You are on page 1of 260

iManager U2000 Unified Network Management

System
V100R002C00
Product Description

Issue 03

Date 2010-11-02

HUAWEI TECHNOLOGIES CO., LTD.


Copyright © Huawei Technologies Co., Ltd. 2010. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior
written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions

and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website: http://www.huawei.com
Email: support@huawei.com

Huawei Proprietary and Confidential


Issue 03 (2010-11-02) i
Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description About This Document

About This Document

Related Version
The following table lists the product version related to this document.

Product Name Version


iManager U2000 V100R002C00

Intended Audience
The iManager U2000 Product Description describes the position, functional characteristics,
system architecture and networking mode of the U2000, appended with standards that the
U2000 complies with, and performance indexes.
This document provides guides for getting the features and functions of the U2000.
This document is intended for:
 Network Planning Engineer
 Data Configuration Engineer
 System Maintenance Engineer

Symbol Conventions
The symbols that may be found in this document are defined as follows.

Symbol Description
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.

Indicates a hazard with a medium or low level of risk,


which if not avoided, could result in minor or moderate
injury.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential iii


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
About This Document Product Description

Symbol Description
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save
time.
Provides additional information to emphasize or
supplement important points of the main text.

Command Conventions
The command conventions that may be found in this document are defined as follows.

Convention Description

Boldface The keywords of a command line are in boldface.


Italic Command arguments are in italics.
[] Items (keywords or arguments) in brackets [ ] are optional.
{ x | y | ... } Optional items are grouped in braces and separated by
vertical bars. One item is selected.
[ x | y | ... ] Optional items are grouped in brackets and separated by
vertical bars. One item is selected or no item is selected.
{ x | y | ... }* Optional items are grouped in braces and separated by
vertical bars. A minimum of one item or a maximum of all
items can be selected.
[ x | y | ... ]* Optional items are grouped in brackets and separated by
vertical bars. Several items or no item can be selected.

GUI Conventions
The GUI conventions that may be found in this document are defined as follows.

Convention Description

Boldface Buttons, menus, parameters, tabs, window, and dialog titles


are in boldface. For example, click OK.
> Multi-level menus are in boldface and separated by the ">"
signs. For example, choose File > Create > Folder.

iv Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description About This Document

Change History
Updates between document issues are cumulative. Therefore, the latest document issue
contains all updates made in previous issues.

Changes in Issue 03 (2010-11-02)


The second commercial release has the following updates:
The Management capabilities of the U2000 on different hardware platforms table is
updated.

Changes in Issue 02 (2010-04-15)


The initial commercial release has the following changes:
NMS Basic Functions
Descriptions of NMS basic functions are updated.
Management Capability
Descriptions of management capability are updated.

Changes in Issue 01 (2009-12-28)


Initial field trial release.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential v


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description Contents

Contents

About This Document ................................................................................................................... iii


1 Overview......................................................................................................................................1-1
1.1 Network Position ........................................................................................................................................... 1-1
1.1.1 Development Trend of Network Management ..................................................................................... 1-2
1.1.2 Product Orientation .............................................................................................................................. 1-2
1.2 Product Characteristics .................................................................................................................................. 1-3
1.3 Manageable Equipment ................................................................................................................................. 1-5

2 Networking and Application ...................................................................................................2-1


2.1 U2000 Deployment Mode ............................................................................................................................. 2-1
2.1.1 Centralized Deployment of the Single-Server System ......................................................................... 2-2
2.1.2 Distributed Deployment ....................................................................................................................... 2-2
2.1.3 Centralized Deployment of an HA System .......................................................................................... 2-3
2.1.4 Distributed Deployment of an HA System ........................................................................................... 2-4
2.2 Networking Scheme Introduction ................................................................................................................. 2-5
2.2.1 Inband Networking Mode .................................................................................................................... 2-5
2.2.2 Outband Networking Mode.................................................................................................................. 2-6
2.3 Application Scenario of the U2000 Management.......................................................................................... 2-7
2.3.1 Integrated NMS for Unified Network Equipment Management .......................................................... 2-8
2.3.2 Broadband Bearer Network.................................................................................................................. 2-9
2.3.3 Mobile Bearer Network ..................................................................................................................... 2-10
2.3.4 IP Core Network ................................................................................................................................ 2-12
2.3.5 Access Network ................................................................................................................................. 2-14

3 System Architecture ...................................................................................................................3-1


3.1 Software Structure ......................................................................................................................................... 3-1
3.1.1 Software Structure of the U2000 Single-Server System ...................................................................... 3-1
3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby) ................................................... 3-2
3.2 External Interfaces ........................................................................................................................................ 3-4
3.2.1 NBI....................................................................................................................................................... 3-5
3.2.2 SBI ....................................................................................................................................................... 3-9

4 NMS Basic Functions ................................................................................................................4-1


4.1 Security Management .................................................................................................................................... 4-3

Issue 03 (2010-11-02) Huawei Proprietary and Confidential vii


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management
System
Contents Product Description

4.2 Topology Management .................................................................................................................................. 4-5


4.3 Alarm Management ....................................................................................................................................... 4-7
4.4 Performance Management ........................................................................................................................... 4-15
4.5 Inventory Management ............................................................................................................................... 4-18
4.6 Log Management ........................................................................................................................................ 4-19
4.7 Database Management ................................................................................................................................ 4-21
4.8 NE Communication Parameter Management .............................................................................................. 4-22
4.9 DCN Management ...................................................................................................................................... 4-23
4.10 NE Software Management ........................................................................................................................ 4-23
4.11 Report Management .................................................................................................................................. 4-25
4.12 System Monitoring .................................................................................................................................... 4-27

5 MSTP Network Feature Management ...................................................................................5-1


5.1 MSTP NE Management ................................................................................................................................ 5-2
5.2 MSTP Protection Subnet Management ......................................................................................................... 5-9
5.3 End-to-End MSTP Management ................................................................................................................. 5-10
5.4 End-to-End MSTP IP Management ............................................................................................................. 5-14
5.5 SDH ASON Management ........................................................................................................................... 5-15

6 WDM Network Feature Management....................................................................................6-1


6.1 WDM NE Management................................................................................................................................. 6-2
6.2 NA WDM NE Management ........................................................................................................................ 6-11
6.3 WDM Protection Subnet Management ....................................................................................................... 6-20
6.4 End-to-End WDM Management ................................................................................................................. 6-20
6.5 WDM ASON Management ......................................................................................................................... 6-23

7 RTN Network Feature Management ......................................................................................7-1


7.1 RTN NE Management ................................................................................................................................... 7-1
7.2 RTN Protection Subnet Management .......................................................................................................... 7-10
7.3 End-to-End RTN Management .................................................................................................................... 7-10
7.4 End-to-End RTN IP Management ............................................................................................................... 7-12

8 PTN Network Feature Management ......................................................................................8-1


8.1 PTN NE Management ................................................................................................................................... 8-1
8.2 End-to-End PTN Management .................................................................................................................... 8-18

9 Router Networks and Switch Networks Feature Management ........................................9-1


9.1 Router NE Management ................................................................................................................................ 9-2
9.2 Switch NE Management ................................................................................................................................ 9-6
9.3 Template Management .................................................................................................................................. 9-9
9.4 Diagnosis Management ............................................................................................................................... 9-11
9.5 Cluster Management ................................................................................................................................... 9-12
9.6 Node Redounded Management ................................................................................................................... 9-14
9.7 Report Subsystem Management .................................................................................................................. 9-14
9.8 VPN Service Management .......................................................................................................................... 9-14

viii Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description Contents

9.9 Tunnel Service Management ....................................................................................................................... 9-16

10 Security Device Network Feature Management ..............................................................10-1


10.1 NE Management of Security Devices ....................................................................................................... 10-1
10.2 Single-Point Web Configuration of Security Devices ............................................................................... 10-2
10.3 Centralized Security Policy Configuration ................................................................................................ 10-3
10.3.1 Policy Package Management ........................................................................................................... 10-4
10.3.2 Security Policy Configuration .......................................................................................................... 10-5
10.3.3 Attack Defense Configuration .......................................................................................................... 10-5
10.3.4 Policy Resource Configuration ........................................................................................................ 10-6
10.3.5 Mapping Service .............................................................................................................................. 10-6
10.4 Report Subsystem Management ................................................................................................................ 10-6
10.5 VPN Service Management ........................................................................................................................ 10-7
10.5.1 IPSec End-to-End Service ................................................................................................................ 10-7
10.5.2 Remote Access Service .................................................................................................................... 10-7

11 FTTx Network Feature Management .................................................................................11-1


11.1 OLT Management ...................................................................................................................................... 11-1
11.2 ONU Management .................................................................................................................................... 11-3

12 MSAN Network Feature Management ..............................................................................12-1


12.1 MSAN Management ................................................................................................................................. 12-1

13 DSLAM Network Feature Management............................................................................13-1


13.1 DSLAM Management ............................................................................................................................... 13-1

14 ONT Management .................................................................................................................14-1


15 Reliability ................................................................................................................................15-1
15.1 Reliability Indicator................................................................................................................................... 15-1
15.2 HA System ................................................................................................................................................ 15-2
15.3 DCN Protection ......................................................................................................................................... 15-3
15.4 Disk Mirroring .......................................................................................................................................... 15-3
15.5 Data Backup .............................................................................................................................................. 15-3

16 Performance Indicators .........................................................................................................16-1


17 Management Capability .......................................................................................................17-1
17.1 Management Capability ............................................................................................................................ 17-1
17.2 Manageable MSTP Series Equipment ..................................................................................................... 17-12
17.3 Manageable WDM Series Equipment ..................................................................................................... 17-14
17.4 Manageable NA WDM Series Equipment............................................................................................... 17-15
17.5 Manageable Marine Series Equipment .................................................................................................... 17-16
17.6 Manageable RTN Series Equipment ....................................................................................................... 17-16
17.7 Manageable PTN Series Equipment ........................................................................................................ 17-17
17.8 Manageable FTTx Series Equipment ...................................................................................................... 17-18
17.9 Manageable MSAN Series Equipment .................................................................................................... 17-19

Issue 03 (2010-11-02) Huawei Proprietary and Confidential ix


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management
System
Contents Product Description

17.10 Manageable DSLAM Series Equipment ............................................................................................... 17-19


17.11 Manageable Router Series Equipment .................................................................................................. 17-20
17.12 Manageable Switch Series Equipment .................................................................................................. 17-21
17.13 Manageable Metro Service Platform Equipment .................................................................................. 17-22
17.14 Manageable Broadband Access Series Equipment ................................................................................ 17-22
17.15 Manageable VoIP Gateway Equipment ................................................................................................. 17-23
17.16 Manageable WLAN Series equipment .................................................................................................. 17-23
17.17 Manageable Firewall Series Equipment ................................................................................................ 17-23
17.18 Manageable Service Inspection Gateway Equipment ........................................................................... 17-26
17.19 Manageable SVN Series Equipment ..................................................................................................... 17-27

18 Standards Compliance ..........................................................................................................18-1


A Glossary .................................................................................................................................... A-1
B Acronyms and Abbreviations ................................................................................................ B-1

x Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description Figures

Figures

Figure 1-1 Network position of the U2000 ........................................................................................................ 1-3


Figure 1-2 Centralized network management..................................................................................................... 1-4

Figure 2-1 Single-server mode ........................................................................................................................... 2-2


Figure 2-2 Distributed deployment mode ........................................................................................................... 2-3

Figure 2-3 Centralized deployment of an HA system......................................................................................... 2-4

Figure 2-4 Distributed deployment of an HA system ......................................................................................... 2-5

Figure 2-5 Inband networking diagram .............................................................................................................. 2-6

Figure 2-6 Outband networking mode................................................................................................................ 2-7

Figure 2-7 Integrated NMS for unified network equipment management.......................................................... 2-8

Figure 2-8 Network management solution for a broadband bearer network ...................................................... 2-9

Figure 2-9 Network management solution for a mobile bearer network .......................................................... 2-11

Figure 2-10 Network management solution for an IP core network ................................................................. 2-13

Figure 2-11 Networking application of the U2000 in the access network ........................................................ 2-15

Figure 3-1 U2000 software structure .................................................................................................................. 3-2

Figure 3-2 Software structure - Solaris HA system (Veritas hot standby) .......................................................... 3-3
Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby) ................................................. 3-3

Figure 3-4 Software structure - Windows HA system (Veritas hot standby) ...................................................... 3-4

Figure 3-5 Function and Feature ........................................................................................................................ 3-5


Figure 4-1 Overview of some of the U2000 applications ................................................................................... 4-1

Figure 4-2 Mechanism for implementing security management ........................................................................ 4-3

Figure 4-3 Topology view and its functions ....................................................................................................... 4-5


Figure 4-4 Alarm display in the topology view .................................................................................................. 4-6

Figure 4-5 Illustration of automatic topology discovery .................................................................................... 4-7

Figure 4-6 Alarm Browsing ................................................................................................................................ 4-9


Figure 4-7 Various alarm notification means .................................................................................................... 4-13

Figure 4-8 Alarm jumping ................................................................................................................................ 4-14

Issue 03 (2010-11-02) Huawei Proprietary and Confidential xi


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management
System
Figures Product Description

Figure 4-9 Performance Management Process ................................................................................................. 4-15

Figure 4-10 Inventory management window and its functions ........................................................................ 4-18
Figure 4-11 Log management window and its functions .................................................................................. 4-19

Figure 4-12 Function and Feature .................................................................................................................... 4-24

Figure 4-13 Diagram of the NE resource report ............................................................................................... 4-26


Figure 4-14 Diagram of the network resource report ....................................................................................... 4-27

Figure 8-1 Unicast MPLS tunnel ...................................................................................................................... 8-10

Figure 8-2 CES service application model ....................................................................................................... 8-12


Figure 8-3 ATM service application model ...................................................................................................... 8-13

Figure 8-4 E-Line Service ................................................................................................................................ 8-14

Figure 8-5 E-Aggr service scenario 1 ............................................................................................................... 8-15


Figure 8-6 E-Aggr service scenario 2 ............................................................................................................... 8-15

Figure 8-7 E-LAN service ................................................................................................................................ 8-16

Figure 9-1 Cluster topology.............................................................................................................................. 9-13

Figure 9-2 Navigation path to cluster functions ............................................................................................... 9-13

xii Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description Tables

Tables

Table 4-1 Description of alarm functions ........................................................................................................... 4-9


Table 4-2 Monitoring template type ................................................................................................................. 4-16

Table 8-1 Types of PTN service interfaces ......................................................................................................... 8-3


Table 15-1 Reliability indicators of the U2000 ................................................................................................. 15-2

Table 15-2 Data backup .................................................................................................................................... 15-4

Table 16-1 Performance indicators ................................................................................................................... 16-1

Table 16-2 DCN bandwidth requirements ........................................................................................................ 16-2

Table 17-1 Management capabilities of the U2000 on different hardware platforms ....................................... 17-3

Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents .................................. 17-7

Table 17-3 Management capabilities of the U2000 on different IP NE equivalents ......................................... 17-9

Table 17-4 Management capabilities of the U2000 on different access NE equivalents ................................ 17-12

Table 17-5 Manageable MSTP series equipment ............................................................................................ 17-13

Table 17-6 Manageable WDM equipment ...................................................................................................... 17-14

Table 17-7 Manageable NA WDM series equipment ..................................................................................... 17-16

Table 17-8 Manageable marine series equipment ........................................................................................... 17-16


Table 17-9 Manageable RTN equipment ........................................................................................................ 17-17

Table 17-10 Manageable PTN series equipment ............................................................................................ 17-17

Table 17-11 Manageable FTTx series equipment ........................................................................................... 17-18


Table 17-12 Manageable MSAN series equipment ........................................................................................ 17-19

Table 17-13 Manageable DSLAM series equipment ...................................................................................... 17-19

Table 17-14 Manageable router series equipment .......................................................................................... 17-20


Table 17-15 Manageable switch series equipment ......................................................................................... 17-21

Table 17-16 Manageable Metro service platform equipment ......................................................................... 17-22

Table 17-17 Manageable broadband access series equipment ........................................................................ 17-22


Table 17-18 Manageable VoIP gateway equipment ........................................................................................ 17-23

Table 17-19 Manageable WLAN series equipment ........................................................................................ 17-23

Issue 03 (2010-11-02) Huawei Proprietary and Confidential xiii


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management
System
Tables Product Description

Table 17-20 Manageable firewall series equipment ....................................................................................... 17-23

Table 17-21 Manageable service inspection gateway equipment ................................................................... 17-26


Table 17-22 Manageable SVN series equipment ............................................................................................ 17-27

Table 18-1 Details of the Standards and Protocols ........................................................................................... 18-2

xiv Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 1 Overview

1 Overview

About This Chapter


This topic describes the position of the U2000 in the telecommunication management network
(TMN) hierarchy, the product characteristics, and the equipment that the U2000 can manage.
1.1 Network Position
Introduce the development trend of network management and the network position of the
U2000.
1.2 Product Characteristics
After software optimization, the U2000 improves the capability of managing integrated
networks, scalability, and ease of use. Therefore, the U2000 helps to construct a
customer-centered and future-oriented network management system of a new generation.
1.3 Manageable Equipment
Introduce the equipment that the U2000 V100R002C00 can manage.

1.1 Network Position


Introduce the development trend of network management and the network position of the
U2000.
1.1.1 Development Trend of Network Management
With the development of IT and IP technology and the convergence of telecommunications, IT,
media, and electronic industries, the telecommunications industry has witnessed tremendous
growth. The broadband services and mobile services have become the mainstream services in
telecommunications networks.
1.1.2 Product Orientation
The U2000 is the major and future-oriented network management product and solution in
Huawei.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 1-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
1 Overview Product Description

1.1.1 Development Trend of Network Management


With the development of IT and IP technology and the convergence of telecommunications, IT,
media, and electronic industries, the telecommunications industry has witnessed tremendous
growth. The broadband services and mobile services have become the mainstream services in
telecommunications networks.
All-IP architecture and fixed-mobile convergence (FMC) are the network development goals
for the next three to five years, during which the market orientations and business modes of
telecom carriers will vary accordingly. The development of all-IP architecture is the leading
factor in the transition from the existing vertical network that is divided by technology and
service to the flattened horizontal network. Improving user experience, lowering operation
expenditure (OPEX), and improving efficiency are the driving forces for FMC.
Network convergence requires network management to be consolidated. To be oriented to the
future network trend, the iManager U2000 that is the integrated network management system
(NMS) combines all-IP and FMC, and manages carrier equipment and access equipment in a
centralized manner. The U2000 can perform not only integrated management of multi-domain
equipment but also integrated management at the network element (NE) and network layers.
The U2000 has revolutionized the layer-based management mode to meet the management
requirements in the transition from the existing vertical network to the flattened horizontal
network.
The integrated NMS U2000 aims to minimize operation and maintenance (O&M) costs for
customers and to bring more network value. The U2000 is based on the design of distributed
software architecture, and supports the new generation advanced telecom computing
architecture (ATCA) hardware platform. In addition, the super network management
capability and modular software architecture of the U2000 that shapes the development trend
in the future network management make the U2000 a leading all-IP and FMC management
solution.

1.1.2 Product Orientation


The U2000 is the major and future-oriented network management product and solution in
Huawei.
The U2000 is an integrated management platform for all equipment in the Huawei. It can
manage transport equipment, access equipment, and IP equipment (including routers, security
equipment, and Metro Ethernet equipment) in a centralized manner. The U2000 is designed as
the management system for Huawei equipment. With powerful management functions at the
NE and network layers, the U2000 is the major and future-oriented network management
product and solution in Huawei.
In the TMN hierarchy, the U2000 is located between the element management layer and
network management layer, and supports all functions of the NE and network layers. Figure
1-1 shows the network position of the U2000.

1-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 1 Overview

Figure 1-1 Network position of the U2000

OSS

Service
management layer

XML/CORBA/SNMP/FTP
Network
management layer
iManager U2000
+
Element
management layer

Access network IP network


MSAN/FTTX Router/Switch/ Network
Transport network
BRAS/PTN element layer
SDH/WDM/
OTN/MW

1.2 Product Characteristics


After software optimization, the U2000 improves the capability of managing integrated
networks, scalability, and ease of use. Therefore, the U2000 helps to construct a
customer-centered and future-oriented network management system of a new generation.

Centralized Network Management


The U2000 can manage transport equipment, access equipment, and IP equipment in a
centralized manner. Figure 1-2 shows the equipment that the U2000 manages. The main
characteristics of the U2000 are as follows:
 Manages multiple equipment and the services related to the equipment in Huawei. For
details, see 1.3 Manageable Equipment.
 Manages end-to-end services across domains in access and bearer networks. The services
include synchronous digital hierarchy (SDH, WDM, microwave, and packet services).

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 1-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
1 Overview Product Description

Figure 1-2 Centralized network management

U2000

IP MSAN WDM
EPE
EPE NPE BRAS IMS
VDSL2
Core

OLT MSE IPTV


VPLS/MPLS
EPE NPE IP/MPLS
ONT

AG
MSE
Internet/
SP
MSTP BRAS WDM

MSTP
MSTP
UPE VC12/VC4

MSTP
MSTP
Access
Home/Business Node Metro Network SR/BRAS Backbone

Multiple Operating Systems


The U2000 is a stand-alone application that can be installed on different operating systems
and databases. Hence, multiple operating systems are compatible.
The U2000 is developed based on Huawei's integrated management application platform
(iMAP). It supports Sun workstations, PC servers, Sybase databases, Oracle databases, SQL
Server databases, and Solaris, Windows, and SuSE Linux operating systems. It provides
high-end solutions to large-scale networks and low-cost solutions to small and medium-scale
networks.

Modular Architecture
The U2000 uses a modular design to increase system flexibility.
 By adopting the mature and widely-used C/S (Client/Server) architecture, the U2000
supports distributed and hierarchical database system, service processing system, and
foreground application system, and supports concurrent operations of multiple clients, to
meet the management requirements of complex and large-scale networks.

1-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 1 Overview

 The U2000 uses an object-oriented, multiprocessing, modular, and componentized


architecture design. Hence, the degree of coupling of NE management components
decreases. In addition, different application processes are integrated into the system by
means of registry files. In this way, the U2000 has flexible expansion capabilities.
 Stand-alone and distributed deployment of the U2000 increases the management
capability to a great extent.
 The modular architecture of the U2000 meets the management requirements of products
in a single domain and the integrated management requirements of products across
domains.

1.3 Manageable Equipment


Introduce the equipment that the U2000 V100R002C00 can manage.
The equipment that the U2000 V100R002C00 can manage is listed as follows:
 Manageable MSTP series equipment
 Manageable WDM series equipment
 Manageable NA WDM series equipment
 Manageable marine series equipment
 Manageable RTN series equipment
 Manageable PTN series equipment
 Manageable FTTx series equipment
 Manageable MSAN series equipment
 Manageable DSLAM series equipment
 Manageable router series equipment
 Manageable switch series equipment
 Manageable Metro service platform series equipment
 Manageable broadband access series equipment
 Manageable VoIP gateway series equipment
 Manageable WLAN series series equipment
 Manageable firewall series equipment
 Manageable service inspection gateway series equipment
 Manageable SVN series equipment

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 1-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 2 Networking and Application

2 Networking and Application

About This Chapter


The U2000 provides a centralized networkwide management solution to transport, IP, and
access networks. In addition, the U2000 provides standard external interfaces to integrate with
the operation support system (OSS), to meet the management requirements of large-scale
transport networks.
2.1 U2000 Deployment Mode
The U2000 supports the centralized and distributed deployment modes of servers.
2.2 Networking Scheme Introduction
The U2000 adopts the widely used C/S (Client/Server) model. In such a model, the client and
the server communicate through the LAN or wide area network (WAN). The U2000 server
communicates with its managed devices in inband or outband networking mode.
2.3 Application Scenario of the U2000 Management
This topic describes the typical application scenario of U2000 management.

2.1 U2000 Deployment Mode


The U2000 supports the centralized and distributed deployment modes of servers.
The U2000 uses the Client/Server architecture. Depends on the sizes of managed networks,
the U2000 supports the centralized and distributed deployment modes of servers.
To ensure the high availability of the system, the U2000 supports the HA system (Veritas hot
standby). The HA system (Veritas hot standby) can also be configured in the distributed mode.
The U2000 system contains management components for manageable equipment. The
components support multiple instances in the distributed mode.
2.1.1 Centralized Deployment of the Single-Server System
The U2000 supports centralized deployment of the single-server system on Windows, Solaris
or SUSE Linux OS, that is, there is only one U2000 server on which all management
components are installed and all processes run.
2.1.2 Distributed Deployment

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 2-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
2 Networking and Application Product Description

The U2000 supports distributed deployment of the single-server system on SUSE Linux OS.
Slave servers can share the CPU usage and memory usage of the master server. In this manner,
the load is balanced.
2.1.3 Centralized Deployment of an HA System
The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where
there is only one server on either the primary site or the secondary site.
2.1.4 Distributed Deployment of an HA System
The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed
deployment mode where both the primary and secondary sites use distributed systems.

2.1.1 Centralized Deployment of the Single-Server System


The U2000 supports centralized deployment of the single-server system on Windows, Solaris
or SUSE Linux OS, that is, there is only one U2000 server on which all management
components are installed and all processes run.
The U2000 supports a networking scheme of a single server and multiple clients. In the
centralized deployment mode of the single-server system, there is only one U2000 server on
which all management components are installed and all processes run. See Figure 2-1.

Figure 2-1 Single-server mode

This type of networking is applicable to medium and small-scale networks.

2.1.2 Distributed Deployment


The U2000 supports distributed deployment of the single-server system on SUSE Linux OS.
Slave servers can share the CPU usage and memory usage of the master server. In this manner,
the load is balanced.
The U2000 supports a networking scheme of multiple servers and clients, as shown in Figure
2-2.

2-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 2 Networking and Application

Figure 2-2 Distributed deployment mode

The management components for manageable equipment can be deployed on different servers
or on the same server.
Distributed system consists of the master server and slave server, which compose a site to
perform the U2000 server function.
The master server is the core of a distributed system. The database server and the core
subsystems of the U2000 are running on the master server.
The non-core subsystems of the U2000 (such as the management components for manageable
equipment) are running on the slave server. In this way, the CPU usage and the memory usage
of the master server are lowered, the load is balanced between the master and slave servers
and the management capability of the U2000 is increased.

In the distributed deployment mode, you can deploy all servers in only the same LAN.

2.1.3 Centralized Deployment of an HA System


The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where
there is only one server on either the primary site or the secondary site.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 2-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
2 Networking and Application Product Description

The primary and secondary sites comprise an HA system. The data in different locations is
backed up through a network. When a fault occurs in the primary site, the system switches to
the secondary site so that network monitoring continues. Figure 2-3 shows the networking
diagram.

Figure 2-3 Centralized deployment of an HA system

2.1.4 Distributed Deployment of an HA System


The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed
deployment mode where both the primary and secondary sites use distributed systems.
The primary and secondary sites comprise an HA system. The data in different locations is
backed up through a network. When a fault occurs in the primary site, the system switches to
the secondary site so that network monitoring continues. In the primary or secondary site,
master and slave servers are deployed in a distributed mode. The slave servers can share the
CPU usage and memory usage of the master server. In this manner, the load is balanced
between the master and slave servers. Figure 2-4 shows the networking diagram.

2-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 2 Networking and Application

Figure 2-4 Distributed deployment of an HA system

2.2 Networking Scheme Introduction


The U2000 adopts the widely used C/S (Client/Server) model. In such a model, the client and
the server communicate through the LAN or wide area network (WAN). The U2000 server
communicates with its managed devices in inband or outband networking mode.
2.2.1 Inband Networking Mode
In inband networking mode, the U2000 uses the service channels that are provided by the
managed devices to manage the devices on the network. The messages sent from the U2000
are transmitted through the service channels of the managed devices.
2.2.2 Outband Networking Mode
In outband networking mode, the U2000 uses the communication channels that are provided
by devices other than the managed devices to transmit messages for network management. In
normal cases, the management interface on the main processing unit or routing switch unit of
the managed device are used as the access interface.

2.2.1 Inband Networking Mode


In inband networking mode, the U2000 uses the service channels that are provided by the
managed devices to manage the devices on the network. The messages sent from the U2000
are transmitted through the service channels of the managed devices.
Figure 2-5 shows the inband networking diagram.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 2-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
2 Networking and Application Product Description

Figure 2-5 Inband networking diagram

Managed Network

NMS

Networking Description
The devices managed by the U2000 are all connected to the managed network. The U2000
needs to be connected to only the nearby NE on the managed network. After configuring the
related routes, you can manage all the devices on the network.
The way of connecting the U2000 with the managed network depends on the distance
between the U2000 and its nearby NE. If the U2000 and its nearby IP devices are in the same
equipment room, you can use the LAN mode. If the U2000 and its nearby IP devices are far
from each other, you can use the private line mode. The private line mode is similar to the
outband networking mode.
 Networking Advantages: This networking mode is flexible and cost-effective. It does not
need extra devices.
 Networking Disadvantages: In the case of network failure, the communication channel
between the U2000 and its managed network is interrupted. As a result, the U2000
cannot maintain the managed network.

2.2.2 Outband Networking Mode


In outband networking mode, the U2000 uses the communication channels that are provided
by devices other than the managed devices to transmit messages for network management. In
normal cases, the management interface on the main processing unit or routing switch unit of
the managed device are used as the access interface.
In this mode, the U2000 can be connected to the managed devices in multiple ways. The
U2000 manages the devices within its management scope through the data communication
network (DCN).Figure 2-6 shows the outband networking mode.

2-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 2 Networking and Application

Figure 2-6 Outband networking mode

DCN

NMS

Managed Network

Networking description
The devices managed by the U2000 are all connected to the managed network. The U2000
connects with the devices on the managed network through the DCN that is made up of other
devices. In this manner, the U2000 implements its management on the managed network and
devices.
 Networking advantages: In outband networking mode, the U2000 is connected to its
managed devices through other devices. It is not connected to its managed devices
directly. Compared with the inband networking mode, this mode provides more reliable
device management channels. When a fault occurs on a managed device, the U2000 can
locate information about the faulty device in a timely manner and monitor this device in
real time.
 Networking disadvantages: In outband networking mode, the U2000 manages its
managed devices through a maintenance channel that is independent of the service
channel. To provide such a maintenance channel, you need to build a network that is
made up of extra devices. Thus, the cost of constructing the network is high.

2.3 Application Scenario of the U2000 Management


This topic describes the typical application scenario of U2000 management.
2.3.1 Integrated NMS for Unified Network Equipment Management
This topic describes the integrated NMS U2000, which is developed for the typical solution of
unified equipment management.
2.3.2 Broadband Bearer Network

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 2-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
2 Networking and Application Product Description

The U2000 provides perfect solutions for broadband bearer networks in terms of network
deployment, service deployment, and service assurance.
2.3.3 Mobile Bearer Network
The U2000 provides perfect solutions for mobile bearer networks in terms of network
deployment, service deployment, and service assurance.
2.3.4 IP Core Network
The U2000 provides perfect solutions for IP core networks in terms of network deployment,
service deployment, and service assurance.
2.3.5 Access Network
In the networking application of the access network, the U2000 manages and maintains xPON
OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner.

2.3.1 Integrated NMS for Unified Network Equipment


Management
This topic describes the integrated NMS U2000, which is developed for the typical solution of
unified equipment management.

Figure 2-7 Integrated NMS for unified network equipment management

oss
Service management layer

XML/CORBA/SNMP/FTP/TL1

iManager U2000
Network management layer
+
NE management layer

Datacom network
Access network Transport network NE layer
Access network SDH/WDM/OTN/MW
Router/Switch/BRAS
MSAN/FTTX
/PTN

The features of the U2000 are as follows:


 The U2000 provides a unified platform for managing access equipment, transport
equipment, and datacom equipment, thus realizing integrated management on
cross-domain equipment. In addition, the U2000 breaks the restrictions of the vertical
management mode and realizes integrated management on the equipment at the network
layer and NE layer.
 The U2000 meets the network integration trend and can provide management schemes
for multiple types of networking scenarios. With unified and consistent GUIs, simple and
convenient service deployment, and effective service monitoring and assurance, the
U2000 brings good user experience and greatly reduces network operation and
maintenance costs.

2-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 2 Networking and Application

 U2000Blessed by the good cooperation relationships between Huawei and many


mainstream OSS vendors, the U2000 can provide abundant NBIs and powerful NBI
customization support, protecting user investment to the largest extent.

2.3.2 Broadband Bearer Network


The U2000 provides perfect solutions for broadband bearer networks in terms of network
deployment, service deployment, and service assurance.

Networking Diagram

Figure 2-8 Network management solution for a broadband bearer network

Network Deployment
The U2000 meets the following requirements in the network deployment stage:
 Supporting the remote disaster recovery solutions
When the active server fails, the standby server can take over as the active server to
avoid service interruption.
 Providing the fast OSS integration capability through abundant NBIs such as SNMP, FTP,
CORBA, and XML NBIs and implementing end-to-end management by providing alarm,
inventory, and performance data for upper-layer OSSs.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 2-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
2 Networking and Application Product Description

Service Deployment
Carrying multiple services is one of the most distinctive features of the Metro Ethernet.
Services such as the high-speed internet (HSI) service, IPTV, and voice over IP (VoIP) must
be established on logical channels.
The U2000 allows you to quickly establish specific logical channels on physical networks.
For example, you can quickly establish end-to-end MPLS LSP, MPLS TE, PW, and VPLS
logical channels through GUIs. You can verify the validity of services before deployment and
modify services after the logical channels are established.
The Metro Ethernet often carries heavy service traffic. To adapt to this feature, the U2000
provides the batch deployment function to accelerate the deployment process.
To ensure the reliability of key channels, you can configure protection protocols such as BFD,
VRRP, and MPLS OAM.
The U2000 provides efficient test diagnosis tools. Through the related test cases, you can use
test diagnosis tools to quickly identify fault causes and rectify network faults, thus ensuring
network stability.

Service Assurance
The U2000 monitors the running status of the network 24 hours a day and 7 days a week in
multiple ways. It can detect network faults or degradation in a timely manner and report
endto- end SLA data of the network.
The U2000 provides the following service assurance for the broadband bearer network:
 Real-time alarm monitoring and notification
The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network.
 Performance monitoring 24 hours a day and 7 days a week
The U2000 regularly collects the traffic data of all the links or some key links on the
entire network to provide effective support for network monitoring.
 End-to-end SLA monitoring on network nodes
The U2000 regularly collect the SLA data between PEs, between the local CE and PE,
and between the PE and remote CE. With these data, you can discover network
degradation, predict the trend of network running, and optimize the network accordingly.

2.3.3 Mobile Bearer Network


The U2000 provides perfect solutions for mobile bearer networks in terms of network
deployment, service deployment, and service assurance.

