights for the NEs for the transferee user group. For details about how to
adjust operation rights, see 3.2.6.1 Adjusting Operation Rights After an NE Is Added.
----End
Subnet Scope Change
The entire subnet is transferred from a user group to another.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand User Group and select a user
group that does not manage the subnet.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
346
3. On the Domain tab page right to the navigation tree, select the subnet device set and click
Delete.
4. In the Confirm dialog box, click OK.
5. For a user group that is going to manage subnet rights, assigning subnet rights to it means
adding a new subnet. For details about how to adjust operation rights, see 3.2.6.2 Adjusting
Operation Rights After a Subnet Is Added.
3.2.7.2 Adjusting Operation Rights After the Scope of Operation Rights Is Changed
If a user group's operation rights for a managed object must be added or deleted due to changes
to personnel's responsibilities, security administrators must adjust operation rights as required.
Prerequisites
You have logged in as a user in SMManagers.
Procedure
Step 1 View the operation rights of a desired user group.
Step 2 Adjust the operation rights of the user group as required.
Task Operations
Adding an operation
right for a managed
object
l For assigning operation rights for a single device or a device
type:
1. On the Operation Rights tab page, click Select.
2. In the Select Operation Rights dialog box, expand
Device or Device Type in the Authorization Objects
navigation tree and select a device or a device type. In the
Operation navigation tree, select the desired operations
and add them to Selected rights in the right pane.
3. Click OK.
l For details about how to assign operation rights for subnet
device sets and user-defined object sets on the basis of existing
operation sets, see step 4 in 3.2.8.5 Viewing Operations
Contained in an Operation Set.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
347
Task Operations
Deleting an operation
right for a managed
object
l For assigning operation rights for a single device or a device
type: On the Operation Rights tab page, expand Device or
Device Type, select the desired operations, and click Delete.
l For assigning operation rights for subnet device sets and user-
defined object sets: Select the bound operation sets, right-
click, and choose View Members from the shortcut menu.
Check whether the operation sets contain operation rights that
need to be deleted. If the operation sets contain operation
rights that need to be deleted, see step 4 in 3.2.8.5 Viewing
Operations Contained in an Operation Set to delete the
operation rights.
NOTE
An operation may exist in multiple operation sets. The operation right
is deleted from a user group only when all operation sets bound to the
user group do not contain the operation.
----End
3.2.7.3 Adjusting Operation Rights After Management Personnel's Posts Change
After management personnel's posts change due to role changes, recruitment, resignation, or
other reasons, U2000 security administrators must adjust users' operation rights.
Prerequisites
You have logged in as a user in SMManagers.
Role Change
After management personnel's roles change, security administrators must perform the following
steps to adjust user groups to which the personnel belong:
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand User and select a user whose user
group is to be adjusted.
3. On the User Groups tab page in the right pane, select the user group to which the user
belongs and click Delete. In the Confirm dialog box that is displayed, click Yes.
4. On the User Groups tab page in the right pane, click Add. In the Add User Group dialog
box, select a user group to which the user is to be added and click OK.
Recruitment
If new employees are recruited, security administrators must create user accounts and assign the
user accounts to the new employees. For details about how to create user accounts and assign
operation rights to user accounts, see 3.2.4.5 Creating Users and Adding the Users to User
Groups.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
348
Resignation
After an employee resigns, the employee's user account is no longer used or is retained.
l To delete the user account, security administrators perform the following steps:
1. Choose OSS Security > OSS User Management (application style) or
Administration > NMS Security > NMS User Management (traditional style) from
the main menu.
2. In the NMS User Management navigation tree, expand User. Right-click the user to
be deleted and choose Delete from the shortcut menu. In the Confirm dialog box that
is displayed, click Yes.
l To retain the user account for future use, security administrators perform the following
steps:
1. Choose OSS Security > OSS User Management (application style) or
Administration > NMS Security > NMS User Management (traditional style) from
the main menu.
2. In the NMS User Management navigation tree, expand User and choose a user.
3. On the Details tab page, set Disable user account to Yes.
NOTICE
l If the policy for deleting a user account when the user account is not used to log
in for a specified period has been set in Setting the Account Policy, the user
account is deleted when it has not been used to log in for the specified period.
l After an employee resigns or a user account is re-enabled, the corresponding user
password must be changed to improve account security.
3.2.8 Querying Authorization
During the period of initial authorization and right maintenance, you can query the user rights
and right assignment and compare the right differences between two users.
3.2.8.1 Viewing a User or User Group's Domain
Security administrators can view users or user groups' domains to identify objects that are
managed by the users or user groups.
Prerequisites
You have logged in as a user in SMManagers.
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
349
Step 2 In the NMS User Management navigation tree, expand User or User Group and select a user
or a user group.
Step 3 On the Domain tab page, view managed objects in the user domain.
The following table lists different methods for viewing domains based on the authorization
mode.
Authorization
Mode
Method
All objects The domain contains all network objects.
Subnet device set Expand Subnet Device Set. Right-click a desired subnet device set and
choose View Member from the shortcut menu.
User-defined
object set
Expand Object Set. Right-click a desired user-defined object set and
choose View Member from the shortcut menu.
To change objects in object sets, see step 4 in 3.2.8.6 Viewing Objects
Contained in an Object Set.
Device Expand Device and view managed device.

iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
350
NOTE
l If you select Show the domain of the owner user group when viewing a user's domain, managed
objects displayed include managed objects that the user inherits from user groups. Perform the
following operations to view the inherited managed objects:
1. Switch to the User Groups tab page. View the user groups to which the user belongs.
2. View the managed objects contained in each user group.
l If you select Sort by device type, objects under the Device node on the Domain tab are grouped by
type.
l By default, Show the domain of the owner user group is selected and Sort by device type is
deselected.
----End
3.2.8.2 Viewing Operation Rights of a User or User Group
Security administrators can view users' or user groups' operation rights to identify operations
that the users or user groups perform on managed objects.
Prerequisites
You have logged in as a user in SMManagers.
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 In the NMS User Management navigation tree, expand User or User Group and select a user
or a user group.
Step 3 On the Operation Rights tab page, expand the object node and view the operation rights of the
user or user group on each object.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
351
The following table lists different methods for viewing operation rights based on the
authorization mode.
Authorization
Mode
Method
Network
management
application
Expand Network Management Application. Right-click the
corresponding operation set and choose View Member from the shortcut
menu.
To change operations in the operation set, see step 4 in 3.2.8.5 Viewing
Operations Contained in an Operation Set.
Subnet device set Expand Subnet Device Set. Right-click the corresponding operation set
and choose View Member from the shortcut menu.
To change operations in the operation set, see step 4 in 3.2.8.5 Viewing
Operations Contained in an Operation Set.
User-defined
object set
Expand Object Set. Right-click the corresponding operation set and
choose View Member from the shortcut menu.
To change operations in the operation set, see step 4 in 3.2.8.5 Viewing
Operations Contained in an Operation Set.
Device Expand Device and view operation rights of the user on different devices.

NOTE
When you view user operation rights, the displayed user operation rights contain the operation rights
inherited from the user groups if Show the operation rights of the owner user group is selected. Perform
the following operations to view the inherited operation rights:
1. View the user groups to which the user belongs.
2. View the operation rights contained in each user group.
By default, Show the domain of the owner user group is selected.
----End
3.2.8.3 Viewing User Groups To Which a User Belongs
Security administrators can view user groups to which users belong to identify the user groups
whose operation rights are inherited by the users.
Prerequisites
You have logged in as a user in SMManagers.
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 In the NMS User Management navigation tree, expand User and select a user.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
352
Step 3 On the User Groups tab page, view user groups to which the user belongs.
----End
3.2.8.4 Querying User and User Group Authorization Details
Viewing the associative user or user group of an operation set is to view the user or user group
that is associated with the operation set during user authorization.
Prerequisites
You have logged in as a user in SMManagers.
Context
The Administrators group contains all operation rights on the U2000 except Security
Management rights. Therefore, in the Authorization Details dialog box, the
Administrators is always displayed in the Authorized User/User Group area when any
operation or operation set is selected.
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 On the top of the NMS User Management navigation tree, click .
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
353
NOTE
You can enter the desired information in the Find text box. Click to search for devices or object sets
in the up direction, click to search for devices or object sets in the down direction, and click to
specify whether to set the Match whole word only or Match case rules.
Step 3 In the Authorization Details dialog box, expand the root node or parent node and select a child
node in the navigation tree.
After a node is selected, the corresponding operation or operation set is displayed in the
Operation area.
Step 4 In the Operation area, expand the root node or parent node and select an operation or operation
set.
In the Authorized User/User Group area, you can view the user or user group to which
operation rights are assigned.
----End
3.2.8.5 Viewing Operations Contained in an Operation Set
Security administrators can view specific operations contained in an operation set and check
whether the contained operations meet the requirements.
Prerequisites
You have logged in as a user in SMManagers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
354
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 In the NMS User Management navigation tree, expand Operation Set and select the desired
operation set.
Step 3 On the Members tab page, view operations contained in the operation set.
NOTE
l On the Details tab page, you can view the operation set type (U2000 application operation set or
network device operation set).
l On the Applicable for tab page, you can view the users and user groups to which the operation set is
assigned.
Step 4 Optional: Add an operation to or delete an operation from the operation set.
l Adding an operation: On the Members tab page, click Select. In the Select Operation Set
Member dialog box, select the desired operation set member and click OK.
l Deleting an operation: On the Members tab page, select one or multiple operation set
members and click Delete, then click Yes in the displayed Confirm dialog box.
----End
3.2.8.6 Viewing Objects Contained in an Object Set
Security administrators can view specific objects contained in an object set and check whether
the contained objects meet the requirements.
Prerequisites
You have logged in as a user in SMManagers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
355
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 In the NMS User Management navigation tree, expand Object Set and select the desired object
set.
Step 3 On the Members tab page, view objects contained in the object set.
NOTE
l On the Details tab page, you can view the details of the object set.
l On the Applicable for tab page, you can view the users and user groups to which the object set is
assigned.
l After Sort by device type is selected, the members of the object set are sorted by device type. If the
object set contains no device, Sort by device type is dimmed.
Step 4 Optional: Add members to or delete members from the object set.
l For adding members: On the Members tab page, click Select. In the Select Object Set
Member dialog box, select the desired object set members and click OK.
l For deleting members: On the Members tab page, select and right-click one or multiple
object set members and choose Delete from the shortcut menu, then click Yes in the displayed
Confirm dialog box.
----End
3.2.8.7 Comparing U2000 User Rights
This topic describes how to compare the rights of two NMS users to check for the differences.
Prerequisites
You have logged in as a user in SMManagers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
356
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 On the top of the NMS User Management navigation tree, click .
Step 3 In the Compare Users dialog box, select a user from the Primary User and Secondary User
list boxes, click Compare.
Step 4 View the result in Compare User Rights.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
357
NOTE
l During the comparison of rights between user A and user B, if user A has an operation right but user
B does not have this right, this right node of user B is displayed as a blank node.
l On the U2000, you cannot compare rights of the same user. If you select the same user in the left and
right columns, the Compare button is unavailable.
l In the Compare User Rights dialog box, the U2000 can display user rights in either of the following
modes:
l Display all rights: All user rights are displayed in the group box.
l Display only differences: Only the differences between user rights are displayed in the group box.
----End
3.2.9 FAQs About Authorization
This section describes how to rectify faults in authorization.
3.2.9.1 How Do I Determine an Operation Right Type?
Symptom
Users may have difficulty determining the types of operation sets when users want to create an
operation set for storing dedicated operation permission, because they are not sure whether the
operation permission belongs to the Network Management Application or Network Device
type.
Possible Causes
l Users cannot determine the type of an operation right.
l Names of some device operation rights are similar to those of some network management
application operation rights.
Procedure
Step 1 Export operation sets to your local PC by referring to Exporting the Files Containing
Operation Set Information.
NOTE
Only the admin user can export operation sets.
Step 2 Search for the operation right name in the following two files.
l If the operation right name is displayed in the *_Network_Device.csv file, the right is of the
Network Device type.
l If the operation right name is displayed in the *_Network_Management_Application.csv
file, the right is of the Network Management Application type.
l If the right name cannot be found in the two files, check the entered name of the operation
right.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
358
NOTE
The formats of default file names are
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Device.csv and
Operation_Sets_YYYY_MM_DD_HH_MM_SS_Network_Management_Application.csv. You can
specify Operation_Sets_YYYY_MM_DD_HH_MM_SS when saving operation set files.
----End
3.2.9.2 How Do I Adjust Operation Rights After an NE Is Added?
After an NE is added, related users' operation rights must be adjusted. If the plan is not found
or users are not authorized by binding to user groups, adjust operation rights by following the
instructions provided in this FAQ.
Question
How do I adjust operation rights after an NE is added?
Answer
If a plan for authorizing users by binding users to user groups is made during initial authorization,
adjust operation rights by following the procedure provided in 3.2.6.1 Adjusting Operation
Rights After an NE Is Added. Otherwise, adjust operation rights based on site requirements
by following the procedure shown in Figure 3-16.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
359
Figure 3-16 Process of adjusting operation rights after an NE is added
Determine the users who manage the new
NE.
Query each user's or the user group's
authorization modes.
Add the NE to each user's or the
user group's domain.
Start
Do the users exist?
Plan user authorization and
authorize the users by referring to
the Authorization Plan topic.
Is the new NE contained in the
subnet whose corresponding
subnet device set is in each user's
or the user group's domain?
Does the network device operation
set bound to the subnet device set
contain operation rights for the
NE?
End
Add the operation rights to the subnet
operation set.
Assign operation rights for the NE to
the users or user group.
Yes
Yes
No
No
End
Do the users belong to the same
user group that contains only the
users?
Perform the subsequent
operations on the user group.
Perform the subsequent
operations on each user.
Yes
No
Yes
No

The procedure is described as follows:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
360
Step 1 Determine users who manage the new NE, and check whether the users exist.
l If new users are required to manage the new NE, plan user authorization and authorize users
by following the procedure provided in Performing the Initial Authorization.
l If users who manage the new NE exist, perform Step 2.
Step 2 Check whether the users belong to the same user group. If the users who manage the new NE
belong to the same user group and the user group contains only the users, operations described
below are performed on the user group. Otherwise, operations described below are performed
on each user who manages the new NE.
Step 3 Query a user or user group's authorization mode by following the procedure provided in 3.2.8.2
Viewing Operation Rights of a User or User Group.
If the new NE is on a subnet and the user or user group's domain includes the subnet device set
corresponding to the subnet, perform Step 4. Otherwise, perform Step 6.
Step 4 Check whether the network device operation set corresponding to the subnet device set
(described in Step 3) to which the new NE belongs contains operation rights for the new NE.
For details, see 3.2.8.5 Viewing Operations Contained in an Operation Set.
If the operation rights for the new NE exist in the network device operation set, the user or user
group automatically has the operation rights for the new NE. The procedure is complete.
Otherwise, perform Step 5.
Step 5 Add the operation rights for the new NE to the network device operation set corresponding to
the user or user group's subnet device set.
1. In the NMS User Management navigation tree, expand the Operation Set node and
choose the network device operation set corresponding to the subnet device set.
2. On the Members tab page in the right pane, click Select.
3. In the Available Rights area of the Select Operation Set Member dialog box, select
operation rights for the type of the new NE.
4. Click to move the operation rights to the Selected Rights area.
5. Click OK.
The procedure ends.
Step 6 Add the new NE to the user or user group's domain.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand User or User Group and select a
user or the user group that manages the new NE.
3. On the Domain tab page in the right pane, click Select.
4. In the Authorization Mode area of the Select Domain dialog box, click More to display
all modes, and select Device.
5. Select the new NE in the Available Objects area.
6. Click to move the NE to the Selected Objects area.
7. Click OK. The new NE is added to the user or user group's domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
361
Step 7 Add the operation rights for the new NE.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand User or User Group and select a
user or the user group that manages the new NE.
3. On the Operation Rights tab page in the right pane, click Select.
4. In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Device node and select the device corresponding to the new NE.
5. In the Operation area, select the operations for the new NE.
6. Click to move the operations to the Selected Rights area.
7. Click OK. The operation rights for the new NE are added.
The procedure ends.
----End
3.2.9.3 How Do I Adjust Operation Rights After a Subnet Is Added?
After a subnet is added, related users' operation rights must be adjusted. If the plan is not found
or users are not authorized by binding to user groups, adjust operation rights by following the
instructions provided in this FAQ.
Question
How do I adjust operation rights after a subnet is added?
Answer
If a plan for authorizing users by binding users to user groups is made during initial authorization,
adjust operation rights by following the procedure provided in 3.2.6.2 Adjusting Operation
Rights After a Subnet Is Added. Otherwise, adjust operation rights based on site requirements
by following the procedure shown in Figure 3-17.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
362
Figure 3-17 Procedure for adjusting operation rights after a subnet is added
Determine the users who manage the new
subnet.
Do the users exist?
Plan user authorization and authorize the users
by referring to the Authorization Plan topic.
Add the subnet device set corresponding
to the new subnet to each user's or the user
group's domain.
Bind an operation set to the subnet device set.
Assign operation rights for the new subnet to
the users or user group.
End
Start
No
Yes
Do the users belong to
the same user group that contains
only the users?
Perform the subsequent operations
on the user group.
Perform the subsequent operations
on each user.
Yes No