2-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 2 Networking and Application

Networking Diagram

Figure 2-9 Network management solution for a mobile bearer network

Network Deployment
The U2000 meets the following requirements in the network deployment stage:
 Large-scale network management in distributed deployment mode
In distributed deployment mode, NE Explorer instances can be deployed on one or more
servers, enabling the entire system to have good expansibility and meet various complex
network management requirements. This greatly reduces the operation and maintenance
investment of large-scale networks.
 HA solution
The U2000 supports two-node cluster backup and real-time monitoring to ensure data
security.

Service Deployment
On a mobile bearer network, the TDM base station, ATM base station, and IP base station are
borne by end-to-end PWs.
The U2000 supports the following features in terms of service deployment:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 2-11


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
2 Networking and Application Product Description

 Providing user-friendly GUIs for the creation and maintenance of logical CES, ATM,
Ethernet, and PWE3 channels
 Supporting the ability to perform end-to-end management on static and dynamic tunnels
and to query the binding relations between PWs and tunnels
 Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, MPLS OAM,
and QoS to ensure service reliability
 Supporting the ability to deploy services in batches through the service template to
improve the efficiency and preciseness of service deployment, in the case that a large
number of NEs are deployed on the mobile bearer network

Service Assurance
The U2000 provides the following service assurance for the mobile bearer network:
 Real-time alarm monitoring and notification
The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network.
 Performance monitoring 24 hours a day and 7 days a week
The U2000 periodically collects the key performance indicators of networkwide links or
specified links and dynamically displays the network running status, providing important
references for locating network faults.
 Service-centered performance monitoring
On a mobile bearer network, you can precisely analyze the trend of service traffic, and
identify and locate faults through the performance indicators used to monitor the related
services, such as PWE3, VPLS, and L3VPN services.

2.3.4 IP Core Network


The U2000 provides perfect solutions for IP core networks in terms of network deployment,
service deployment, and service assurance.

2-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 2 Networking and Application

Networking Diagram

Figure 2-10 Network management solution for an IP core network

Network Deployment
The U2000 meets the following requirements in the network deployment stage:
 Centralized deployment and authority- and domain-based user management
Different users can mange different objects according to their respective management
rights. In this manner, the security of the U2000 is ensured.
 HA solution
The U2000 supports two-node cluster backup and real-time monitoring to ensure data
security.
 Distributed deployment of collectors for managing large-scale networks
In distributed deployment mode, NE explorer instances can be deployed on one or more
servers, enabling the whole system to have good expansibility and meet various complex
network management requirements. This greatly reduces the operation and maintenance
investment of large-scale networks.

Service Deployment
The U2000 supports the following features in terms of service deployment:
 Supporting the ability to deploy mainstream services such as VPLS, L3VPN, and PWE3
services and providing multiple types of service configuration templates and bulk
configuration templates

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 2-13


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
2 Networking and Application Product Description

With simple and user-friendly GUIs, the U2000 effectively improves the efficiency of
service deployment.
 Supporting the ability to manage mainstream routing protocols, such as OSPF, ISIS, and
BGP
 Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, VPN FRR,
MPLS OAM, and QoS to ensure service reliability

Service Assurance
The U2000 provides the following service assurance for the IP core network:
 Real-time alarm monitoring and notification
The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network. By diagnosing services
according to network protocol layers, the U2000 can quick locate the faulty network
layer.
 Performance monitoring 24 hours a day and 7 days a week
The U2000 periodically collects the key performance indicators of networkwide links or
specified links and dynamically displays the network running status, providing important
references for locating network faults.
 End-to-end SLA monitoring on network nodes
The U2000 regularly collects the SLA data between PEs, between the local CE and PE,
and between the PE and remote CE. With these data, you can discover network
degradation, predict the trend of network running, and optimize the network accordingly.

2.3.5 Access Network


In the networking application of the access network, the U2000 manages and maintains xPON
OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner.
Figure 2-11 shows the networking application of the U2000 in the access network.

2-14 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 2 Networking and Application

Networking Diagram

Figure 2-11 Networking application of the U2000 in the access network

Networking description
 Broadband access:
− As IP-DSLAMs, the broadband access devices support various broadband access
modes, such as the ADSL2+, SHDSL, and VDSL2. They provide high-speed Internet
access service, video service, and ATM and IP private line services for business users,
enterprises, cyber cafes, and common users.
− The DSLAMs at different levels can be subtended through GE/FE ports to provide
xDSL services. The subtending of devices extends the coverage of the network
efficiently and meets the requirements of the scenarios in which a large number of
users are supported.
− The broadband access devices provide the LAN private line interconnection service
of the carrier-class high quality. The service is applicable to the interconnection
between branches, such as the government, enterprise, and business user (for example,
a bank), and their headquarters. It is also applicable to other applications such as
broadband Internet access and video conference.
 FTTx access:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 2-15


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
2 Networking and Application Product Description

− The OLT in the PON system works with the ONU/ONT, which is connected to the
LAN switch or hub in the downstream direction, to provide service access for users.
− In the downstream direction, the OLT is connected to the MDU or mini-MSAN
through fibers. The MDU or mini-MSAN provides service access for more users
through twisted pairs, coaxial cables, and category-5 cables.
 Integrated access:
− Controlled by the MGC, the MSAN supports the VoIP, FoIP, and MoIP service access
and provides ISDN BRA and ISDN PRA services.
− The MSAN provides the ADSL/VDSL2 broadband Internet access service and the
SHDSL private line interconnection service.

2-16 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 3 System Architecture

3 System Architecture

About This Chapter


The U2000 provides solution of the single-layer management network for small- and
medium-scale transport networks. In addition, the U2000 provides standard external
interfaces, through which the U2000 is interconnected with an upper-layer NMS to form a
hierarchical management network. The U2000 assists the NMS at the network management
layer and the NMS at the service management layer to manage large-scale transport networks.
3.1 Software Structure
This topic describes the configuration requirements of the software structures of the U2000
single server system and U2000 HA system.
3.2 External Interfaces
An external interface is used for the communication and data exchange between the NMS and
external systems. An external interface can be a northbound or southbound interface.

3.1 Software Structure


This topic describes the configuration requirements of the software structures of the U2000
single server system and U2000 HA system.
3.1.1 Software Structure of the U2000 Single-Server System
This topic describes the software structure of the U2000 single-server system.
3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby)
This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).

3.1.1 Software Structure of the U2000 Single-Server System


This topic describes the software structure of the U2000 single-server system.
The U2000 single-server system is a standard system structure of the U2000. A U2000 server
can be connected to multiple U2000 clients.
Figure 3-1 shows the structural relationship between main modules.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 3-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
3 System Architecture Product Description

Figure 3-1 U2000 software structure

3.1.2 Software Structure of the U2000 HA System (Veritas Hot


Standby)
This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).
The U2000 HA system (Veritas Hot Standby), a type of HA system provided by the U2000,
applies to geographic redundancy of an HA system.
The U2000 HA system (Veritas Hot Standby) supports the Solaris, SUSE Linux, and
Windows. Figure 3-2, Figure 3-3, and Figure 3-4 show the software structure.

3-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 3 System Architecture

Figure 3-2 Software structure - Solaris HA system (Veritas hot standby)

Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby)

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 3-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
3 System Architecture Product Description

Figure 3-4 Software structure - Windows HA system (Veritas hot standby)

 The Veritas volume replicator (VVR) is used to duplicate the U2000 data on the primary
site to the secondary site so that data is synchronized between the primary and secondary
sites in real time.
 The Veritas cluster server (VCS) is used to monitor the system and application service in
real time. When a fault occurs in hardware or software, the VCS restarts or stops the
application service.
 The Veritas volume manager (VxVM) is used to manage the disks and data volumes of
servers.

3.2 External Interfaces


An external interface is used for the communication and data exchange between the NMS and
external systems. An external interface can be a northbound or southbound interface.
Figure 3-5 depicts the function and feature of external interface.

3-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 3 System Architecture

Figure 3-5 Function and Feature

3.2.1 NBI
Through the NBIs, the U2000 offers networking monitoring information for the OSS on
various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the
U2000 support network management functions, including service provisioning and diagnosis
test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs.
3.2.2 SBI
Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to
implement the functions such as provisioning services, transmitting alarms, and transmitting
performance data.

3.2.1 NBI
Through the NBIs, the U2000 offers networking monitoring information for the OSS on
various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the
U2000 support network management functions, including service provisioning and diagnosis
test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs.
The following table lists the equipment supported by the NBIs of the U2000.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 3-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
3 System Architecture Product Description

Interface Equipment
Type

XML The XML NBI enables unified management functions for the OSS in
terms of alarms, performance, inventory, and service provisioning. These
management functions apply to routers, Metro equipment, transport
equipment, and access equipment.
CORBA The CORBA NBI enables unified alarm management for the OSS on
routers, Metro equipment, transport equipment, and access equipment.
Meanwhile, the CORBA NBI enables management of performance,
inventory, and service provisioning for the OSS in Metro and transport
domains.
SNMP The SNMP NBI enables unified alarm management of the OSS on
routers, Metro equipment, transport equipment, and access equipment.
TL1 The TL1 NBI enables inventory query, inventory provisioning, and
service provisioning (xDSL, xPON, broadband, and narrowband
services) for the OSS in the access domain.
FTP The FTP performance NBI enables the export of performance statistics
for the OSS. In this case, the performance statistics is exported to the
specified FTP server for analysis.
MML The U2000 can access an OSS test system, and can support tests on
narrowband access devices (lines and terminals) and ADSL lines through
the OSS test NBI.

XML NBI
Compliant with the TMF MTOSI 2.0 series standard, the U2000 XML NBI enables unified
management functions of the OSS in terms of alarms, performance, inventory, and service
provisioning. These management functions apply to routers, Metro equipment, transport
equipment, and access equipment.
The U2000 XML NBI mainly supports the following functions:
 Alarm management
− Report alarm events.
− Synchronize active alarms.
− Acknowledge alarms.
− Unacknowledge alarms.
− Collect alarm statistics.
 Performance management
− Query history performance data.
− Query current performance data.
− Report performance threshold-crossing events.
− Query performance threshold-crossing events.
 Inventory management
− Query physical inventory (NE, shelf, slot, card, and physical port).

3-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 3 System Architecture

− Query logical inventory (logical port, fiber/cable, tunnel, and service).


− Export inventory data and report the change of inventory.
 Service provisioning management
− Provision resources for the routing and Metro tunnels (MPLS tunnel and IP tunnel).
− Provision resources for the routing and Metro services (ATM PWE3, CES PWE3,
ETH PWE3, VPLS, and L3VPN).

CORBA NBI
Compliant with the TMF MTNM V3.5 series standard, the U2000 CORBA NBI enables
unified alarm management for the OSS. Meanwhile, the CORBA NBI enables service
provisioning, diagnosis test, inventory management, and performance management on Metro
and transport equipment.
The U2000 CORBA NBI mainly supports the following functions:
 Alarm management
− Report alarm events.
− Synchronize active alarms.
− Acknowledge alarms.
− Unacknowledge alarms.
 Performance management in the Metro and transport domains
− Query history performance data.
− Query current performance data.
− Report performance threshold-crossing events.
− Query performance threshold-crossing events.
 Inventory management in the Metro and transport domains
− Query physical inventory (NE, shelf, slot, card, and physical port).
− Query logical inventory (logical port, fiber/cable, and trail).
 Service provisioning management in the Metro and transport domains
− Provision end-to-end services in the transport domain (SDH, WDM, OTN, MSTP,
ASON, and RTN).
− Provision single-station services in the transport domain (SDH, WDM, OTN, and
MSTP).
− Provision resources for Metro tunnels (MPLS tunnel and IP tunnel).
− Provision resources for Metro services (ATM PWE3, CES PWE3, ETH PWE3, and
VPLS).
 Diagnosis test management in the transport domain
− Set loopback on a port and alarm insertion.
− Conduct Ethernet CC, LB, and LT tests.
− Conduct the 2M PRBS test.

SNMP NBI
Compliant with the SNMP V1/V2/V3 standard, the U2000 SNMP NBI enables unified alarm
management of the OSS on routers, Metro equipment, transport equipment, and access
equipment.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 3-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
3 System Architecture Product Description

The U2000 SNMP NBI mainly supports the following functions:


 Report alarm events.
 Synchronize active alarms.
 Acknowledge alarms.
 Unacknowledge alarms.
 Report heartbeat alarm events.
 Set alarm filter criteria.

TL1 NBI
Compliant with the GR 831 standard, the U2000 TL1 NBI enables inventory query, inventory
provisioning, and service provisioning (xDSL, xPON, broadband, and narrowband services)
for the OSS in the access domain.
The U2000 TL1 NBI mainly supports the following functions:
 Service provisioning management in the access domain
− Provision xDSL services (ADSL, SHDSL, and VDSL2).
− Provision xPON services (GPON and EPON).
− Provision multicast services.
− Provision voice services.
− Provision BRAS services.
− Manage service port/PVC connections.
− Manage VLANs.
− Manage Ethernet ports.
− Manage ACL&Qos.
 Inventory management in the access domain
− Query resources (equipment, shelf, card, daughter card, port, and service virtual port).
− Report resource change notification.
− Manage and maintain resources.

FTP Performance NBI


The U2000 FTP performance NBI enables the export of performance statistics for the OSS. In
this case, the performance statistics is exported to the specified FTP server for analysis.
The U2000 FTP performance NBI mainly supports the following functions:
 Set conditions for exporting performance data, as follows:
− Monitoring period of performance events
− Monitoring indicator of performance events
− Export period of performance data
 Export performance data to the specified FTP server.

MML Test NBI


The U2000 provides the MML NBI for the upper layer OSS to implement the following
features:

3-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 3 System Architecture

 Controlling the test component of an access device to perform a line test and report the
test result.
 Issuing commands to capture or release a subscriber line to the test bus of a device and
then using external test unit to perform a line test.
The MML NBI solves the following problems:
 A centralized line test system is provided to manage and test lines in the entire network.
These lines can be managed by EMSs provided by different vendors.
 The integrated line test system can control an access device and a test unit concurrently
to perform a line test.
The U2000 supports the following types of MML NBIs:
 Narrowband line test NBI: It is used to test narrowband access devices (lines and
terminals).
 ADSL line test NBI: It is used to query ADSL port information, and capture or release
lines.

3.2.2 SBI
Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to
implement the functions such as provisioning services, transmitting alarms, and transmitting
performance data.

Qx Interface
The Qx interface adopts the private OptiX management protocol developed by Huawei.
Through the Qx interface, the U2000 is connected to the OptiX series equipment.

SNMP SBI
The SNMP interface is compliant with the SNMP V1, V2, and V2 standards. Through the
SNMP interface, the U2000 is connected to routers, switches, and security products of
Huawei.

CLI SBI
Through the CLI interface, the U2000 is connected to routers, switches, and security products
of Huawei.

SSH SBI
Secure Shell (SSH) is a tool that is similar to Telnet. All the transmitted data can be encrypted
through the SSH to prevent DNS spoofing and IP spoofing. In addition, the transmission rate
is high because the data transmitted through the SSH is compressed.

Telnet SBI
Through the Telnet SBI, the U2000 can log in to equipment remotely and manage equipment.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 3-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
3 System Architecture Product Description

TFTP/FTP/SFTP SBI
The U2000 can back up the data of devices, upgrade devices, and load patches through the
TFTP/FTP/SFTP SBI.

When the data is backed up in the SFTP mode, the commands and the data are encrypted before they are
transmitted.

Syslog SBI
The U2000 can manage the NE logs through the Syslog SBI.

3-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

4 NMS Basic Functions

About This Chapter


The U2000 provides all management functions at element management layer and network
management layer.
Figure 4-1 depicts an overview of some of the U2000 applications.

Figure 4-1 Overview of some of the U2000 applications

4.1 Security Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

This topic describes how to ensure the security of the U2000 by managing objects such as
users, user groups, rights, and operation sets.
4.2 Topology Management
In topology management, the managed NEs and their connections are displayed in a topology
view. The managed NEs are displayed and managed in subnets and views. You can monitor
the operating status of the entire network in real time by browsing the topology view.
4.3 Alarm Management
In alarm management, you can monitor network exceptions in real time. It provides various
management methods such as alarm statistics, alarm identification, alarm notification, alarm
redefinition, and alarm correlation analysis. This helps the network administrator take proper
measures to recover the normal operation of the network.
4.4 Performance Management
The U2000 can monitor the key indicators of a network in real time, and provide statistics on
the collected performance data. It provides a graphical user interface (GUI) to facilitate
network performance management.
4.5 Inventory Management
The U2000 provides the inventory management function that allows you to query and collect
the statistics on physical and logical resources in a unified manner.
4.6 Log Management
Log management includes the management of U2000 security logs, U2000 operation logs,
and NE security logs. The U2000 allows you to query and save logs periodically, to detect
illegal login and operations, and analyze faults in a timely manner. You can query the U2000
client that is used by a U2000 user to log in to the U2000 server and query the operations
performed by the user after login. You can also dump or print log data.
4.7 Database Management
The database backup management system of the U2000 provides a tool for database backup
and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable
and safe running of the U2000. Database management includes the management of NE and
U2000 databases. To ensure data security, you need to back up the database periodically.
4.8 NE Communication Parameter Management
You can set the parameters for the communication between the U2000 and NEs to ensure that
the U2000 communicate with the NEs in normal state.
4.9 DCN Management
DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and
microwave products.
4.10 NE Software Management
U2000 supports backup and loading of the equipment data.
4.11 Report Management
The U2000supports the iWeb report function and at the same time supports NMS report that
provides reports about alarms, logs, and resources. The U2000 user is able to print desired
data while viewing them. The report in table format supports filtering by equipment type and
can be saved in Excel format.

4-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

4.12 System Monitoring


The U2000 provides a GUI-based system monitoring tool, which is used for managing the
NMS and querying the system information.

4.1 Security Management


This topic describes how to ensure the security of the U2000 by managing objects such as
users, user groups, rights, and operation sets.
Figure 4-2 shows the mechanism for implementing security management.

Figure 4-2 Mechanism for implementing security management

OSS/BSS

Hacker
SSL encryption
Firewall
Plain text…
<=> 1010100100...
Client Worm

Firewall Virus
iManager U2000
SSL encryption
Plain text…
<=> 1010100100...
 Database backup and
 Centralized authentication restoration
 Account security policy  Log management
 Access control list

SNMP/Telnet/FTP…

Managed equipment and network

The following describes security management in details.

Login and Session Management


The functions of login and session management are described as follows:
 The user can log in to the U2000 with an account. The user performs operations
according to the permissions assigned to the account.
 If the client is not used for a period of time, the user can manually lock the client or set
the lock time to make the U2000 lock the client automatically. This prevents others from
performing operations illegitimately. If the client is locked out, you need to enter the user
password or use the administrator account to unlock the client.
 The members of the administrator group have the permissions to monitor the session
information and log out of illegitimate users forcibly.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

 The U2000 can automatically detect and clear invalid sessions.

User and User Group Management


The functions of user and user group management are described as follows:
 Creating a user account or user group. During user account creation, the user details,
owner group of the user, management domain, user permissions, and access control list
must be set. During user group creation, the user group details, management domain, and
user group permissions must be set.
 Modifying the user or user group information, and deleting a user account or user group.
 Adding a user to a user group. After addition, the user has the permissions of the user
group. A user can be added to multiple user groups. In this case, the user has the
permissions of the user groups besides those of the user.

Permission Management
User permissions are classified into management permissions and operation permissions.
Through permission assignment, user operations on the U2000 can be controlled.
 Management permissions refer to the permissions that a user is given to manage the
specified equipment and its data, or the permissions that a user group is given to manage
the specified domains. In the topology view, the equipment or areas that cannot be
managed are invisible.
 Operation permissions refer to the permissions that a user is given to perform operations.
If a user does not have the permissions to manage a type of equipment, the user does not
have the permissions to operate the equipment.
The functions of permission management are described as follows:
 Adding or deleting user or user group permissions, and setting the management domain
of the user or user group.
 Creating object sets. Managed objects are grouped into different object sets to facilitate
permission assignment.
 Creating operation sets. Operation permissions are grouped into different operation sets
to facilitate permission assignment.
 Modifying or deleting object sets or operation sets.
 Assigning the permissions of a type set to the user. After that, the user has the
permissions to view and operate the devices whose type is consistent with the type set.

Security Policy Management


The functions of security policy management are described as follows:
 The password policy is used to set the user password rules and password security
policies. The password rules involve the minimum password length of common users,
minimum password length of superusers, and maximum password length. The password
security policies involve the maximum number of password duplications with history
passwords, maximum password reservation period, minimum password reservation
period, and number of days ahead for notifying password expiration.
 The account policy is used to set the minimum length of the user name, automatic
unlocking time, maximum number of login attempts, and timeout period at a login or
unlocking failure.

4-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

Access Control List


The Access Control List (ACL) is a secure access control mechanism. It restricts user access
to the server by allowing only the clients with specified IP addresses.
ACL can effectively control the client IP addresses from which users can log in to the U2000.
In this case, even if the user account and password are obtained by illegal users, these users
cannot log in to the U2000. Thus, the security of the U2000 is improved.

4.2 Topology Management


In topology management, the managed NEs and their connections are displayed in a topology
view. The managed NEs are displayed and managed in subnets and views. You can monitor
the operating status of the entire network in real time by browsing the topology view.
U2000 provides the Physical Root, Clock View, IP View, Tunnel View, and Custom View.
Therefore, you can view the required information in different views and also monitor and
learn the operating status of the entire network.

Topology View and Its Functions


The topology view of the U2000 consists of a navigation tree on the left and a view on the
right. The navigation tree directly shows the network hierarchy. Meanwhile, the view displays
the objects at different coordinates in the background map, which offers an intuitive view on
the deployment of objects.
Figure 4-3 shows the functions provided in the topology view of the U2000.

Figure 4-3 Topology view and its functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

 Adjustable topology view: The view can be zoomed in or out so that you can view the
objects clearly.
 Bird's eye view: You can see the position of the current topological window in the entire
view.
 Network-wide NE statistics collection: You can collect statistics on the number of NE
types and the number of NEs of each type in the entire network.
 Filter tree: You can filter all the NEs to display only the required NEs quickly.
 Status bar: It displays the information such as the current status, current login user, IP
address of the server that is connected currently, and current operation result.
 Topology view: A GUI in the U2000, which reflects the network structure. This GUI
shows various physical and logical entities of the network and provides the entrances of
various operations.

Alarm Display In the Topology View


In the topology view of the U2000, alarms are displayed in different colors to indicate
different status of the submaps and NEs. The alarms in the topology view are displayed by
two methods: color-coded display and small icon display. The default method is the small
icon display, as shown in Figure 4-4.

Figure 4-4 Alarm display in the topology view

The display of topology alarms on the U2000 has the following features:
 The color of a topological node indicates the polling status (such as normal, unknown, or
offline) and the alarm status of the monitored NE.
 When an NE generates multiple fault alarms at different severities, the corresponding
topological node is displayed in the color/iron that indicates the highest alarm severity of
these alarms.
 When multiple nodes in a subnet generate fault alarms, the subnet is displayed in the
color/iron that indicates the highest alarm severity of these alarms.
 You can query the current alarms of an NE through the NE node. In addition, you can
query the details of the fault alarms through the NE Panel.

Automatic Topology Discovery


The U2000 provides the automatic topology discovery function. Therefore, manual
intervention is not required and the operational expenditure (OPEX) is reduced.
The U2000 supports two methods of automatic topology discovery, as follows:
 After the SNMP parameters are set on the NE based on the SNMP protocol, the NE
sends traps to the U2000 in an unsolicited manner. Then, the NE is added to the topology
view on the U2000 automatically.

4-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

 In automatic topology discovery, the transport NE, NE based on the SNMP protocol, and
NE based on the ICMP protocol are searched separately in batches. Then, the NE that is
searched out is added to the topology view automatically.
 The Secuity NE can be added to the topology view automatically by use the function of
Batch Import NE.
 The U2000 searches for the fiber/link in batches. Then, the discovered fiber/link is added
to the topology view on the U2000 automatically.

Figure 4-5 Illustration of automatic topology discovery

1. The automatic topology discovery operation is implemented step by step through a


wizard. Specifically, the wizard guides you to configure the parameters required for the
automatic discovery, such as NE type, SNMP parameters, and the IP address range.
2. After you finish configuring the parameters, the U2000 searches for the required NE
among the specified network segments according to the preset parameters. All NE (both
from Huawei and other vendors) that is based on the SNMP protocol and meets the
conditions is displayed automatically in the topology view. At the same time, the basic
configurations of the NE is uploaded automatically. In this manner, you need not
perform basic configurations on the NE again.
3. During the discovery, you can cancel the discovery at any time. In addition, you can
learn the cause if the discovery fails.

4.3 Alarm Management


In alarm management, you can monitor network exceptions in real time. It provides various
management methods such as alarm statistics, alarm identification, alarm notification, alarm
redefinition, and alarm correlation analysis. This helps the network administrator take proper
measures to recover the normal operation of the network.

Networkwide Alarm Browsing


Alarm display is classified into alarm panel display, alarm topology display, and alarm
browsing.
The U2000 supports the following alarm browsing functions:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

 Alarm panel display


It is used to display the number of alarms of the currently managed objects by severity
and simply provide the fault status of the system. It can be used as a monitoring panel.
 Alarm topology display
When an NE reports an alarm, the NE icon in the topology view can be in different
colors according to the alarm severity. In this case, you can right-click the NE icon and
query the current alarm of the NE from the shortcut menu.
 Alarm browsing
− Browsingcurrent alarms
It is used to browse the fault alarms that are currently not processed, that is,
unacknowledged and uncleared alarms.
− Browse history alarms
It is used to browse all fault alarms that were acknowledged and cleared.
− Browse alarm logs
It is used to browse all fault alarms reported by NEs.
− Browsing event logs
It is used to browse current abnormal events.
− Setting an alarm query template
You can save common query conditions in an alarm query template. Thus, next time
when you query alarms that meet the common conditions, you can use the template
directly without setting query conditions again. This helps you browse and monitor
the alarms that concerns you.
− In the handling suggestion pane of the alarm, a link is provided, which points to the
corresponding alarm reference topic in the Online Help.
In addition to the preceding functions, the U2000 provides various customized functions, as
shown in Figure 4-6 and as listed in Table 4-1.

4-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

Figure 4-6 Alarm Browsing

Table 4-1 Description of alarm functions

Function Description

Unified alarm panel Through the alarm panel, you can customize alarm conditions in
an alarm template flexibly and display alarms dynamically. This
helps to classify alarms quickly and acknowledge the concerned
alarms.
Alarm filtering With the alarm filtering function, you can learn the running status
of an NE in real time. In addition, you can query the alarm status,
refresh the status in real time, and query the details of an alarm in
the alarm activation window. You can also print the alarm
records that are received recently and meet the print conditions.
Alarm query With the alarm query function, you can query alarms by object
where an alarm occurs, function, alarm status, and alarm severity.
In addition, you can save and print the query result.
Alarm color display The severity of each alarm in the alarm list is displayed with a
corresponding color. The color can be customized.
Alarm topology When an NE reports an alarm, the icon in the upper left corner of
display the NE in the topology view varies with the alarm severity, or the
NE icon in the topology view can be in different colors according
to the alarm severity. In this case, you can query the current alarm
of the NE from the shortcut menu.
Alarm locating With the alarm locating function, you can select an alarm and
locate the topology object that generates the alarm (For a physical
alarm, you can locate the panel of the NE that generates the
alarm.)

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

Function Description
Sequence customizing Through the sequence customizing function, you can sort alarms
by field in the alarm list and customize the alarm display. In
addition, you can save alarms in the .txt, html, xls, pdf, and csv
file, and print the required alarm records.

Alarm Statistics
You can learn the alarm status through alarm statistics and alarm analysis.
U2000 can collect alarm statistics based on user-defined conditions. The alarm conditions
include the alarm name, alarm severity, alarm function type, alarm rising time, alarm status, or
a combination of any preceding items.

Alarm Masking and Alarm Correlation Analysis


NEs report a large number of alarms during maintenance, test, or new deployment. However,
you need not concern the reported alarms. Therefore, these alarms reported by the NE need to
be masked, that is, these alarms are not displayed or saved. You can set conditions to mask the
alarms or events that meet the conditions.
The U2000 provides the following means for you to perform specific correlation analysis:
alarm/event correlation analysis, intermittent alarm analysis, repeated event analysis, and
alarm/event frequency analysis, and lasting time analysis of acknowledged but uncleared
alarms.

 Alarm/Event correlation analysis


This function helps to find the root alarm. The U2000 supports the analysis of the
correlation between different NEs. The system analyzes the alarms based on the
pre-defined correlation rule to mask the correlative alarms and finds the root alarm. This
helps the maintenance personnel to easily find and rectify the fault.
 Intermittent alarm/repeated event analysis
This function helps you to analyze alarms that are repeatedly cleared or events that are
repeatedly reported within a short period of time. To handle these alarms or events, the
system reserves only one of these alarms or events and/or change their severities. The
reserved alarms or events record the frequency with which the intermittent alarms or

4-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

repeated events occur. In addition, the system can change the alarm or event severity
according to the pre-defined settings.
 Alarm/Event frequency analysis
This function helps you to analyze the frequency with which an alarm or event occurs.
You can set a condition. Within the pre-defined period, when the number of alarms or
events exceeds the threshold, the system informs the user according to the pre-defined
correlation action.
 Acknowledged&Uncleared alarm time analysis
This function helps you to analyze the time of an acknowledged but uncleared alarm.
You can set a condition. Within the pre-defined period, if the time of an acknowledged
alarm exceeds the threshold, the system changes the alarm severity.

Alarm Dumping and Acknowledging


Alarm acknowledgment helps to identify whether an alarm is processed.
Alarm acknowledgment helps you to identify a processed alarm. You can then take proper
measures by checking whether the alarm is in the acknowledged state.
 Alarm dumping: It supports overflow dumping and manual dumping of alarms. Alarm
dumping is used to dump history alarms and events to files, which ensures a stable and
efficient system and saves disk space.
 Alarm acknowledgment: It helps you to identify a processed alarm. You can then take
proper measures by checking whether the alarm is in the acknowledged state. The U2000
supports manual and automatic acknowledgment of alarms.

Alarm Synchronization
The U2000 supports the ability to synchronize NE alarms automatically and manually. You
can manually synchronize NE alarms by performing operations through GUI or set an
automatic synchronization policy. When the U2000 restarts or the communication with an NE
recovers, the NE sends an alarm to the U2000. This implements the automatic alarm
synchronization on the U2000.
The U2000 supports the ability to synchronize NE alarm.
 Manual synchronization
You can manually synchronize NE alarms by performing operations through GUI.
 Automatic synchronization
You can set an automatic synchronization policy. When the U2000 starts, when its
communication with an NE recovers, or when the LCT user logs out, the NE sends an
alarm to the U2000. This implements the automatic alarm synchronization on the U2000.
Alarms are synchronized according to the following rules:
 If an alarm is cleared on the NE but uncleared on the U2000, the alarm on the U2000 is
cleared.
 If an alarm exists on the NE but does not exist on the U2000, the alarm is added to the
U2000.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-11


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

Alarm Redefinition
The U2000 allows you to redefine the alarms of the NE. You can redefine the alarm severity
according to the requirements.
You can use this function to change the alarm severity displayed on the U2000, thus
highlighting only the alarms that concerns you.

Alarm Suppression
U2000 supports the ability to suppress NE alarms. If you set the status of an alarm to
Suppressed, the NE does not report the alarm.
The difference between alarm suppression and alarm masking is as follows: If you enable
alarm masking, an NE still reports an alarm but the U2000 does not receive the alarm. If you
enable alarm suppression, the NE does not report an alarm.

Various Alarm Notification Means


The U2000 provides various alarm notification means. The U2000 can send notifications to
the related maintenance personnel for locating faults regardless of the time and place, which
ensures that the faults are troubleshoot in time. Figure 4-7 shows the alarm notification
means.

4-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

Figure 4-7 Various alarm notification means

The U2000 supports the following two remote notification means:


 By email
You can send an alarm remote notification by email. The alarm information is sent to an
email address. The user can check the email address for alarm information received on
the alarm server.
 By SMS
You can send an alarm remote notification by SMS. The U2000 sends the alarm
information to a mobile phone through the SMS device (SM modem or SM gateway)
connected to the alarm server. The mobile phone user can check the SMS for alarm
information received on the alarm server.

Alarm Jumping
The U2000 supports the alarm locating function. This function helps to jump to the topology
object that generates the required alarm. In addition, this function helps to quickly locate a
network fault, which improves the efficiency of alarm locating. Figure 4-8 shows the alarm
jumping function.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-13


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

Figure 4-8 Alarm jumping

Alarm Maintenance Experience Base


You can obtain the alarm processing information from the alarm maintenance experience base.
This base stores alarm details.
The alarm maintenance experience refers to the experience summarized by customers during
the maintenance. The experience is imported to the U2000. If the same fault occurs, you can
refer to the related experience to quickly handle the alarm, which improves the efficiency of
troubleshooting.

4-14 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

Alarm Time Localization


U2000 can display the time when an alarm is generated, acknowledged, cleared, or received
as the local time. The U2000 can display the time based on the server time or client time.
The NE that reports an alarm and the current U2000, however, may be in different time zones.
To learn the correct alarm generation time, the U2000 automatically converts the alarm
generation time (NE time) into the local time of the client.

4.4 Performance Management


The U2000 can monitor the key indicators of a network in real time, and provide statistics on
the collected performance data. It provides a graphical user interface (GUI) to facilitate
network performance management.

Figure 4-9 Performance Management Process

Monitoring Instance Management


Monitoring instance enables you to collect performance data according to the monitoring
template and schedule policy for all performance indicators belonging to a resource from a
device. One monitoring instance collects data for only one resource. Monitoring instance can
be either data monitoring instance or TCA monitoring instance.
 Creating a monitoring instance for resources, such as equipment, boards, ports, and links.
Monitoring the IP SPLA of the PTN and the third-party equipment.
 Modifying a monitoring instance.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-15


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

 Querying a monitoring instance.


 Suspending a monitoring instance.
 Resuming a monitoring instance.
 Synchronizing resources of an instance.
 TCA query.
 Querying a VPN SLA test matrix. Querying the VPN SLA test result through a matrix.
 Capability license control. Capability license controls the monitoring instance creation
based on the license availed.

Data Monitoring Template Management


The monitoring template is used with a monitor instance to monitor the performance data for
specific indicators.

Table 4-2 Monitoring template type

Template Description
Data Monitoring Template A data monitoring template is a collection
of indicators, which can be applied on the
resources for collecting the performance
data. You can configure indicators and
indicator groups.
TCA Monitoring Template A threshold crossing alert (TCA)
monitoring template is a collection of
indicators and threshold definition that can
be applied on the resources for monitoring
the TCA alerts. TCA can be applied
according to the conditions selected such as
high TCA monitor and low TCA monitor.
Threshold definition includes high trigger,
low trigger, high clear, low clear, high alarm
level, and low alarm level.