The procedure is described as follows:
Step 1 Determine users who manage the new subnet, and check whether the users exist.
l If new users are required to manage the new subnet, plan user authorization and authorize
users by following the procedure provided in Performing the Initial Authorization.
l If users who manage the new subnet exist, perform Step 2.
Step 2 Check whether the users belong to the same user group.
If the users who manage the new subnet belong to the same user group and the user group contains
only the users, operations described below are performed on the user group. Otherwise,
operations described below are performed on each user who manages the new subnet.
Step 3 Add the subnet device set corresponding to the new subnet to a user or user group's domain.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
363
2. In the NMS User Management navigation tree, expand User or User Group and select a
user or the user group that manages the new subnet.
3. On the Domain tab page in the right pane, click Select.
4. In the Select Domain dialog box, click .
5. In the Available Objects area, select the subnet device set corresponding to the new subnet.
6. Click to move the subnet device set to the Selected Objects area.
7. Click OK. The subnet device set is added to the user or user group's domain.
Step 4 Add an operation set for the subnet device set by following the procedure provided in 3.2.4.3
Creating User-defined Operation Sets.
Step 5 Add the operation rights for the new subnet to the user or user group's operation rights.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand User or User Group and select
the user or user group that manages the new subnet.
3. On the Operation Rights tab page in the right pane, click Select.
4. In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Subnet Device Set node and select the subnet device set corresponding to the new subnet.
5. In the Operation area, select the operation set for the new subnet.
6. Click to move the subnet device set to the Selected rights area.
7. Click OK. The operation set for the new subnet is bound.
The procedure ends.
----End
3.2.9.4 How to Adjust Operation Rights After the Scope of Managed NEs Is
Changed?
If NE management responsibilities must be transferred from one user to another, security
administrators must adjust the users' operation rights. If the plan is not found or users are not
authorized by binding to user groups, adjust operation rights by referring to this FAQ.
Question
How to adjust operation rights after the scope of managed NEs is changed?
Answer
If a plan for authorizing users by binding users to user groups is made during initial authorization,
adjust operation rights by referring to 3.2.7 Operation Right Adjustment After Personnel's
Responsibilities Change. Otherwise, adjust operation rights based on site requirements by
following the procedure shown in Figure 3-18.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
364
Figure 3-18 Procedure for adjusting operation rights
Identify the two parties involved in
NE transfer.
Query the mode in which the NEs
are added to the transferor user's
domain.
Start
The NEs are added to the domain in
subnet device set mode.
The NEs are added to the domain in
single-device mode.
The NEs are added to the domain in
object set mode.
Delete the NEs from the object set.
Query the operation set bound to
the object set to which the NEs
belong.
Create an object set.
Replace the original object set with
the new one and bind the new
object set to the operation set.
Delete the subnet device set from
the transferor user's domain.
Create an object set.
Delete the subnet device set from
the transferor user's domain.
Query the operation set bound to
the subnet device set to which the
NEs belong.
Add the new object set to the
transferor user's domain and bind
the object set to the operation set.
Delete the NEs from the transferor
user's domain.
Are the transferred NEs
configured in the transferor
user's domain?
Yes
No
Does deletion of the NEs
from the object set affect
other users and user
groups?
No
Yes
End
Add the transferred NEs to the
transferee user's domain.
Delete the user from the original
user group.
Query the transferor user's
operation rights.
Yes
Does the transferor user
continue managing other
NEs in the subnet device
set?
No
Query users and user groups that
manage the object set to which the
NEs belong.
Delete the NEs from the user
group's domain.
Does the user group to which
the transferor user belongs
continue managing the NEs?
No
Yes
Create a user group and delete the
NEs from the new user group's
domain.
Add the transferor user to the new
user group.

iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
365
The procedure is described as follows:
Step 1 Identify the two parties involved in NE transfer. For example, the transferor (user A) transfers
NEs to the transferee (user B).
Step 2 Query the transferor's (user A's) domain and operation rights.
Query and record the transferor's (user A's) domain and operation rights (including rights
inherited from a user group to which the transferor (user A) belongs) by referring to 3.2.8.1
Viewing a User or User Group's Domain and 3.2.8.2 Viewing Operation Rights of a User
or User Group.
Step 3 Identify the domain where the transferred NEs are configured.
Query the user group to which the transferor (user A) belongs by referring to 3.2.8.1 Viewing
a User or User Group's Domain. Check whether the transferred NEs are configured in the
domain of the transferor (user A) or the user group to which the transferor (user A) belongs.
Assume that the transferor (user A) belongs to UserGroup1.
l If the transferred NEs are configured in the domain of UserGroup1, perform Step 4.
l If the transferred NEs are configured in the transferor's (user A's) domain, perform Step 9.
Step 4 Check whether UserGroup 1 must continue managing the transferred NEs.
l If no, perform Step 5.
l If yes, perform Step 6.
Step 5 Perform Step 9 to Step 20 to delete the transferred NEs from the domain of UserGroup1.
After the transferred NEs are deleted, perform Step 22.
Step 6 Delete the transferor (user A) from UserGroup1.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the User node and choose the user
whose operation rights are to be adjusted.
3. Select UserGroup1 and click Delete. In the Confirm dialog box, click Yes.
The transferor (user A) is deleted from UserGroup1.
Step 7 Create a user group and delete the transferred NEs from the new user's domain.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, right-click the User Group node and
choose New User Group.
3. On the Details tab, set the user group name, description, type, and maximum number of
sessions. Assume that the new user group is named UserGroup2.
4. Click Copy Rights from User Groups. In the Copy Rights from User Groups dialog
box, select UserGroup1 and click OK.
Operation rights are copied from UserGroup.
5. On the Details tab, click Finish.
6. Perform Step 9 to Step 20 to delete the transferred NEs from the domain of UserGroup2.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
366
Step 8 Add the transferor (user A) to UserGroup2.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the User node and choose the user
whose operation rights are to be adjusted.
3. On the User Groups tab in the right pane, click Add. In the Add User dialog box, select
UserGroup2 and click OK.
The transferor (user A) is then added to UserGroup2.
After the transferor (user A) is added to UserGroup2, perform Step 22.
Step 9 Query the mode in which the transferred NEs are added to the transferor (user A) domain.
Query the mode in which the transferred NEs are added to the transferor (user A) domain by
referring to 3.2.8.1 Viewing a User or User Group's Domain.
l If the NEs are added to the domain in object set mode, for example, the NEs are contained
in ObjectSet1, perform Step 10.
l If the NEs are added to the domain in subnet device set mode, for example NEs are contained
in SubNetObjectSet1, perform Step 15.
l If the NEs are added to the domain in device mode, perform Step 21.
Step 10 Query users and user groups that manage the object set to which the transferred NEs belong.
For details, see 3.2.8.6 Viewing Objects Contained in an Object Set.
l If ObjectSet1 is used only by the transferor (user A), or it is shared by other users and user
groups that no longer manage the devices, the deletion of the NEs from the object set takes
no effect on the other users. Perform Step 11.
l If ObjectSet1 is shared by other users and user groups that still manage the devices, perform
Step 12.
Step 11 Delete the NEs from ObjectSet1.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the Object Set node and choose
ObjectSet1.
3. On the Members tab in the right pane, select the NEs and click Delete.
4. In the Confirm dialog box, click OK.
After the NEs are deleted from ObjectSet1, perform Step 22.
Step 12 Query the operation set bound to the object set to which the NEs belong.
Query the operation set bound to ObjectSet1 by referring to 3.2.8.2 Viewing Operation Rights
of a User or User Group. Assume that ObjectSet1 is bound to OperationSet1.
Step 13 Create an object set (ObjectSet2). ObjectSet2 contains all NEs in ObjectSet1 except the
transferred NEs.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
367
2. In the NMS User Management navigation tree, right-click the Object Set node and choose
New Object Set.
3. On the Details tab in the New Object Set dialog box, select Network Device for Type,
and set Name and Description to create an object set. Assume that ObjectSet2 is created.
Click Copy Members from Object Sets.
4. In the Copy Members from Object Sets dialog box, select ObjectSet1 and click OK to
add the members of ObjectSet1 to the Members tab as the members of ObjectSet2.
5. On the Members tab in the New Object Set dialog box, select the transferred NEs and
click Delete. Click OK.
ObjectSet2 is created.
Step 14 Replace ObjectSet1 with ObjectSet2, and then bind ObjectSet2 to the operation set.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the User node and choose the
transferor (user A).
3. On the Domain tab in the right pane, click Select.
4. Replace the object set with the new one.
In the Authorization Mode area of the Select Domain dialog box, and select Object
Set.
l In the Available Objects area, select ObjectSet2 and click .
l Then ObjectSet2 is added to the Selected Objects area.
l In the Selected Objects area, select ObjectSet1 and click to move ObjectSet1
out of the domain.
5. On the Operation Rights tab in the right pane, click Select.
6. In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Object Set node and choose Objectset2. In the Operation area, select OperationSet1 and
click .Then ObjectSet1 is added to the Selected Rights area. Click OK.
After replacing ObjectSet1 with ObjectSet2 and binding ObjectSet2 to the operation set, perform
Step 22.
Step 15 Check whether the transferor (user A) must manage the other devices in the subnet device set.
l If no, perform Step 16.
l If yes, perform Step 17.
Step 16 Delete SubNetObjectSet1 from the transferor's (user A's) domain.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the User node and choose the
transferor (user A) who no longer manages SubNetObjectSet1.
3. On the Domain tab in the right pane, click Select.
4. In the Authorization Mode area of the Select Domain dialog box, and select Subnet
Device Set.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
368
5. In the Selected Objects area, select SubNetObjectSet1. Click to move
SubNetObjectSet1 to the Available Objects area.
6. Click OK.
After deleting the subnet device set from the transferor's (user A's) domain, perform Step 22.
Step 17 Query the operation set bound to the subnet device set to which the transferred NEs belong.
Query the operation set bound to ObjectSet1 by referring to 3.2.8.2 Viewing Operation Rights
of a User or User Group. Assume that OperationSet2 is bound to SubNetObjectSet1.
Step 18 Create an object set (ObjectSet3). ObjectSet3 contains all NEs in SubNetObjectSet1 except the
transferred NEs.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, right-click the Object Set node and choose
New Object Set.
3. On the Details tab in the New Object Set dialog box, select Network Device for Type,
and set Name and Description to create an object set. Assume that ObjectSet3 is created.
4. Click the Members tab and then click Select.
5. In the Available devices and objects sets area of the Select Object Set Member dialog
box, select the devices in SubNetObjectSet1 managed by the transferor (user A). Click
to add the devices to the Selected devices and objects sets area, and click
OK. Close the Select Object Set Member dialog box.
6. In the New Object Set dialog box, click OK.
Step 19 Delete SubNetObjectSet1 from the transferor's (user A's) domain by referring to Step 16.
Step 20 Add ObjectSet3 to the transferor's (user A's) domain and bind ObjectSet3 to OperationSet2.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the User node and choose the
transferor (user A).
3. On the Domain tab in the right pane, click Select.
4. In the Authorization Mode area of the Select Domain dialog box, and select Object
Set. In the Available Objects area, select ObjectSet3 and click .
Then ObjectSet3 is added to the Selected Objects area.
5. On the Operation Rights tab in the right pane, click Select.
6. In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Object Set node and choose ObjectSet3. In the Operation area, select OperationSet2 and
click .OperationSet2 is added to the Selected Rights area. Click OK.
After the NEs are deleted from user A's domain, perform Step 22.
Step 21 Delete the transferred NEs from the transferor's (user A's) domain.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
369
2. In the NMS User Management navigation tree, expand the User node and choose user A.
3. On the Domain tab in the right pane, click Select.
4. In the Authorization Mode area of the Select Domain dialog box, click More to display
all modes, and select Device.
5. In the Selected Objects area, select the NEs to be moved out. Click to move
the NEs to the Available Objects area.
6. Click OK.
After the NEs are deleted from user A's domain, perform Step 22.
Step 22 Configure the transferee's (user B's) domain and operation rights.
1. Choose OSS Security > OSS User Management (application style) or Administration
> NMS Security > NMS User Management (traditional style) from the main menu.
2. In the NMS User Management navigation tree, expand the User node and choose the
transferee (user B).
3. On the Domain tab in the right pane, click Select.
4. In the Authorization Mode area of the Select Domain dialog box, and select Device. In
the Available Objects area, select NEs to be transferred and then click .
The NEs are added to the Selected Objects area.
5. On the Operation Rights tab in the right pane, click Select.
6. In the Authorization Objects area of the Select Operation Rights dialog box, expand the
Device node and choose the transferred NEs. In the Operation area, select operations
performed on the NEs by referring to Step 2. Click to add the operations to
the Selected Rights area. Click OK.
----End
3.2.9.5 How Do I Assign User Operation Rights That Do Not Belong to the User's
User Group?
Question
How do I assign extra operation rights to a user after the user is added to a user group?
Answer
Step 1 Check whether there is a user group that has only the extra operation rights required by the user.
l If yes, add the user to the user group by referring to 3.2.4.5 Creating Users and Adding the
Users to User Groups.
l If no, perform Step 2.
Step 2 Follow steps described in 3.2.4 Assigning Rights to Users to create a user group, assign the
operation rights to the user group, and add the user to the user group.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
370
3.2.10 Configuration Examples of Security Management
Examples on security management are provided to enhance your understanding on authority
management.
3.2.10.1 Assigning Specific Operation Rights to an NMS User
In live network maintenance, an NMS user may need to be assigned only part of operation rights.
This topic provides an example for assigning specific operation rights to an NMS user.
Prerequisites
You have logged in as a user in SMManagers.
Context
If the topology view is locked, Modify Object Position is unavailable even if the user has this
operation right. Only a user with the Lock/Unlock View operation right can unlock the topology
view and make Modify Object Position available. To unlock the topology view, choose
View > Lock from the main menu.
Scenario
Security administrator A needs to create a topology maintenance engineer (Topo_mtB) to
manage topological objects and ensure that the assigned rights do not contain the Modify Object
Position right.
Roadmap
Step Roadmap
1 Assigns operation rights by adding the user to
a user group. Before this operation, you must
create topology maintenance user group
Topo_mtgroup.
2 Topology management involves NMS
operations only and does not require NE
authority. Therefore, assign default Network
Management Application operation sets
first to Topo_mtgroup.
After checking the Network Management
Application operation sets exported from the
NMS, you can find that the default NMS
operation sets for topology management such
as Topo Maintainer Operation Set, Topo
Operator Operation Set, and Topo
Monitor Operation Set contain Modify
Object Position. Therefore, the default NMS
operation sets cannot be assigned to
Topo_mtgroup.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
371
Step Roadmap
3 The default NMS operation sets contain
Modify Object Position. Therefore, create
an operation set that does not contain Modify
Object Position and assign it to
Topo_mtgroup. For operation details, see
the following section.
4 Creates topology maintenance user B and
adds it to group Topo_mtgroup.

Procedure
Step 1 Choose Administration > NMS Security > NMS User Management (traditional style) from
the main menu or select Security Management in Application Center and choose OSS
Security > OSS User Management (application style) from the main menu.
Step 2 Create an object set for Topo_mtgroup.
1. In the NMS User Management navigation tree, right-click Object Set and choose New
Object Set from the shortcut menu.
2. In the New Object Set dialog box, click the Details tab and set common attributes for the
new object set.
3. On the Members tab, configure members for the new object set. These members are the
objects managed by Topo_mtB.
Step 3 Create an operation set for Topo_mtgroup.
1. In the NMS User Management navigation tree, right-click Operation Set and choose
New Operation Set from the shortcut menu.
2. In the New Operation Set dialog box, click the Details tab and set common attributes for
the new operation set.
3. On the Members tab, configure members for the new operation set. Select the topological
management rights other than Modify Object Position in the Topo Management node.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
372
4. Click OK.
Step 4 Create topology maintenance user group Topo_mtgroup and set its management domain and
operation rights.
1. In the NMS User Management navigation tree, right-click User Group and choose New
User Group from the shortcut menu. Alternatively, click above the navigation tree
and choose New User Group.
2. In the New User Group dialog box, click the Details tab and set common attributes such
as User name and Description, and then click Next.
3. Click Select. In the Select Domain dialog box, select Object Set of Topo_mtGroup, click
OK, and then click Next.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
373
4. Click Select. In the Select Operation Rights dialog box, select Operation Set of
Topo_mtB, click OK, and then click Next.
5. Click OK.
Step 5 Create topology maintenance user Topo_mtB and add it to group Topo_mtgroup.
1. In the NMS User Management navigation tree, right-click User and choose New User
from the shortcut menu. Alternatively, click above the navigation tree and choose
New User.
2. Set common attributes for the user, such as user name and password.
3. Click Add, choose Topo_mtgroup from the Add New Group dialog box, and click OK.
4. Click OK.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
374
Result
Once you have created user Topo_mtB following the preceding procedure, log in to the
U2000 as user Topo_mtB to manage the topology.
3.2.10.2 Adjusting User Rights
Maintenance engineers need to add or delete rights for created users when planning or
maintaining the live network. This topic provides an example for deleting a specific right for an
NMS user.
Prerequisites
l You have logged in as a user in SMManagers.
l A clear plan is required before adjusting rights for a user. Before the plan is made, the user's
role must be clear.
Scenario
Security administrator A finds out that a monitoring engineer Monitor_B has the Modify Object
Position rights. However, a monitoring engineer should not have the rights according to the plan
made before the adjustment. Therefore, the rights are to be deleted.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
375
Configuration Roadmap
Scenario Configuration Roadmap Description
1. Monitor_B is a member of the
default user group Guests.
Modify the rights of the default
operation sets in Guests.
NOTE
If other members in the Guests require
the Modify Object Position right, you
must remove Monitor_B from
Guests and then grant rights to
Monitor_B separately.
Guests has all
the rights of
Monitor
Operation Set
of Region XX.
Checking the
Network
Management
Application
operation sets
exported from
the NMS, Topo
Monitor
Operation Set
contains
Modify Object
Position.
Therefore,
remove Modify
Object
Position from
Topo Monitor
Operation Set.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
376
Scenario Configuration Roadmap Description
NOTE
l A user has
all rights of
its user
groups.
Therefore,
to delete a
specific
right of a
user, delete
the right
from the
groups to
which the
user
belongs.
l A user or
user group
has all rights
of its
operation
sets.
Therefore,
to delete a
specific
right of a
user or user
group,
delete the
right from
the
operation
sets.
l Generally,
modifying
the rights of
default user
groups and
operation
sets is not
recommend
ed. To adjust
user rights,
you can
remove
Guests from
the user
groups to
which
Monitor_B
belongs and
reassign
rights to
Monitor_B.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
377
Scenario Configuration Roadmap Description
2. Monitor_B is
a member of the
non-default user
group Topo
Guests of
Region XX
2.1 Topo
Guests of
Region XX
contains a Topo
Monitor
Operation Set
provided by the
U2000 by
default.
Modify the rights of the Topo
Monitor Operation Set provided
by the U2000 by default.
NOTE
If other members in the Topo Guests
of Region XX require the Modify
Object Position right, you must
remove Monitor_B from Topo Guests
of Region XX and then grant rights to
Monitor_B separately.
Topo Guests of
Region XX is a
service-
function-based
user group in the
service
authorization
and planning
phase. Users in
Topo Guests of
Region XX
have the rights
of querying
topology
objects. To
adjust rights for
Monitor_B,
remove Modify
Object
Position from
Topo Monitor
Operation Set.
2.2 Topo
Guests Region
XX contains the
new Topo
Monitor
Operation Set
of Region XX.
Modify the rights of the new Topo
Monitor Operation Set of Region
XX.
NOTE
If other members in the Topo Guests
of Region XX require the Modify
Object Position right, you must
remove Monitor_B from Topo Guests
of Region XX and then grant rights to
Monitor_B separately.
Topo Monitor
Operation Set
of Region XX is
a new operation
set assigned to
Topo Guests of
Region XX and
has the rights of
querying
topology
objects. To
adjust rights for
Monitor_B,
remove Modify
Object
Position from
Topo Monitor
Operation Set.
3. Monitor_B does not belong to
any user groups.
Modify the rights for Monitor_B
directly.
In the Select
Operation
Rights window,
deselect Modify
Object
Position for
Monitor_B.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
378