View History Performance Data


You can query the performance of network resources by using the U2000 which displays the
history performance of a network in the form of table, curve diagram, or bar chart. In this way,
you can know the dynamic running status of the network from different dimensions. You can
save the performance data in different file formats. Meanwhile, you can compare the
performance data in different periods in the line chart or in the histogram.

 Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.
 Information displayed in table mode can be saved in TXT,CSV or HTMLformat.

You can collect statistics on network performance data within a specified period, to know the
performance status of a network in the specified period and to provide data reference for
forecasting performance change of the network.

4-16 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

By setting the performance monitoring template, you can manage performance monitoring
tasks in an easy manner.

View Real-time Performance Data


You can query real-time performance data in the form of table, curve diagram or bar chart,
and save the performance data into file.

 Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.
 Information displayed in table mode can be saved in TXT,CSV or HTMLformat.

View TOPN Performance Data


You can query TOP N performance data sorted by two indicators, and the result will be
refreshed when the new data generates.

Schedule Policy Management


Schedule policy enables you to set the time segments and repeat periods at which the data
needs to be collected. The schedule policy can be applied on the resources while creating or
modifying a monitoring instance

Data Lifecycle Management


You can back up the performance data to a specified storage medium manually or
automatically when excessive performance data is saved in the database ofU2000.
Data can be dumped in the following two ways:
 Automatic Dumping: Performance data is dumped automatically based on the
configured values, such as the number of days for different granularities and the database
usage.
 Manual Dumping: Performance data is dumped based on the user-defined conditions,
according to the dump type with in the end date.

Monitoring Network Performance


Through network grouping, you can view the performance data of devices, interfaces, IP links,
L2 links, static tunnel, dynamic tunnel, and tests on the same network. In addition, you can
implement various tests within a network, such as the tests of UDP jitter and FTP ping, to
evaluate the quality of networks and services and perform association analysis on the quality
of networks and services.
 Creating a network group
Associate the monitoring instances of the resources of different types with the same
network according to the customized grouping rules, such as the area-based rule and
service-based rule, so that you can conveniently browse and compare data.
 Analyzing the interface performance trend
After the interface indicators on the network are set, the trend analysis graph of the
interface indicators which is generated at the current time point or 12 hours before and
after the current time point can be obtained. The trend analysis graph helps you know the
entire change trend of the interface performance in a timely manner.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-17


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

 Viewing the running results of SLA test on network monitoring through a matrix (Now
only support UDP jitter test through matrix)
You can view the results of the network monitoring test cases through a matrix. In this
manner, you can know the statistics about network-related indicators, evaluate network
performance, and perform association analysis on network performance.

4.5 Inventory Management


The U2000 provides the inventory management function that allows you to query and collect
the statistics on physical and logical resources in a unified manner.
Figure 4-10 shows the inventory management window of the U2000.

Figure 4-10 Inventory management window and its functions

Physical Resources
The physical resources are as follows:
 Telecommunications room
 Rack
 NE
 Shelf
 Board
 Subboard
 Port
 ONU
 Slot Information Report
 Slot Used Statistics

4-18 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

 SFP Information Report


 Fiber/cable

Logical Resources
The logical resources are as follows:
 Connection
 Gateway
 VLAN
 Multicast
 QoS and ACL
 Protocol
 Link
 Link group
 Interface resource

4.6 Log Management


Log management includes the management of U2000 security logs, U2000 operation logs,
and NE security logs. The U2000 allows you to query and save logs periodically, to detect
illegal login and operations, and analyze faults in a timely manner. You can query the U2000
client that is used by a U2000 user to log in to the U2000 server and query the operations
performed by the user after login. You can also dump or print log data.
Figure 4-11 shows the U2000 log management window and its functions.

Figure 4-11 Log management window and its functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-19


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

Operation Logs
Operation logs record the operations (such as fault management, performance management,
topology management, and resource management) performed on the U2000.
 View operation logs. The network administrator can set query conditions and query user
operation logs by user name, operation terminal, operation result, risk level, time range,
operation name, operation object, or a random combination of the preceding items. In
this manner, the network administrator can learn the operations performed by the current
user in real time.
 Dump operation logs.
− Dump operation logs manually.
− Dump operation logs upon log overflow or at scheduled times.
 Forward operation logs to the syslog server.
 Save operation logs as the TXT, HTML, CVS, PDF or Excel file.

System Logs
System logs record operations performed on the U2000, including the service start and stop,
and log exporting and deletion.
 View system logs. The network administrator can set query conditions and query user
operation logs by source, level, time range, details, or a random combination of the
preceding items. In this manner, the network administrator can learn the operations
performed by the current user in real time.
 Dump system logs.
− Dump system logs manually.
− Dump system logs upon log overflow or at scheduled times.
 Forward system logs to the syslog server.
 Save system logs as the TXT, HTML, CVS, PDF or Excel file.

Security Logs
Security logs record the security-based operations that the user performs on the U2000,
including logout, login, log dumping, and device log synchronization.
 View security logs. The network administrator can set query conditions and query user
operation logs by user name, operation terminal, operation result, risk level, time range,
operation name, security event, operation object, or a random combination of the
preceding items. In this manner, the network administrator can learn the operations
performed by the current user in real time.
 Dump security logs.
− Dump security logs manually.
− Dump security logs upon log overflow or at scheduled times.
 Forward security logs to the syslog server.
 Save operation logs as the TXT, HTML, CVS, PDF or Excel file.

NE Logs
NE logs record the operations on the managed NEs. You can query the NE logs through
theU2000 client GUI. You do not need to query the operation logs on each NE.

4-20 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

 Browse the NE syslog run logs.


You can know the equipment running information through NE logs.
 Dump NE syslog run logs.
− Dump NE logs manually.
− Dump NE logs upon logs overflow or at scheduled times.
 Forward NE logs to the syslog server.
 Save NE logs as the TXT, HTML, CVS, PDF or Excel file.

4.7 Database Management


The database backup management system of the U2000 provides a tool for database backup
and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable
and safe running of the U2000. Database management includes the management of NE and
U2000 databases. To ensure data security, you need to back up the database periodically.

NE Database Management
By using the U2000, you can perform the following NE database management operations:
 For transport equipment and access equipment, back up the NE database to the system
control and communication unit (SCC).
 For transport equipment and access equipment, back up the NE database of transport or
access equipment to the CF card manually or automatically.
 For transport equipment and access equipment, restore the NE configuration data of
transport or access equipment from the SCC board or CF card.
 Back up the NE database to a local or remote server.
 Start a manual backup.
 Set a scheduled backup task.
 Restore the NE database from a local or remote server.

U2000 Database Management


By using the U2000, you can perform the following NMS database management operations:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-21


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

 Back up the U2000 database to a local or remote server.


− Start an immediate backup.
− Set a scheduled backup task.
 Restore the U2000 database from a local or remote server.
 Dump data in the U2000 database, including operation logs, system logs, security logs,
alarm /event logs, and performance data.
− Set a manual dump.
− Set periodical dump.
 Import or export script files: Export the configuration data in the U2000 to script files, or
import the configuration data to the U2000 from script files. This function is applicable
only to MSTP, WDM, PTN and microwave products.
 Initialize the U2000 database.
 Configuration upgrade wizard: On the upgraded U2000 software, previous data can be
restored with the help of the upgrade wizard.
 Customize scheduled tasks: Provide flexible customization of scheduled tasks to reduce
operation and maintenance costs. The scheduled tasks that the U2000 supports are
backing up the database, exporting script files, collecting performance data, collecting
ATM performance data, backing up history performance data, and refreshing the
automatically switched optical network (ASON) information.
 In the case of MSTP and WDM products, the U2000 information can be exported to a
TXT file so that it can be used by the MDS 6600.
 In the case of MSTP and WDM products, the U2000 can import a TXT file that contains
the MDS 6600 data.

4.8 NE Communication Parameter Management


You can set the parameters for the communication between the U2000 and NEs to ensure that
the U2000 communicate with the NEs in normal state.
You can query or set the following communication parameters:

4-22 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

 Query and set the NE access protocol parameters.


 Manage the default access protocol parameters.
 Query and set the NE Telnet or STelnet parameters.
 Manage the Telnet or STelnet parameter template.

4.9 DCN Management


DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and
microwave products.
The U2000 communicates with NEs and manages and maintains network nodes through a
DCN. In the DCN, the U2000 and NEs can be considered as nodes. These nodes are
connected by using Ethernet or data communications channel (DCC). In actual practice, the
U2000 and NEs may be located at different floors of the same building, or different buildings
or cities. Hence, the U2000 and NEs are usually connected through an external DCN that
consists of equipment such as switches and routers. Comparatively, the DCN between NEs is
referred to as an internal DCN.
 Modify gateway NE (GNE) parameters.
 Change the GNE for an NE.
 Set the secondary GNE for an NE.
 Convert a GNE to a normal NE.
 Convert a normal NE to a GNE.
 Check the GNE switching status.
 Test the communication between the U2000 and a GNE.
 Check the network communication status.

4.10 NE Software Management


U2000 supports backup and loading of the equipment data.

Function and Feature


Figure 4-12 depicts the function and feature of software management.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-23


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

Figure 4-12 Function and Feature

Task Management
U2000 enables you to create scheduled tasks, including backing up the data of an NE, loading
the programs or patches of an NE, and restoring the data of an NE. U2000 can automatically
perform the tasks and can also suspend and resume tasks.

Policy Management
U2000 enables you to configure backup policies and saving policies. You can configure the
default backup policy or saving policy. In this case, U2000 backs up or saves the data
automatically and periodically according to the configured policy. You can also modify,
suspend, and run the equipment backup or saving policy.

Data Backup Management


U2000 supports automatic and manual data backup. You can back up the data on the GUI of
U2000. U2000 supports the ability to restore the backup data of equipment. You can restore
the historical backup data of the equipment on the GUI of U2000.

Software library management


The system supports the ability to manage NE software. The NE software is imported to the
software library of the system for formal management.
During the upgrade, a user can select the required target software from the software library.

4-24 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

4.11 Report Management


The U2000supports the iWeb report function and at the same time supports NMS report that
provides reports about alarms, logs, and resources. The U2000 user is able to print desired
data while viewing them. The report in table format supports filtering by equipment type and
can be saved in Excel format.

Alarm and Log Report


 Equipment alarm severity distribution details report
 Equipment alarm severity distribution report
 Equipment connectivity statistics report
 General alarm information report
 History change record report

Resource Report
 Port Resource Report
 Statistics Report of SDH Tributary Port Resources
 Lower Order Cross-Connections Statistic Report
 SDH Fiber/Microwave Link Resource Usage Report
 Statistics Report of Trails Between SDH NEs
 Statistics Report of SDH Protection Subnet Resources
 Statistics Report of SDH Circuit Resources
 Microwave Link Report
 Microwave License Capacity Report
 Statistics Report of Ethernet Port Resources
 Statistics Report of Service Resources Between Ethernet NEs
 WDM Protection Group Switching State Report
 WDM NE Master/Slave Subrack Info Report
 Statistics Report of WDM Client-Side Port Resources
 Statistics Report of WDM Link Resources
 Statistics Report of Inter-Station Wavelength Resources
 Browse WDM Wavelength Resource
 Wavelength Resource Usage Report
 PON Port Splitting Status
 Board Manufacturer Information
 Export project Document
 Clock Tracing Diagram
 Networking Diagram
 Timeslot Allocation Diagram

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-25


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

iWeb report
The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
The function of the iWeb report see 9.7 Report Subsystem Management.

The diagrams of the resource report

Figure 4-13 Diagram of the NE resource report

4-26 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 4 NMS Basic Functions

Figure 4-14 Diagram of the network resource report

4.12 System Monitoring


The U2000 provides a GUI-based system monitoring tool, which is used for managing the
NMS and querying the system information.
The system monitoring tool of the U2000 provides the functions for managing system
processes, as shown in the following figure.

The main functions for managing system processes are as follows:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 4-27


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
4 NMS Basic Functions Product Description

 Starting and stopping a process


 Setting the security communication mode
The system monitoring tool of the U2000 provides the functions for querying the system
information, as shown in the following figure.

The main functions for querying the system information are as follows:
 Querying the process information
 Querying the hard disk information
 Querying the database information
 Querying the component information
 Querying the operation logs

4-28 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

5 MSTP Network Feature Management

About This Chapter


This topic describes the functional features of MSTP NE management and network
management.
5.1 MSTP NE Management
NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration data is saved to the
database of the U2000 and to the database of the NE.
5.2 MSTP Protection Subnet Management
A protection subnet is a network structure with the comprehensive self-protection function. In
the U2000, the protection subnet is a generalized concept that includes not only the network
structure with the comprehensive self-protection function, such as an MSP ring and a path
protection (PP) ring, but also the network structure without the self-protection function, such
as an unprotected ring and an unprotected chain.
5.3 End-to-End MSTP Management
End-to-end network management is also referred to as trail management. You can construct
the configuration data of end-to-end network management by searching for the data at the NE
layer of the U2000, or directly configure the data at the network layer of the U2000, and apply
the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
5.4 End-to-End MSTP IP Management
There is the IP feature in MSTP equipment. You can build the configuration data of
end-to-end MSTP IP network management by searching for the data at the NE layer of the
U2000, or directly configure the data at the network layer of the U2000, and apply the data to
all the relevant NEs. Configuring NE data by using the trail management function is faster
and more convenient compared with configuring NE data on a per-NE basis.
5.5 SDH ASON Management
ASON is a new generation of optical network that integrates the exchange and transport. After
a user initiates a service request, the ASON selects a route automatically, establishes and
removes connections through the signaling control, and performs network connections
automatically and dynamically. An ASON NE refers to the equipment that is equipped with

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

both SDH and ASON features. An ASON network is managed by the U2000 that combines
ASON and SDH features.

5.1 MSTP NE Management


NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration data is saved to the
database of the U2000 and to the database of the NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:
 Modify NE attributes such as:
− NE name
− NE ID
− NE Extended ID
− Remarks
− NE pre-configuration

In the case of the NE whose ID needs to be set through the DIP switch, you can modify the NE ID on the
U2000.
 Synchronize NE time: Align all NEs with the system time of the U2000 server. The user
can configure the U2000 to automatically synchronize the NE time by specifying the
automatic synchronization period.
 Query physical resources in the following lists:
− NE list
− Board manufacturer information
− Board list
− Cabinet list
− Subrack list
− Equipment room list
 Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
 Replace a board. The user can replace a board with a board of another type on the
U2000.
− The user can replace board A with board B whose rate is the same as the rate of board
A and where the number of ports is the same as the number of ports on board A.
− The user can also replace board A with board B whose rate is lower than the rate of
board B and where the number of ports is less than the number of ports on board A.
 Query the actual physical board type of a board that is used as a board of another type.
 Automatically disable the NE functions: You can set to periodically disable some NE
functions that may affect services, such as loopback and automatic laser shutdown (ALS).
When the time expires, these operations automatically stop.
 Environment monitoring information. You can set the following items:
− PMU interface

5-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

− EMU interface
− CAU interface
− NE fan speed
 Virtual NE management
− Create a virtual NE.
− Add a board.
− Create fibers between the virtual NE and other NEs.
− Create SDH services.
− Create protection subnets.
− Search for and create trails on the virtual NE.
 Support the replacement of the boards.
 Supports the management of inband DCN.
 Support graphical display of performance events relevant to the optical power.

Orderwire Configuration
By using the U2000, a user can perform the following operations:
 Set and query the orderwire phone numbers, call waiting time and orderwire phone port
availability.
 Set and query the networkwide conference call number.
 Set and query the subnet No. length and the related subnet of the optical interface.
 Configure and query the SDH network node interface (NNI) connection for orderwire.
 Configure and query the F1 data port.
 Configure and query the broadcast data port.

Board Protection Configuration


By using the U2000, a user can perform the following operations:
 Configure board 1+1 protection.
 Configure 1:N tributary protection switching (TPS) protection for a tributary board.
 Configure board level protection.
 Configure port protection.
 Query the data backup status between the active and standby SCC boards.

Interface Configuration
By using the U2000, a user can perform the following operations:
 Interface board management: Query and set the SDH interface boards installed on NEs.
 Set the parameters of SDH interfaces.
 Set the parameters of PDH interfaces.
 Modify the optical/electrical attributes of the board port.
 Set overhead interfaces, including:
− Orderwire
− Hotline number

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

− Special line number


− Conference call number
− Subnet number length
− F1 data port
− Broadcast data port
− Communication port
− Data port
− Out-ring route
 Set the optical amplifier board interface.
 Manage the optical power of a board.
 Set tone and data access (TDA) interfaces, including:
− TDA clock source.
− TDA power feeding.
 Query and set the overhead including:
− Regenerator section overhead (J0).
− Lower order path overhead (V5, J2)
− VC4 higher order path overhead (J1, C2) and its pass-through or termination.
− VC3 higher order path overhead (J1, C2).
 Support PRBS.
 Support pre-alerts for the port optical power.
 Support setting and querying the TUG structure in the transmit and receive directions.
 Support lower order loopbacks.
 Support querying the in service (IS) port status and the out of service (OOS) port status
of a line board or a data board.
 Support managing the power consumption.
 Support setting and querying the optical power threshold of a line board.
 Support the TCM function.
 Support the configuration of enabling the AIS insertion of the J0MM alarm.
 Set the parameters for an IF interface.
 Set the parameters for a digital interface.
 Set the parameters for an Outdoor unit (ODU) interface.

Configuration for SDH Services and Protection


By using the U2000, a user can perform the following operations:
 Configure VC12, VC3, or VC4 services and select protection groups for them. In the
case of the platform 4.0 equipment, you can also select protection groups of these
services.
 Manage Transmux services, including M13/E13 Transmux and M13/E13 Transmux
Server services.
 Configure VC4-4C, VC4-8C, VC4-16C, or VC4-64C concatenated service; bind or
unbind services, and select protection groups for them. In the case of the platform 4.0
equipment, you can also select protection groups of these services.

5-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

 Configure other services: enterprise system connection (ESCON) services, 64 kbit/s


services (including TDA board services, N x 64 kbit/s services), and DSL services.
 Manage subnetwork connection multiple protection (SNCMP) services.
 Activate or deactivate services.
 Manage subnetwork connection protection (SNCP) services.
 Manage subnetwork connection tunnel protection (SNCTP) services.
 Convert an SNCP service to a normal service or convert a normal service to an SNCP
service.
 Support multiple multiplex section protection (MSP) rings configured at a single optical
port. You can configure multiple MSP rings by VC4 at an optical port to increase the
usage of network resources.
 Configure REG. After the line board is set as REG on the U2000, each pair of optical
interfaces of the line board provides a special receive or transmit function. Through the
internal switch, the SDH signals from the receiving optical interface are sent out directly
to the corresponding transmitting optical interface after passing through the regenerator
section layer and being amplified. The REG function is completely realized by the board
without the need of the SCC board and a cross-connect board.
 Query the capacity of higher order and lower order cross-connections on an NE.
 Manage multiprotocol label switching (MPLS) for MSTP equipment. The MSTP
equipment builds a label switched path (LSP) with a PE router, identifies LSP labels and
service priorities, and encapsulates LSPs into virtual concatenation groups (VCGs) for
transmission.
 The linear MSP supports the reconstruction protocol. You can set the appointed MSP
group as the reconstruction protocol.
 Configure two 40G lower order cross-connect protection groups at the same time. You
can adjust concatenated timeslots and optimize higher order pass-trough.

Configuration for ATM Interfaces, Services, and Protection


By using the U2000, a user can perform the following operations:
 Interface board management: Query and configure the ATM interface board on an NE.
 ATM bandwidth management: Query the bandwidth of ATM board.
 Set the parameters for an ATM interface.
 Configure ATM traffic.
 Configure ATM cross-connections.
 Create a network to network interface (NNI) on the ATM processing board.
 Configure ATM cross-connections.
 Configure ATM protection groups.
 Configure ATM protection pairs.
 Configure ATM services from ATM board to SDH line.
 Activate or deactivate ATM cross-connections.
 Configure ATM bound path.
 Perform ATM operation, administration and maintenance (OAM).
 Set or query the section-end attribute of a connection point.
 Set or query the continuity check (CC) activation status of the connection point.
 Perform a remote loopback test.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

 Set or query the NE loopback location identifier (LLID).


 Upload, download, duplicate the OAM data of the NE or perform the related consistency
check.
 Configure an inverse multiplexing over ATM (IMA) group.

Configuration for Ethernet Interfaces and Services


By using the U2000, a user can perform the following operations:
 Interface board management: Query and configure the Ethernet interface board on an
NE.
 Configure fast Ethernet transparent transmission board.
 Configure Ethernet internal interfaces, including:
− Basic attributes
− TAG attributes
− Network attributes
− Encapsulation/mapping
− Link capacity adjustment scheme (LCAS)
− Bound path
− Advanced attributes.
 Configure external ports of Ethernet interface, including:
− Basic attributes
− Flow control
− TAG attributes
− Network attributes
− Advanced attributes.
 Configure point-to-point LPT and point-to-multipoint LPT.
 Configure private line services, including Ethernet private line (EPL) and Ethernet
virtual private line (EVPL). You can create a new service and configure a bound path.
 Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge
(VB) and configure the following: service mount, VLAN filtering, VLAN unicast,
disable MAC address, bound path, self-learning MAC address, VB port MAC address
table capacity, and VLAN MAC address table capacity.
 Configure Ethernet Layer-2 switching, including:
− Aging time
− Spanning tree
− Multiple Spanning Tree
− IGMP snooping protocol.
 Configure QinQ service: QinQ is an embedded technology in VLAN, and tags users with
multi-layer VLAN ID, so that VLAN can be extended. You can perform operations such
as adding, stripping and exchanging of tags in different scenarios.
 Configure Ethernet link aggregation group (LAG), which contains intra-board LAG and
inter-board LAG.
− Create or delete an LAG.
− Add or delete LAG ports.

5-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

− Query LAG ports and aggregation state.


 Configure quality of service (QoS), including:
− Flow configuration
− CAR configuration
− CoS configuration
− Flow shaping management
− Port shaping management
− Configuring the differentiated service (DiffServ) domains
− Port policy
− CAR policy
− Port WRED Policy
− V-UNI ingress policy
− V-UNI egress policy
− PW policy
− Weighted random early detection (WRED) congestion and discarding policy of
services
− QinQ policy
− Weighted fair queuing (WFQ) schedule policy
 Test frame receiving and transmitting on Ethernet boards, including the EGT, EFT, EGS,
EFS and EMS boards.
 Support the ability to query the opposite NE of the data services on these boards for the
Metro 1000V3.
 Configure OAM for Ethernet services.
 Configure OAM for Ethernet ports.
 Configure the LCAS attributes such as hold-off time, WTR time and protocol mode.
 Use QoS template to simplify the QoS configuration for Ethernet services.
 Support the automatic reporting of RMON performance of Ethernet boards.
 Support the dumping of history RMON performance of Ethernet boards.
 Support the automatic creation of OAM for Ethernet trails.
 Support the protocol diagnosis function.
 Support the configuration of IGMP static multicast table items.
 Support the standard LPT bearer mode.
 Support the setting of the LCAS alarm threshold.
 Support the alarm function in the case of no traffic at Ethernet ports.
 Support the Ethernet port mirroring.
 Support the unidirectional LPT function.
 Support setting and querying the MAC address of a data board.
 Support traffic monitoring and report for an Ethernet port.
 Support the board-level configuration, including setting and querying the IP address.
 Support the LPT and port traffic statistics functions.
 Support creating flows in batches.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

 Support the setting of the LPT restoration time and the point to multi-point LPT
management in the three scenarios of IP->VCTrunk(s), VCTrunk->IP(s), and
VCTrunk(s)->VCTrunk(s) for a board.
 Support the ability to manage multiprotocol label switching (MPLS) for multi-service
transmission platform (MSTP) equipment. The MSTP equipment builds an label
switched path (LSP) with a PE router, identifies LSP labels and service priorities, and
encapsulates LSPs into virtual concatenation groups (VCGs) for transmission.
 Supports the management of the virtual Ethernet interface
 Supports the control plane for configuring the static routes and address resolution.
 Supports the packet Ethernet services including E-Line service, E-LAN service,
E-AGGR service and clock service.

RPR Management
By using the U2000, a user can perform the following operations:
 Modify resilient packet ring (RPR) node information.
 Set and query the node information of an NE in the RPR.
 Set the RPR link information of an NE.
 Query the topology of the RPR that the NE belongs to.
 Query the protection status, switching status and switching position of the RPR that an
NE belongs to.
 Configure forced switching, manual switching or clear switching in the RPR that an NE
belongs to.

Clock Configuration
By using the U2000, a user can perform the following operations:
 Query the clock synchronization status.
 Set clock source priority tables, including:
− System clock source priority list
− Priority table for phase-locked sources of 1st external clock output
− Priority table for phase-locked sources of 2nd external clock output
 Set clock source switching, including:
− Clock source restoration parameters
− Clock source switching condition
− Clock source switching
 Configure clock subnets, including:
− Clock subnet
− Clock quality
− Synchronization status message (SSM) output control
− Clock ID status
 Set phase-locked sources output by external clock, including:
− External clock output phase-locked source
− 2 Mbit/s phase-locked source external clock attributes

5-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

IEEE 1588 Packet Clock


By using the U2000, a user can perform the following operations:
 Configure the selection mode of a frequency source.
 Set the PTP clock source port.
 Set the quality level of the clock source.
 Set the PTP clock source priority.
 Configure a PTP clock service.
 Set the clock interface configuration.
 Set the external clock interface configuration.

Ethernet OAM Management


By using the U2000, a user can configure the 802.1 ag Ethernet OAM as follows:
 Create and configure maintenance nodes.
 Perform a CC check.
 Perform a loopback (LB) check.
 Perform a link trace (LT) check.
 Perform a ping test.
 Perform performance detection.
By using the U2000, a user can configure the 802.3 ah Ethernet OAM as follows:
 Query remote OAM parameters.
 Set link monitoring parameters. This function can help you to detect the events of frame
error, frame error period, and frame error seconds.
 Perform a remote loopback test.
 Support reporting of Ethernet OAM loopback events.
Supports OAM management for MPLS tunnels.

5.2 MSTP Protection Subnet Management


A protection subnet is a network structure with the comprehensive self-protection function. In
the U2000, the protection subnet is a generalized concept that includes not only the network
structure with the comprehensive self-protection function, such as an MSP ring and a path
protection (PP) ring, but also the network structure without the self-protection function, such
as an unprotected ring and an unprotected chain.
To perform protection subnet management, you need to have the related license.
By using the U2000, a user can perform the following operations:
 Create protection subnets of different types.
− Linear MSP: 1+1 and M:N.
− MSP ring: two-fiber bidirectional MS shared protection ring, two-fiber unidirectional
MS dedicated protection ring, and four-fiber bidirectional MS shared protection ring.
− PP ring: two-fiber unidirectional PP ring and two-fiber bidirectional PP ring.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

− dual node interconnection (DNI) protection.


− Non-protection (NP) ring and NP chain.
 Search for a protection subnet according to the information of NEs and fibers or cables
in the U2000, to form a complete protection subnet.
 Migrate an NP chain to a 1+1 linear MSP without interrupting services.
 Start or stop the MSP protocol of the MSP subnet, such as enabling or disabling the MSP
protocols networkwide or the MSP protocol for a single node.
 For 1+1 MSP, the U2000 automatically generates the service of the protection channel
according to the service of the working channel.
 Adjust the bandwidth dynamically. You can dynamically adjust the MSP bandwidth
according to the service demands and how the network bandwidth is used currently to
improve the utilization of network bandwidth. For example, for an STM-16 MSP of an 8
x VC4 bandwidth, if the 6 x VC4 bandwidth is enough, then you can change the
protection bandwidth from 8 x VC4 to 6 x VC4 bandwidth and save 4 x VC4 for the use
of non-MSP-protected services.
 Expand the capacity of an MSP ring and a linear MSP chain. Expand the link capacity by
replacing the line boards on both sides of the link without interrupting active services.
For example, upgrade an STM-16 MSP ring to STM-64 smoothly.
 Change the reversion mode of linear MSP protection without restarting the protocol.
 Expand and add nodes to multiple types of protection subnets, including MSP, SNCP, PP,
NP ring, NP chain and their combinations.
 Query the names, types and status of all protection subnets.
 Query and set the switching status, wait-to-restore (WTR) time and the trigger condition
of the protection subnet.
 Query all the isolated nodes and delete useless nodes.
 Set and view SDH NNIs.
 Query the relevant trail by protection subnet.
 Manage the entire RPR ring network. You can create, delete, and search for an RPR ring.
You can also manage the RPR ring protection parameters and link parameters. RPR ring
topology can be displayed through a view.
 Collect statistics on protection subnets, and display the rate levels of the protection
subnets.

5.3 End-to-End MSTP Management


End-to-end network management is also referred to as trail management. You can construct
the configuration data of end-to-end network management by searching for the data at the NE
layer of the U2000, or directly configure the data at the network layer of the U2000, and apply
the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
To perform end-to-end network management, you need to have the related license.

MSTP Trail Management


By using the U2000, you can perform the following operations:
 Create and maintain an SDH trail.

5-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

− Create an SDH trail, designate a timeslot, and select the protection priority strategy
and the resource usage strategy. The service levels include VC12, VC3, VC4, VC4
server trail, VC4-4C, VC4-8C, VC4-16C and VC4-64C.
− Activate or deactivate, and lock or unlock an SDH trail.
− Join or split, and enable or disable a VC4 server trail.
− During search of SDH trails, the U2000 retains the attributes of the existing ones as
they are.
− Upgrade an SDH trail to an ASON trail.
− Degrade an ASON trail to an SDH trail.
− Query the service status on a per-NE basis according to SDH trails.
− Manage optical power: Query the input power, output power, and power thresholds
for SDH boards.
− Set and query the overhead bytes of all NEs on the trail, such as the trace byte.
− The U2000 prompts users to configure trace bytes when timeslot out-of-sequence
occurs to the MS.
− Query the status of a lower order service.
− Set overhead pass-through or termination of all NEs on the trail.
− Insert alarms into the trails of VC4 level, such as AIS and remote defect indication
(RDI).
− Set loopback on any nodes of the trail, including VC4 loopback, tributary loopback,
optical interface loopback and cross-connection loopback.
− Perform a PRBS test on the trail.
− Modify the add/drop ports of the trail and the timeslot occupied by the trail
in-service.
− Adjust the original route partially by changing the NE, board or timeslot that the trail
passes through.
− Modify the route for concatenated services in-service.
− Person SNCP switching on a trail.
− Generate dual-fed SDH services automatically for 1+1 linear MSP.
− Duplicate an SDH trail for creating trails in batches.
− Manage discrete SDH services, such as querying or analyzing discrete services.
− View the usage of VC12 or VC3 trails related to a VC4 server trail in an easy manner.
You can also view the information about the VC12 or VC3 trails.
− Convert SDH discrete cross-connections to a mono nodal trail.
− Manage an SDH trail based on rights and domains.
 Manage the alarms and performance events related to an SDH trail.
− Configure alarm suppression or alarm reversion for a trail.
− Query current and history alarms, current and history performance data, unavailable
time (UAT) and performance threshold-crossing records of an SDH trail.
− Set the performance parameters for an SDH trail.
− Query the SDH trails and customer information affected by an alarm.
− Display the R_LOS alarms in the Transmission Media Layer Route view.
 Search for trails. According to the NE configuration data, at the NE layer, or the fiber
connection data, protection subnet information at the network layer, the U2000 generates

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-11


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

the network layer information about end-to-end trails, including SDH trails and Ethernet
trails.
 Name trails automatically.
 Filter trails in three ways.
− Filter all: Filter all trails and only display the qualified trails in a network.
− Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
− Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

Ethernet Trail Management


By using the U2000, you can perform the following operations:
 Create and maintain an Ethernet trail.
 Create trunk links at VC12, VC3, VC4, VC4-4C, VC4-8C and VC4-16C levels.
 Create an unterminated trunk link.
 Create an Ethernet trail. The service includes EPL, EVPL, unterminated EPL, EPLAN,
EVPL based on QinQ, EVPL based on RPR and EVPLAN based on RPR.

For release 4.0 NEs, the SDH NNI needs to be created on Ethernet line boards.
 Activate or deactivate an Ethernet trail.
 During search of Ethernet trails, the U2000 retains the attributes of the existing ones as
they are.
 Manage discrete Ethernet services, such as querying or analyzing discrete services.
 Search for an Ethernet trail.
 Manage the alarms and performance events related to an Ethernet trail.
 Query the Ethernet trails and customer information affected by the alarm.
 Query current and history alarms of an Ethernet trail.
 Filter trails in three ways.
− Filter all: Filter all trails and only display the qualified trails in a network.
− Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
− Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.
 Manage the alarms and performance events related to an Ethernet trail.
− Query the Ethernet trails and customer information affected by the alarm.
− Query current alarms, history alarms of an Ethernet trail.
− Implement the RMON performance function of an Ethernet trail.

ATM Trail Management


By using the U2000, you can perform the following operations:
 Create and maintain an asynchronous transfer mode (ATM) trail.
− Create an ATM trunk link.
− Create an ATM trail.

5-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

− Activate and deactivate an ATM trail.


− Manage ATM discrete services, such as querying and analyzing a discrete service.
− Search for an ATM trail.
 Manage the alarms and performance events related to an ATM trail.
− Query the ATM trails and customer information affected by an alarm.
− Query the current and history alarms related to an ATM trail.
 Filter trails in three ways.
− Filter all: Filter all trails and only display the qualified trails in a network.
− Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
− Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

Network-Wide Clock Topology Management


 Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.
 Displaying clock trace relationship.
 Displaying clock alarm status.

PWE3 Service Management


By using the U2000, you can perform the following operations:
 Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.
 Pre-deploy a PWE3 service.
 Implement the function of automatically discovering PWE3 services.
 Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
 Manage multi-hop PWE3 services.
 Implement the protection management of PWE3 services.
 View the topology of PWE3 services.
 View the alarms of a PWE3 service.
 View the performance of a PWE3 service.
 Test and check a PWE3 service.
 Manage discrete PWE3 services.
 Manage PWE3 services based on rights and domains.
 Clone a PWE3 service.
 Manage PWE3 service templates.
 Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management
By using the U2000, you can perform the following operations:
 Create static tunnels.
 Pre-deploy a tunnel.
 Implement the function of automatically discovering tunnels.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-13


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

 Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
 View the topology of tunnels, including the working and protection routes.
 View the alarm of a tunnel.
 View the performance of a tunnel.
 Test and check a tunnel.
 Manage discrete tunnels.
 Manage BGP/MPLS VPN tunnels.
 Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
 Switch services in a 1+1 or 1:1 tunnel protection group manually.
 Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.