Procedure
l Operation procedure in scenario 1 (where Monitor_B is a member of Guests):
1. Choose Administration > NMS Security > NMS User Management (traditional
style) from the main menu or select Security Management in Application Center
and choose OSS Security > OSS User Management (application style) from the
main menu.
2. Choose NMS User Management > Operation Set > Topo Monitor Operation
Set from the navigation tree.
3. On the Members tab, click Select.
4. The Select Operation Set Member dialog box is displayed. In the Selected rights
group area, expand the nodes under Network Management Application. Select
Modify Object Position and click .
5. Click OK.
l Operation procedure in scenario 2 (where Monitor_B is a member of the non-default user
group Topo Guests of Region XX):
The operation procedure is the same as that in scenario 1.
The operation procedure is similar to that in scenario 1. The only difference is Topo
Monitor Operation Set of Region XX is selected from the navigation tree on step 2.
l Operation procedure in scenario 3 (where Monitor_B does not belong to any user groups):
1. Choose Administration > NMS Security > NMS User Management (traditional
style) from the main menu or select Security Management in Application Center
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
379
and choose OSS Security > OSS User Management (application style) from the
main menu.
2. Choose NMS User Management > User > Monitor_B from the navigation tree.
3. On the Operation Rights tab, click Select.
4. The Select Operation Rights dialog box is displayed. In the Selected rights group
area, expand the nodes under Network Management Application. Select Modify
Object Position and click .
5. Click OK.
Result
If Monitor_B has logged in already, restart the client and relog in to the U2000 for the settings
to take effect. Then, Monitor_B does not have the rights of modifying positions for topology
objects.
3.2.10.3 Example for Creating U2000 User Accounts and Allocating Rights in the
Rights- and Domain-based Management Scenario
This topic provides the example for creating U2000 user accounts and allocating rights in the
rights- and domain-based management scenario.
Application Scenario
In an office, all NEs are monitored and managed through the U2000 in a centralized manner and
they are classed into two categories by domain: transport NEs and IP NEs, which are monitored
and managed separately. To enable different users to monitor and manage NEs through the
U2000, you need to assign them different U2000 user accounts and rights.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
380
Figure 3-19 shows the networking.
Figure 3-19 Networking of rights- and domain-based management
IP domain network
transport domain network
NMS
PTN
PTN
CX600
CX600
RTN
RTN
SDH
SDH
NE80E
NE80E
ME60
MA5200
transport domain
maintainer
IP domain
maintainer
transport and IP
domain maintainer

Data Planning
Plan the following subnets based on the NE domain division:
l Transport domain subnet: All managed transport NEs are included.
l IP domain subnet: All managed IP NEs are included.
Plan the following four user groups based on user groups' responsibilities:
User Group
Name
Descriptio
n
Responsibility Managemen
t Domain
Operation Right
T2000group-
admin
Transport
domain
maintainer
group
Responsible for
maintaining NEs
in the transport
domain.
NEs in the
transport
domain
Operation set of the
transport domain NE
maintainer
Operation set of the
transport domain
service maintainer
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
381
User Group
Name
Descriptio
n
Responsibility Managemen
t Domain
Operation Right
T2000group-
view
Transport
domain
monitor
group
Responsible for
monitoring NEs in
the transport
domain.
NEs in the
transport
domain
Operation set of the
transport domain NE
monitor
Operation set of the
transport domain
service monitor
DMSgroup-
admin
IP domain
maintainer
group
Responsible for
maintaining NEs
in the IP domain.
NEs in the IP
domain
Operation set of the IP
domain NE
maintainer
Operation set of the IP
domain service
maintainer
DMSgroup-
view
IP domain
monitor
group
Responsible for
monitoring NEs in
the IP domain.
NEs in the IP
domain
Operation set of the IP
domain NE monitor
Operation set of the IP
domain service
monitor

NOTE
The operation sets listed in the Operation Right column refer to general operation sets associated with
NEs in the transport or IP domains. Determine the actual operation sets to be added based on the types of
managed NEs and the operation rights of user groups.
Plan the following seven users based on user responsibilities:
User
Name
Descripti
on
Responsibility User Group
T2000-
admin
Transport
domain
maintainer
Responsible for maintaining
NEs in the transport domain.
Transport domain maintainer
group
T2000-
view
Transport
domain
monitor
Responsible for monitoring
NEs in the transport domain.
Transport domain monitor
group
DMS-
admin
IP domain
maintainer
Responsible for maintaining
NEs in the IP domain.
IP domain maintainer group
DMS-view IP domain
monitor
Responsible for monitoring
NEs in the IP domain.
IP domain monitor group
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
382
User
Name
Descripti
on
Responsibility User Group
T2000-
admin-
DMS-view
Transport
domain
maintainer
& IP
domain
monitor
Responsible for maintaining
NEs in the transport domain
and monitoring NEs in the IP
domain.
Transport domain maintainer
group
and
IP domain monitor group
DMS-
admin-
T2000-
view
IP domain
maintainer
& transport
domain
monitor
Responsible for maintaining
NEs in the IP domain and
monitoring NEs in the
transport domain.
IP domain maintainer group
and
Transport domain monitor
group
T2000-
view-
DMS-view
Transport
domain
monitor &
IP domain
monitor
Responsible for maintaining
NEs in the transport and IP
domains.
Transport domain monitor
group
and
IP domain monitor group

Configuration Process
On the U2000, do as follows to create a user account and allocate associated rights:
1. Create subnets.
Create a transport domain subnet and an IP domain subnet, and add NEs in the transport
and IP domains to the associated subnets.
For details about how to create a subnet, see 5.4 Creating a Subnet.
For details about how to add an NE, see 5.6 Creating NEs.
2. Create user groups and allocate management domains and operation sets for the user groups.
You can easily allocate rights to multiple users by using the user group function.
l Based on responsibilities of user groups, configure management domains for the user
groups so that different user groups can manage different NE domains.
l Based on responsibilities of user groups, configure operation rights for the user groups
so that different user groups have different operation rights.
For details about how to create a user group, see 3.2.4.4 Creating and Authorizing U2000
User Groups.
3. Create user accounts.
Create user accounts for current users, and configure user groups based on responsibilities
of users. Then, each user account has the management domain and operation rights of the
user group.
For details about how to create a user account, see 3.2.4.5 Creating Users and Adding
the Users to User Groups.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
383
NOTE
When creating user accounts, do as follows to ensure the U2000 security:
l Set different time available for login based on the shifts.
l Bind IP addresses of area workstations to users.
l Change the user password when logging in to the U2000 for the first time.
When the configuration is complete, the administrator can provide the accounts to associated
personnel.
3.3 User Security Policy Management
User security policies can efficiently strengthen U2000 system security and prevent
unauthorized user operations. The policies include setting access control rules, managing
passwords and locking clients, and monitoring login users.
3.3.1 Security Policy Management
Security policies refer to the access control rules that are created for managing users. During
initial installation of the U2000, you must plan and configure security policies. After configuring
security policies, you can adjust them according to the actual requirements.
3.3.1.1 Setting the System ACL
This section describes how to set the system access control list (ACL) so that NMS users can
log in to the U2000 server through only the U2000 clients that use the allowed IP addresses.
After being set by security administrators, the system ACL applies to all NMS users.
Prerequisites
You have logged in as a user in SMManagers.
Context
The system ACL enables all the NMS users to log in to the U2000 only on the clients using the
specific IP addresses or network segments. The user ACL is a subset of the system ACL. The
user ACL is effective for the current user only.
NOTICE
l If there are multiple network adapters on the host where the client exists, you need to add
the IP addresses of all network adapters to the ACL. This ensures that users log in to the
U2000 clients successfully.
l When the network where the client is located has both the internal network and the external
network, you need to add both the internal IP address and the external IP address to the ACL,
ensuring that users can log in the U2000 client properly.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
384
Procedure
Step 1 Choose OSS Security > Settings > System ACL (application style) or Administration > NMS
Security > System ACL (traditional style) from the main menu.
Step 2 In the System ACL dialog box, you can view existing ACLs. You can click Add, Delete, or
Modify to add, delete, or modify access control items, and click Close for the settings to take
effect.
Set System ACL Operation
Add a system ACL item 1. In the System ACL dialog box, click Add.
2. In the Add System Access Control Item dialog box,
select the display mode of IP addresses, set the related
parameters, and click OK.
Delete a system ACL item 1. In the System ACL dialog box, select the system ACL
item to be deleted, and click Delete.
2. In the Confirm dialog box, click Yes.
Modify a system ACL item 1. In the System ACL dialog box, select the system ACL
item to be changed, and click Modify.
2. In the Modify System Access Control Item dialog
box, modify the related parameters, and click OK.
NOTE
You can change the IP Address Display Mode only after
deleting a system ACL item and adding a new system ACL
item.