5.4 End-to-End MSTP IP Management


There is the IP feature in MSTP equipment. You can build the configuration data of
end-to-end MSTP IP network management by searching for the data at the NE layer of the
U2000, or directly configure the data at the network layer of the U2000, and apply the data to
all the relevant NEs. Configuring NE data by using the trail management function is faster
and more convenient compared with configuring NE data on a per-NE basis.
To perform end-to-end network management by using the U2000, you need to have the
required license.

PWE3 Service Management


By using the U2000, you can perform the following operations:
 Create the CES service and the Ethernet service of the PWE3 services.
 Pre-deploy a PWE3 service.
 Implement the function of automatically discovering PWE3 services.
 Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
 Manage multi-hop PWE3 services.
 View the topology of PWE3 services.
 View the alarms of a PWE3 service.
 View the performance of a PWE3 service.
 Manage discrete PWE3 services.
 Manage PWE3 services based on rights and domains.
 Copy a PWE3 service.
 Implement the function of automatically generating Ethernet OAM for PWE3 services.

VPLS Service Management


By using the U2000, you can perform the following operations:
 Create a VPLS service.
 Pre-deploy a VPLS service.

5-14 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

 Implement the function of automatically discovering VPLS services.


 Modify and delete VPLS services, and filter VPLS services to view the desired services.
 View the topology of VPLS services.
 View the alarms of a VPLS service.
 View the performance of a VPLS service.
 Manage discrete VPLS services.
 Manage VPLS services based on rights and domains.
 Implement the function of automatically generating Ethernet OAM for VPLS services.

Tunnel Management
By using the U2000, you can perform the following operations:
 Create static CR tunnel.
 Pre-deploy a tunnel.
 Implement the function of automatically discovering tunnels.
 Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
 View the topology of tunnels.
 View the alarm of a tunnel.
 View the performance of a tunnel.
 Manage discrete tunnels.
 Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
 Switch services in a 1+1 or 1:1 tunnel protection group manually.
 Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.

5.5 SDH ASON Management


ASON is a new generation of optical network that integrates the exchange and transport. After
a user initiates a service request, the ASON selects a route automatically, establishes and
removes connections through the signaling control, and performs network connections
automatically and dynamically. An ASON NE refers to the equipment that is equipped with
both SDH and ASON features. An ASON network is managed by the U2000 that combines
ASON and SDH features.

ASON Topology Management


By using the U2000, a user can perform the following operations:
 Discover ASON topologies and resources automatically.
 Synchronize NEs in a domain: The U2000 can obtain the topology of the network
through the active NE.
 Upload the configuration data of NEs that are already created automatically.
 Set the active and standby NEs.
 Synchronize cross-connections for NEs.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-15


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

 Manage domains, including creating and deleting domains, and changing the domain
name.
 Query the ASON NE software version.
 Search for ASON discrete signaling.
 Manage node IDs on ASON NEs.
 Enable or disable the optical virtual private network (OVPN) status of the NE.
 Query SRGs relevant to an NE.

Control Link Management


By using the U2000, a user can perform the following operations:
 Synchronize networkwide control links .
 Filter links by domain or source/sink information.
 View control links.
 Query the current alarm and history alarm about a control link.
 Set alarm suppression for a control link.
 Customize whether to display the color of alarms in the SDH Control Link
Management window.
 Print or save the report list control links information.

Component Link Management


By using the U2000, a user can perform the following operations:
 Synchronize networkwide component links.
 Filter component links by domain or source/sink information
 View component link information.
 Create component links.
 Delete component links.
 Set resources reservation.
 Query VC4 timeslot usage status.
 Query link timeslot segmentation.
 Print or save the report list component links information.

TE Link Management
By using the U2000, a user can perform the following operations:
 Synchronize networkwide links by domain.
 Filter links by domain, source/sink information or OVPN customer.
 View traffic engineering (TE) links.
 Create virtual TE links.
 Delete virtual TE links.
 Create fibers.
 Set the distance for a TE link.
 Set the risk link group number.

5-16 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

 Create a link resource report.


 View bandwidth usage.
 Divide link resource to an OVPN customer.
 Query the alarm information for a TE link.
 Set alarm suppression for a TE link.
 Query the performance for a TE link.
 View the interrupted TE links.
 Query SRGs relevant to a TE link.
 Set the cost of a TE link.

ASON Trail Management


By using the U2000, a user can perform the following operations:
 Filter relevant ASON services by actual route, original route or shared mesh restoration
trail.
 Synchronize ASON trails by domain or attributes.
 View ASON trails.
 View the details of an ASON trail.
 Create an ASON server trail of the diamond, gold, silver, or copper class.
 Create an ASON trail of the diamond, gold, silver, copper or iron class.
 Set OVPN customer of an ASON trail.
 Activate or deactivate ASON trails or SDH ASON server trails.
 Delete inactive SDH ASON trails or inactive SDH ASON server trails.
 Delete SDH ASON trails or SDH ASON server trails from NM.
 Duplicate ASON trails.
 Optimize ASON trails.
 Pre-calculate and optimize service trails.
 Create a user network interface (UNI) service trail.
 Set routing attributes of the ASON trails, including rerouting lockout status, revertive
lockout status, rerouting priority, rerouting revertive mode, WTR time, schedule
revertive time, rerouting policy, trigger condition, crankback and rerouting triggered by
B3 bit error
 Query the rerouting reversion status of a revertive ASON trail.
 Create and disable SDH ASON associated trails.
 Set association for ASON trails.
 Remove association for ASON trails.
 Set the association source for ASON trails.
 Set the trigger condition for rerouting associated route.
 Query the related SDH trails for ASON trails.
 Set a preset restoration trail for an ASON trail.
 Downgrade an ASON trail to an SDH trail.
 Migrate a trail in-service.
 View the actual route, original route or associated route of an ASON trail.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-17


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

 View the preset restoration trail or shared mesh for restoration trail an ASON trail.
 Revert ASON trails manually.
 Switch the working or protection trail of a diamond trail manually.
 View the alarms of an ASON trail.
 Set alarm suppression for the selected ASON trail.
 View the control plane performance of an ASON trail.
 View the performance events of an ASON trail.
 Create the ASON trail report.
 Refresh the original route, actual route or associated route of an ASON trail.
 Refresh the preset restoration trail or shared MESH restoration trail for an ASON trail.
 Set an actual route as an original route.
 Restore to the original route in batches.
 Set names for ASON trails in batches according to the naming rules.
 Query the service level agreement (SLA) conformity of ASON trails.
 Support the display of valid routes for gold services after the MSP switching.
 Save the attributes of the service after you create an ASON service successful.
 Restore the default attributes of the service when you create an ASON service.
 Set SNCP access to a ASON trail.
 Manage creators of SDH ASON trails.
 Downgrade an SDH ASON trail forcibly.
 Reroute the preset SDH ASON restoration trail in case of a fault.

UNI Service Management


 Synchronize UNI services by domain.
 View the information about an UNI service.
 Filter UNI services by domain or source/sink information.

ASON Clock Subnet Management


 Create an ASON clock subnet.
 Create a preconfigured ASON clock subnet.
 Convert a preconfigured ASON clock subnet into an ASON clock subnet.
 Convert a traditional clock subnet into an ASON clock subnet.
 Manage a hybrid network composed of an ASON clock subnet and a traditional clock
subnet.
 Manage the startup time for the SDH ASON clock recovery.

SRG Management
 Create, delete and modify an SRG.
 Manage SRGS of the pipe, fiber/cable, NE and site.

One-End Terminated ASON Server Trail Management


By using the U2000, a user can perform the following operations:

5-18 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 5 MSTP Network Feature Management

 Create and delete a one-end terminated ASON server trail.


 Activate and deactivate a one-end terminated ASON server trail.
 Associate one-end terminated ASON server trails.
 Create and delete the ASON-SDH trail that contains one-end terminated ASON server
trail.
 Activate and deactivate the ASON-SDH trail that contains one-end terminated ASON
server trail.
 Search for the ASON-SDH trail that contains one-end terminated ASON server trail.
 Set association relations between the ASON trails that have different sources and sinks.

Integration of SDH and ASON Trails


By using the U2000, a user can perform the following operations:
 Specify the explicit route for ASON services when creating an ASON-SDH trail. That is,
an ASON-SDH trail includes an SDH trail and an ASON trail.
 View SDH and ASON trails at the same time in the SDH Trail Management window.
 Manage overhead bytes, alarms and performance of a joint trail in a unified manner.
 Query the related ASON trails by an SDH trail.
 Query the related SDH trails by an ASON trail.
 Downgrade an ASON trail to an SDH trail.
 Upgrade an SDH trail to an ASON trail.
 Set the revertive attributes when an SDH trail is being migrated to an ASON trail.
 Create dual-fed and selectively received VC4 ASON server trails.
 Create lower order diamond trails.
 Calculate working and protection routes using the SPC first policy.
 The alarm in the ASON section of an ASON-SDH trail supports the alarm statistics
function.
 Support an SNCP access scheme, such as setting the SNCP access attributes of an ASON
trail, querying the SNCP protection switching status of the ASON trail, and performing
protection switching on the SNCP access point of the ASON trail.

File Export or Import for Simulated Network Planning Information


By using the U2000, a user can perform the following operations:
 Export the simulated network planning information, including networkwide
configuration file, NE configuration file, network layer information file, ASON
information file, the TE link information, the associated ASON service information, the
route calculation policy, the component link information, the ASON resource reservation
information, the WTR time information, the preset restoration trails and route calculation
policy for nodes.
 Import file scripts of the simulated planning information.

ASON NE Catastrophe Restoration


The U2000 supports an ASON NE catastrophe restoration scheme.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 5-19


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
5 MSTP Network Feature Management Product Description

SDH ASON Management on a Per-NE Basis


By using the U2000, a user can perform the following operations:
 Manage board ASON feature.
 Manage control plane parameters.
 LMP control channel.
 Query LMP component link.
 Query LMP TE link.
 Set LMP auto discovery type.
 Manage fiber resource threshold.
 Query OSPF control link.
 Query OSPF SDH TE link.
 Query OSPF component link.
 Manage OSPF IP address.
 Manage OSPF TE Link flood threshold.
 Manage OSPF protocol authentication.
 Manage ASON trail group.
 Query ASON trail.
 Maintenance SDH ASON signaling.
 Maintenance SDH ASON switch controller.
 Maintenance ASON shared MESH switch controller.
 Suppression the control plane alarm.
 Manage control plane performance parameters.
 Manage reserved resource .
 Manage VC4 timeslot occupation status.

5-20 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

6 WDM Network Feature Management

About This Chapter


This topic describes the functional features of WDM NE management and network
management.
6.1 WDM NE Management
NE management refers to the management of configurations of an NE in terms of attributes,
services, protection, and clocks. The configuration object is a single NE. The data is saved to
the database of the U2000 and the database of the NE.
6.2 NA WDM NE Management
NE management includes the configurations on attributes, communications, services,
protection, and clock on an individual NE basis. The configuration data is saved at the NE
layer on the U2000 and in the database of the NE.
6.3 WDM Protection Subnet Management
A protection subnet is a network structure with the comprehensive self-protection function. In
the U2000, the protection subnet is a generalized concept that includes not only the network
structure with the comprehensive self-protection function, such as an MSP ring and a PP ring,
but also the network structure without the self-protection function, such as an unprotected ring
and an unprotected chain.
6.4 End-to-End WDM Management
End-to-end network management is also referred to as trail management. You can construct
the configuration data of end-to-end network management by searching for the data at the NE
layer of the U2000, or directly configure the data at the network layer of the U2000, and apply
the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
6.5 WDM ASON Management
ASON is a new generation of optical network that integrates the exchange and transport. After
the user initiates a service request, the ASON selects a route automatically, establishes and
removes connections through the signaling control, and performs network connections
automatically and dynamically. An ASON NE refers to the equipment that is equipped with
both WDM and ASON features. An ASON network is managed by the U2000 that combines
ASON and WDM features.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

6.1 WDM NE Management


NE management refers to the management of configurations of an NE in terms of attributes,
services, protection, and clocks. The configuration object is a single NE. The data is saved to
the database of the U2000 and the database of the NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:
 Synchronize NE time: Send the computer system time, NTP server time, or standard
NTP server time at the U2000 server end to all NEs for synchronizing the NE time. You
can set the U2000 to automatically synchronize the NE time by specifying the automatic
synchronization period.
 Query the physical inventory information, including the equipment room, racks, NEs,
shelves, boards, subboards, and ports.
 Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
 Disable NE functions automatically. You can set the U2000 to periodically disable
certain NE functions that may affect services, such as loopback and ALS. When the time
expires, these operations automatically stop.
 Modify NE attributes such as:
− NE name
− NE ID
− NE extended ID
− Remarks
− NE pre-configuration
− NE Time zone and DST
 Change attributes of optical NEs, including:
− Name
− Remarks
− Resources assigned for them
 Environment monitoring information. You can set or query the PMU interface, NE fan
speed and monitor temperature.
 Network operator information. You can set the information about the network operator,
including the international identifier, domestic identifier, and customized identifier.
 Search and create NEs by discovering the NE IP address automatically.

Orderwire Configuration
By using the U2000, a user can perform the following operations:
 Configure the board to an orderwire board, and query the orderwire board information.
 Set and query the orderwire phone numbers, call waiting time, dialing mode, and
orderwire phone port availability.
 Set and query the networkwide conference call number.
 Set and query the subnet No. length and the related subnet of the optical interface.
 Set and query the SDH NNI connection for orderwire.

6-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

 Configure and query the F1 data port.


 Configure and query the broadcast data port.
 Configure E1 Cross-Connections.

Configuration for Ethernet Interfaces and Services


By using the U2000, a user can perform the following operations:
 Configure Ethernet port mirroring. You can monitor packets, perform routine
maintenance operations and in-service commissioning through a mirrored port in a
flexible manner.
 Configure or query the internal ports of an Ethernet interface, including:
− Basic attributes
− Flow control
− TAG attributes
− Network attributes
− Bound path
− Advanced attributes
 Configure or query the external port of an Ethernet interface, including:
− Basic attributes
− Flow control
− TAG attributes
− Network attributes
− Advanced attributes
 Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.

 QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different
users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.
 The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a
VLAN SNCP service and a normal Ethernet service.
 Configure EPLAN services. You can create a new VB and configure the following:
service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and
self-learning MAC address.
 Configure QoS, including:
− Flow
− CAR
− CoS
− Flow shaping
− Port shaping
 Configure link capacity adjustment scheme (LCAS): The LCAS can dynamically adjust
the number of virtual containers for mapping desired services, to meet different
bandwidth requirements of services. In this manner, the bandwidth utilization is
improved.
 Configure OAM for Ethernet services.
 Configure OAM for Ethernet ports.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

 Support the intra-board LAG function.


 Support the DLAG function.
 Support the VLAN group function.
 Support the port MAC address filtering.
 Test frame receiving and transmitting on Ethernet boards.
 Support the protocol diagnosis function.
 Configure QinQ type area.
 Configure Ethernet Layer-2 switching, including:
− Aging time
− Spanning tree.
− IGMP snooping protocol.
 Configure Multiple Spanning Tree Protocol (MSTP). MSTP is compatible with the STP
and RSTP, and it also fixes the defects of the STP and RSTP. The convergence rate of the
MSTP is fast. In addition, traffic of different VLANs passes through corresponding trails,
which provides a well load balancing mechanism.
 Configure MPLS Tunnel. In a PSN network, the MPLS tunnel carries PWs where
various services are encapsulated. In this way, data packets can be transparently
transmitted among NEs.
 Configure Ethernet ring protection switching (ERPS). Based on the traditional Ethernet
mechanism, the ERPS uses the Eth-OAM function and the ring automatic protection
switching (R-APS) protocol to achieve fast protection switching on the Ethernet ring
network.
 Configure link-state pass through (LPT). LPT is used to return the remote-end link status
to the near end. The near-end equipment performs operations depending on the
remote-end link status. The Ethernet board periodically monitors the network to know
the Ethernet status. For the change in the connection status of Ethernet ports, if the
change is caused by the opposite equipment, a board at the local end, network cable,
human factors and other reasons, you can use the LPT function to quickly switch the
route to the equipment on both ends.
 Support the automatic reporting of RMON performance of Ethernet boards.
 Dump history RMON performance data of Ethernet boards.

WDM Board Configuration


By using the U2000, a user can perform the following operations:
 Configure optical transponder units.
 Configure service multiplexing and de-multiplexing units.
 Configure tributary and line boards.
 Configure protection boards.
 Configure optical amplifier units.
 Configure spectrum analysis units.
 Configure optical supervisory channel units.
 Configure optical add/drop multiplexing units.
 Configure variable optical attenuator units.
 Configure optical equalization units.
 Configure optical fiber monitoring units.

6-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

 Configure dispersion compensation units.


 Configure wavelength management boards.
Manage dynamic ports.
Query the line rate of an optical transport network (OTN).

Overhead Configuration
By using the U2000, a user can configure OTN overheads as follows:
 Configure and query the SM overhead.
 Configure and query PM overheads.
 Configure and query the TCM overhead.
 Configure and query the FTFL overhead.
 Query the OPU overhead.
By using the U2000, a user can configure WDM overheads as follows:
 Configure the optical channel (OCh) overhead at the SDH interface.
 Configure the optical transponder unit (OTU) overhead at the OTN interface.
 Configure the optical demultiplexer unit (ODU) overhead at the OTN interface.
 Configure the optical channel payload unit (OPU) overhead at the OTN interface.
 Configure the optical transmission section (OTS) overhead at the OTN interface.
By using the U2000, a user can configure SDH overheads for the OptiX OSN 8800 I and
OptiX OSN 8800 II as follows:
 Configure the regenerator section overhead (J0).
 Configure the lower order path overhead (V5, J2).
 Configure the VC4 higher order path overhead (J1, C2) and pass-through or termination.
 Configure the VC3 higher order path overhead (J1, C2).

WDM Service Configuration


At an optical add/drop multiplexer (OADM) station, a user can perform ADM configuration
for GE/Any services using the OTU board as follows:
 Several WDM service boards in specified slots form a cross-connect unit group.
 GE/FC services can be added or dropped, passed through or looped back in each
cross-connect unit group.
 Support wavelength cross-connection protection (WXCP), with working and protection
cross-connections configured at the sink NE.
Support the function of configuring electrical cross-connections.
 The U2000 allows you to configure electrical cross-connections to control service flow
in the electrical layer, and to dynamically groom, converge and split sub-wavelength
services. In this way, the networking and network survivability ability is enhanced.
 Integrated grooming of GE services, ODU0, ODU1 and ODU2 services realized by
cross-connect boards.
 Distributed grooming of GE services, ODU0, ODU1 and ODU2 services and Any
services.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

 Support SNCP at the ODU2, ODU1 and ODU0 level.


You can configure optical cross-connections as follows:
 Create optical cross-connections dynamically. Manage optical cross-connections for a
board and a per-NE basis, including creation, activation, deactivation, deleting and
querying.
 Support the functions of creating, querying, and deleting boundary ports.
You can perform the following service management functions:
 Lock WDM trails and view the lock status of the corresponding trails in the service
management window of the NE Explorer.
 View the name of the trail that a service belongs to.
 Query the trail that a service belongs to.
The OSN 1800 supports service package management. The service package module helps you
perform typical service configurations. In this manner, you are freed from the in-field
commissioning. This reduces costs of deployment commissioning and maintenance of
products. In addition, the equipment can be configured in a one-touch manner.
Manage license for the service types and cross-connect capacity of the OptiX OSN 8800 I and
OptiX OSN 8800 II.

ROADM Configuration
Using the reconfigurable optical add/drop multiplexer (ROADM) function in the U2000, a
user can perform add/drop and pass-through configuration for optical channels. The WDM
equipment uses the DWC and wave selective switch (WSS) to implement the ROADM
function.
 Configure ROADM boards based on the DWC boards: The wavelength grooming is
realized through the DWC boards. This configuration method is often used for the
normal nodes in a chain or ring network.
 Configure ROADM boards based on the WSS boards: There are two types of networking:
WSSD+WSSM and WSS+RMU/ROAM. This configuration method is often used for the
cross-connect nodes in a ring network.
 Configure ROADM boards based on the multiplexing and demultiplexing boards:
Wavelengths cannot be groomed dynamically. This configuration method is often used
for the normal nodes in a chain network.

Clock Configuration
By using the U2000, a user can perform the following operations:
 Configure a board clock source.
 Configure transparent transmission of an external clock.
 Configure a clock for the SCC board.
− Configure a clock for the optical supervisory channel unit.
− Specify the traceable clock source for the SCC board.
− Define the clock source priorities.

6-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

PTP Clock(1588 V2 Clock) Configuration


 Configure the frequency source mode.
 Configure PTP clock synchronization attributes.
 Query the clock source received at the port.
 Configure PTP clock subnet.
 Configure PTP packet attributes.
 Configure the external time interface.

Physical Clock Configuration


 Configure input attributes of external clocks.
 Configure the system clock source priority table.
 Configure the clock source protection and clock source reversion.
 Configure phase-locked source output of external clocks.
 Configure the quality of clock sources.

WDM Protection Configuration


By using the U2000, a user can perform the following operations:
 Configure optical line protection and 1:1 optical line protection.
 Configure optical wavelength protection group.
 Configure port protection.
 Configure 1:N(N no larger than 8) optical channel protection.
 Configure 1+N(N no larger than 48) optical channel protection.
 Configure protection for clock transparent transmission.
 Configure optical wavelength share protection (OWSP) in the case of the Metro WDM
equipment and the NG WDM equipment.
 Configure WXCP protection for GE/FC services.
 Configure WXCP protection group for the NE in the sink slot.
 Configure and query the WXCP protection parameters.
 Query the status of WXCP protection switching.
 Query the services with WXCP protection.
 Perform WXCP protection switching.
 Configure tributary protection set.
 Configure dual path protection set.
 Configure board 1+1 protection.
− Configure SCC board 1+1 protection.
− Configure cross-connect and synchronous timing (XCS) board 1+1 protection.
− Perform switching between working and protection.
− Query the switching status.
 Configure SNCP protection.
 Configure sub-wavelength (SW) SNCP for GE services or services of the Any type on an
OTU board.
 Configure SNCP for optical channel data unit (ODUk) services.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

 Configure MS SNCP.
 Configure VLAN SNCP for an Ethernet board.
− Perform protection switching.
− Query the switching status.
 Support BPS protection.
 Support the DBPS protection. The distribute board protect system (DBPS) protects the
10GE and GE ports of the TBE board.
 Support ODUk SPRings of the ODU1 and ODU2 levels.
 Support the service package. The service package module helps you perform typical
service configurations. In this manner, you are freed from the in-field commissioning.
This reduces costs of deployment commissioning and maintenance of products. In
addition, the equipment can be configured in a one-touch manner.
 In the case of 1+1 protection for the SCC board, a user can query the status of the data
backup between the active and standby SCC boards.

Optical Power Adjustment


By using the U2000, a user can perform the following operations:
 Manage the optical power. The user can query the input power, output power and power
threshold and so on for each WDM board.
 Perform the function of intelligent power adjustment (IPA) management. When a fiber is
cut off, the optical amplifier board detects the signal loss at the station. The station
reports an exceptional event to the U2000. After the user confirms the event, the optical
amplifier boards at the upstream and downstream stations reduce their output power to a
safe value to prevent the fiber maintainer from being hurt by the lasers emitted from the
cut-off fiber. After the fiber is reconnected, the optical signals restore to normal and the
optical power of each optical amplifier board automatically returns to a normal value.
 Automatic level control (ALC) management: Support the adjustment modes including
wavelength count detection, power detection, and link attenuation (gain mode). The
wavelength detection mode applies to the transmission link where no service is added or
dropped or where the number of wavelengths added and that dropped are the same at the
OADM. When the spectrum analyzer unit detects that the sum of each wavelength power
greatly differs from the standard power of the corresponding wavelength count, an
exceptional event is reported to the U2000. After the user confirms the event, the user
needs to manually issue a command to adjust the attenuations of each station on the link.
The power reference mode applies to the transmission links where the number of added
wavelengths differs from the number of dropped ones at an OADM. When the optical
amplifier board detects that the output power becomes abnormal, the station
automatically issues the command to adjust the attenuation of each station on the link.
This mode does not involve the spectrum analyzer unit, and is thus cost-effective. For the
previous two modes, a user can manually control whether to enable the ALC function.
The link attenuation adjustment mode also applies to the transmission link where the
number of added wavelengths differs from the number of dropped ones at an OADM.
When the optical power is attenuated to the detection threshold, a command is
automatically issued to adjust the attenuation of each station on the link.

The link attenuation adjustment mode is also referred to as the gain mode, which compares the
difference between the line attenuation and the amplifier gain, and also compares the node gain
compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the
attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus
ensuring the power budget of the entire link.

6-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

 Perform the function of automatic power equilibrium (APE). If the MCA board at the
receive end detects that the optical power of some channels is abnormal, the station
reports an exceptional event to the U2000. After the user confirms the event, the U2000
issues a command to the optical attenuation adjustment board of the upstream station.
This board adjusts the optical power of the abnormal channel so that the optical signal
noise ratio (OSNR) of each channel at the receive end is equalized.
 Perform the function of ROADM optical power equalization. After the ROADM is used
to dynamically configure the wavelength services, the WDM equipment outputs
multiplexed wavelengths. The optical power, however, may be greatly different between
each channel, especially for the newly added wavelength channels. To avoid negative
impacts on the transmission performance, the ROADM optical power equalization
function is provided. The ROADM first distinguishes between the pass-through
wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power
of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the
added wavelengths based on the wavelength flags.
 Support pre-alerts for the port optical power.

Dispersion Compensation
By using the U2000, a user can perform the following operations:
 The DCM board can conduct dispersion compensation to each band to realize dispersion
equalization.
 Tunable dispersion compensators (TDCs) can be used to precisely adjust the dispersion.
 The submarine system supports using a separate dispersion compensation board, such as
the TDC1 and TDC2, to perform dispersion compensation for signals at the line side of
OTU boards.

Wavelength Monitoring
The U2000 supports wavelength monitoring management for the OptiX BWS 1600G, OptiX
OSN 6800, OptiX OSN 8800 I and OptiX OSN 8800 II.

WDM PRBS
You can perform a PRBS test on a board to check the path quality. You can also check
whether the WDM link is normal before a service is available.

SDH Board Configuration


You can configure SDH line boards for the OptiX OSN 8800 I and OptiX OSN 8800 II.
 Configure dynamic SDH ports.
 Adjust the rates of optical ports on SDH boards.
 Query the status of a port.

Configuration for SDH Services and Protection


By using the U2000, a user can perform the following operations:
 Configure SDH line boards, SDH services, and SDH service protection for the OptiX
OSN 8800 I and OptiX OSN 8800 II.
 Configure VC12, VC3, or VC4 services and select protection groups for them.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

 Activate or deactivate services.


 Configure subnetwork connection protection (SNCP) services.
 Convert an SNCP service to a normal service or convert a normal service to an SNCP
service.
 Query the capacity of higher order and lower order cross-connections on an NE.
 Configure subnetwork connection tunnel protection (SNCTP). SNCTP provides
protection channels at the VC4 level. When the working channel is faulty, all its services
can be switched to the protection channel.
 Configure linear multiplex section protection (MSP). In the MSP protection, bytes K1
and K2 in the SDH multiplex section overhead (MSOH) are used to transmit protocol
information to control the transmit and receive routes of services.
 Configure MSP Ring, including two-fiber and four-fiber MSP rings.
 Configure transoceanic MSP Ring, A transoceanic multiplex section (MS) is an MS
based on transoceanic MSP protocol and used to provide path protection for higher-order
service on a transoceanic ring network.

Power Consumption Management


By using the U2000, a user can perform the following operations:
 Manage NE power consumption, to ensure that energy conservation and environment
protection can be achieved when the NE runs in the normal state.
 Query the power consumption of a board or an NE.
 Configure energy conservation for an NE. You can dynamically adjust NE power
consumption to achieve environment protection and energy conservation.
 View the networkwide NE power consumption report.

Submarine Cable Line Management


You need to create a line group for the actual submarine cable on the U2000. Hence, you can
measure and analyze the line data, and monitor the working status of lines. Submarine cable
line management includes the following functions:
 Create a submarine cable line.
 Modify a submarine cable line.
 Activate a submarine cable line.
 Delete a submarine cable line.

Submarine Cable Line Monitoring


You can monitor and test the status of fibers and repeaters, analyze the test data, to monitor
the working status of a submarine line system and locate faults. Submarine cable line
monitoring includes the following functions:
 Support submarine line threshold management.
 Monitor submarine cable lines and the status of a repeater in the in-service mode.
 Support the fast fault location function.
 Locate a fault in a submarine cable line in the out-of-service mode.
 Support tests of multiple types: manual test, comparison test in single-test mode, and
comparison test in periodic mode.

6-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

 Synchronize, query and analyze the test data.


 Support the ability to refresh monitoring information in real time.
 Support querying the gain report and event report.

PFE Managent
The U2000 supports the ability to manage the PFE 1670, the PFE 1670 is the power supply
equipment for the submarine transmission system.

FC Service Test
The FC service test uses the 12LOM board to replace the FC test equipment (such as Smartbit)
to run the test. The FC service test serves to verify whether the FC service line and the
equipment under test are normal.

6.2 NA WDM NE Management


NE management includes the configurations on attributes, communications, services,
protection, and clock on an individual NE basis. The configuration data is saved at the NE
layer on the U2000 and in the database of the NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:
 Synchronize NE time: Send the computer system time, NTP server time at the U2000
server end to all NEs for synchronizing the NE time. You can configure the U2000 to
automatically synchronize the NE time by specifying the automatic synchronization
period.
 Query physical resources in the following lists:
− NE list
− Board manufacturer information
− Board list
− Subrack list
− Equipment room list
 Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
 Disable the NE functions automatically. You can set to periodically disable some NE
functions that may affect services, such as loopback and ALS. When the time expires,
these operations automatically stop.
 Modify NE attributes such as:
− NE name
− Remarks
− Enable or disable automatic board installation.
− Enable or disable LAN port access control.
− Set start time for 24-hour performance monitoring.
− Enable or disable daylight saving time.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-11


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

− Modify IP address and subnet mask of NE.


− Enable or disable ARP proxy.
− Enable or disable OSI protocol.
− Modify subrack name.
− Modify subrack remarks.
− Set the time zone and DST.
− Cold reset or warm reset NE.
− Reset the NE in the DBERASE mode, with the NE database erased.
− Reset the NE in the SWDL mode after the NE software is downloaded.
− Enable or disable performance reporting.
− Enable or disable alarm reporting.
− Enable or disable database changed (DBCHG) reporting.
− Clear audible and visual alarm indication of NE cabinet.
− Set the NE alarm delay time, including the delay time of alarm start and the delay
time of alarm end.
− Set the longitude and latitude of the NE.
− Affiliated gateway IP address.
− Affiliated gateway port.
− Choose to set the state model level of the NE.
− Set the country code and national segment code of the NE.
− Enable or disable buzzer of the NE.
 Change attributes of optical NEs, including:
− Type
− Name
− Remarks
− Vendor
− Resources assigned for them
 Support querying and modification of the parameters in board attribute interface,
including:
− Set the primary and secondary states.
− Query NE logical board and physical board.
− Query board PCB version, software version, FPGA version, and BIOS version.
− Query CLEI code, vendor ID, part number, serial number, date of manufacture and
board description.
− Query backup power and rated power voltage.
− Set temperature upper threshold, temperature lower threshold and current
temperature.
− Set fan speed, working mode and LED state.
− Perform a cold reset on a board.
− Perform a warm reset on a board.
 Environment monitoring information. You can set NE fan speed mode and speed level.
 Manages fibers and cables as follows:
− View fiber cable information.

6-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

− Create or delete a fiber cable.


− Create a fiber cable report.
 Dynamically add a port: The new function of dynamically adding, deleting, or modifying
a port supports the SFP/XFP client side color port, fiber connection and optical
cross-connection, and client side 1+1 protection.
 Search and create NEs by discovering the NE IP address automatically.

Orderwire Configuration
By using the U2000, a user can perform the following operations:
 Set and query the orderwire phone numbers, and call waiting time.
 Set and query the networkwide conference call number.
 Set and query the subnet number length.

Card attributes Management


By using the U2000, a user can perform the following operations:
 Set the primary and secondary states. The primary and secondary states are presented in
the form of PST-PSTQ, SST.
 Query NE logical board and physical board.
 Query board PCB version, software version, FPGA version, and BIOS version.
 Query CLEI code, vendor ID, part number, serial number, date of manufacture and board
description.
 Query backup power and rated power voltage.
 Set temperature upper threshold, temperature lower threshold and current temperature.
 Set fan speed, working mode and LED state.
 Perform a cold reset on a board.
 Perform a warm reset on a board.

Configuration for Ethernet Interfaces and Services


By using the U2000, a user can perform the following operations:
 Configure Ethernet port mirroring. You can monitor packets, perform routine
maintenance operations and in-service commissioning through a mirrored port in a
flexible manner.
 Configure the internal ports of an Ethernet interface, including:
− Basic attributes
− TAG attributes
− Network attributes
− Advanced attributes
− Flow control
 Configure the external port of an Ethernet interface, including:
− Basic attributes
− Flow control
− TAG attributes

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-13


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

− Network attributes
− Advanced attributes
 Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.

 QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different
users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.
 The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a
VLAN SNCP service and a normal Ethernet service.
 Configure EPLAN services. You can create a new VB and configure the following:
service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and
self-learning MAC address.
 Configure QoS, including:
− Flow
− CAR
− CoS
− Port shaping
 Configure OAM for Ethernet services.
 Configure OAM for Ethernet ports.
 Support the intra-board LAG function.
 Support the DLAG function.
 Support the VLAN group function.
 Support the port MAC address filtering.
 Test frame receiving and transmitting on Ethernet boards.
 Support the protocol diagnosis function.
 Configure QinQ Type area.
 Configure Ethernet Layer-2 switching, including:
− Aging time
− Spanning tree
− IGMP snooping protocol.
 Support the automatic reporting of RMON performance of Ethernet boards.
 Dump history RMON performance data of Ethernet boards.

WDM Card Configuration


By using the U2000, a user can perform the following operations:
 Configure optical transponder units.
 Configure service multiplexing and de-multiplexing units.
 Configure tributary and line cards.
 Configure protection cards.
 Configure optical amplifier units.
 Configure spectrum analysis units.
 Configure optical supervisory channel units.
 Configure optical add/drop multiplexing units.

6-14 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

 Configure variable optical attenuator units.


 Configure optical equalization units.
 Configure wavelength monitoring.
 Optical equalization board.

Overhead Configuration
By using the U2000, a user can configure OTN overheads as follows:
 Configure and query the SM overhead.
 Configure and query the PM overhead.
 Configure and query the TCM overhead.
 Query the OPU overhead.
 Configure and query the FTFL overhead.
By using the U2000, a user can configure WDM overheads as follows:
 OCh Overhead Management-SONET Interface.
 Configure the OTU overhead at the OCh overhead management-OTN interface.
 Configure the ODU overhead at the OCh overhead management-OTN interface.
 Configure the OPU overhead at the OCh overhead management-OTN interface.
 Configure the TCM overhead at the OCh overhead management-OTN interface.
 Configure the OTS overhead at the OCh overhead management-OTN interface.

WDM Service Configuration


At an OADM station, a user can perform ADM configuration for GE/Any services using the
LQG, LOG and other boards as follows:
 Several WDM service boards in specified slots form a cross-connect unit group.
 GE services can be added or dropped, passed through or looped back in each
cross-connect unit group.
 Support WXCP protection, with working and protection cross-connections configured at
the sink NE.
Configure electrical cross-connections. The U2000 allows you to configure electrical
cross-connections to control service flow in the electrical layer. In this way, the networking
and network survivability ability is enhanced.
 Integrated grooming of GE services, ODU1 and ODU2 services realized by XCS.
 Distributed grooming of GE services, ODU1 and ODU2 services and Any services.
Support ODU1, ODU2, ODU0, GE/Any, and OTU1 cross-connections, and SNCP at the
ODU0, ODU1 and ODU2 level.
Optical Cross-connection Configuration:
 Create OCh cross-connections dynamically. Manage optical cross-connections for a
board and a per-NE basis, including creation, activation, deactivation, deleting and
querying.
 Create edge ports.
You can perform the following service management functions:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-15


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

 Lock WDM trails and view the lock status of the corresponding trails in the service
management window of the NE Explorer.
 View the name of the trail that a service belongs to.
 Query the trail that a service belongs to.

ROADM Configuration
Using the ROADM function in the U2000, a user can perform add/drop and pass-through
configuration for optical channels. The WDM equipment uses the DWC and WSS to
implement the function of reconfiguration optical add/drop multiplexing.
 The DWC type of the ROADM: The DWC is applicable to normal nodes in a chain or
ring network.
 The WSS type of the ROADM: The WSS is applicable to cross-connect nodes in a ring.
This way is applicable for the grooming of multi-dimensional optical cross-connections.
A maximum of eight dimensions are supported.
Optical cross-connection broadcast services: Support the broadcast services of optical
cross-connections on a per-NE basis.

Clock Configuration
By using the U2000, a user can perform the following operations:
Configure the master clock.
 Add a clock source.
 Delete a clock source.
 Query a clock source.
Configure the OTC card clock.
 Set the input attributes of the OTC card clock.
 Set the output attributes of the OTC card clock.
 Set the working route of the OTC card clock.
 Set the synchronization clock source.

WDM Protection Configuration


By using the U2000, a user can perform the following operations:
 Configure the 1+1 optical channel protection.
 Configure 1:N optical channel protection.
 Configure the inter-subrack protection.
 Configure port protection.
− Configure optical line protection.
− Configure intra-board 1+1 protection: This function includes the intra-board 1+1
protection realized by the dual-fed OTU board and the intra-board 1+1 protection
realized by the assistance of the DCP or OLP board.
− Configure client-side 1+1 protection.
 Configure protection for clock transparent transmission.
 Configure OWSP protection.

6-16 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

 Configure WXCP protection for GE/OTU1 services.


− Configure WXCP protection group for the NE in the sink slot.
− Configure and query the WXCP protection parameters.
− Query the status of WXCP protection switching.
− Query the services with WXCP protection.
− Perform WXCP protection switching.
 Configure board 1+1 protection.
− Configure SCC board 1+1 protection.
− Configure XCS board 1+1 protection.
− Configure AUX board 1+1 protection.
− Perform switching between working and protection.
− Query the switching status.
 Configure SNCP protection.
− Configure subwavelength (SW) SNCP for GE services or services of the Any type on
an OTU board.
− Configure SNCP for ODUk services.
− Configure VLAN SNCP for an Ethernet board.
− Perform protection switching.
− Query the switching status.
 Support BPS protection. The BPS protection uses two boards, that is, the working and
protection boards. This function realizes the protection of any one port by performing
board-level switching.
 In the case of 1+1 protection for the SCC board, a user can query the status of the data
backup between the active and standby SCC boards.

Optical Power Adjustment


By using the U2000, a user can perform the following operations:
 Manage the optical power, such as querying the input power, output power, and power
threshold for each WDM board.
 Perform the function of IPA management. When a fiber is cut off, the optical amplifier
board detects the signal loss at the station. The station reports an exceptional event to the
U2000. After the user confirms the event, the optical amplifier boards at the upstream
and downstream stations reduce their output power to a safe value to prevent the fiber
maintainer from being hurt by the lasers emitted from the cut-off fiber. After the fiber is
reconnected, the optical signals restore to normal and the optical power of each optical
amplifier board automatically returns to a normal value.
 ALC management: Support link attenuation (gain mode) as the adjustment mode. The
link attenuation adjustment mode applies to the transmission link where the number of
added wavelengths differs from the number of dropped ones at an OADM. When the
optical power is attenuated to the detection threshold, a command is automatically issued
to adjust the attenuation of each station on the link.

The link attenuation adjustment mode is also referred to as the gain mode, which compares the
difference between the line attenuation and the amplifier gain, and also compares the node gain
compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the
attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus
ensuring the power budget of the entire link.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-17


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

 Perform the function of APE. If the MCA board at the receive end detects that the optical
power of some channels is abnormal, the station reports an exceptional event to the
U2000. After the user confirms the event, the U2000 issues a command to the optical
attenuation adjustment board of the upstream station. This board adjusts the optical
power of the abnormal channel so that the OSNR of each channel at the receive end is
equalized.
 Perform the function of ROADM optical power equalization. After the ROADM is used
to dynamically configure the wavelength services, the WDM equipment outputs
multiplexed wavelengths. The optical power, however, may be greatly different between
each channel, especially for the newly added wavelength channels. To avoid negative
impacts on the transmission performance, the ROADM optical power equalization
function is provided. The ROADM first distinguishes between the pass-through
wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power
of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the
added wavelengths based on the wavelength flags.
 Support pre-alerts for the port optical power.

Dispersion Compensation
 The G.652 and G.655 fibers have positive dispersion coefficient and positive dispersion
slope at 1550 nm window. After the optical signal is transmitted over a certain distance,
the accumulation of positive dispersion broadens the optical signal pulse and seriously
affects the system transmission performance. To minimize this effect, a negative DCM is
used in the network. It uses negative dispersion to compensate the positive dispersion of
transmitting fiber, so as to maintain the original shape of the signal pulse.
 The OEQ NE can apply dispersion compensation to each band to reach dispersion
equalization.
 This function supports 40G dispersion compensation configuration. It uses the TDC to
precisely adjust the dispersion.

Wavelength Monitoring
Wavelength monitoring uses the wavelength supervisory unit to monitor the wavelengths that
are transmitted from the WDM-side optical interface of the OTU board (including the service
convergence unit) and to control the wavelength drift. This function ensures stable
wavelengths.

WDM PRBS
You can perform PRBS on a board to check the path quality. You can also check whether the
WDM link is normal before a service is available.

Housekeeping Configuration
By using the U2000, a user can perform the following operations:
 Set and query environment alarm property.
− Create environment alarm attributes.
− Set normal state of environment property.
− Query environment alarm attributes.
− Modify environment alarm attributes.
− Delete environment alarm attributes.

6-18 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

 Set and query external control property.


− Create external control attributes.
− Query external control attributes.
− Modify external control attributes.
− Delete external control attributes.
− Set the control time of the external control relay.

Query of AO Buffer Records


By using the U2000, a user can perform the following operations:
 Query the records in the automatic output (AO) buffer.
− The time at which the record is generated.
− The auto report tag (ATAG) of the record.
− The type of the record.
− The description of the record.
 Filter the records in the AO buffer.
 Save the records in the AO buffer to file.
 Export the AO buffer information to the browser of the operating system for printing.

EAPE Management
Enhanced automatic power equalization (EAPE) management can reduce the bit error rate
(BER) of a service. You can query the EAPE function for an OCh trail.

Power Consumption Management


By using the U2000, a user can perform the following operations:
 Manage NE power consumption, to ensure that energy conservation and environment
protection can be achieved when the NE runs in the normal state.
 Query the power consumption of a board or an NE.
 Configure energy conservation for an NE. You can dynamically adjust NE power
consumption to achieve environment protection and energy conservation.
 View the networkwide NE power consumption report.

ASON Management
Topology Management
By using the U2000, a user can perform the following operations:
 Discover ASON topologies and resources automatically.
 Synchronize NEs in a domain: the U2000 can obtain the topology of the network through
the active NE.
 Set the active and standby NEs.
 Manage domains, including creating and deleting domains, and changing the domain
name.
 Query the ASON NE software version.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-19


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

 Manage node IDs on ASON NEs.


 Query the enable status of the ASON NE software.
 Enable or disable the ASON feature of an ASON NE.
TE Link Management
By using the U2000, a user can perform the following operations:
 Synchronize networkwide links by domain or payload type.
 Filter links by domain, link signal type, payload type, or source/sink information.
 View TE links.
 Create fibers.
 Manage TE links whose payload type is OCh.
 Set the distance for a TE link.
 Create a link resource report.

6.3 WDM Protection Subnet Management


A protection subnet is a network structure with the comprehensive self-protection function. In
the U2000, the protection subnet is a generalized concept that includes not only the network
structure with the comprehensive self-protection function, such as an MSP ring and a PP ring,
but also the network structure without the self-protection function, such as an unprotected ring
and an unprotected chain.
To perform protection subnet management, you need to have the related license.
By using the U2000, a user can perform the following operations:
 Search for a wavelength protection subnet.
− Create a 1:N wavelength protection subnet by using the search function.
− Create ODUk SPRings at ODU1 and ODU2 levels by using the search function.
 Manage a wavelength protection subnet.
− Set 1:N Wavelength Protection Subnet Parameters.
− Perform and verify the 1:N Wavelength Protection Switching.
− Set Parameters of an ODUk SPRing Protection Subnet.
− Perform and verify the ODUk Wavelength Protection Switching
− Query and delete a protection subnet.
− Query and delete an isolated node.
− Query protection subnet resources.

6.4 End-to-End WDM Management


End-to-end network management is also referred to as trail management. You can construct
the configuration data of end-to-end network management by searching for the data at the NE
layer of the U2000, or directly configure the data at the network layer of the U2000, and apply
the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.

6-20 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

To perform end-to-end network management, you need to have the related license.
By using the U2000, a user can perform the following operations:
 Search for a trail.
− According to the NE configuration data and fiber connection data in the NE layer, the
U2000 generates the network layer information about end-to-end trails, including
OTS trails, OCh client trails, OCh trails, optical multiplex section (OMS) trails,
optical supervisory channel (OSC) trails, ODUk layer trails and optical channel
transport unit (OTUk) layer trails.
− Manage conflict and discrete trails created during the search process.
− Join trails automatically during the wavelength trail search process.
− Support the reservation of user-defined information on trails during WDM trail
search.
− Search for inverse multiplexing trail of the 40G and 10G rate levels.
 Create a trail.
− The U2000 automatically generate an OTS trail after the fibers are correctly
connected between the specified boards.
− Create an OCh trail, and create an OCh cross-connection by using the trail
management function.
− Create an ODU0, ODU1 or ODU2 trail, and create an ODU0, ODU1 or ODU2
cross-connection by using the trail management function.
− Create a client trail, and create GE, FC, and FE services based on the OCh and ODUk
trails by using the trail management function.
− Create SNCP or WXCP by using the trail management function.
− Create a WDM trail by double-clicking an NE and select the source and sink ends.
− Select the explicit route of the protection trail when creating a WDM trail.
− Support the end-to-end management function for ASON-WDM trails.
− Create multi-layer WDM trails. Meanwhile, the Client and ODUk cross-connections
are created by using the end-to-end trail management function.
− Create trails through duplication. You can create multiple trails by duplicating a trail.
In addition, you can generate Client and ODUk cross-connections in batches by using
the end-to-end trail management function.
− Create WDM trails whose fiber jumpers are connected inside a station
− Support port attribute.
− View inner cross-connection.
 Manage customers of a trail.
− Create a customer.
− View and modify the customer information.
− View the trail related to a customer.
− View the current and history alarms for a customer.
− Delete a customer.
 View trails.
− Join trails of the same type.
− Split a trail into trails of the same type.
− Browse the trails included in a trail group.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-21


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

− Query the route information of a trail.


− Display the signal flow diagram of a trail.
− Query the transmission media layer (that is, server trail) for a trail.
− Query the client trail for a trail.
− Query details of a trail, including its attributes and channel allocation.
− Query the optical power of a trail. You can query the optical power of a WDM trail,
and the input and output optical power of the source and sink of the trail.
− Query the DPPS protection for a trail.
− Support display of valid routes for the protected wavelength trails.
− Query the associated working and protection trails for the protected OCh trails.
− Support the functions of displaying intra-site fibers in real lines and inter-site fibers in
dotted lines in the signal flow diagram of a trail.
− Support the functions of displaying working and protection routes in different colors
in the signal flow diagram of a trail.
− Support the function of displaying the details of a trail group. The details of a trail
group include direction, name, trail status, source and sink, source and sink
wavelength, bearer rate, rate, and service type.
− Support enable or disable service alarm.
− Switch between the window for viewing WDM trails and the window for viewing
associated SDH trails.
− Support lock WDM trails.
 Manage the alarms and performance events related to a trail.
− Query the current alarms of a trail.
− Query the history alarms of a trail.
− Query history performance data of a trail.
− Query UAT of a trail.
− Support the ability to set the performance threshold of a WDM trail.
− Query the performance threshold-crossing records of a trail.
− Query the current performance data of a trail.
− Query the Ethernet performance of an OCh client trail with GE services.
− Manage networkwide alarmed WDM trails in real time.
− Support display of MUT_LOS and R_LOS alarms on the signal flow diagram of a
trail.
− Support the function of setting the alarm threshold for a trail.
− Support the service alarm.
 Query statistics resources report.
− Support the function of collecting the statistics on WDM client-side port resources.
− Support the function of collecting the statistics on WDM inter-site wavelength
resources.
− Support the function of collecting the statistics on WDM link resources.
− Support the OTUk link resource occupancy report.
− Support the statistics report of WDM wavelength resource.
− Support the statistics report of WDM wavelength usage.
 Manage trails.

6-22 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

− Query 1+1 protection for an optical layer trail and perform protection switching for
the optical layer trail.
− Query WXCP and SNCP protected trails, and perform protection switching.
− Support the ability to add and delete a WXCP protection group.
− Use the TTI byte to check fiber connection relations of an OCh trail.
− Support the transaction creation of WDM trails and the rollback in the case of a
creation failure.
− Support outputting the TM-TM connection diagram for WDM trails.
− Support the automatic naming rule for WDM trails.
− Modify the source and sink of a Client trail.
− Support ODU trail end-to-end management.
− Support the search and end-to-end management of Client trails.
− Support the optical layer alarms and the configuration of optical layer overheads on
trail levels.
− Support the functions of adding and deleting the WXCP or SNCP protection of an
ODUk trail or a Client trail.
− Set the optical power mode by the end-to-end trail management function.
− Implement the Save As and Print functions for the channel allocation of a WDM trail.
− Save the signal flow diagram of a WDM trail.
− Manage WDM trails base on rights and domains.
− Manage WDM discrete services.
− Manage WDM platinum trails.
− Support 8 clients to create WDM trail on the same time.
 Delete a trail. You can delete a WDM trail (except the OTS trail) from the NE layer and
network layer of the U2000.
 Support enhanced automatic power equilibrium (EAPE) based on an OCh trail. The
EAPE function automatically adjusts the transmitted optical power of each path
according to the signal quality of each path monitored by the OTU board at the receive
end, to ensure the quality of signals in each path at the receive end meets the preset
requirements. This ensures that services are available.
 Filter trails in three ways.
− Filter all: Filter all trails and only display the qualified trails in a network.
− Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
− Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

6.5 WDM ASON Management


ASON is a new generation of optical network that integrates the exchange and transport. After
the user initiates a service request, the ASON selects a route automatically, establishes and
removes connections through the signaling control, and performs network connections
automatically and dynamically. An ASON NE refers to the equipment that is equipped with
both WDM and ASON features. An ASON network is managed by the U2000 that combines
ASON and WDM features.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-23


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

Topology Management
By using the U2000, a user can perform the following operations:
 Discover ASON topologies and resources automatically.
 Synchronize NEs in a domain: the U2000 can obtain the topology of the ASON domain
through the active NE.
 Set the active and standby NEs.
 Manage domains, including creating and deleting domains, and changing the domain
name.
 Query the ASON NE software version.
 Manage node IDs on ASON NEs.
 Query the version of the ASON software.

ASON Control Link Management


By using the U2000, a user can perform the following operations:
 Synchronize control links networkwide.
 Filter links by domain or source/sink information.
 View control links.
 View the current alarm or history alarm information about a control link.
 Set alarm suppression for a control link.
 Customize whether to display the color of alarms in the Control Link Management
window.

TE Link Management
By using the U2000, a user can perform the following operations:
 Synchronize networkwide links by domain or payload type.
 Filter links by domain, link signal type, payload type (optical layer, electrical layer), or
source/sink information.
 View TE links.
 Query the related ASON trails for a TE link.
 Create fibers according the TE link.
 Create a virtual TE link.
 Delete a virtual TE link.
 Manage TE links whose payload type is OCh, ODUk or client (GE/Any).
 Set the distance for a TE link.
 Set the risk link group number.
 Create a link resource report.
 View resource usage.
 View the current alarm or history alarm information about a link.
 Set alarm suppression for a control plane alarm.

6-24 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

ASON Trail Management


By using the U2000, a user can perform the following operations:
 Filter relevant ASON services by domain, name, original route, shared MESH restoration
trail, created time, planned time, OVPN customer, type, activation status, managed
identifier, class or whether original route is active.
 Synchronize networkwide ASON trails by domain, level or attributes.
 View ASON trails.
 View details of an ASON trail.
 Create an ASON trail of the diamond, gold, silver, or copper class.
 When diamond WDM ASON OCh trails are created, the working and protection
wavelengths are shared.
 Create an ASON trail of the OCh, ODU0, ODU1, ODU2 and Client level.
 Set the SNCP type and OTN level when create a diamond WDM ASON ODUk trai.
 Create a inverse multiplexing WDM ASON trail.
 Create WDM ASON associated trail.
 Duplicate ASON trails.
 Pre-calculate route when create or optimize ASON trails.
 Activate or deactivate ASON trails.
 Apply planning data to an ASON trail.
 Delete inactive ASON trails.
 Delete an ASON trail from NM.
 Set routing attributes, including rerouting lockout status, reversion lockout status,
rerouting priorities , revertive mode, WTR time, scheduled revertive time, rerouting
policy, trigger condition, crankback, rerouting triggered by B3 bit error and rerouting
hold-off time.
 Set association source for ASON trails.
 Set association for ASON trails.
 Remove association for ASON trails.
 Set the trigger condition for rerouting associated route.
 Set the shared policy of associated service.
 Downgrade an ASON trail to an traditional trail.
 Query related server trails for ASON trails.
 Query related client trails for ASON trails.
 Query related trails for ASON trails.
 Migrate a ASON trail in-service.
 Enable or disable the optical parameters of WDM ASON OCh trails, including OSNR,
PMD and chromatic dispersion.
 Revert an ASON trail to the original route.
 Optimize ASON trails.
 Switch the working or protection trail of a diamond trail manually.
 Revert ASON trails manually.
 Refresh the actual route, original route, associated route or signal flow diagram of an
ASON trail.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-25


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
6 WDM Network Feature Management Product Description

 Set an actual route as an original route.


 Refresh the preset restoration trail for an ASON trail.
 Set the preset restoration trail for an ASON trail.
 Delete the preset restoration trail for an ASON trail.
 View the actual route , original route or associated route of an ASON trail.
 View the preset restoration trail for an ASON trail.
 View the alarms of an ASON trail.
 View the alarm suppression information for the selected ASON trail.
 Set alarm suppression for the selected ASON trail.
 View the performance events of the ASON trails.
 View the control plane performance of the ASON trails.
 View the control plane performance parameters of the ASON trails.
 Create the ASON trail report.
 Recover to original route in batch.
 Set names for ASON trails in batches according to the naming rules.
 Save the attributes of the service after you create an ASON service successful.
 Restore the default attributes of the service when you create an ASON service.
 Manage creators of WDM ASON trails.
 Downgrade a WDM ASON trail forcibly.

Combination of ASON and Traditional Trails


By using the U2000, a user can perform the following operations:
 Support the ability to create an ASON-WDM trail.
 View both WDM and WDM ASON trails in the WDM Trail Management window.
 Manage the overhead bytes, alarms, and performance events of an ASON-WDM trail in
a centralized manner.
 Query the ASON trail related to a WDM trail.
 Query the WDM trail related to an ASON trail.
 Downgrade an ASON trail to a traditional trail.
 Upgrade a traditional WDM trail to a WDM ASON trail.
 The alarm in the ASON section of an ASON-WDM trail supports the alarm statistics
function.

Exchange Script Files


By using the U2000, a user can perform the following operations:
 Import and export the script files of WDM ASON nodes,.
 Import and export the script files of WDM TE links
 Import and export the script files of WDM ASON trails.

NG WDM ASON Management on a Per-NE Basis


By using the U2000, a user can perform the following operations:

6-26 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 6 WDM Network Feature Management

 Enable or disable ASON features.


 Manage node IDs on ASON NEs.
 Query control plane parameters.
 Manage control channel.
 Manage LMP TE links.
 Support LMP automatic discovery.
 Manage OSPF control links.
 Manage OSPF TE links.
 Manage OSPF IP addresses.
 Authenticate the OSPF protocol.
 Authenticate the RSVP protocol.
 Manage WDM ASON trails.
 Maintain ASON signaling.
 Maintain the ASON switching controller.
 Manage the LMP status.
 Manage the OSPF protocol status.
 Set alarm suppression for a control plane alarm.
 Manage the control plane performance.
 Manage resource reservation.
 Manage the resource occupation status.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 6-27


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 7 RTN Network Feature Management

7 RTN Network Feature Management

About This Chapter


This topic describes the functional features of RTN NE management and network
management.
7.1 RTN NE Management
NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration object is a single NE. The
data is saved to the database of the U2000 and to the database of the NE.
7.2 RTN Protection Subnet Management
A protection subnet is a network structure with the comprehensive self-protection function.
7.3 End-to-End RTN Management
End-to-end network management is also referred to as trail management. You can construct
the configuration data of the end-to-end network management by searching for the data at the
NE layer of the U2000, or directly configure the data at the network layer of the U2000, and
apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
7.4 End-to-End RTN IP Management
There is the IP feature in RTN equipment. You can build the configuration data of end-to-end
RTN IP network management by searching for the data at the NE layer of the U2000, or
directly configure the data at the network layer of the U2000, and apply the data to all the
relevant NEs. Configuring NE data by using the trail management function is faster and more
convenient compared with configuring NE data on a per-NE basis.

7.1 RTN NE Management


NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration object is a single NE. The
data is saved to the database of the U2000 and to the database of the NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 7-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
7 RTN Network Feature Management Product Description

 Support the ability to manage the connections between back-to-back RTN NEs. On the
Main Topology of the U2000, the connections between back-to-back RTN NEs indicate
the relations between the RTN NEs on the same station that are connected in a
back-to-back manner through network interfaces.
 Modify NE attributes such as:
− NE name
− NE ID
− NE Extended ID
− Remarks
 Synchronize NE time: Align all NEs with the system time of the U2000 server. The user
can configure the U2000 to automatically synchronize the NE time by specifying the
automatic synchronization period.
 Query physical resources in the following lists:
− NE list
− Board manufacturer information
− Board list
− Cabinet list
− Subrack list
− Equipment room list
 Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
 Automatically disable the NE functions: You can set to periodically disable some NE
functions that may affect services, such as loopback and automatic laser shutdown (ALS).
When the time expires, these operations automatically stop.
 Environment monitoring information. You can set the interfaces of environment
monitoring.
 Support the license management function for equipment.
 Support the press-to-install function for logical boards.
 Support the Hop management function.

Orderwire Configuration
By using the U2000, a user can perform the following operations:
 Set and query the orderwire phone numbers, call waiting time and orderwire phone port
availability.
 Set and query the orderwire occupied bytes.
 Configure and query the F1 data port.
 Configure and query the broadcast data port.

Equipment Protection Configuration


By using the U2000, a user can configure board 1+1 protection.

Interface Configuration
By using the U2000, a user can perform the following operations:

7-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 7 RTN Network Feature Management

 Set the parameters for a SDH interface.


 Set automatic laser shutdown.
 Set the parameters for a PDH interface.
 Set the parameters for an IF interface.
 Set the parameters for a digital interface.
 Set the parameters for an Outdoor unit (ODU) interface.
 Set overhead interfaces, including:
− Orderwire
− Broadcast data port
 Query and set the overhead including:
− Regenerator section overhead (J0).
− Lower order path overhead (V5, J2)
− VC4 higher order path overhead (J1, C2) and its pass-through or termination.
− VC3 higher order path overhead (J1, C2).
 Enable IEEE-1588 overhead bytes.
 Support PRBS.
 Support the feature of packet-based microwave. You can configure a microwave
interface in terms of basic and advanced attributes, IF attributes, and Layer-2 and
Layer-3 attributes.
 Support the ability to configure the long and short serial numbers for an MP group.

Configuration for RTN Service and Protection


By using the U2000, a user can perform the following operations:
 Configure VC12, VC3, or VC4 services.
 Convert between an SNCP service and a normal service.
 Modify attributes of SNCP services.
 Perform SNCP protection switching.
 Support 1+1 linear MSP, 1:N (N no larger than 3) linear MSP.
 Support the N+1 protection.
 Support IF 1+1 protection.
 Support the REG configuration.
 Support MSP rings.
 Support the XPIC feature.

Configuration for Ethernet Interfaces and Services


By using the U2000, a user can perform the following operations:
 Configure Ethernet internal interfaces, including:
− TAG attributes
− Encapsulation/mapping
− Network attributes
− Link capacity adjustment scheme (LCAS)

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 7-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
7 RTN Network Feature Management Product Description

− Bound path
 Configure external ports of Ethernet interface, including:
− Basic attributes
− Flow control
− TAG attributes
− Network attributes
− Advanced attributes.
 Configure Jumbo frame.
 Configure QinQ Type area.
 Configure Ethernet private line (EPL) services.
 Configure EVPL (QinQ) services.
 Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge
(VB) and configure the following: service mount, VLAN filtering, VLAN unicast,
disable MAC address, bound path, self-learning MAC address, and VLAN MAC address
table capacity.
 Configure Ethernet virtual private LAN (EVPLAN) services.
 Test frame receiving and transmitting on Ethernet boards.
 Configure quality of service (QoS), including:
− Flow configuration
− CAR configuration
− CoS configuration
− Port shaping configuration
− Board shaping configuration
 Configure Ethernet Layer-2 switching, including:
− Aging time
− Spanning tree
− IGMP snooping protocol.
 Support the ability to diagnose protocol faults and restore protocols.
 Configure point-to-point LPT management and point-to-multipoint LPT management.
 Configure Ethernet intra-board LAG.
 Configure Ethernet Ring Protection.
 Configure the RMON performance functions such as browsing history groups of
Ethernet ports, collecting performance statistics of a group, setting an alarm group of
Ethernet ports, and setting a history control group.

Clock Configuration
By using the U2000, a user can perform the following operations:
 Query the clock synchronization status.
 Set system clock source priority list.
 Set clock source switching, including:
− Clock source restoration parameters
− Clock source switching condition

7-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 7 RTN Network Feature Management

− Clock source switching


 Configure clock subnets, including:
− Clock subnet
− Clock quality
− Synchronization status message (SSM) output control
− Clock ID status
 Set 2 Mbit/s phase-locked source external clock attributes.
 Set the priority table of NE clock sources and query the currently-traced clock source.

IEEE 1588 Packet Clock


By using the U2000, a user can perform the following operations:
 Configure the selection mode of a frequency source.
 Set the PTP system time.
 Configure a PTP clock subnet.
 Configure a PTP clock service.
 Set the WTR time for a PTP clock source.
 Set the PTP clock source priority.

Ethernet OAM Management


By using the U2000, a user can configure the 802.1 ag Ethernet OAM as follows:
 Support maintenance domain (MD), maintenance association (MA), maintenance end
point (MEP), and maintenance intermediate point (MIP).
 Perform CC check.
 Perform LB check.
 Perform LT check.
 Perform Ping test.
 Perform Performance detect.
By using the U2000, a user can configure the 802.3 ah Ethernet OAM as follows:
 Support OAM self-loop detection.
 Enable OAM automatic discovery.
 Support link event notification and support the adjustment of the OAM error frame
monitoring threshold.
 Perform remote loopback.

IS-IS Protocol Configuration


The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the
protocol of the network control plane, and provides the following configuration functions:
 Configure an IS-IS protocol instance.
 Enable the IS-IS protocol for a port.
 Import routes.
 Configure link TE information.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 7-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
7 RTN Network Feature Management Product Description

OSPF Protocol Configuration


The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network
control plane, and provides the following configuration functions:
 Configure an OSPF protocol instance.
 Enable the OSPF protocol for a port.
 Import routes.
 Configure the TE information about a link.

MPLS Signaling Protocol Configuration


The U2000 supports configuring the following two signaling protocols:
 RSVP-TE protocol. Resource reservation protocol-traffic engineering (RSVP-TE) is
derived from the RSVP protocol. The RSVP protocol is a type of QoS protocol. The
RSVP protocol reserves resources for specific services in a network to ensure the service
quality. As the TE is generated, RSVP is extended accordingly to support LSP creation
and to realize TE.
 LDP protocol. Label distribution protocol (LDP) is a control and signaling protocol of
multi-protocol label switching (MPLS).
PTN equipment supports using the RSVP-TE protocol to create dynamic LSP connection and
using the LDP protocol to create PW connection.

Static Route Management Configuration


The U2000 supports configuring the static route management.

Address Parse Configuration


The U2000 supports configuring the address parse.

LAG Configuration
Link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical
link of faster rate for transmitting data. This function improves the link availability and
increases link capacity.
The U2000 supports configuring the following LAG attributes:
 Configure the load sharing type, including sharing and non-sharing.
 Configure the LAG type, including manual and static.
 Configure the service distribution algorithm of the LAG.
 Configure the port priority and system priority of the LAG.

BFD Configuration
Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.
BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols
in many aspects. A pair of systems periodically sends detection packets on the channel on
which session between the two systems is created. If a system does not receive any detection

7-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 7 RTN Network Feature Management

packet from the opposite end in a specific time, the system regards that a failure occurs in
some part of the bidirectional channel to the adjacent system.

QoS Configuration
Quality of service (QoS) indicates the performance of the data flow that travels through a
network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the
bandwidth, but it can minimize the delay and jitter in the network by reasonably allocating
and monitoring network resources. In this way, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision
policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS
nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification
on the traffic that enters the DS domain. Traffic of different types is marked with different
PHB service types. For internal DS nodes, you need to perform only simple flow
classification based on PHB service type.
The U2000 supports the following QoS functions:
 Configure Diffsever domains.
 Configure ATM CoS mapping.
 Configure simple flow classification and complex flow classification.
 Configure CAR and Shaping.
 Configure the color blindness mode.
 Configure the WFQ schedule policy.
 Configure the port WREQ schedule policy.
 To simplify the operation and share some common QoS configuration parameters, the
U2000 supports creating QoS function point policy. The function point policies are as
follows: port policy, ATM policy and V-UNI ingress policy. By using these function
point policies, you can bind the CAR configuration attribute, shaping configuration
attribute, flow classification configuration attributes, WFQ schedule policy and WRED
policy attributes.

MPLS Tunnel Configuration


The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service,
the MPLS tunnel realizes end-to-end transmission and carries the PWs related to the service.
The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE
basis:
 Configure basic attributes of the MPLS.
 Configure static unicast MPLS tunnels.
 Create forward and backward MPLS tunnels at the same time.
 Create the E-LSP.
 Manage PWs.
 Manage Tunnel labels and PW labels.

MPLS Tunnel Protection Group Configuration


The U2000 provides the following functions of configuring an MPLS tunnel protection group:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 7-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
7 RTN Network Feature Management Product Description

 Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,
containing the switching mode, revertive mode, wait-to-restore (WTR) time, and
hold-off time.
 Perform MPLS tunnel protection switching.
 Query the protection switching status of an MPLS tunnel.

PWs with UDP Encapsulation.


The U2000 supports the PWs with UDP encapsulation that are carried in IP tunnels.

IP Tunnel and GRE Tunnel Configuration


If the equipment at the two ends of an IP network does not support MPLS tunnel, PWE3
services can pass through the IP network by using the IP tunnel or GRE tunnel.
IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication.
The U2000 supports configuring bidirectional IP tunnels and GRE tunnels on a per-NE basis.
The U2000 supports the Offload protection between MPLS and GRE tunnels.

CES Service Configuration


CES is mainly used for service transparent transmission of TDM trail switching data in the
packet transport network (PTN).
The U2000 provides the following configuration functions for CES service creation:
 Create the corresponding PW when creating a CES service.
 Create UNI-UNI and UNI-NNI CES services.
 Create CES services of structure-aware TDM circuit emulation service over packet
switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).
 Configure QoS of the CES service.
 Configure idle timeslot recovery value.
 Support to carry the CES service by IP/GRE Tunnel.

ATM Service Configuration


ATM emulation service is mainly used to transparently transmit ATM services in the PTN.
The U2000 provides the following configuration functions for ATM service creation:
 Create an ATM service that contains multiple ATM connections.
 Create UNI-UNI and UNIs-NNI ATM services.
 Create PVP and PVC ATM services.
 Create the corresponding PW when creating an ATM service.
 Configure the IMA group.
 Configure QoS of the ATM service.
 Configure the CoS mapping.

7-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 7 RTN Network Feature Management

E-Line Service Configuration


The E-line service is a point-to-point Ethernet service. The equipment transmits user packets
from the user side to the network side based on Port or Port+VLAN. In this way, user data can
be transparently transmitted in a point-to-point manner.
The U2000 supports the following functions of configuring E-line services on a per-NE basis:
 Create UNI-UNI E-Line services.
 Create UNI-NNI E-Line services that are carried on ports.
 Create UNI-NNI E-Line services that are carried on PWs.
 Create UNI-NNI E-Line services that are carried on QinQ links.
 Configure the service and the QoS of the corresponding PW when creating an L2VPN
service.
 Configure the V-UNI group.

E-Aggr Service Configuration


The E-Aggr service is a multipoint-to-point Ethernet service. The equipment uses several
ports to access services from the V-UNI side, and converges the services into one PW at the
network side for transmission. In this way, user data from multiple points can be converged
into one point.
The U2000 supports the following functions of configuring E-Aggr services on a per-NE
basis:
 Configure the VLAN forwarding table items of an E-Aggr service.
 Configure the service and the QoS of the corresponding PW when creating an E-Aggr
service.
 Configure the V-UNI group.