----End
3.3.1.2 Setting the User ACL
This section describes how to set the access control list (ACL) for a user so that the user can log
in to the U2000 from an U2000 client using a specified IP address. User ACLs are set by security
administrators.
Prerequisites
You have logged in as user admin or a user in SMManagers.
Context
l User admin can set access rights for all users. Users belonging to SMManagers can set
access rights for any user except user admin.
l The system ACL enables all the NMS users to log in to the U2000 only on the clients using
the specific IP addresses or network segments. A user ACL is a subset of the system ACL
and is effective only for the current user.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
385
NOTICE
l If multiple network adapters are installed on the host where the client is deployed, add
the IP addresses of all network adapters to the ACL to ensure that users can log in to
the U2000 client successfully.
l When the network where the client is located has both internal and external networks,
add both the internal and external IP addresses to the ACL to ensure that users can log
in to the U2000 client properly.
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 In the NMS User Management navigation tree, expand the User node, and then select a user
to be modified.
Step 3 Select the policies for using ACLs on the ACL tab page in the right pane of the window by
following the procedure provided in Table 3-13. Then, click Apply.
NOTE
l Access control items on the ACL tab page for a user come from the system ACL. That is, a user ACL
derives from the system ACL and serves as a subset of the system ACL.
l In the lower right corner of the ACL tab page for a user, click Set System ACL to open the System
ACL dialog box. You can click Add, Delete, or Modify to add, delete, or modify access control items
in the dialog box.
Table 3-13 Parameters related to user ACLs
Option Setting
Use all ACLs After this option is selected, the settings of the corresponding user ACL are
consistent with those of the system ACL.
Use specified
ACLs
After selecting this option, you can log in to the U2000 server by using the
client with the selected IP address or network segment.

----End
3.3.1.3 Setting the Proxy Service ACL
Users must use U2000 clients to connect to network elements (NEs) through the proxy service.
The proxy service access control list (ACL) specifies IP addresses that users can use to connect
to NEs, which ensures network security.
Prerequisites
l You have logged in as a user in SMManagers.
l This function applies to the Router series, Switch series, Access series and Security NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
386
Context
l Newly configured access control items applies only to new proxy connections and do not
apply to existing proxy connections. To apply the newly configured access control items
to existing proxy connections, users must re-establish the proxy connections.
l When a user uses the proxy service to connect to an NE, the U2000 compares the source
IP address with the access control items from the top to the bottom in the Proxy Service
ACL dialog box. If a matched access control item is found, the comparison is complete. If
no matched access control item is found, the proxy connection request is rejected. Users
can click Up or Down to change the access control item sequence in the Proxy Service
ACL dialog box.
l If the networking includes gateway devices such as the Network Address Translation
(NAT) device, and U2000 clients or NEs are located on the internal NAT network, users
must set IP addresses in access control items to IP addresses that are stored on the NAT
device and can be connected to by the U2000 server. Do not set IP addresses in access
control items to internal network IP addresses to which U2000 clients or NEs are bound.
l If the U2000 client and server are installed on the same machine, you must set IP addresses
in access control items to 127.0.0.1.
l If IP Address or Network Segment is set to 0.0.0.0/0 (or a value in IP address/0 format)
and Operation is set to Accept in the proxy service ACL, clients in all network segments
can connect to NEs.
Procedure
Step 1 Choose OSS Security > Settings > Proxy Service ACL (application style) or
Administration > NMS Security > Proxy Service ACL (traditional style) from the main
menu.
Step 2 In the Proxy Service ACL dialog box, view the existing access control items. Click Add,
Delete, or Modify to add, delete, or modify an access control item, and then click OK for the
settings to take effect.
Setting the Proxy Service
ACL
Procedure
Adding an access control item 1. In the Proxy Service ACL dialog box, click Add.
2. In the Add Access Control Item dialog box, enter an
IP address or network segment, set Operation, and
click OK.
NOTE
l To improve system security, you are advised to enter an IP
address but not a network segment when adding an access
control item. If the IP address is changed, modify the access
control item of the proxy service ACL in a timely manner.
l If Operation is set to Accept, users can use the entered IP
address or an IP address in the entered network segment to
connect to an NE using the proxy service.
l If Operation is set to Reject, users cannot use the entered
IP address or an IP address in the entered network segment
to connect to an NE using the proxy service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
387
Setting the Proxy Service
ACL
Procedure
Deleting an access control item 1. In the Proxy Service ACL dialog box, select an access
control item to be deleted, and click Delete.
2. In the Confirm dialog box, click Yes.
NOTE
After connecting to NEs from clients by using the proxy service
and performing required operations, users must manually delete
access control items that they have set to prevent other users from
connecting to the NEs based on the access control items.
Modifying an access control item 1. In the Proxy Service ACL dialog box, select an access
control item to be modified, and click Modify.
2. In the Modify Access Control Item dialog box,
change the IP address or network segment, modify
Operation, and click OK.
NOTE
l If Operation is set to Accept, users can use the entered IP
address or an IP address in the entered network segment to
connect to an NE through the proxy service.
l If Operation is set to Reject, users cannot use the entered
IP address or an IP address in the entered network segment
to connect to an NE through the proxy service.