MPLS OAM Configuration


MPLS OAM is an OAM function of the MPLS network. This function can check the quality
of LSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge,
and locate a defect inside the network at the MPLS layer. It can report and handle a defect.
When a fault occurs, the MPLS OAM provides trigger scheme of protection switching.
The U2000 provides the following functions of configuring MPLS OAM:
 Configure MPLS OAM parameters of a tunnel.
 Perform CV/FFD check.
 Perform LSP ping check.
 Perform PW ping check.
 Perform LSP traceroute check.

ATM OAM Configuration


ATM OAM is an end-to-end OAM function for ATM services. This function can check the
quality of ATM links that pass through multiple NEs. The ATM OAM function checks an
ATM link by inserting some OAM cells of the standard cell structure to the user cell flow.
The U2000 provides the following functions of configuring ATM OAM:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 7-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
7 RTN Network Feature Management Product Description

 Set segment end attributes.


 Perform CC activation test.
 Perform remote loopback.
 Set LLID.

7.2 RTN Protection Subnet Management


A protection subnet is a network structure with the comprehensive self-protection function.
To perform protection subnet management, you need to have the related license.
By using the U2000, you can perform the following operations:
 Create an RTN protection subnet.
 IF_1+1 protection subnet
 IF_N+1 protection subnet
 Manage RTN protection subnets.
 Set the parameters for a protection subnet.
 Query the switching status of a protection subnet.
 Query and delete a protection subnet.
 Query protection subnet resources.

7.3 End-to-End RTN Management


End-to-end network management is also referred to as trail management. You can construct
the configuration data of the end-to-end network management by searching for the data at the
NE layer of the U2000, or directly configure the data at the network layer of the U2000, and
apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
To perform end-to-end network management, you need to have the related license.
By using the U2000, you can perform the following operations:
 Create and maintain an RTN trail.
− Create a PDH microwave trail.
− Create a PDH microwave trail.
− Activate and deactivate an RTN trail.
 Manage the alarms and performance events related to an RTN trail.
− Query current and history alarms, current and history performance data, UAT and
performance threshold-crossing records of an RTN trail.
− Set the performance parameters for an RTN trail.
− Query the RTN trails and customer information affected by an alarm.
 Filter trails in three ways.
− Filter all: Filter all trails and only display the qualified trails in a network.
− Secondary filter: Filter those trails that are already displayed according to the filter
criteria.

7-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 7 RTN Network Feature Management

− Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

Network-Wide Clock Topology Management


 Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.
 Displaying clock trace relationship.
 Displaying clock alarm status.

PWE3 Service Management


By using the U2000, you can perform the following operations:
 Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.
 Pre-deploy a PWE3 service.
 Implement the function of automatically discovering PWE3 services.
 Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
 Manage multi-hop PWE3 services.
 Implement the protection management of PWE3 services.
 View the topology of PWE3 services.
 View the alarms of a PWE3 service.
 View the performance of a PWE3 service.
 Test and check a PWE3 service.
 Manage discrete PWE3 services.
 Manage PWE3 services based on rights and domains.
 Clone a PWE3 service.
 Manage PWE3 service templates.
 Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management
By using the U2000, you can perform the following operations:
 Create static tunnels.
 Pre-deploy a tunnel.
 Implement the function of automatically discovering tunnels.
 Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
 View the topology of tunnels, including the working and protection routes.
 View the alarm of a tunnel.
 View the performance of a tunnel.
 Test and check a tunnel.
 Manage discrete tunnels.
 Manage BGP/MPLS VPN tunnels.
 Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
 Switch services in a 1+1 or 1:1 tunnel protection group manually.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 7-11


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
7 RTN Network Feature Management Product Description

 Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.

7.4 End-to-End RTN IP Management


There is the IP feature in RTN equipment. You can build the configuration data of end-to-end
RTN IP network management by searching for the data at the NE layer of the U2000, or
directly configure the data at the network layer of the U2000, and apply the data to all the
relevant NEs. Configuring NE data by using the trail management function is faster and more
convenient compared with configuring NE data on a per-NE basis.
To perform end-to-end network management by using the U2000, you need to have the
required license.

PWE3 Service Management


By using the U2000, you can perform the following operations:
 Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.
 Pre-deploy a PWE3 service.
 Implement the function of automatically discovering PWE3 services.
 Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
 View the topology of PWE3 services.
 View the alarms of a PWE3 service.
 View the performance of a PWE3 service.
 Manage discrete PWE3 services.
 Manage PWE3 services based on rights and domains.
 Copy a PWE3 service.
 Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management
By using the U2000, you can perform the following operations:
 Create static CR, RSVP, and IP tunnels.
 Create RSVP tunnels in batches.
 Pre-deploy a tunnel.
 Implement the function of automatically discovering tunnels.
 Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
 View the topology of tunnels.
 View the alarm of a tunnel.
 View the performance of a tunnel.
 Manage discrete tunnels.
 Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
 Switch services in a 1+1 or 1:1 tunnel protection group manually.

7-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 7 RTN Network Feature Management

 Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 7-13


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

8 PTN Network Feature Management

About This Chapter


This topic describes the functional features of PTN NE management and network
management.
8.1 PTN NE Management
NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration object is a single NE.
8.2 End-to-End PTN Management
End-to-end network management is trail management. You can build the configuration data of
end-to-end network management by searching for the data at the NE layer of the U2000, or
directly configure the data at the network layer of the U2000, and apply the data to all the
relevant NEs. Configuring NE data by using the trail management function is faster and more
convenient compared with configuring NE data on a per-NE basis.

8.1 PTN NE Management


NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration object is a single NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:
 Modify NE attributes such as:
− NE name
− NE ID
− NE extended ID
− Remarks
− NE pre-configuration
 Synchronize NE time: Align all NEs with the system time of the U2000 server. You can
set the U2000 to automatically synchronize the NE time by specifying the automatic
synchronization period.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

 Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
 Disable NE functions automatically: You can set to periodically disable certain NE
functions that may affect services, such as loopback and ALS. When the time expires,
these operations automatically stop.
 Support environment monitoring information.
 Support the board replacement function.

Configure NE Alarm Attribute


 Configure alarm severity and auto reporting.
 Configure alarm saving mode, reversion mode and alarm correlation.
 Configure alarm suppression.
 Configure AIS insert switch.
 Configure alarm reversion.

Configure NE Performance Attribute


 Configure NE performance monitoring time.
 Configure RMON performance.
 Query board current performance, history performance and UAT event.
 Reset board performance register.
 Configure board performance monitor status.
 Configure board performance threshold.

Configure NE Security Attribute


 Support NE user management.
 Support NE login management.
 Configure LCT Access control.
 Support NE user group management.
 Support Online user management.
 Configure NE security parameters.
 Query NE security log.
 Configure ACL.

Service Interface Types Configuration


You can configure the basic, Layer-2, or Layer-3 attributes for an interface to specify the
working mode and application scenario of the interface.
Basic attributes are physical attributes of the interface. Layer-2 attributes are data link layer
attributes of the interface, such as ATM attribute, VLAN attribute, and QinQ attribute.
Layer-3 attributes are network layer attributes of the interface, such as the IP attribute.
Table 8-1 lists the PTN service interface types that the U2000 supports.

8-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

Table 8-1 Types of PTN service interfaces

Service Supported Port Type MP Group Function


Interface Port Supported or
Mode/Encaps Not
ulation Type
SDH interface General Physical port Not supported Sets together
attributes with the Layer
3 attributes or
connects to the
equipment as
the channelized
STM service
interface.
Layer 2 Physical port Not supported This interface
attributes can carry the
ATM services.
Layer 3 Physical port Not supported This interface
attributes can carry
tunnels after the
PPP is enabled.
PDH interface General Physical port Not supported This interface
attributes can carry the
TDM services.
Layer 2 Physical port Not supported Carries the
attributes IMA signals.
Layer 3 Physical port Supported This interface
attributes can be added
into a multilink
PPP (MP)
group after the
PPP is enabled.
Ethernet General None None Sets together
interface attributes with the Layer
2 and Layer 3
attributes.
Layer 2 Physical port Not supported Carries the
attributes user-side or
network-side
Ethernet
services.
Layer 3 Physical port Not supported Carries tunnels.
attributes
Ethernet Virtual General Logical port Not supported Sets together
interface attributes with the Layer
2 and Layer 3
attributes.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

Service Supported Port Type MP Group Function


Interface Port Supported or
Mode/Encaps Not
ulation Type
Layer 2 Logical port Not supported Carries the
attributes Ethernet
services for
VLAN Sub
Interface.
Layer 3 Logical port Not supported  EOA Virtual
attributes Interface:
carries the IP
or GRE
tunnels.
 VLAN Sub
Interface:
applies to the
BFD, L3VPN
or Tunnel
ADSL interface General Physical port - Carries the
attributes ADSL signals
G.SHDSL General Physical port - Carries the
interface attributes G.SHDSL
signals
Serial interface General None None Sets together
attributes with the Layer
3 attributes.
Layer 3 Logical port Supported This interface
attributes can be added to
an MP group
after the PPP is
enabled.
MP Group General None None Sets together
attributes with the IP
attributes.
Layer 3 Logical port None Carries tunnels.
attributes

IMA Group Configuration


By using the U2000, you can perform the following operations:
 Bind ports.
 Manage IMA groups.
 Query the status of an IMA group.
 Query the status of an IMA link.

8-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

 Manage ATM ports.

Microwave Interface Configuration


By using the U2000, you can perform the following operations:
 Configure a microwave interface in terms of basic and advanced attributes, IF attributes,
and Layer-2 and Layer-3 attributes.
 Configure a radio link, including the IF 1+1 protection, IF boards, and ODU boards.
 Configure HOP Management.

IS-IS Protocol Configuration


The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the
protocol of the network control plane, and provides the following configuration functions:
 Configure node attributes.
 Configure port attributes.
 Import routes.
 Configure link TE information.
 Configure GR Session.
 Configure route aggregation.

OSPF Protocol Configuration


The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network
control plane, and provides the following configuration functions:
 Configure node attributes.
 Configure port attributes.
 Configuring peer attributes.
 Import routes.
 Configure link TE information.
 Configure route aggregation.

MP-BGP Protocol Configuration


By using the internal border gateway protocol (IBGP), the U2000 implements L3VPN
functions and provides the following configuration functions:
 Configuring MP-BGP instance.
 Configuring MP-BGP Peer.
 Configuring route filtering policy.

LDP Protocol Configuration


By using the label distribution protocol (LDP), the U2000 creates LSP connections and PW
connections and provides the following configuration functions:
 Configuring MPLS-LDP peer entities.
 Configuring node attributes.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

 Configuring port attributes.


 Configuring IP address filtering table.
 Configuring routing policy.
 Configuring label policy.

RSVP Protocol Configuration


By using the resource reserved protocol (RSVP), the U2000 creates LSP connections and
provides the following configuration functions:
 Configure node attributes.
 Configure port attributes.

Static Route Management Configuration


The U2000 supports the function of configuring the static route management.

Address Parse Configuration


The U2000 supports configuring the address parse.

Routing Policy Configuration


The U2000 supports configuring routing policy.

Clock Configuration
The U2000 supports configuring various clock mode.
 Configuration the clock domain.
 Query the clock synchronization status.
 IEEE 1588 Packet Clock
− Configure clock service.
− Configure clock synchronization attribute.
− Configure clock source priority table.
− Configure clock subnet.
− Configure external interface.
 TOP Packet Clock Configuration
− Configure clock services.
− Select a differential clock source.
 ACR Clock Configuration
− Configure CES ACR or 1588 ACR clock.
− Configure ACR clock protection.
 Physical Clock Configuration
− Query the clock synchronization status.
− Set clock source priority tables, including:
− System clock source priority list
− Priority table for phase-locked sources of 1st external clock output

8-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

− Priority table for phase-locked sources of 2nd external clock output


− Configure clock subnets, including:
− Clock subnet
− Clock quality
− SSM output control
− Clock ID status
− Set phase-locked sources output by external clock, including:
− External clock output phase-locked source
− 2 Mbit/s phase-locked source external clock attributes

Board-Level Protection Configuration


By using the U2000, a user can perform the following operations:
 Configure TPS protection of a sub-board.
 Configure board 1+1 protection for the SCC and cross-connect boards.
 Check the switching status.
 Perform protection switching.

LAG/MC LAG Configuration


A LAG aggregates multiple Ethernet physical links to form a logical link of faster rate for
transmitting data. This function improves the link availability and increases link capacity.
The MC LAG supports the ability to share load between aggregation group devices.
The U2000 supports configuring the following LAG/MC LAG attributes:
 Configure the load sharing type, including sharing and non-sharing.
 Configure the LAG type, including manual and static.
 Configure the load sharing hash algorithm of the LAG.
 Configure the port priority and system priority of the LAG.

MSTP Configuration
The MSTP can be used to clear loops in a network. The MSTP uses a specific algorithm to
block some redundant trails and change a loop network to a non-loop tree network. This
function prevents packet increase in a loop network and generation of broadcast storms in an
endless cycle. Different from the STP and RSTP, the MSTP can forward data according to
VLAN packets and realize load balance of VLAN data.
The U2000 supports configuring the following MSTP attributes:
 Configure parameters of port groups and bridges.
 Configure CIST and MSTI parameters.
 Query CIST status and MSTI status.

IGMP Snooping Configuration


IGMP Snooping is the multicast constraint scheme that runs on the Layer-2 equipment, and is
used to manage and control multicast groups.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

The U2000 supports the ability to configure IGMP snooping for E-LAN services and provides
the following functions:
 Configure IGMP Snooping protocol parameters.
 Configure quick leave ports.
 Manage routes.
 Configure route member ports.
 Query statistic information of IGMP protocol packets.

BFD Configuration
Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.
BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols
in many aspects. A pair of systems periodically sends detection packets on the channel on
which session between the two systems is created. If a system does not receive any detection
packet from the opposite end in a specific time, the system regards that a failure occurs in
some part of the bidirectional channel to the adjacent system.
The U2000 supports the functions of performing the BFD detection on IP/GRE tunnels and
the inter gateway protocol (IGP).
The U2000 supports configuring single-hop or multi-hop BFD detection.

LPT Configuration
LPT is used to return the remote-end link status to the near end. The near-end equipment
performs operations depending on the remote-end link status. When the intermediate
transmission network of the services becomes faulty, the LPT informs the access equipment at
both ends of the transmission network to enable the backup network. That ensures the normal
transmission of the important data.

Synchronization Protocol Configuration


In the application scenario of dual-homing, the status of the peer equipment needs to be
obtained either for the MC LAG or for the cross-MC LMSP. Meanwhile, the actions on both
sides need to be negotiated based on different fault cases. With the method of adding
information of the peer end, a channel is established for control status synchronization with
the peer end. In this manner, the control packets can be transmitted and received through the
channel and link fault detection can be performed.

LMSP/MC LMSP Configuration


Linear MSP protection contains 1+1 linear MSP and 1:N linear MSP. They use the protection
channel to protect services that are transmitted on the working channel. When the working
channel fails, services are switched to the protection channel. The linear MSP applies to the
POS interface and structured STM interface.
The multi-chassis (MC) LMSP can implement the LMSP among NEs.
The U2000 supports the following functions of LMSP/MC LMSP configuration:
 Create a linear MSP.
 Check the linear MSP switching status.
 Perform linear MSP switching.

8-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

QoS Configuration
QoS indicates the performance of the data flow that travels through a network. The QoS is
used to ensure end-to-end service quality. The QoS cannot increase the bandwidth, but it can
minimize the delay and jitter in the network by reasonably allocating and monitoring network
resources. In this way, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision
policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS
nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification
on the traffic that enters the DS domain. Traffic of different types is marked with different
PHB service types. For internal DS nodes, you need to perform only simple flow
classification based on PHB service type.
The U2000 supports the following QoS functions:
 Configure QoS profile.
 Configure DiffServ domains.
 Configure ATM CoS mapping.
 Configure SVLAN DEI used flag.
 Configure simple flow classification and complex flow classification.
 Configure CAR and Shaping.
 Configure the color blindness mode.
 Configure the WFQ schedule policy.
 Configure the port WRED schedule policy.
 Configure the port WFQ policy.
 Configure the service WRED policy.
 To simplify the operation and share some common QoS configuration parameters, the
U2000 supports creating QoS function point policy. The function point policies are as
follows: port policy, ATM policy, V-UNI ingress policy, V-UNI egress policy, PW policy
and QinQ policy. By using these function point policies, you can bind the CAR
configuration attribute, shaping configuration attribute, flow classification configuration
attributes, WFQ schedule policy, WRED policy and color blindness mode attributes.
 Configure CoS queue mapping.
 Supports the application of the QoS policy to multiple NEs.

MPLS Tunnel Configuration


The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service,
the MPLS tunnel realizes end-to-end transmission and carries the PWs related to the service.
See Figure 8-1. Unicast MPLS tunnel is mainly used to transparently transmit point-to-point
PWE3 services.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

Figure 8-1 Unicast MPLS tunnel

The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE
basis:
 Configure basic attributes of the MPLS.
 Configure static unicast MPLS tunnels.
 Create forward and backward MPLS tunnels at the same time.
 Create bidirectional MPLS Tunnel.
 Create the E-LSP and L-LSP.
 Manage PWs.
 Manage tunnel labels and PW labels.
 Query the PWs that a tunnel carries.

MPLS Tunnel Protection Group Configuration


The U2000 provides the following functions of configuring an MPLS tunnel protection group:
 Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,
containing the switching mode, revertive mode, wait-to-restore (WTR) time, and
hold-off time.
 Perform MPLS tunnel protection switching.
 Query the protection switching status of an MPLS tunnel.

MS PW Configuration
By creating multi step (MS)-PW to transmit services, you can save tunnel resources and
transmit services over different networks.

8-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

UDP-Encapsulated PW Configuration
The U2000 supports the UDP-encapsulated PWs that are carried in IP tunnels.

PW APS/MC PW APS Configuration


As a network protection mechanism, PW automatic protection switching (APS) is intended to
protect the services on the working PW with a protection PW. That is, when the working PW
is faulty, the services on the working PW are switched to the protection PW. In this manner,
the services on the working PW are protected.
By using the MC PW APS function, you can implement the PW APS protection among NEs.
You can perform the following PW APS/MC PW APS functions on a per-NE basis:
 Create a protection group.
 Bind the master and slave protection pairs.

IP Tunnel and GRE Tunnel Configuration


If the equipment at the two ends of an IP network does not support MPLS tunnel, PWE3
services can pass through the IP network by using the IP tunnel or GRE tunnel.
IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication.
The U2000 supports configuring bidirectional IP tunnels and GRE Tunnels on a per-NE basis.
Query the PWs that a tunnel carries.

Dual-Homing Protection Configuration


The two sets of PE equipment, that is, dual-homing nodes, are connected to the same CE
equipment through the corresponding attachment circuits (ACs). In this case, the services that
are received on the PE nodes at the two end of a carrier network can be protected. This is the
dual-homing protection.
You can configure the following types of dual-homing protection for ATM and CES services.
 1:1 MC-PW APS and 1:1 MC-LMSP
 1:1 MC-PW APS and 1+1 MC-LMSP
 1:1 PW redundancy and 1:1 MC-LMSP
 1+1 PW redundancy and 1+1 MC-LMSP
You can configure the following types of dual-homing protection for E-line services.
 1:1 MC-PW APS and MC-LAG
 1:1 PW redundancy and MC-LAG
You can configure dual-homing protection for E-LAN services through the MAC address
withdrawal and MC-LAG.

CES Service Configuration


CES is mainly used for service transparent transmission of TDM trail switching data in the
PTN network.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-11


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

See Figure 8-2. The 2G/3G stations or Intranet line accesses the PTN equipment by using the
E1/ channelized STM-1 line. The equipment divides the E1 signals into pieces, encapsulates
the pieces into the Ethernet, and transmits the E1 signals to the opposite end by using the PW.

Figure 8-2 CES service application model

The U2000 provides the following configuration functions for CES service creation:
 Create the corresponding PW when creating a CES service.
 Create UNI-UNI and UNI-NNI CES services.
 Create CES services of structure-aware TDM circuit emulation service over packet
switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).
 Configure QoS of the CES service.
 Configure idle timeslot recovery value.
 Configure CES service alarm transparent transmission.
 Select the tunnel where a PW is carried online.

ATM Service Configuration


ATM emulation service is mainly used to transparently transmit ATM services in the PTN.
See Figure 8-3. The 3G station accesses the PTN equipment by using the ATM IMA group.
The equipment encapsulates the ATM cells into the Ethernet, and transmits the ATM cells to
the opposite end by using the PW.

8-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

Figure 8-3 ATM service application model

The U2000 provides the following configuration functions for ATM service creation:
 Create UNI-UNI and UNIs-NNI ATM services.
 Create PVP, PVC and transparent ATM services.
 Create the corresponding PW when creating an ATM service.
 Configure the IMA group.
 Configure QoS of the ATM service.
 Configure the CoS mapping.
 Select the tunnel where a PW is carried online.

E-Line Service Configuration


The E-line service is a point-to-point Ethernet service. The equipment transmits user packets
from the user side to the network side based on Port or Port+VLAN. In this way, user data can
be transparently transmitted in a point-to-point manner.
See Figure 8-4. Company A has branches in City 1 and City 3. Company C has branches in
City 1 and City 2. Branches of Company A or Company C that are in different cities have data
communication requirements. The PTN equipment can provide E-line services for Company
A and Company C, to meet their communication requirements. In addition, the service data
can be completely isolated.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-13


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

Figure 8-4 E-Line Service

The U2000 supports the following functions of configuring E-line services on a per-NE basis:
 Create UNI-UNI E-Line services.
 Create UNI-NNI E-Line services that are carried on ports.
 Create UNI-NNI E-Line services that are carried on PWs.
 Create UNI-NNI E-Line services that are carried on QinQ links.
 Configure the service and the QoS of the corresponding PW when creating an L2VPN
service.
 Configure ETH LPT.
 Configure the V-UNI group.
 Select the tunnel where a PW is carried online.

E-Aggr Service Configuration


The E-Aggr service is a multipoint-to-point Ethernet service. The equipment uses several
ports to access services from the V-UNI side, and converges the services into one PW at the
network side for transmission. In this way, user data from multiple points can be converged
into one point.
See Figure 8-5 and Figure 8-6. One carrier wants to construct a 3G network. Services of each
Node B are converged and transported to the RNC. The data between each Node B and RNC
is regarded as one service. At the convergence point, the QoS parameters such as the overall
bandwidth are specified.

8-14 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

Figure 8-5 E-Aggr service scenario 1

Figure 8-6 E-Aggr service scenario 2

The U2000 supports the following functions of configuring E-Aggr services on a per-NE
basis:
 Configure the VLAN forwarding table items of an E-Aggr service.
 Configure the service and the QoS of the corresponding PW when creating an E-Aggr
service.
 Configure the V-UNI group.
 Select the tunnel where a PW is carried online.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-15


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

E-LAN Service Configuration


The E-LAN is a multipoint-to-multipoint Ethernet service. It connects to multiple V-UNI and
NNI access points. It realizes packet forwarding and interconnection by using the MAC
address self-learning scheme of layer 2.
See Figure 8-7. The HQ of Company A is in City 3. Company A has Branch A in City 1, City
2, and City 3, and has Branch B in City 1 and City 2. Branch A and Branch B do not have
business with each other. Hence, the data should be isolated between the two branches. The
HQ has requirements of communicating with each branch and accessing the Internet.

Figure 8-7 E-LAN service

Different VLANs are used to identify service data of different branches by using the E-LAN
service. In this way, data is shared within a branch and is isolated from other branches. The
Internet data of the HQ is also isolated from the internal service data by using the VLAN.
The U2000 supports the following functions of configuring E-LAN services on a per-NE
basis:
 Create E-LAN services that are carried on port.
 Create E-LAN services that are carried on PWs.
 Create E-LAN services that are carried on QinQ links.
 Configure the service and the QoS of the corresponding PW when creating an E-LAN
service.
 Configure the V-UNI and NNI interfaces of an E-LAN service.
 Configure the split horizon group of an E-LAN service.
 Configure the V-UNI group.
 Configure the MAC address learning parameters.
 Configure the unknown frame processing mode.
 Configure the static MAC address.

8-16 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

 Configure the disabled MAC address.


 Select the tunnel where a PW is carried online.

Service Mirroring Configuration


In the case of the service mirroring, all packets that enter a certain port are duplicated and
then duplicated packets are transmitted through an observation port. In this manner, the
normal service is scarcely affected when packets of the mirrored service are captured and
analyzed.
You can configure the service mirroring as follows:
 Configure the local service mirroring.
 Configure the remote service mirroring.

MPLS OAM Configuration


MPLS OAM is an OAM function of the MPLS network. This function can check the quality
of LSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge,
and locate a defect inside the network at the MPLS layer. It can report and handle a defect.
When a fault occurs, the MPLS OAM provides trigger scheme of protection switching.
The U2000 provides the following functions of configuring MPLS OAM:
 Configure MPLS OAM parameters of a tunnel.
 Perform CV/FFD check.
 Perform LSP ping check.
 Perform PW ping check.
 Perform LSP traceroute check.
 Perform PW traceroute check.
 The FDI can be enabled and disabled.

Ethernet Service OAM Configuration


Ethernet service OAM is an end-to-end OAM function for services. This function can check
the quality of Ethernet links that pass through multiple NEs. The Ethernet service OAM
checks an Ethernet link by sending OAM packets. The OAM packet is handled only at the
MAC layer. As a low rate protocol, the OAM protocol uses very small network bandwidth.
Hence, this function does not affect services carried by the link.
The U2000 provides the following functions of configuring Ethernet service OAM:
 Create maintenance domains (MDs), maintenance associations (MAs), maintenance end
points (MEPs), and maintenance intermediate points (MIPs).
 Perform a CC check.
 Perform an LB check.
 Perform an LT check.

Ethernet Port OAM Configuration


The Ethernet port OAM is mainly used to automatically check the connectivity and
performance and locate the faults of the physical links under the MAC layer. It is applicable
when the physical Ethernet ports are directly connected.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-17


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

The U2000 provides the following functions of configuring Ethernet port OAM:
 Configure OAM parameters.
 Configure the OAM error frame monitoring.
 Query the remote OAM parameters.

ATM OAM Configuration


ATM OAM is an end-to-end OAM function for ATM services. This function can check the
quality of ATM links that pass through multiple NEs. The ATM OAM function checks an
ATM link by inserting some OAM cells of the standard cell structure to the user cell flow.
The U2000 provides the following functions of configuring ATM OAM:
 Set segment end attributes.
 Perform CC activation test.
 Perform remote loopback.
 Set LLID.
 Configure ATM alarm transmission

8.2 End-to-End PTN Management


End-to-end network management is trail management. You can build the configuration data of
end-to-end network management by searching for the data at the NE layer of the U2000, or
directly configure the data at the network layer of the U2000, and apply the data to all the
relevant NEs. Configuring NE data by using the trail management function is faster and more
convenient compared with configuring NE data on a per-NE basis.
To perform end-to-end network management by using the U2000, you need to have the
required license.

PWE3 Service Management


By using the U2000, you can perform the following operations:
 Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.
 Pre-deploy a PWE3 service.
 Implement the function of automatically discovering PWE3 services.
 Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
 Manage multi-hop PWE3 services.
 Implement the protection management of PWE3 services.
 View the topology of PWE3 services.
 View the alarms of a PWE3 service.
 View the performance of a PWE3 service.
 Test and check a PWE3 service.
 Manage discrete PWE3 services.
 Manage PWE3 services based on rights and domains.
 Clone a PWE3 service.

8-18 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 8 PTN Network Feature Management

 Manage PWE3 service templates.


 Implement the function of automatically generating Ethernet OAM for PWE3 services.

VPLS Service Management


By using the U2000, you can perform the following operations:
 Create a VPLS service.
 Pre-deploy a VPLS service.
 Implement the function of automatically discovering VPLS services.
 Modify and delete VPLS services, and filter VPLS services to view the desired services.
 View the topology of VPLS services.
 View the alarms of a VPLS service.
 View the performance of a VPLS service.
 Test and check a VPLS service.
 Manage VSI resource.
 Manage VPLS services based on rights and domains.
 Manage VPLS service templates.
 Implement the function of automatically generating Ethernet OAM for VPLS services.

L3VPN Service Management


By using the U2000, you can perform the following operations:
 Create an L3VPN service that supports the BGP/MPLS protocol.
 Pre-deploy an L3VPN service.
 Implement the function of automatically discovering L3VPN services.
 Modify and delete L3VPN services, and filter L3VPN services to view the desired
services.
 View the topology of L3VPN services.
 View the alarms of an L3VPN service.
 View the performance of an L3VPN service.
 Test and check the configuration of an L3VPN service.
 Manage VRF resource.
 Manage L3VPN services based on rights and domains.
 Manage L3VPN service templates.

Tunnel Management
By using the U2000, you can perform the following operations:
 Create static CR, RSVP, LDP, and IP tunnels.
 Create RSVP and LDP tunnels in batches.
 Pre-deploy a tunnel.
 Implement the function of automatically discovering tunnels.
 Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
 View the topology of tunnels.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 8-19


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
8 PTN Network Feature Management Product Description

 View the alarm of a tunnel.


 View the performance of a tunnel.
 Test and check a tunnel.
 Manage discrete tunnels.
 Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
 Switch services in a 1+1 or 1:1 tunnel protection group manually.

Network-Wide Clock Topology Management


 Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.
 Displaying clock trace relationship.
 Displaying clock alarm status.

8-20 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System 9 Router Networks and Switch Networks Feature
Product Description Management

9 Router Networks and Switch Networks


Feature Management

About This Chapter


This topic describes the functions and features of router networks and switch networks.
9.1 Router NE Management
NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure devices through GUIs.
9.2 Switch NE Management
NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure devices through GUIs.
9.3 Template Management
In the process of NE configuration management, you need to perform a large number of
repetitive operations. With the template management function, you can quickly configure NEs
in batches.
9.4 Diagnosis Management
It provides easy-to-use test diagnosis functions for you to test the connectivity of networks
and services. You can manually run diagnosis cases or customize test policies to let the
diagnosis cases run automatically at scheduled times.
9.5 Cluster Management
The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of
automatic management operations and centralized management for multiple dispersed
low-end and mid-range switches.
9.6 Node Redounded Management
E-Trunk (Enhanced-Trunk), developed on the basis of Link Aggregation Control Protocol
(LACP), is a protocol that controls and implements link aggregation among multiple sets of
equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS,
VLL, or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links
between the CE and PEs.
9.7 Report Subsystem Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 9-1


Copyright © Huawei Technologies Co., Ltd.
9 Router Networks and Switch Networks Feature iManager U2000 Unified Network Management System
Management Product Description

The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
9.8 VPN Service Management
The U2000 provides centralized and unified management, including service deployment,
service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS
service, and PWE3 service.
9.9 Tunnel Service Management
Tunnel service management is used to plan and deploy services on the entire MPLS network.
Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service
management, thus reducing the costs of operating and maintaining MPLS networks.

9.1 Router NE Management


NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure devices through GUIs.

Device Management
Identify the software versions of devices and adapt to different types of devices automatically.

Entity Management
This function allows you to perform the following operations:
 Automatically obtain the data about device entities, including frames, boards, power
supplies, fans, and ports.
 Refresh entity data and monitor the entity status.

Device Panel Management


This function displays device entities, including frames, boards, power supplies, fans, and
ports, on the device panel.

Clock Management
This function supports physical clock and PTP clock.

Interface Management
This function allows you to configure a variety of media interfaces, including:
 Ethernet interfaces
 POS interfaces
 Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and
virtual template (VT) interfaces

9-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System 9 Router Networks and Switch Networks Feature
Product Description Management

LLDP Management
This function supports the configuration of LLDP globally or on interfaces.

Ethernet Features Management


The specific functions are as follows:
 Manage VLANs, such as configuring the global VLAN, port VLAN, VLAN stacking,
and VLAN mapping.
 Manage MAC address forwarding, such as configuring static MAC addresses, MAC
address learning rules, and MAC address aging.
 Manage VLAN switch.

Ethernet OAM Management


To realize OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With IEEE
802.1ag, the U2000 can continuously monitor user services, and acknowledge and locate
faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last mile, and
notify the related faults.
The specific functions are as follows:
 Manage global information.
 Support IEEE 802.1ag-related functions, such as managing the configurations of the MD,
MA, local MEP, remote MEP, and MIP and managing test diagnosis (including loopback,
link trace, MAC ping, and MAC trace).
 Support IEEE 802.3ah-related functions, such as configuring protocols, querying ports,
and detecting loopbacks.

NE Channel Management
This function allows you to configure and maintain various types of management channels,
including:
 Manage local users
 Configure VTYs
 Configure the Telnet and FTP service
 Configure log services
 Configure alarm services
 Configure SSH services
 Configure NAP services

QoS Management
The specific functions are as follows:
 Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.
 Manage the configurations of interface QoS and system QoS.
 Configure DS domain policies.
 Manage the configurations of mirrored traffic and mirrored ports.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 9-3


Copyright © Huawei Technologies Co., Ltd.
9 Router Networks and Switch Networks Feature iManager U2000 Unified Network Management System
Management Product Description

 Manage the configurations of HQoS, including the discard policy, HQoS flow queue
policy, HQoS flow queue mapping, HQoS scheduler, and HQoS user scheduling.

Route Management
This function allows you to configure the static routes, routing information, routing policy,
public network and private network of BGP routes, IS-IS routes, and OSPF routes.

MPLS Management
This function supports NE-level MPLS management, including:
 Enable MPLS-related protocols.
 Configure MPLS TE tunnel.
 Set MPLS interface parameters.
 Configure static LSPs.
 Configure MPLS OAM detection and protection groups.

ACL Management
This function allows you to configure ACLs on network devices and perform specific access
control.

BRAS Management
This function supports the broadband remote access service (BRAS) features of multi-service
gateways, including:
 Address pool management
 Authorization, authentication and accounting (AAA) management
 Domain and Point-to-Point Protocol (PPP) management
 Built-in Web server management
 Layer-3 Internet Service Provider (ISP) configuration management
 Portal server management
 VLAN management
 User management
This function also allows the system to collect the statistics on domains, IP address segments,
and IP addresses of the whole device in real time.

VPDN Management
This function allows you to configure the Layer-2 Tunneling Protocol (L2TP) on
multi-service gateways and manage L2TP tunnels.

BFD Management
The specific functions are as follows:
 Configure BFD attributes.
 Manage BFD sessions.

9-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System 9 Router Networks and Switch Networks Feature
Product Description Management

 Manage BFD alarms.


 Perform BFD in VRF, PW, MPLS TE, IS-IS, BGP, and physical links services.

VRRP/VGMP Management
The specific functions are as follows:
 Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as
configuring global VRRP attributes, interface attributes, and interface VR, and managing
VRRP alarms.
 Manage the configurations of the VRRP Group Management Protocol (VGMP), such as
configuring global VGMP attributes, managing VGMP members, and managing VGMP
alarms.

VPN Management
The specific functions are as follows:
 Support tunnel policies.
 Support PW templates.
 Manage PWs.
 Manage VSIs.
 Manage VRFs.

MSE Management
This function enables routers to support MSE features, such as configuring MSE globally,
managing AAA, managing users, and configuring interface services.

Multicast Management
This function enables routers to support multicast features, such as configuring IGMP
Snooping, configuring SSM Mapping, managing multicast CAC, and configuring channel
group.

E-Trunk Management
This function supports E-Trunk search and discovery, configure E-Trunk and member of
E-Trunk.

Smart Configuration Tool


This function supports import NE from other system, grammer check of CLI, template of
configuration, parameter setup and batch execution, provide menu entry and integration
withU2000

ANCP Management
This function enables routers to support ANCP services, such as configuring global ANCP
information, configuring ANCP template, and configuring access management.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 9-5


Copyright © Huawei Technologies Co., Ltd.
9 Router Networks and Switch Networks Feature iManager U2000 Unified Network Management System
Management Product Description

9.2 Switch NE Management


NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure devices through GUIs.

Device Management
This function identifies the software versions of devices and adapts to different types of
devices automatically.

Entity Management
This function allows you to perform the following operations:
 Obtain the data about device entities, including frames, boards, power supplies, fans, and
ports automatically.
 Refresh entity data and monitor the entity status.

Device Panel Management


This function displays device entities, including frames, boards, power supplies, fans, and
ports on the device panel.

LLDP Management
This function supports the configuration of LLDP globally or on ports.

Interface Management
This function allows you to configure a variety of media interfaces, including:
 Ethernet interfaces
 POS interfaces
 Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and VT
interfaces

Ethernet Features Management


The specific functions are as follows:
 Manage VLANs.
 Manage MAC address forwarding.
 Isolate ports.
 Detect LDT loopback.
 Detect PWs.
 Configure BPDU tunnels.

OAM Management
 To realize the OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With
IEEE 802.1ag, the U2000 can continuously monitor user services, and acknowledge and

9-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System 9 Router Networks and Switch Networks Feature
Product Description Management

locate faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last
mile, and notify the related faults.
 BFD is used to detect the communication fault between forwarding engines. To be
specific, BFD detects the connectivity of a data protocol on the same path between two
systems. The path can either be a physical link or a logical link.
The specific OAM management functions are as follows:
− Manage global information.
− Support IEEE 802.1ag-related functions, such as managing the configurations of the
MD, MA, local MEP, remote MEP, and MIP, and managing test diagnosis (including
loopback, link trace, MAC ping, and MAC trace).
− Support IEEE 802.3ah-related functions, such as configuring protocols, querying
ports, and detecting loopback.
− Configure BFD attributes, manage BFD sessions and BFD alarms, and perform BFD
in VRF, PW, and VSI services.

QoS Management
The specific functions are as follows:
 Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.
 Manage the configurations of interface QoS and system QoS.
 Configure DS domain policies.
 Manage the configurations of mirrored traffic and mirrored ports.

Route Management
This function allows you to configure the public network, routing information, routing policy,
and private network of static routes, BGP routes, IS-IS routes, and OSPF routes.

MPLS Management
This function supports NE-level MPLS management, including:
 Enable MPLS-related protocols.
 Configure MPLS TE tunnel.
 Configure MPLS interface parameters.
 Configure static LSPs.
 Configure MPLS OAM detection and protection groups.

ACL Management
This function allows you to configure ACLs on network devices and perform specific access
control.

BFD Management
The specific functions are as follows:
 Configure BFD attributes.
 Manage BFD sessions.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 9-7


Copyright © Huawei Technologies Co., Ltd.
9 Router Networks and Switch Networks Feature iManager U2000 Unified Network Management System
Management Product Description

 Manage BFD alarms.


 Perform BFD in VRF, PW, MPLS TE, VSI, and physical links services.

VRRP/VGMP Management
The specific functions are as follows:
 Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as
configuring the global VRRP attributes, interface attributes, and interface VR, and
managing VRRP alarms.
 Manage the configurations of the VRRP Group Management Protocol (VGMP), such as
configuring global VGMP attributes, and managing VGMP members and VGMP alarms.

VPN Management
The specific functions are as follows:
 Support tunnel policies.
 Support PW templates.
 Manage PWs.
 Manage VSIs.
 Manage VRFs.

EPON Management
This function supports PON interface management and ONU management.

NE Channel Management
This function allows you to configure and maintain various types of management channels,
including:
 Configure VTYs.
 Configure FTP services.
 Manage local users.
 Configure log services.
 Configure alarm services.
 Configure SSH services.
 Set SNMP parameters.

DLDP Management
This function supports the management on the DLDP working mode, packet authentication
mode, and statistics.

MSTP Management
This function supports the management on the MSTP domain, MSTP protection, and
statistics.

9-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System 9 Router Networks and Switch Networks Feature
Product Description Management

DHCP Management
This function supports the management on the DHCP server, DHCP relay, client address, and
DHCP statistics.

Web Authentication Management


This function supports the management on the Web authentication server.

Controllable Multicast Management


This function supports the management on the multicast group, multicast template, and
interface filtering.

Mirroring Management
This function supports the management on the local/remote interface mirroring, VLAN
mirroring, MAC address mirroring, flow mirroring, CPU mirroring, and CPU buffer statistics.

IP Source Guard Management


This function supports the management on the static user binding table, dynamic check, and
clearance of dynamic configurations.

Interface Security Management


This function supports the management on the Ethernet interface security.

MAC Address Authentication Management


This function supports the management on the MAC address authentication.

PPPoE+ Management
This function supports the management on the PPPoE+ function.

AAA and User Management


This function supports the management on the user authentication, authorization, and
accounting.

9.3 Template Management


In the process of NE configuration management, you need to perform a large number of
repetitive operations. With the template management function, you can quickly configure NEs
in batches.

Template Features
Template Management provides some default configuration templates. When you reference a
template, the attribute settings on the template automatically apply to the configured resource.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 9-9


Copyright © Huawei Technologies Co., Ltd.
9 Router Networks and Switch Networks Feature iManager U2000 Unified Network Management System
Management Product Description

A template has the following features:


 Offline configuration
Global templates are created in advance and saved on the U2000 instead of being created
on a device. Thus, you can create global templates when devices are offline or do not
exist. The creation of global templates is irrelevant to the device status.
 Global validity
After a global template is created, this template can take effect on all the devices
managed by the U2000. It can be referenced by a type of device or none of the devices.
 Little duplicate data
− After a global template is applied to a type of device, if the template data on some
devices is the same, the U2000 keeps only one template data record for these devices.
− When a device references a global template, the U2000 does not adds a record of
template data. Instead, the U2000 records the reference relation between the device
and global template.
 A global template can be referenced by a large number of devices of the same type,
which helps to reduce recorded template data and facilitate maintenance.

Main Templates
The main templtes are as follows:
 ACL template
ACLs can be used to control the access of user packets that flow into ports. Configuring
ACLs in batches simplifies the configuration of the defense against attacks on the
network access side. When you configure the firewall on the network access side, you
need to configure ACL matching rules, such as the restriction on a MAC address and the
restriction on an IP address. If a rule needs to be applied to multiple interfaces on
different routers, configuring the rule at every point is time-consuming and increases the
costs of management and maintenance.
 QoS template
The main applications of network QoS are as follows:
− CBQoS template, and it can be applied to interfaces on NEs in batches.
− DS domain template, and it can be applied to interfaces on NEs in batches.
− HQoS template, and it can be applied to interfaces on NEs in batches.
− PQ template, and it can be applied to interfaces on NEs in batches.
− Interface CAR template, and it can be applied to interfaces on NEs in batches.
 VPN service template
The service template is used to perform batch configurations for multiple devices when a
VPN service is created or configured. In this manner, the efficiency of service
deployment is greatly improved.
 Switch EPON template
When you configure multiple ONU services, you can manage ONUs uniformly by
configuring templates to improve configuration efficiency.

9-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System 9 Router Networks and Switch Networks Feature
Product Description Management

9.4 Diagnosis Management


It provides easy-to-use test diagnosis functions for you to test the connectivity of networks
and services. You can manually run diagnosis cases or customize test policies to let the
diagnosis cases run automatically at scheduled times.

Test Diagnosis Functions


 This describes the test diagnosis function of the U2000. The U2000 provides test cases,
such as VPLS MAC ping/traceroute, ICMP ping/traceroute, PWE3 ping/traceroute, LSP
ping/traceroute, and ICMP VRF ping/traceroute, which can help you to test the network
connectivity at each protocol layer.
 The U2000 allows you to combine several test cases into a test suite, so that you can
perform test diagnosis in batches as required. By diagnosing services layer by layer
according to network protocol layers, theU2000 can quickly locate the faulty network
layer.
− Application Layer
DNS, DHCP, FTP, SNMP, VOIP
− Transport Layer
TCP, UDP
− Network Layer
ICMP ping/traceroute, ICMP VRF ping/traceroute, ICMP Jitter, multicast ping/trace,
multicast VRF trace, MTU ping
− Data Link layer
8021.ag MAC ping, CE ping
− MPLS Services
PWE3 ping, LSP ping, VPLS MAC ping, MAC study, mfib ping, service ping
 The U2000 provides intelligent result analysis. You can manually customize the
thresholds of test case indicators such as delay, jitter, and packet loss ratio in the result
analysis template and the result analysis policy according to the related service level. In
this manner, you can quickly determine the network status.

Test Diagnosis Management


Through test diagnosis management, you can test the connectivity and QoS of a network and
diagnose network faults according to the test results. Test diagnosis management helps to
narrow the range of fault diagnosis and reduce the time of fault location and rectification.
A test diagnosis tool consists of the following parts:
 Test suite
− A test suite is made up of multiple test cases. Created according to user test requests,
a test case is the entity of a test tool based on the application layer, transport layer,
network layer, data link layer, and MPLS services. The test suite is a group of test
tools organized according to certain test scenarios.
− You can take a test suite as a performance unit and perform all the test cases or
optionally perform some test cases in the test suite. Then you can diagnose network
QoS according to the parameters shown in the test results, such as delay, jitter, and
packet loss ratio.
 Diagnosis policy

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 9-11


Copyright © Huawei Technologies Co., Ltd.
9 Router Networks and Switch Networks Feature iManager U2000 Unified Network Management System
Management Product Description

The U2000 provides multiple running policies for test suites. You can run the test suite
associated with a certain running policy at a specified time daily, weekly, or monthly.
 Network scanning
It collects network information through network synchronization and tests the
connectivity of partial types links on the network. The U2000 provides real-time
scanning and allows you to stop running scanning tasks. The U2000 also provides the
traceroute function for you to locate faults.
 History data
The history data is the records of test suite operations. You can filter and query history
data according to conditions such as the test suite name, test result, or test time, and
export query results.
 Diagnosis result analysis
It provides intelligent result analysis. You can manually customize the thresholds of test
case indicators such as delay, jitter, and packet loss ratio in the result analysis template
and the result analysis policy according to the related service level. In this manner, you
can quickly determine the network status.

9.5 Cluster Management


The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of
automatic management operations and centralized management for multiple dispersed
low-end and mid-range switches.
Cluster network management involves the following functions:
 Managing cluster views
 Configuring clusters
 Managing cluster configuration files
 Managing image programs
 Locating cluster faults
The U2000 provides cluster management for the
CX200/CX200D/CX300/CX380/CX600/S2300/S3300/S5300. This function allows you to
manage network equipment in a more convenient and efficient manner. With this function,
you can monitor the network status through the physical topology of cluster networks and
reduce improper operations on single equipment during management. Therefore, the U2000
meets the ever-increasing service requests.
Figure 9-1 and Figure 9-2 show the cluster topology management window and functions
provided by theU2000.

9-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System 9 Router Networks and Switch Networks Feature
Product Description Management

Figure 9-1 Cluster topology

Figure 9-2 Navigation path to cluster functions

 Automatically discovering and dynamically refreshing cluster equipment nodes


 Automatically discovering and dynamically refreshing the physical topology of cluster
networks and links
 Managing the configurations of cluster equipment in batches and in a unified and
centralized manner
 Maintaining the equipment of a cluster in a centralized manner and supporting fault
detection and recovery
 Facilitating the backup and recovery of configuration data
 Setting the parameters, such as the management VLAN, IP address pool, and multicast
MAC address, for the switches of a cluster
 Supporting the plug-and-play feature of protocols such as NDP, NTDP, and HGMP
 Supporting the access to command or member switches through Telnet based on the
nodes in the cluster view

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 9-13


Copyright © Huawei Technologies Co., Ltd.
9 Router Networks and Switch Networks Feature iManager U2000 Unified Network Management System
Management Product Description

9.6 Node Redounded Management


E-Trunk (Enhanced-Trunk), developed on the basis of Link Aggregation Control Protocol
(LACP), is a protocol that controls and implements link aggregation among multiple sets of
equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS,
VLL, or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links
between the CE and PEs.
This function allows you to perform the following operations:
 Creat an E-Trunk, bind Eth-Trunks, and configure the attributes of the E-Trunk and the
Eth-Trunks.
 Display the automatically discovered E-Trunk information in the database of the NMS
to the interface of the NMS.
 Automatically discover the E-Trunk by user specify the equipment range, the
configuration of the equipment and the E-Trunk group can be automatically discovered.

9.7 Report Subsystem Management


The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
The report subsystem not only supports the manual and periodical generation of reports, but
also is perfect in distributing reports. It can be easily integrated with the security management
module of the U2000 and has a strong data display power.
The report subsystem provides Web-based report generation, distribution, and management
functions.
For more information, reference to "iManager U2000 (RPT)V100R002C00SPC001 Release
Notes_01.doc".

9.8 VPN Service Management


The U2000 provides centralized and unified management, including service deployment,
service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS
service, and PWE3 service.

Service Deployment
The U2000 provides a user-friendly service configuration GUI on which you can complete all
configuration operations. The parameters of multiple sets of equipment can be automatically
generated through related service templates. User configuration results can be previewed
through the topology before being delivered.
 Customer management
The U2000 supports the operations of adding, deleting, and modifying customers, and
binding customers to VPN services.
 L3VPN service management

9-14 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System 9 Router Networks and Switch Networks Feature
Product Description Management

− Configuring L3VPNs in networking modes such as Full-Mesh, Hub-Spoke, and


Extranet
− Configuring VPN FRR and IP FRR for L3VPNs and binding L3VPNs to TE tunnels
− Configuring static, OSPF, and BGP private routes
− Configuring VPN services in inter-AS OptionA or inter-AS OptionB mode
 VPLS service management
− Supporting the VPLS services in LDP signaling (Martini) mode
− Supporting the interworking of different VSIs
− Supporting VLL/VPLS services
 PWE3 service management
− Configuring static and dynamic PWE3 services
− Supporting PWE3 services in CES, ATM, Ethernet, IWF, and heterogeneous
interworking mode
− Backing up PW configurations
− Configuring PW FRR
 Composite service management
The U2000 supports the management on composite services, such as VLL/VPLS,
VLL/L3VPN, L3VPN multi-VRF, and inter-AS OptionA.

Automatic Service Discovery


The U2000 provides the function of automatically discovering L3VPN, VPLS, and PWE3
services that are running on the managed network. In addition, the U2000 can quickly load
services on the current network to itself for unified management and monitoring, without
requiring much user participation.

Service Monitoring
 The U2000 provides the visual topology display function for L3VPN, VPLS, and PWE3
services. The running status of the resources used by the current service, such as an
interface, a VRF, or a VSI, can be displayed in the related topology view, thus helping
you to quickly locate faults.
 You can quickly locate a faulty service based on the alarm generated by the related NE.

Service Diagnosis
 The diagnosis tools are used to detect the connectivity of networks and locate faults.
Through the service diagnosis function, you can generate diagnosis tasks according to
the selected services and directly operate equipment nodes in topology views. The
diagnosis results can be directly displayed.

Service Check and Test


 Configuration check: checking the consistency of VPN service configurations on
different sites and showing the positions of configuration errors
 Service connectivity test: testing the service connectivity through the ping and tracert
tests, and locating the fault equipment
 Protocol status test: checking the service protocol status and the forwarding table, and
displaying the error information, thereby helping you to locate faults

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 9-15


Copyright © Huawei Technologies Co., Ltd.
9 Router Networks and Switch Networks Feature iManager U2000 Unified Network Management System
Management Product Description

9.9 Tunnel Service Management


Tunnel service management is used to plan and deploy services on the entire MPLS network.
Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service
management, thus reducing the costs of operating and maintaining MPLS networks.

Tunnel Deployment
 Enabling MPLS, LDP, and MPLS TE on the network equipment and interfaces in
batches
 Implement the planning of traffic on MPLS core networks by supporting the deployment
of end-to-end MPLS TE tunnel services
 Facilitating the implementation of the MPLS access scheme by supporting the
deployment of static LSP services
 Implementing the end-to-end MPLS OAM protection by supporting the configuration of
end-to-end MPLS TE protection groups, configuration of MPLS OAM detection, and
monitoring of related alarms

Automatic Tunnel Discovery


With the help of a network administrator, the LSPs and related protection groups that are
previously deployed on the network can be restored to the U2000. This satisfies the
requirement in the special case where the LSP deployment is prior to the U2000 installation.
Moreover, less time of the network administrator is required and the impact of incorrect
operations on original services is prevented.

Tunnel Monitoring
 Supporting the networkwide tunnel view and displaying multiple types of tunnels, such
as static, RSVP, LDP, and IP tunnels, and their alarms in the topology view
 Collecting and displaying the performance data of tunnels
 Switching to the related tunnel from an alarm

Tunnel Diagnosis
The U2000 supports LSP ping and LSP tracert functions through which you can diagnose
deployed MPLS TE tunnels and static tunnel services.

9-16 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 10 Security Device Network Feature Management

10 Security Device Network Feature


Management

About This Chapter


This topic describes the functions and features of security device networks.
10.1 NE Management of Security Devices
NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure basic configurations on devices through GUIs.
10.2 Single-Point Web Configuration of Security Devices
Single-point Web configuration integrates the existing Web functions on the device by
embedding browser controls in the Client/Server interfaces. Single-point configuration applies
to all the configurations of security devices. In collaboration with centralized security policy
configuration, it provides an integrated and comprehensive network security management
solution.
10.3 Centralized Security Policy Configuration
Deploying a set of security devices with comprehensive technologies during network security
construction does not mean that the network is under stable and reliable security protection.
10.4 Report Subsystem Management
The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
10.5 VPN Service Management
As an important management component for the IPSec and L2TP VPN solutions, the VPN
service management module is used to configure and monitor the IPSec and L2TP VPN
services. It provides intelligent configuration and monitoring means.

10.1 NE Management of Security Devices


NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure basic configurations on devices through GUIs.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 10-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
10 Security Device Network Feature Management Product Description

The NE configuration management functions are as follows:


 Device management
This function allows you to perform the following operations:
− Identify the software versions of devices and adapt to different types of devices
automatically.
− Configure management tunnels on devices, for example, configure local users such as
Telnet users or STelnet users, set SNMP parameters and set trap parameters.
 Entity management
This function allows you to perform the following operations:
− Obtain the data about device entities, including frames, boards, power supplies, fans,
and ports automatically.
− Refresh entity data and monitor the entity status.
 Panel management
This function is used to display device entities, including frames, boards, power supplies,
fans, and ports, on the device panel.
 Interface management
This function is used to configure the general interface information and Ethernet
interfaces.
 GTP management
Through the configuration of GTP policies, the security devices can filter GTP packets
according to different rules, thus realizing the security defense of the GPRS network.
The security devices defend against GTP overbilling attacks, thus protecting users'
benefits against illegitimate damages.
 Automatic registration
This function is used to receive the automatic registration messages sent by devices. If
the IP address of a device changes, the NMS can synchronize the IP address information
of the device in time.

10.2 Single-Point Web Configuration of Security Devices


Single-point Web configuration integrates the existing Web functions on the device by
embedding browser controls in the Client/Server interfaces. Single-point configuration applies
to all the configurations of security devices. In collaboration with centralized security policy
configuration, it provides an integrated and comprehensive network security management
solution.
The Web features of security devices provide users with simple and easy-to-use Web
configuration interfaces. You can easily operate and maintain devices.
The single-point Web configuration is a proxy-based Web access mode. It includes two parts:
Web proxy and Web browser.The functions of single-point Web configuration are as follows:
 Open the Web management interface of a device through a U2000 client.
 Log in to the device Web interface automatically.
 Access devices through the Hyper Text Transfer Protocol (HTTP) or Hyper Text Transfer
Protocol Secure (HTTPS).
 Support multiple Web protocols, such as javascript, Hyper Text Marked Language
(HTML), CSS, and Applet, and technologies related to Web 2.0.

10-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 10 Security Device Network Feature Management

 Function without modifying or affecting the usage of local browsers such as IE and
Firefox.

10.3 Centralized Security Policy Configuration


Deploying a set of security devices with comprehensive technologies during network security
construction does not mean that the network is under stable and reliable security protection.
In network security maintenance, even deploying a satisfied security policy scheme for a
small-sized local network is a rather complex task. Designing and deploying a set of reliable
security protection policies for a large-scale network, accordingly, is a fairly hard and
challenging task.
An industry-leading security policy design, configuration, and management system is worked
out upon the aim of making a security configuration and management center. With this system,
the truly reliable and stable network security protection can be implemented on the basis of
the security devices deployed on the network.
It has the following features:
 Policy package management
A policy package can be used to manage all the security devices on the whole network
and sort the protection tasks on each security device into security policy, attack defense,
and service port mapping.
Users can create their own policy packages and include the configuration tasks in the
policy packages. Users can also perform operations such as creating, deploying,
undeploying, and verifying policy packages. A policy package can cover all the network
security configuration and management tasks of a user on a network.
 Configuration and management ranges
Security policy
Attack defense
Service port mapping
Policy resource
 Policy recovery
During network security management and maintenance, how to ensure the data
consistency between the NMS and devices so that the actual network configurations can
be accurately displayed on the NMS?
Policy recovery can restore the security policies and attack defense configurations
deployed on devices and the used resources of devices to the NMS, thereby achieving
the data consistency between the NMS and devices.
 Policy audit
Auditing the configuration data difference between the NMS and devices helps to ensure
the data consistency and make users to fully trust the NMS when using it.
 Security policy configuration and management modes of two dimensions
1. Service-dimension configuration: manages the configurations when the services are
deployed on multiple or all devices on the network. This helps users to manage and audit
services from the point of networkwide view. On a large-scale network, users do not
need to check and configure services on devices one by one. Therefore, missing
configurations are reduced, and security services can be configured reliably and
efficiently.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 10-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
10 Security Device Network Feature Management Product Description

2. Single NE-dimension configuration: manages the configurations of a single NE. Users


can select an NE to check security configurations, create, modify, deploy, and undeploy
configurations, and import the configurations of other NEs to this NE.
 Policy deployment status display
Whether a policy is deployed, whether the deployment is successful, and whether the
deployment status is the same as that on the device are displayed. This helps to prevent
the repeated deployment of a policy that is already deployed.
 History record query
The detailed policy package configuration and maintenance procedures are recorded. The
history operations that users perform on policy packages can be audited.
10.3.1 Policy Package Management
This topic describes the fuction of policy package management.
10.3.2 Security Policy Configuration
The U2000 allows you to manually create and modify security device rules.
10.3.3 Attack Defense Configuration
The U2000 provides attack defense functions.
10.3.4 Policy Resource Configuration
The configuration of policy resources includes the configuration of service,addess sets,period
and ports sets.
10.3.5 Mapping Service
The U2000 It provides the configuration function that re-maps the most common service ports
to other ones.

10.3.1 Policy Package Management


This topic describes the fuction of policy package management.
This feature allows you to create, modify, delete, verify, deploy, undeploy, discover, and audit
policy packages, view the deployment and audit result of policy packages.
By changing operations based on single policies and single devices to centralized operations
based on batch policies and multiple devices, this feature increases operation efficiency and
reduces maintenance cost.
The policy packages verifying function ensures the correctness of policy package
configurations and correlations among the policies within the same policy package. With the
policy verifying function, you can correctly deploy policy packages on devices and avoid
repeated modifications due to configuration errors during policy deployment.
Policy auditing is to audit the policy configuration differences between the NMS and device,
so as to determine whether the policy needs to be deployed or discovered.
Policy discovery is to recover the data synchronized to the database to the NMS for
management.
The rights to perform various operations on policy packages are under control. Operations on
policy packages are recorded in logs for the policy maintenance personnel to monitor and
manage policies.

10-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 10 Security Device Network Feature Management

10.3.2 Security Policy Configuration


The U2000 allows you to manually create and modify security device rules.
The U2000 allows you to manually create the device rule, including:
 Specify the name of a new rule
 Select the source security zone
 Add the source address manually
 Select the destination security zone
 Add the destination address
 Select the service
 Select the action
 Add the device
 Add the time range
 Choose whether to generate logs
 Configure functions such as ASPF
 Configure functions such as DDoS
 Configure functions such as package filtering
After a rule is created and deployed to a device, the device filters device information
according to this rule.
The U2000 allows you to modify the device rule, including:
 Change the name of a rule
 Change the source security zone
 Change the source address
 Change the destination security zone
 Change the destination address
 Change the service
 Change the action
 Change the device
 Change the time range
 Change whether to generate logs
 Modify functions such as ASPF
 Modify functions such as DDoS
 Modify functions such as package filtering
The U2000 also allows you to delete a rule, or the value of a certain configuration item of a
rule.

10.3.3 Attack Defense Configuration


The U2000 provides attack defense functions.
This feature provides attack defense functions against SYN flood, UDP flood, ICMP flood,
HTTP get flood, DNS request flood, connection flood, scanning, malformed packet, special
packet control, and blacklist for security devices.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 10-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
10 Security Device Network Feature Management Product Description

10.3.4 Policy Resource Configuration


The configuration of policy resources includes the configuration of service,addess sets,period
and ports sets.
 Configuring services, address set, time range, and port set
− Services
As flexible support for the IP protocol, security services can be classified into TCP
services, UDP services, ICMP services, and other services. The U2000 provides some
basic services by default. You can create different services by adding different
parameter settings to the same protocol. Different types of services can form a service
group. A rule corresponds to one or multiple services. In the case where a rule
corresponds to multiple services, these services can be in a service group or map to
these services. When you log in to the U2000 for the first time, the U2000 provides
some services by default.
− Address set
When setting source and destination addresses on the U2000, you can either set
single IP addresses or set address sets.
− Time range
Time ranges are classified into two types: continuous time ranges and periodic time
ranges. A continuous time range starts from one time point and ends at another time
point. Rules are valid only within the time range. A period time range is on a weekly
cycle. You need to set the start time and end time of a day and specify on which days
of a week the rules are valid. Then the rules will take effect on a weekly cycle.
− Port set
A port set is a collection of single, continuous, or discontinuous port numbers,
specifying the ports through which the server can provide services. The value of a
port set ranges from 0 to 65535.
 Configuration log server
Binary flow logs of devices can be sent to binary servers via configuration of log server.

10.3.5 Mapping Service


The U2000 It provides the configuration function that re-maps the most common service ports
to other ones.
Mapping Service means security devices map the service ports of networking program to
out-of-ordered ports when forwarding network data packets.It implies the most common ports
to prevent the outer attack to programs.

10.4 Report Subsystem Management


The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
9.7 Report Subsystem Management lists the details of the report subsystem management.

10-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 10 Security Device Network Feature Management

10.5 VPN Service Management


As an important management component for the IPSec and L2TP VPN solutions, the VPN
service management module is used to configure and monitor the IPSec and L2TP VPN
services. It provides intelligent configuration and monitoring means.
10.5.1 IPSec End-to-End Service
The IPSec end-to-end service is to securely connect two intranets trustable to each other
through Internet. It is applied when secure communication connections need to be established.
This application mode can be used to protect the sensitive data transmitted on the Internet.
10.5.2 Remote Access Service
The U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2)
and L2TP over IPSec technologies. The remote access service is applicable to employees
accessing the enterprise intranet in remote dial-up mode over the Internet.

10.5.1 IPSec End-to-End Service


The IPSec end-to-end service is to securely connect two intranets trustable to each other
through Internet. It is applied when secure communication connections need to be established.
This application mode can be used to protect the sensitive data transmitted on the Internet.
 Service deployment
This feature provides both the single service deployment function and the service batch
deployment function. Service deployment is used to make services take effect on devices.
You can view the deployment results through the auditing function.
 Service discovery
This feature supports the function of automatically discovering services. With this
function, you can discover running IPSec VPN services on the network and then restore
the discovered services to the U2000 for unified management and monitoring.
 Service monitoring
By monitoring the status of managed services in real time, the performance management
module allows you to view the service status in the topology view. The performance
management module monitors the service status and performance indicators and displays
collected performance data in graphs or reports.
 Display of the service topology
This feature provides the function of visualizing the service topology. In the topology
view, you can view service alarms, service statuses, and service-related device alarms.
 Service audit
This feature supports to audit the differences of service configuration between the NMS
and device.

10.5.2 Remote Access Service


The U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2)
and L2TP over IPSec technologies. The remote access service is applicable to employees
accessing the enterprise intranet in remote dial-up mode over the Internet.
 Service deployment
The remote access service management supports the deployment of a single service and
the deployment of services in batches. In addition, you can view deployment results in

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 10-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
10 Security Device Network Feature Management Product Description

the service topology view. Remote access services include L2TP service, L2TP over
IPSec service and IPSec (IKEv2) service three types.
 Service monitoring
The L2TP service, L2TP over IPSec service and IPSec (IKEv2) service management can
manage and monitor the online users of remote access services. It also provides the
functions of displaying the statuses of online users in real time, restricting the number of
online users, and forcing users to log out.
 Display of the service topology
The remote access service management provides the function of visualizing the service
topology. In the topology view, you can view service alarms, service statuses, and
service-related device alarms.
 Service audit
The remote access service management supports to audit the differences of service
configuration between the NMS and device.
 Service resource management
The remote access service management provides the function of radius template
management and user domain management.

10-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 11 FTTx Network Feature Management

11 FTTx Network Feature Management

About This Chapter


This topic describes the functional features of FTTx NE management and network
management.
11.1 OLT Management
In the FTTx solution, the OLT is connected with high bandwidth across a long distance. It
works with the ONU to provide voice, data, and video services and meets the individualized
requirements of telecom users. NE configuration management provides GUIs for you to
configure NEs and maintain NE configurations. You can directly configure services on
devices through GUIs.
11.2 ONU Management
The ONU supports GPON, EPON, and GE in the upstream direction and provides different
access modes to meet different FTTx application scenarios. NE configuration management
provides GUIs for you to configure NEs and maintain NE configurations. You can directly
configure services on devices through GUIs.

11.1 OLT Management


In the FTTx solution, the OLT is connected with high bandwidth across a long distance. It
works with the ONU to provide voice, data, and video services and meets the individualized
requirements of telecom users. NE configuration management provides GUIs for you to
configure NEs and maintain NE configurations. You can directly configure services on
devices through GUIs.

Device Management
By using the U2000, you can manage device panels, shelves, cards, clock sources, and system
parameter profiles.

Network Interface Management


By using the U2000, you can perform the following operations:
 Manage and maintain TDM E1/T1 ports.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 11-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
11 FTTx Network Feature Management Product Description

 Manage and maintain CES E1/T1 ports.


 Manage and maintain STM-x/OC-x TDM ports.
 Manage Ethernet ports.

Connection Management
By using the U2000, you can manage service virtual ports and traffic profiles.

Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.

Layer 3 Management
By using the U2000, you can configure the DHCP relay and the ARP function and perform
MPLS management.

ACL&QoS
By using the U2000, you can manage ACLs, QoS, time segments, and HQoS.

User Security and System Security


By using the U2000, you can perform the following operations:
 Configure user access in PITP mode.
 Configure user access in DHCP option 82 mode.
 Configure user access control.
 Configure system security access.
 Manage BFD sessions.

Ethernet Connection Fault Management


By using the U2000, you can manage maintenance domains (MDs), maintenance associations
(MAs), and maintenance association end point (MEPs).

Protection Group Management


By using the U2000, you can manage PS protection groups and configure type B dual homing
protection, GPON type C protection, and EPON type D protection.

GPON Management
By using the U2000, you can manage GPON optical ports, ONTs, GEM ports, TDM private
line services, and GPON profiles.

EPON Management
By using the U2000, you can manage EPON optical ports, ONTs, CESoP connections, TDM
private line services, and EPON profiles.

11-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 11 FTTx Network Feature Management

Multicast Service Management


By using the U2000, you can perform basic configurations and manage programs, profiles,
and users.

Service Provisioning Profile


The U2000 supports E2E service provisioning profiles to improve the service provisioning
efficiency.

Alarm Root Cause Identification


By using the U2000, you can quickly determine the reason why the ONU is offline, and
distinguish whether the backbone or tributary optical fiber is faulty or the terminal is powered
off. This reduces the number of orders that require engineers to rectify faults on site.

Quick Service Cutover of PON Ports


When a PON port of an OLT is faulty, you can connect the optical fiber that is connected to
the faulty PON port to an idle PON port on the OLT, copy the configurations of the faulty
PON port to the idle PON port, and transfer the configurations of the MDUs that are
connected to the faulty PON port to the idle PON port. Then, the services restore quickly.

11.2 ONU Management


The ONU supports GPON, EPON, and GE in the upstream direction and provides different
access modes to meet different FTTx application scenarios. NE configuration management
provides GUIs for you to configure NEs and maintain NE configurations. You can directly
configure services on devices through GUIs.

Device Management
By using the U2000, you can manage device panels, shelves, cards, and system parameter
profiles.

Network Interface Management


By using the U2000, you can perform the following operations:
 Manage and maintain TDM E1/T1 ports.
 Manage and maintain CES E1/T1 ports.
 Manage GPON optical ports.
 Manage EPON optical ports.

Connection Management
By using the U2000, you can manage service virtual ports and traffic profiles.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 11-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
11 FTTx Network Feature Management Product Description

Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.

Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security


By using the U2000, you can perform the following operations:
 Configure user access in PITP mode.
 Configure user access in DHCP option 82 mode.
 Configure user access control.
 Configure system security access.
 Manage BFD sessions.

Ethernet Connection Fault Management


By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management


By using the U2000, you can manage PS protection groups and configure type B dual homing
protection, GPON type C protection, and EPON type D protection.

xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, and VDSL2 profiles and ports.

Ethernet Access Management


By using the U2000, you can manage Ethernet ports.

Multicast Service Management


By using the U2000, you can perform basic configurations and manage programs, profiles,
and users.

VoIP Service Management


By using the U2000, you can manage media gateways (MGs), signaling gateways, POTS
ports, and IP interfaces.