----End
3.3.1.4 Setting Account Policies
This section describes how to set the minimum length of user names and how to set the policies
related to user login. Proper settings help improve the U2000 system security. User account
policies apply to all users and are set by security administrators.
Prerequisites
You have logged in as a user in SMManagers.
Context
l Account policies must be configured after the U2000 is installed for the first time. During
maintenance, the account policies can be adjusted as required.
l New account policies do not affect the configured accounts.
Procedure
Step 1 Choose OSS Security > Settings > Security Policy (application style) or Administration >
NMS Security > Security Policies (traditional style) from the main menu.
Step 2 In the Security Policy dialog box, click the Account Policy tab, and view the current account
policies.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
388
Step 3 According to the policy planning, set account policies by following the procedure provided in
Account Policy. Then, click OK to confirm the settings.
----End
3.3.1.5 Setting Password Policies
Password policies such as the password complexity and update period policies prevent users
from setting too simple passwords or retaining passwords for a long time, therefore improving
U2000 access security. Password policies apply to all users and are set by security administrators.
Prerequisites
You have logged in as a user in SMManagers.
Context
l User password policies must be set during the initial phase of site deployment and can be
adjusted as required during the maintenance.
l After a password policy is changed, the new password policy takes effect immediately for
all users of the U2000. For example, after the minimum length of the user password is
changed, when an online user changes a password, the minimum password length must
comply with the corresponding password policy.
l New password policies do not affect passwords that have been set.
l Password policies specify the password complexity, update periods, and character
restrictions.
Procedure
Step 1 Choose OSS Security > Settings > Security Policy (application style) or Administration >
NMS Security > Security Policies (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
389
Step 2 In the Security Policy dialog box, click the Password Policy tab, and view the current password
policies.
NOTE
You can set account policies on the Account Policy tab page. For details, see 3.3.1.4 Setting Account
Policies.
Step 3 Set basic and advanced parameters for password policies as required.
Step 4 Click OK to confirm the settings.
----End
3.3.1.6 Setting the Maximum Number of Sessions
In the U2000 system, the maximum number of sessions involves the maximum number of system
sessions, user group sessions, and user sessions. The maximum number of system sessions is
defined in the U2000 License file that customers purchase and cannot be set through the
U2000 client. The maximum number of user group sessions and user sessions are set by security
administrators on the U2000 client to control the maximum number of U2000 client logins for
a user group or a user.
Prerequisites
l You have logged in as a user in SMManagers.
l A user or user group has been created or is being created.
Context
l A user can log in to the U2000 server through multiple terminals. The user can also start
multiple U2000 clients on one terminal to log in to the U2000 server. Setting the maximum
number of user sessions limits the total number of sessions that a user creates on multiple
login terminals.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
390
l User groups are categorized based on user roles. To balance the access attempts of different
user roles to the system, you can set the maximum number of user group sessions to limit
the total number of sessions that the users in a user group create on all the login terminals.
l The setting of the maximum number of user sessions and user group sessions is limited by
the system login mode. If the current system login mode is the single-user login mode, only
one user admin is allowed to log in to the U2000 through one U2000 client regardless of
the setting of the maximum number of user group sessions and user sessions.
Procedure
Step 1 Select an operation mode based on the actual situation.
If... Then...
You are creating a user group or user Set the maximum number of user group sessions and
user sessions by following the procedure provided
in 3.2.4.4 Creating and Authorizing U2000 User
Groups and 3.2.4.5 Creating Users and Adding
the Users to User Groups.
You have created a user group or user 1. Choose OSS Security > OSS User
Management (application style) or
Administration > NMS Security > NMS User
Management (traditional style) from the main
menu.
2. In the NMS User Management navigation
tree, expand the User Group or User node.
3. Select a user group or a user, on the Details tab
page in the right pane, set Maximum sessions
for user groups or Maximum number of online
users for users.
----End
3.3.1.7 Setting the U2000 Login Mode
The U2000 provides two login modes: multi-user mode and single-user mode. Normally, the
U2000 runs in multi-user mode. When you need to maintain the U2000 server (for example,
changing the user group, managed domain, or operation rights of a user), you can change the
login mode of the U2000 to the single-user mode so that the operation does not affect other users.
Prerequisites
l You have logged in as user admin.
l Plan the time of switching the login mode and ask other users to save their operations.
Context
l The setting takes effect for all the users that log in to different clients.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
391
l In single-user login mode, only user admin is allowed to log in to the system. Therefore,
only user admin can set the system login mode to the single-user login mode.
NOTICE
Only the admin user can log in to the U2000 on a client and all the other users are forced
to exit after the U2000 login mode is switched from the multi-user mode to the single-user
mode. You need to switch to the multi-user mode after you complete the operations in
single-user mode. Therefore, other users can operate the U2000 properly.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose System Login Mode in the navigation tree on the left.
Step 3 Set the U2000 login mode in the right area.
Login Mode Operation
Single-user mode Select Single-user mode and click OK. In the Set Switch
Delay dialog box, set the delay time for switching the login
mode, and click OK.
l If the delay time is not 0, a warning dialog box is
displayed. After the specified delay time, the U2000 is
switched to the single-user mode.
l If the delay time is 0, no warning dialog box is displayed.
The U2000 is directly switched to the single-user mode
immediately.
The lower right corner on the U2000 client displays Single-
user mode.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
392
Login Mode Operation
Multi-user mode Select Multi-user mode and click OK.
The U2000 is switched to the multi-user mode immediately.
The lower right corner on the U2000 client displays Multi-
user mode.
----End
3.3.1.8 Setting Auto-Locking for a Client
You can set the auto-locking for your U2000 client so that your client automatically locks when
no operation is performed on it within the preset duration. This prevents illegal operations on
your client when you are away.
By Security Policy
Prerequisite
You have logged in as an NMS user.
Context
l After a U2000 client is locked, only the current user or user in the Administrators group
can unlock it. The current user can unlock the client by following the message displayed
in the window. To unlock the client as user in the administrators group, see 1.13 Unlocking
the Client.
l The operation is valid for all online users.
l The priority is higher than the priority of Automatically lock terminal in the
Preferences dialog box.
NOTICE
After a user in the Administrators group unlocks an U2000 client, the original logged in user
is logged out.
Procedure
Step 1 Choose OSS Security > Settings > Security Policy (application style) or Administration >
NMS Security > Security Policies (traditional style) from the main menu.
Step 2 In the Security Policy dialog box, click the Account Policy tab.
Step 3 Select Automatically lock the terminal if no activity for XX minute(s), set the time of enabling
auto-locking, and then click OK to apply the settings.
----End
By Preference
Prerequisite
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
393
You have logged in as an NMS user.
Context
l After a U2000 client is locked, only the current user or user in the administrators group can
unlock it. The current user can unlock the client by following the message displayed in the
window. To unlock the client as user in the administrators group, see 1.13 Unlocking the
Client.
l The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.
l On the Account Policy tab page in the Security Policy dialog box, if you select
Automatically lock the terminal if no activity for XX minute(s) check box,
Automatically lock terminal in the preferences dialog box is unavailable.
NOTICE
After a user in the administrators group unlocks an U2000 client, the original logged in user is
logged out.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree in the left part of the window, select Lock Settings.
Step 3 Select Automatically lock terminal, set the time of enabling auto-locking, and click OK to
apply the settings.
NOTE
In the Preferences dialog box, select Show main window when terminal locked in the Lock Settings
area. Therefore, after the client is locked, the main window of the client is visible.
----End
3.3.2 Setting U2000 Data Transmission Security
The U2000 uses the Security Socket Layer (SSL) protocol to improve security of data
transmission between an NE, the U2000 client, and the U2000 server. This protocol also
improves integrity of data transmission. You can set the SSL communication mode for an NE,
the U2000 client, and the U2000 server to enable the SSL protocol.
3.3.2.1 Setting a Secure Connection Between the U2000 Client and Server
This section describes how to set the SSL communication mode between the U2000 client and
server.
Prerequisites
The SSL communication mode is enabled on the U2000 server. For details about how to set the
SSL communication mode, see the U2000 administrator guide.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
394
Context
Data transmission security is ensured when the SSL communication mode is set on both the
U2000 client and server.
Procedure
Step 1 Start the U2000 client. In the Login dialog box, click .
Step 2 In the Server List dialog box, select a server record, and click Modify.
In the Server List dialog box, if no server information exists, add the server information as
follows:
1. In Server List, click Add.
2. In the Add Server Information dialog box, enter the name, host IP address, port, and
communication mode of the U2000 server.
Step 3 In the Modify Server Information dialog box, select Security(SSL) from the Mode drop-down
list.
After change the communication mode in the Mode drop-down list, the value of Port changes
automatically. The default settings for the port and communication mode are as follows:
l If the communication mode is set to Common, the port is 31037.
l If the communication mode is set to Security(SSL), the port is 31039.
Step 4 Click OK separately in the Modify Server Information and Server List dialog boxes.
The Login dialog box is returned. The client setting is complete.
----End
Follow-up Procedure
After you click Login, if the client does not trust the server, you need to determine whether the
server is trustable using the server certificate.
l If you confirm that the server is trustable, click Yes and log in to the client. If you do not
want the system to display the dialog box again, contact the system administrator to
configure a trust certificate.
l If you confirm that the server is not trustable, click No to return to the Login dialog box
and contact the system administrator to process the issue.
3.3.2.2 Setting the FTP Transfer Policies Between the Client and Server
Files can be transferred between the U2000 client and server. You can set FTP Mode and transfer
parameters as required.
Prerequisites
You have logged in as a user who belongs to the Administrators groups.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
395
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, select OSS Client/Server File Transfer Settings.
Step 3 In the OSS Client/Server File Transfer Settings dialog box, set FTP Mode, FTP Option, and
Network timeout (5-3600s).
l FTP Mode includes FTP and SFTP.
NOTE
Using SFTP is recommended because of its higher security than FTP.
l FTP Option includes Resumable Transfer, Compression, and Passive Mode. If Passive
Mode is not selected, the default mode is active mode.
l Network timeout (5-3600s) ranges from 5 to 3600 seconds. Its default value is 120 seconds.
Step 4 Click OK.
----End
3.3.3 Managing Passwords and Locking Clients
This topic describes how to manage passwords and lock clients to ensure security for accessing
the U2000 system.
3.3.3.1 Changing the Password of the Current User
When changing the password, ensure that the new password meets the requirement of password
policies.
Prerequisites
l You have logged in as an NMS user.
l You are familiar with password policies. For details, see 3.3.1.5 Setting Password
Policies.
Procedure
Step 1 Choose OSS Security > Change Password (application style) or File > Change Password
(traditional style) from the main menu.
Step 2 In the Change Password dialog box, set the new password for the current user, and click OK.
Step 3 In the Confirm dialog box, click Yes to confirm the settings.
----End
3.3.3.2 Resetting the Password of an NMS user
This topic describes how a member of the SMManagers group resets the password of an NMS
user. You need to reset the password if you forget the password or the password expires, or when
you cannot log in to the U2000 due to other reasons.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
396
Context
l The configured password must comply with all password policies except the difference
policies Previously used passwords that cannot be the same as the new password, Min.
different characters between new and old password and Password repetition not
allowed within (months). For details about how to set password policies, see 3.3.1.5
Setting Password Policies.
l The SMManagers user can re-set the passwords of all users, except for the admin user,
other security administrators, and itself. The password of a security administrator needs to
be re-set by the admin user.
l The password of the admin user must be kept secure because the admin user cannot reset
it.
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 In the NMS User Management navigation tree, expand the User node. Right-click the user
whose password is to be reset and choose Reset Password.
Step 3 In the Reset Password dialog box, set New Password and Confirm Password, and then click
OK.
NOTE
If Require user to change password on next login is selected, you need to change the password when
you log in to the U2000 client next time. Otherwise, you do not need to change the user password when
you log in to the U2000 client next time. You are advised to select Require user to change password on
next login to improve the security of the U2000 system.
Step 4 In the Information dialog box, click OK.
----End
3.3.3.3 Modifying NMS user Information in Batches
Modifying information about NMS user in batches enables you to prohibit specified users to log
in to the U2000 in holidays or other periods. This improves U2000 system security and increases
the user information modification efficiency.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
397
Prerequisites
You have logged in as a user in SMManagers.
Context
l You can modify only Disable user account, Password validity period (days), New
password, Require user to change password on next login, Login period, and Auto-
logout, and cannot modify other parameters such as user group, domain, operation rights,
and ACL.
l You cannot modify the information about the current user, admin and remote user. If the
selected user list contains the current user, admin or remote user, Modify Multiple
Users is unavailable.
l You can choose Modify Multiple Users to modify information about a maximum of 100
users.
Procedure
Step 1 Choose OSS Security > OSS User Management (application style) or Administration > NMS
Security > NMS User Management (traditional style) from the main menu.
Step 2 Expand the User node In the NMS User Management navigation tree, and select one or more
users in the user list on the right.
Step 3 Right-click one of the selected users and choose Modify Multiple Users from the shortcut menu.
In the Confirm dialog box, click Yes.
Step 4 In the Modify Multiple Users dialog box, specify the parameter values.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
398
NOTE
The configured password must meet all password policies except the policies related to user accounts and
differences between old and new passwords. The password policies related to user accounts include
Password cannot be any user name in reverse order and Max. Same Consecutive Characters Between
User Name and Password. The password policies related to differences between old and new passwords
include Previously used passwords that cannot be the same as new password, Min. different
characters between new and old password, and Password repetition not allowed within (months). For
details about how to set a password policy, see 3.3.1.5 Setting Password Policies.
Step 5 Click OK.
----End
Result
The parameters are modified successfully according to the settings in the Modify Multiple
Users dialog box.
3.3.3.4 Locking the Client Immediately
To prevent other users from performing illegal operations on your U2000 client, lock your
U2000 client manually when you are away. This operation is valid only for the current NMS
user, and should be performed by the current NMS user.
Prerequisites
You have logged in as an NMS user.
Context
After an U2000 client is locked, only the current user or user in the administrators group can
unlock it. The current user can unlock the client by following the message displayed in the
window. To unlock the client as user in the administrators group, see 1.13 Unlocking the
Client.
NOTICE
After a user in the administrators group unlocks an U2000 client, the original logged in user is
logged out.
Procedure
Step 1 Lock your U2000 client in either of the following ways:
l Choose File > Lock Terminal from the main menu.
l On the toolbar, click .
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
399
3.3.3.5 Unlocking the Client
After a client is locked by the current login user or by the system automatically, the current user
can unlock it, or ask a user in the SMManagers group to reset the password and then log in
again, or ask a user in the Administrators group to unlock the client.
Prerequisites
The U2000 client is locked.
Procedure
The following table describes how to unlock the client in different scenarios.
Operation
Scenarios
Operation Method
If the current user
remembers the
password
1. Press Ctrl+Alt+U or click .
2. Enter the current user name and password, and click OK.
If the current user
forgets the password
l A user in the SMManagers group need to reset the current user
password. For details, see 3.3.3.2 Resetting the Password of an
NMS user. Then log in to the client again using the user name and
the new password.
NOTE
A user in the SMManagers group cannot reset the password of the
admin user. If the current user is admin, only a user in the
Administrators group can unlock the client.
l The current user must ask a user in the Administrators group to
unlock the client. After the client is unlocked, the current user is
logged out.
1. Press Ctrl+Alt+U or click .
2. Enter the user name and password of the user in the
Administrators group, and click OK.

NOTE
If the number of password retries reaches the upper limit (3 by default), the user account is locked for a
specified period (30 minutes by default). The U2000 user is automatically unlocked after the auto-unlocking
duration. The U2000 user can also be unlocked by security administrators manually. For details, see 3.3.4.4
Unlocking Users.
3.3.3.6 Setting Auto-Locking for an U2000
Setting auto-locking of an NMS user involves setting the maximum number of illegal login times
of an NMS user and setting the auto-unlocking duration. After these settings are complete, an
NMS user is locked if the number of illegal login times of the user exceeds the preset number.
The NMS user is automatically unlocked after the auto-unlocking duration. The NMS user can
also be unlocked by security administrators manually. The parameters for setting auto-locking
of an NMS user are set by security administrators.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
400
Prerequisites
You have logged in as a user in SMManagers.
Context
l Illegal login indicates the login to the U2000 system of an NMS user with an incorrect
password. The maximum number of illegal login times and the auto-unlocking duration
can also be set when the user account policies are set. For the description of relevant
parameters, see Account Policy.
l To manually unlock a user as security administrators, see 3.3.4.4 Unlocking Users.
Procedure
Step 1 Choose OSS Security > Settings > Security Policy (application style) or Administration >
NMS Security > Security Policies (traditional style).
Step 2 On the Account Policy tab page, set the maximum number of illegal login times and the auto-
unlocking duration, and then click OK to apply the settings.
----End
3.3.4 Monitoring U2000 Users
A user in the SMManagers group or a user who has the Monitor All User Sessions right can
monitor U2000 user sessions and force an U2000 user to log out.
3.3.4.1 Monitoring NMS User Sessions
A user in the SMManagers group or a user who has the Monitor All User Sessions right can
monitor U2000 user sessions. By monitoring U2000 user sessions, you can obtain information
about the users who have logged in.
Prerequisites
You have logged in as a user in the SMManagers group or a user who has the Monitor All
User Sessions right.
Context
l A session refers to the connection established between the client and the server. A session
starts when the user logs in to the client, and ends when the user logs out or exits the client.
l Multiple sessions can be created by using one NMS user account.
On the U2000, a user account can be used to log in to multiple clients concurrently. You
can set the maximum number of clients to which a user account can be used to log in
concurrently in Maximum of online users on the Details tab. If this user account is used
to log in to a certain number of clients, the same number of sessions are established.
l When the client uses multiple network adapters, the value of Operation Terminal is
selected randomly among available IP addresses.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
401
Procedure
Step 1 Choose OSS Security > User Session Monitor (application style) or Administration > NMS
Security > User Session Monitor (traditional style) from the main menu.
Step 2 In the User Session Monitor window, view the information about login and other operations
performed by NMS users.
Monitoring Mode Operation
Session Monitor In the Session Monitor area, you can view the information about
online users and sessions.
NOTE
l After the U2000 server is restarted or the network is recovered from a
disconnection, you need to click Refresh to update the session monitor
table.
l If you select the local client in the Session Monitor area, Force User to
Log Out and Send Message becomes unavailable.
----End
3.3.4.2 Monitoring NMS User Operations
Users in the SMManagers group or users who have the Monitor All User Sessions permission
can monitor the operations performed by the NMS users in real time, avoiding unauthorized user
operations. For example, logging in to or logging out of the U2000, resetting password,
authorizing, creating or deleting other users.
Procedure
Step 1 Choose OSS Security > User Operator Monitor (application style) or Administration > NMS
Security > User Operator Monitor (traditional style) from the main menu.
Step 2 Click Filter. In the displayed Filter dialog box, set the operation information to be displayed.
Click OK.
Step 3 In the Monitor User Operation window, view information about operations performed by
U2000 users.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
402
NOTE
l When an operation affects the U2000, you can limit the user who performs this operation according to
the actual U2000 applications. For example, you can force the user to log out in the User Session
Monitoring window.
l You can monitor the operations performed by the following users in the Monitor User Operation
window:
l Common users or Administrators: In the Query Operation Logs window, click Choose at the
lower left corner in the Filter dialog box. In the Select Operation Name dialog box, you can view
the operations that can be monitored. For details, see 4.4.1 Querying U2000 Operation Logs.
l SMManger: In the Query Security Logs window, click Choose at the lower left corner in the
Filter dialog box. In the Select Security Event dialog box, you can view the operations that can
be monitored. For details, see 4.3.1 Querying U2000 Security Logs.
----End
3.3.4.3 Forcing U2000 Users to Log Out
A member of the SMManagers group can force an NMS user to quit session if the user performs
unauthorized operations or initiates illegal sessions.
Context
l Only members of the SMManagers group can force a user to quit. If you force a user to
quit session, only the user corresponding to a session is logged out forcibly. For example,
a user logs in to the U2000 server as user user_z on clients A and B respectively. Sessions
a and b are generated. When user user_z on client A is forcibly logged out, session b is not
affected.
l Users who have logged in cannot force themselves to quit their corresponding sessions.
Procedure
Step 1 Choose OSS Security > User Session Monitor (application style) or Administration > NMS
Security > User Session Monitor (traditional style) from the main menu.
Step 2 From the Session Monitor table, select the records of the sessions to be quit forcibly, and then
click Force User to Log Out.
Step 3 In the Confirm dialog box, click Yes.
----End
3.3.4.4 Unlocking Users
If the number of times that an OM user types an incorrect password reaches the preset maximum
number of login attempts, the system automatically locks the user. After a user is locked for the
preset period, the system automatically unlocks the user. Alternatively, a security administrator
can manually unlock the user, allowing the user to log in to the U2000 system again.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
403
Prerequisites
You have logged in as a user in SMManagers.
Procedure
The U2000 supports the following user account unlocking modes.
Unlocking Mode Operation Method
Manual unlocking Only a member of the SMManagers group can perform the following
operations:
1. Choose OSS Security > OSS User Management (application
style) or Administration > NMS Security > NMS User
Management (traditional style).
2. In the NMS User Management navigation tree, expand the
User node.
3. Right-click the locked user account, and choose Unlock User.
After that, the unlocked user can log in to the U2000 successfully.
Automatic unlocking The locked user can log in to the U2000 only when the preset
automatic unlocking time arrives.
NOTE
You can set the automatic unlocking time in Account Policy. The procedure
is as follows:
Choose OSS Security > Settings > Security Policy (application style) or
Administration > NMS Security > Security Policies (traditional style). In
the displayed Security Policy dialog box, click the Account Policy tab, and
set Auto-unlock (minutes).

3.3.4.5 Sending Messages to Online Users
A member of the SMManagers group can send messages to the users of the specified sessions
or all sessions. Therefore, users in different regions can communicate with each other in real
time regarding the U2000 maintenance experience.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
404
Context
On the U2000, users of current sessions cannot send messages to themselves.
Procedure
Step 1 Choose OSS Security > User Session Monitor (application style) or Administration > NMS
Security > User Session Monitor (traditional style) from the main menu.
Step 2 In the Session Monitor area, send messages to the users of the specified sessions or all sessions.
Sessions to Be Sent Operation
A specified session Right-click a session and choose Send Message. Enter the message
contents, and then click Send.
Multiple sessions Use the Ctrl or Shift key to select multiple sessions. Right-click the
selected sessions and choose Send Message. Enter the message
contents, and then click Send.
All sessions Use the combination key Ctrl+A to select all sessions. Right-click the
selected sessions and choose Send Message. Enter the message
contents, and then click Send.
NOTE
You can choose System > Broadcast Message (application style) or Administration > Broadcast
Message (traditional style) to send broadcast messages to the users of all sessions. For details, see 1.16.2
Sending Broadcast Messages.
----End
3.3.5 Managing the Remote Maintenance User
The U2000 remote maintenance function allows you to log in to the U2000 server from the
remote maintenance terminal. Strict management of the remote maintenance user not only
ensures U2000 security, but also facilitates maintenance operations.
Prerequisites
l You are an NMS user with Maintenance Group authority or higher.
l This function applies to the MSTP series, WDM series, WDM (NA) series, RTN series,
PTN series (except PTN 6900 series) and marine series NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 3 Security Management
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
405
Context
l To facilitate maintenance, the U2000 provides the remote maintenance function. A
maintenance engineer can log in to the remote maintenance terminal as the remote
maintenance user and maintain NEs. It is recommended that the remot