11-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 11 FTTx Network Feature Management

Layer 2 Topology Management of MDUs


In the topology view, an MDU is managed as a card in the remote shelf of an OLT node. You
can double-click the virtual ODN shelf to enter the Layer 2 topology view of the ODN and the
MDU. Then, you can add, delete, or modify the MDU and configure the services associated
with the MDU.

Sheet Pre-deployment
The U2000 provides the sheet pre-deployment solution. Therefore, you can bulk import
devices to the U2000 and implement the functions of software-commissioning-free and
remote acceptance. In addition, only one site visit is required and the plug and play (PnP)
feature is supported. These features greatly improve the deployment efficiency and reduce
network construction costs.

PnP and Quick Replacement


When an MDU is faulty, you need to quickly locate the fault and restore services. It is time
consuming to locate internal faults of an MDU and repair the MDU. Therefore, it is
recommended that you replace faulty MDUs directly and store and repair the faulty MDUs in
a centralized manner.

Remote Acceptance
In FTTx network construction, the U2000 supports remote acceptance of deployed ONUs to
implement one site visit and reduce operation and maintenance costs.

Automatic Bulk Upgrade


The U2000 provides the solution to automatic bulk upgrade of offline ONTs. By using the
U2000, you can perform the following operations:
 Bulk upgrade ONTs.
 Manage scheduled upgrade tasks.
 Upgrade offline ONTs.
 Enable the function of automatically upgrading ONTs when the ONTs are connected.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 11-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 12 MSAN Network Feature Management

12 MSAN Network Feature Management

About This Chapter


This topic describes the functions and features of msan device networks.
12.1 MSAN Management
The multi-service access node (MSAN) connects user telephone lines to the core network. It
also provides voice, ISDN, and broadband services on the same platform. NE configuration
management provides GUIs for you to configure NEs and maintain NE configurations. You
can directly configure services on devices through GUIs.

12.1 MSAN Management


The multi-service access node (MSAN) connects user telephone lines to the core network. It
also provides voice, ISDN, and broadband services on the same platform. NE configuration
management provides GUIs for you to configure NEs and maintain NE configurations. You
can directly configure services on devices through GUIs.

Device Management
By using the U2000, you can manage device panels, shelves, cards, clock sources, and system
parameter profiles.

Network Interface Management


By using the U2000, you can perform the following operations:
 Manage E1 ports and Ethernet ports.
 Configure and maintain E3/T3 ports.
 Manage and maintain STM-x/OC-x TDM ports
 Manage IMA groups and links.

Connection Management
By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP
connections.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 12-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
12 MSAN Network Feature Management Product Description

Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.

Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security


By using the U2000, you can perform the following operations:
 Configure user access in PITP mode.
 Configure user access in DHCP option 82 mode.
 Configure user access control.
 Configure system security access.
 Manage BFD sessions.

Ethernet Connection Fault Management


By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management


By using the U2000, you can manage PS protection groups and configure type B dual homing
protection, GPON type C protection, and EPON type D protection.

xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, and VDSL2 profiles and ports.

Multicast Service Management


By using the U2000, you can perform basic configurations and manage programs, profiles,
and users.

VoIP Service Management


By using the U2000, you can manage MGs, signaling gateways, POTS ports, and IP
interfaces.

V5 Voice Service Management


By using the U2000, you can manage V5 interfaces, service ports, SPCs, and VFB, ATI, CDI,
and party line services.

12-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 12 MSAN Network Feature Management

Narrowband Data Service Management


By using the U2000, you can manage MTA and HSL services and TDM SHDSL ports.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 12-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 13 DSLAM Network Feature Management

13 DSLAM Network Feature


Management

About This Chapter


This topic describes the functions and features of dslam device networks.
13.1 DSLAM Management
In the ATM-DSLAM or IP-DSLAM networking mode, the DSLAM provides the access to
various services such as ADSL, ADSL2+, SHDSL, and VDSL2. It also provides the
integrated services that feature large capacity, high rate, and high quality. NE configuration
management provides GUIs for you to configure NEs and maintain NE configurations. You
can directly configure services on devices through GUIs.

13.1 DSLAM Management


In the ATM-DSLAM or IP-DSLAM networking mode, the DSLAM provides the access to
various services such as ADSL, ADSL2+, SHDSL, and VDSL2. It also provides the
integrated services that feature large capacity, high rate, and high quality. NE configuration
management provides GUIs for you to configure NEs and maintain NE configurations. You
can directly configure services on devices through GUIs.

Device Management
By using the U2000, you can manage device panels, shelves, cards, and system parameter
profiles.

Network Interface Management


By using the U2000, you can perform the following operations:
 Manage E1 ports and Ethernet ports.
 Configure and maintain E3/T3 ports.
 Manage and maintain STM-x/OC-x TDM ports
 Manage IMA groups and links.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 13-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
13 DSLAM Network Feature Management Product Description

Connection Management
By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP
connections.

Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP and LACP.

Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security


By using the U2000, you can perform the following operations:
 Configure user access in PITP mode.
 Configure user access in DHCP option 82 mode.
 Configure user access control.
 Configure system security access.
 Manage BFD sessions.

Ethernet Connection Fault Management


By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management


By using the U2000, you can manage PS protection groups and configure type B dual homing
protection, GPON type C protection, and EPON type D protection.

xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, EFM SHDSL ports, and VDSL2 profiles and ports.

Multicast Service Management


By using the U2000, you can perform basic configurations and manage programs, profiles,
and users.

13-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 14 ONT Management

14 ONT Management

The U2000 supports the management of EPON terminals in the OAM mode and GPON
terminals in the OMCI mode. In this manner, the terminals are managed in a centralized
manner, which saves the maintenance workload.
To manage xPON terminals, the U2000 adopts two solutions, namely, SNMP+OMCI and
FTP+OMCI.
 The objects managed by the ONT L2 protocol and protocols at lower layers provision
multicast IPTV and data services by using the SNMP+OMCI solution.
 The VoIP services are provisioned through the FTP+OMCI solution. The N2000 BMS
generates a .xml configuration file and then uploads the file to the FTP server. The OLT
obtains the configuration file from the FTP server, loads it, and then sends it to the ONT
through the OMCI. Finally, the service configuration of the ONT is complete.
The U2000 supports the automatic batch upgrade of ONTs.
 Supports the batch upgrade of ONTs.
 Supports the scheduled task upgrade management.
 Supports the upgrade of offline ONTs, that is, automatic upgrade when the ONT is
connected.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 14-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 15 Reliability

15 Reliability

About This Chapter


In reliability design, measures are taken to reduce potential risks, so that the product can
operate in a safer manner.
15.1 Reliability Indicator
This topic describes the indicators of the reliability design.
15.2 HA System
The high availability (HA) system helps you improve the running reliability of the U2000
server.
15.3 DCN Protection
You can use a data communication network (DCN) to connect the U2000 to a standby
gateway NE (GNE). This improves the reliability of the communication connection between
the U2000 and equipment.
15.4 Disk Mirroring
The disk mirroring function helps you improve the reliability of disk data on the U2000
server.
15.5 Data Backup
The data backup function helps you improve the reliability of important U2000 data.

15.1 Reliability Indicator


This topic describes the indicators of the reliability design.
Table 15-1 lists the reliability indicators of the U2000.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 15-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
15 Reliability Product Description

Table 15-1 Reliability indicators of the U2000

Item Indicator Remarks


MTBF The average fault interval is HA system
larger than 6 months.
The fault is defined as database
crash.
MTTR The average fault recovery time HA system
is no more than 15 minutes.
The fault is defined as database
crash.
HA switching time ≤ 15 minutes 70% of the management
capacity
NMS start time ≤ 10 minutes 70% of the management
capacity
NMS shutdown time ≤ 10 minutes 70% of the management
capacity

15.2 HA System
The high availability (HA) system helps you improve the running reliability of the U2000
server.
The non-distributed U2000 server uses a 1+1 scheme. If the active site fails, the U2000 can be
switched to the standby site so that the U2000 application is not interrupted.

The U2000 supports distributed cluster. For better stability and risk resistance capability, the
distributed cluster uses a 1+1 scheme. If a slave server fails, the master server fails, the

15-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 15 Reliability

database is faulty, IP addresses conflict, or the key process fails to be switched, you can
switch the distributed cluster to the standby distributed cluster without interrupting the U2000.
The protection mechanism of an HA system has two aspects:
 Database synchronization and backup between the active and standby sites
 Switching the application program between the active and standby sites
The U2000 provides the following HA schemes:
 HA system (Veritas 1+1 hot standby): Applicable to remote hot standby of the
non-distributed system, featuring automatic switching.
 HA system (Veritas distributed hot standby): Applicable to remote hot standby of the
distributed system on SUSE Linux OS, featuring automatic switching.

15.3 DCN Protection


You can use a data communication network (DCN) to connect the U2000 to a standby
gateway NE (GNE). This improves the reliability of the communication connection between
the U2000 and equipment.
The communication between non-GNEs and the U2000 is forwarded by the GNE. In the
U2000, you can set the active GNE and standby GNE for NEs in advance. When the
communication between the active GNE and the U2000 is interrupted, the U2000
automatically switches to the standby GNE for communication, so that the communication
between the U2000 and NEs is not interrupted. When the communication between the U2000
and the active GNE recovers, the U2000 determines whether to use the active GNE again
according to the preset revertive mode.

15.4 Disk Mirroring


The disk mirroring function helps you improve the reliability of disk data on the U2000
server.
If the server is a Sun workstation with more than two hard disks, disk mirroring can be
installed together with the U2000. After you create disk mirroring, if the active disk fails, you
can use a command to switch the data to the standby disk, to restore the working data and
parameter settings before the active disk is damaged.

15.5 Data Backup


The data backup function helps you improve the reliability of important U2000 data.
The security of network data is a concern for users. The U2000 provides the following
solutions listed in Table 15-2.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 15-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
15 Reliability Product Description

Table 15-2 Data backup

Data to Be Backed Up Solution of the U2000 Operation Description


Alarm log, abnormal event Dump logs. Operate on the U2000 client.
log, performance log, For more details, see the
security, and operation log U2000 Online Help.
Configuration data Export them to script files,
adopting the MML
command format. The script
files can neglect the
structural differences among
databases of all the U2000
versions, and are suitable for
data backup in the case of
version upgrade. The script
files supported by the
U2000 consist of
networkwide configuration
files, NMS naming file, NE
configuration file, NE list
files, server computer
information files, service
implementation
configuration file,
network-layer information
files, and network
simulation and planning
information files.
Database Back up all data in the
U2000 database.
NE database Back up the NE data.

15-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 16 Performance Indicators

16 Performance Indicators

This topic describes the performance indicators of the U2000.

Table 16-1 Performance indicators

Item Subitem Indicator


Storage capacity Capacity of current alarms Default: 100,000 pieces
Maximum: 100,000 pieces
Capacity of history alarms Default: 2,000,000 pieces
Maximum: 2,000,000 pieces
Capacity of logs, including Default: 1,000,000 pieces
operation logs and system Maximum: 1,000,000 pieces
logs
Resources occupied CPU usage Normally, the CPU usage is
not greater than 10%.
Processing capability Response speed of alarm Normally, the time interval
handling from the time at which an
alarm is generated on the
equipment to the time at
which the alarm is displayed
on the U2000 is not more
than 10 seconds.
Response speed of Normally, in the case of
performance event handling 1,000 pieces of performance
data, the time interval from
the time at which they are
reported to the U2000 to the
time at which they are stored
in the database is
approximately 10 seconds.
Alarm handling capability Normally, 100 (not more
than 400 at most) pieces of
alarms can be handled per
second.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 16-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
16 Performance Indicators Product Description

Item Subitem Indicator


U2000 user management User Maximum: 500
User group Maximum: 50
Equipment set Maximum: 100
Function set Maximum: 255
HA switching time Switching between remote < 15 minutes
active and standby servers
Stability Mean time between failures The MTBF is more than six
(MTBF) months (a failure refers to
the situation where the
database quits
unexpectedly).
Mean time to recovery The MTTR is not more than
(MTTR) 15 minutes (a failure refers
to the situation where the
database quits
unexpectedly).
Management capability The number of managed Maximum: 15,000 physical
physical nodes nodes
The number of managed Maximum: 15,000
equivalent NEs equivalent NEs

Table 16-2 DCN bandwidth requirements

Item Bandwidth Requirements


Bandwidth required for the communication 2 Mbit/s
between the U2000 server and a U2000
client

16-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 16 Performance Indicators

Item Bandwidth Requirements


Bandwidth required for the communication A bandwidth of 2 Mbit/s may not meet the
between the N equivalent NEs and U2000 bandwidth requirements in the case of
server different networks. In this case, you can
determine the CIR or PIR by using the
following formula:
 CIR:
− N>56:
2048k+(N-56)*
0.5k
− N<=56:
2Mbit/s
 PIR:
− N>56:
2048k+(N-56)*
5k
− N<=56:
10Mbit/s
Bandwidth required for the communication 2 Mbit/s
between the OSS and U2000 server NOTE
A minimum of 2 Mbit/s is required.

Bandwidth required for the communication 2 Mbit/s


between the primary and secondary sites in NOTE
an HA system (Veritas) A minimum of 2 Mbit/s is required. A bandwidth
of 2 Mbit/s refers to the bandwidth that is
required when you do not synchronize all
performance data by using PMS. If you want to
synchronize the performance data, more
bandwidth is required.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 16-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

17 Management Capability

About This Chapter


Introduce the manageable equipment and the management capability of the U2000.
17.1 Management Capability
The management capability of the U2000, on the basis of satisfying the preceding
performance indexes, can be measured by the maximum number of NEs it manages.

17.1 Management Capability


The management capability of the U2000, on the basis of satisfying the preceding
performance indexes, can be measured by the maximum number of NEs it manages.
Currently, a set of U2000 can manage a maximum of 15,000 physical NEs, 20,000 equivalent
NEs and 100 clients. This conclusion is drawn after the tests under a certain environment and
objectively reflects the actual management capability of the U2000.
 Management capability: In this document, management capability refers to the capability
of the NMS to manage network resources, which are expressed in the number of
equivalent NEs.
 Equivalent NE: The functional features, cross-connect capacity, and number of
boards/ports/channels are specific to NEs of different types. As these NEs require
different resources of the NMS, the number of NEs that can be managed by the NMS
depends on the NE types. For easy description and calculation of the management
capability, the concept of equivalent NE is defined so that NEs of different types or a
number of ports can be converted to equivalent NEs by an uniform criteria according to
the system resources required by them. The system resources required by an equivalent
NE is equal to the resources for managing an STM-1 transport NE.
 Equivalent coefficient: The equivalent coefficient refers to the ratio of the resources used
by physical NEs or ports to the resources used by equivalent NEs. Equivalent coefficient
= (Resources used by physical NEs or ports)/(Resources used by equivalent NEs)
The management capability of the U2000 in a network that consists of different types of NEs
is affected by the following factors:
 The key technical specifications include the number of equivalent NEs, number of
clients, and number of physical NEs.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

 The management capability of the U2000 also depends on the hardware and varies with
the hardware configuration.
 The system limits the number of physical nodes. Hence, the number of physical nodes is
a restriction for the management capability.
 The management capability refers to the maximum number of equivalent NEs that can
be managed by the U2000 on certain hardware configuration conditions.
 If a client also runs on the computer where the server is running, the management
capability is reduced by 50%. Hence, it is recommended that you run the client and
server on different computers.
 Virtual NEs are not included in the management capability. A pre-configured NE is equal
to a real NE. One third-party NE is equal to one equivalent NE, and can only be
discovered instead of being managed. The equivalent coefficient of the OEM equipment
is calculated in the way similar to Huawei equipment.
Generally, the number of equivalent NEs that the U2000 can manage is calculated according
to the following rules:
 Number of equivalent NEs = <Number of equivalent NEs in the transport domain> +
<Number of equivalent NEs in the IP domain> + <Number of equivalent NEs in the
access domain>
 <Number of equivalent NEs in the transport domain> = (Number of transport NEs of
type_I x Equivalent coefficient + ... + (Number of transport NEs of type_n x Equivalent
coefficient)

For example, there are 5 OptiX OSN 9500 (equivalent coefficient: 10), 10 OptiX OSN 7500 (equivalent
coefficient: 6.5), and 100 OptiX OSN 3500 (equivalent coefficient: 4.5). Then, you can calculate the
number of equivalent NEs in the transport domain as follows:
Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 + 100 x 4.5 = 565
 <Number of equivalent NEs in the IP domain> = (Number of IP NEs of type_I x
Equivalent coefficient) + ... + (Number of IP NEs of type_n x Equivalent coefficient)

For example, there are 5 NE5000E (equivalent coefficient: 10), 200 S5300 (equivalent coefficient: 1.25),
and 1000 CX200 (equivalent coefficient: 0.625). Then, you can calculate the number of equivalent NEs
in the IP domain as follows:
Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925
 <Number of equivalent NEs in the access domain> = Number of FTTx OLT equivalent
NEs + Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs +
Number of DSLAM equivalent NEs + Number of equivalent NEs of other access
equipment

 Number of FTTx OLT equivalent NEs = (Number of ONTs x Equivalent coefficient) + (Number of
MDUs x Equivalent coefficient) + (Number of P2P ports x Equivalent coefficient)
 Number of FTTx MDU equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ...
+ (Number of ports of type n x Equivalent coefficient)
 Number of MSAN equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type n x Equivalent coefficient)
 Number of DSLAM equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type_n x Equivalent coefficient)
 Number of equivalent NEs of other access equipment = (Number of NEs of type_I x Equivalent
coefficient) + ... + (Number of NEs of type_n x Equivalent coefficient)
 The basic unit of an equivalent NE of the U2000 is OptiX Metro 1000.

17-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

 The comparison coefficient of an equivalent NE of the U2000 to the equivalent NE in


each domain is as follows:
− 1 equivalent NE in the transport domain = 1 equivalent NE of the U2000
− 4 equivalent nodes in the IP domain = 1 equivalent NE of the U2000
− 3.3 equivalent nodes in the access domain = 1 equivalent NE of the U2000
 The management scales of the U2000 are defined as follows:
− Small-scale network: less than 2,000 equivalent NEs of the U2000
− Medium-scale network: less than 6,000 equivalent NEs of the U2000
− Large-scale network: less than 15,000 equivalent NEs of the U2000
− Extra-large-scale network: less than 20000 equivalent NEs of the U2000
 Conversion between monitored instances to equivalent nodes:
Monitored instances are converted into physical equivalent nodes as follows: 2
monitored instances = 1 equivalent NE of the U2000
 Conversion between service resources to equivalent NEs.
Service resource management needs to be converted into a certain number of equivalent
nodes. The formulas for calculating the equivalent nodes are as follows:
− For 1-20,000 service resource licenses, Equivalent nodes of services = Total
equivalent nodes x 20%
− For 20,001-60,000 service resource licenses, Equivalent nodes of services = Total
equivalent nodes x 25%
− For 60,001-100,000 service resource licenses, Equivalent nodes of services = Total
equivalent nodes x 30%
The management capability of the U2000 varies with hardware platforms, as shown in Table
17-1.

Table 17-1 Management capabilities of the U2000 on different hardware platforms

Server Short Name of Management Number Support


Computer Capability of Unified
Clients Network
Management

Mainstream Server to Be Delivered with the U2000 V100R002C00

Sun T5220-4C*1.2G-16G 2000 32 No


Server

T5220-8C*1.4G-32G 6000 64 Yes

M4000-4P*2.53G-32G 15000 100 Yes


Array: 6*146G Array

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

Server Short Name of Management Number Support


Computer Capability of Unified
Clients Network
Management

PC HP 2000 32 Yes
Server DL380G6-2P*2.0G-8G

HP 6000 64 Yes
DL580G5-4P*2.13G-16G

Compatible Server (Reuse)


SUN M4000-2P*2.15G-16G 6000 64 No
Server

SUN V890-4P*1.5G-16G 3000 48 No

SUN V890-2P*1.5G-8G 1500 32 No

SUN 1500 32 No
V445-4P*1.6GHz-8G

SUN 5000 80 Yes


E2900-8P*1.5GHz-32G

SUN 5000 100 Yes


E2900-12P*1.5GHz-48G

Fujitsu PW650-4P*1.8GHz-16G 2000 48 No


Server
PW650-2P*1.8GHz-8G 1500 32 No

PC IBM X3650-2P*2.0G-8G 2000 32 No


Server
IBM 6000 64 No
X3850M2-4P*2.13G-16G

Compatible Server for the Single-Domain Upgrade


The servers are applicable to only the single-domain upgrade instead of the
cross-domain management in centralized manner. For example, if the T2000 is
installed on SUN V490, the T2000 can be directly upgraded to the U2000, but the
U2000 cannot have the management functions of the IP and access domains in this
case.

17-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Server Short Name of Management Number Support


Computer Capability of Unified
Clients Network
Management

SUN SUN 600 16 No


Server Netra240-2P*1.5GHz-2G SUN Netra240
does not
support the
management
of PTN
devices. If
T2000 is
installed on
Netra240,
after upgraded
to the U2000,
the U2000
cannot have
the
management
functions of
the PTN
devices. If
must to
manage the
PTN devices,
the Netra240
must be
changed.
SUN 800 24 No
V490-2P*1.6GHz-4G

SUN 800 24 No
V440-2P*1.6GHz-4G

SUN 600 16 No
V240-2P*1.5GHz-4G

SUN 600 16 No
V245-2P*1.5GHz-4G

PC IBM X3500-2P*2.0G-4G 2000 64 No


Server
IBM X3200-1P*2.4G-2G 600 14 No

HP ML350-2P*2.0G-4G 2000 64 No

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

Server Short Name of Management Number Support


Computer Capability of Unified
Clients Network
Management

HP ML110-1P*2.4G-2G 600 24 No

HP ML570-4P*2.0G-4G 2000 48 No

DELL 2000 48 No
R900-4P*2.13G-4G

DELL 2000 48 No
PE6800-4P*2.0G-4G

DELL 1500 32 No
PE2900-2P*2.0G-4G

DELL 600 24 No
PE840-1P*2.4G-2G

HP 6000 64 No
DL380G5-2P*2.0G-8G

HP 10000 100 No
DL580G5-4P*2.13G-16G

IBM X3650-2P*2.0G-8G 6000 64 No

IBM 10000 100 No


X3850M2-4P*2.13G-16G

Maximum number of physical NEs managed by U2000 as follows:


 Maximum number of physical NEs: 15000
 Maximum number of SDH paths: 300000
 Maximum number of WDM paths: 50000

The management capability of the U2000 varies with OptiX NE equivalents, as shown in
Table 17-2.

17-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents

NE Series NE Type Equivalent Coefficient


for the U2000

OSN series OptiX OSN 500 1


OptiX OSN 1500 3.5 (With ASON)
2.5 (Without ASON)
OptiX OSN 2000 2
OptiX OSN 2500 4.5 (With ASON)
3.5 (Without ASON)
OptiX OSN 2500 REG 1.5
OptiX OSN 3500 6.5 (With ASON)
4.5 (Without ASON)
OptiX OSN 7500 10 (With ASON)
6.5 (Without ASON)
OptiX OSN 9500 15 (With ASON)
10 (Without ASON)
MSTP series OptiX Metro 100 0.5
OptiX Metro 200 0.5
OptiX Metro 500 1
OptiX 155/622H (Metro 1
1000)
OptiX Metro 1000V3 1
OptiX Metro 1050 1.5
OptiX Metro 1100 1.5
OptiX 155/622 (Metro 2
2050)
OptiX 2500+(Metro 3000) 3
OptiX Metro 3100 3
OptiX 10G (Metro 5000) 4
SDH series OptiX 155C 1
OptiX 155S 1
OptiX 155/622B_I 2
OptiX 155/622B_II 2
OptiX 2500 3

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

NE Series NE Type Equivalent Coefficient


for the U2000

Metro WDM series OptiX Metro 6020 1


OptiX Metro 6040 1
OptiX Metro 6040V2 1
OptiX Metro 6100 1.5
OptiX Metro 6100V1 1.5
OptiX Metro 6100V1E 1.5
OptiX OSN 900A 1
LH WDM series OptiX BWS OAS, OptiX 1.5
BWS OCS, OptiX BWS
OIS
OptiX BWS 320GV3 1.5
OptiX BWS 1600G, OptiX 1.5+1.5*N (N refers to the
BWS 1600G OLA number of slave shelves)
OptiX OTU40000 1
Marine series OptiX BWS 1600S 1.5
OptiX PFE 1670 1
OptiX SLM 1630 1
NG WDM series OptiX OSN 1800 1
OptiX OSN 3800 3.5 (With ASON)
1.5 (Without ASON)
OptiX OSN 6800 4+4*N (With ASON)
2+2*N (Without ASON)
N refers to the number of
slave shelves
OptiX OSN 8800 I 10+10*N (With ASON)
6+6*N (Without ASON)
N refers to the number of
slave shelves
OptiX OSN 8800 II 16+16*N (With ASON)
12+12*N (Without ASON)
N refers to the number of
slave shelves
NA WDM series OptiX BWS 1600A 1.5
OptiX BWS 1600(NA) 1.5

17-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

NE Series NE Type Equivalent Coefficient


for the U2000

OptiX OSN 1800(NA) 1


OptiX OSN 3800A 3.5 (With ASON)
1.5 (Without ASON)
OptiX OSN 6800A 4+4*N (With ASON)
2+2*N (Without ASON)
N refers to the number of
slave shelves
OptiX OSN 8800 I(NA) 10+10*N (With ASON)
6+6*N (Without ASON)
N refers to the number of
slave shelves
OptiX OSN 8800 II(NA) 16+16*N (With ASON)
12+12*N (Without ASON)
N refers to the number of
slave shelves
RTN series OptiX RTN 605 0.4
OptiX RTN 610 0.4
OptiX RTN 620 0.5
OptiX RTN 910 0.5
OptiX RTN 950 1
OptiX RTN 5000S 1

The management capability of the U2000 varies with IP NE equivalents, as shown in Table
17-3.

Table 17-3 Management capabilities of the U2000 on different IP NE equivalents

NE Series NE Type Equivalent Coefficient


for the U2000

Router NE05/NE08(E)/NE16(E) 0.75


NE20/NE20E 1.25
NE40/NE80 5
NE40E/NE80E 10
NE5000E 10*N (N: number of
chassis)
R-series router 1

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

NE Series NE Type Equivalent Coefficient


for the U2000

AR-series router 0.25


Security equipment for load SSP 10
balancing and blocking
NSE 10
Switch S2000 series 0.125
S2300 series 0.625
S3000 series 0.125
S3300 series 0.75
S5000 series 0.25
S5300 series 1.25
S6500 series 0.75
S7800 series 1.25
S8016 series 1.25
S8500 series 1.25
S9300 series 2.5
PTN series OptiX PTN 1900 2.5
OptiX PTN 3900 4.5
OptiX PTN 912 0.5
OptiX PTN 910 0.5
OptiX PTN 950 1
MAN service platform CX200 series 0.625
CX300 series 1.25
CX600 series 5
Firewall Eudomen 300/500/1000 0.5
Eudomen 200E series 0.25
Eudomen 1000E series 0.75
Eudomen 8040 3
Eudomen 8080 6
Eudomen 8080E 4
Eudomen 8160E 8
USG USG9110 4

17-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

NE Series NE Type Equivalent Coefficient


for the U2000

USG9120 2
USG9210 3
USG9220 6
USG9310 4
USG9320 8
USG5000 series 0.75
USG3030 0.25
USG3040 0.25
USG2100 series 0.25
USG2200 series 0.25
USG50 0.25
SRG SRG1200 0.25
SRG20-10 0.25
SRG20-11 0.25
SRG20-12 0.25
SRG20-15 0.25
SRG20-20 0.25
SRG20-21 0.25
SRG20-30 0.25
SRG20-31 0.25
SRG20-31-D 0.25
SIG SIG9810 4
SIG9820 8
SIG9800 Server 0.25
SVN SVN3000 0.25
Broadband access MA5200E/F series 1.5
MA5200G series 10
ME60 series 10
Voice gateway VG1040/1041 series 0.25
WLAN AP AP 0.25

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-11


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

The management capability of the U2000 varies with access NE equivalents, as shown in
Table 17-4.

Table 17-4 Management capabilities of the U2000 on different access NE equivalents

Class Type Equivalent Coefficient


for the U2000
FTTx OLT (calculation ONT 1/64
based on the managed ONT,
MDU, and P2P resources in MDU 1/32
the case of OLT)
P2P port 1/64
FTTx MDU (calculation xDSL port 1/128
based on the managed user
ports in the case of MDU) E1 port 1/128
ETH port 1/128
PSTN/ISDN/HSL port 1/160
MSAN (calculation based xDSL port 1/128
on the number of managed
ports) E1 port 1/128
ETH port 1/128
PSTN/ISDN/HSL port 1/160
DSLAM (calculation based xDSL port 1/128
on the number of managed
ports) E1 port 1/128
ETH port 1/128
Other NEs (calculation MD5500 1.5
based on the NE types)
8850 18
8825 18
8750 18
MA5200V1R2/R9 3

17.2 Manageable MSTP Series Equipment


Manageable MSTP series equipment is listed as follows:

17-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Table 17-5 Manageable MSTP series equipment

Category Equipment Description


SDH series OptiX 155C OptiX 155C SDH transmission unit for
the access network
OptiX 155S OptiX 155S simplified STM-1 optical
transmission system
OptiX 1556/622B_I OptiX 155/622B STM-1/STM-4
OptiX 1556/622B_II compatible optical transmission system
(19-inch rack)
OptiX 2500 OptiX 2500 STM-4/STM-16
compatible optical transmission system
OptiX 2500 REG OptiX 2500 REG STM-16 regenerator
MSTP series OptiX Metro 100 OptiX Metro 100 terminal STM-1
optical transmission system
OptiX Metro 200 OptiX Metro 200 ultra compact STM-1
optical transmission system
OptiX Metro 500 OptiX Metro 500 ultra compact STM-1
multi-service transmission system
OptiX 155/622H (Metro OptiX 155/622H(Metro1000)
1000) STM-1/STM-4 MSTP
OptiX Metro 1000 OptiX 155/622H(Metro1000)
STM-1/STM-4 MSTP optical
transmission system V3 series
OptiX Metro 1050 OptiX Metro 1050 compact
STM-1/STM-4 multi-service optical
transmission system
OptiX Metro 1100 OptiX Metro 1100 compact container
STM-16 multi-service transmission
system
OptiX 155/622 (Metro OptiX 155/622(Metro2050)
2050) STM-1/STM-4 compatible optical
transmission system
OptiX 2500+ (Metro OptiX 2500+(Metro3000) STM-16
3000) MADM/MSTP optical transmission
system
OptiX Metro 3100 OptiX Metro 3100 STM-16
multi-service transmission system
OptiX 10G (Metro 5000) OptiX 10G(Metro5000)STM-64
MADM optical transmission system
OSN series OptiX OSN 500 OptiX OSN 500 STM-1/STM-4
multi-service CPE optical transmission
system

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-13


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

Category Equipment Description


OptiX OSN 1500 OptiX OSN 1500 intelligent optical
transmission system
OptiX OSN 2000 OptiX OSN 2000 enhanced
STM-1/STM-4 multi-service optical
transmission system
OptiX OSN 2500 OptiX OSN 2500 intelligent optical
transmission system
OptiX OSN 2500 REG OptiX OSN 2500 REG STM-16
regenerator
OptiX OSN 3500 OptiX OSN 3500 intelligent optical
OptiX OSN 3500 II transmission system

OptiX OSN 7500 OptiX OSN 7500 intelligent optical


switching system
OptiX OSN 9500 OptiX OSN 9500 intelligent optical
switching system

17.3 Manageable WDM Series Equipment


Manageable WDM series equipment is listed as follows:

Table 17-6 Manageable WDM equipment

Category Equipment Description

Metro WDM series OptiX Metro 6020 OptiX Metro 6020 compact
container CWDM system
V100R001
OptiX Metro 6040 OptiX Metro 6040 compact
container WDM system
V100R001
OptiX Metro 6040 V2 OptiX Metro 6040 compact
container DWDM system
V200R001 or higher
OptiX Metro 6100 OptiX Metro 6100 DWDM
multi-service transmission
system V100R002
OptiX Metro 6100V1 OptiX Metro 6100 DWDM
multi-service transmission
system V100R003

17-14 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Category Equipment Description


OptiX Metro 6100 V1E OptiX Metro 6100 WDM
multi-service transmission
system V100R004 or higher
OptiX OSN 900A OptiX OSN 900A compact
WDM system (A Type)
LH WDM series OptiX BWS 320G OptiX BWS 320G backbone
DWDM optical transmission
system V300R002
OptiX BWS 320G V3 OptiX BWS 320G backbone
DWDM optical transmission
system V300R004
OptiX BWS 1600G, OptiX OptiX BWS 1600G
BWS 1600G OLA backbone DWDM optical
transmission system
V100R003 or higher
OptiX OTU40000 OptiX OTU 40000
backbone DWDM optical
transmission system
NG WDM series OptiX OSN 1800 OptiX OSN 1800 compact
multi-service edge optical
transport platform
OptiX OSN 3800 OptiX OSN 3800 compact
intelligent optical transport
platform
OptiX OSN 6800 OptiX OSN 6800 intelligent
optical transport platform
OptiX OSN 8800/8800 II OptiX OSN 8800 I/ 8800 II
intelligent optical transport
platform

The OptiX BWS 1600G OLA is an independent power supply subrack. It is supported by the OptiX
BWS 1600G backbone DWDM optical transmission system V100R004 and higher versions.

17.4 Manageable NA WDM Series Equipment


Manageable NA WDM series equipment is listed as follows:

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-15


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

Table 17-7 Manageable NA WDM series equipment

Category Equipment Description


LH WDM series OptiX BWS 1600A OptiX BWS 1600A WDM
Optical Transmission
System
OptiX BWS 1600G(NA) OptiX BWS 1600G(NA)
Backbone DWDM Optical
Transmission System
NG WDM series OptiX OSN 1800(NA) OptiX OSN 1800(NA)
compact intelligent optical
transport platform
OptiX OSN 3800A compact OptiX OSN 3800A
intelligent optical transport
platform
OptiX OSN 6800A OptiX OSN 6800A
intelligent optical transport
platform
OptiX OSN 8800 I/II(NA) OptiX OSN 8800 I/II(NA)
intelligent optical transport
platform

17.5 Manageable Marine Series Equipment


Manageable marine series equipment is listed as follows:

Table 17-8 Manageable marine series equipment

Category Equipment Description


Submarine line series OptiX SLM 1630 OptiX SLM 1630 submarine
line monitor
OptiX PFE 1670 OptiX PFE 1670 Power
Feeding Equipment
OptiX BWS 1600S OptiX BWS 1600S
submarine line terminal
equipment

17.6 Manageable RTN Series Equipment


Manageable RTN series equipment is listed as follows:

17-16 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Table 17-9 Manageable RTN equipment

Category Equipment Description


RTN series OptiX RTN 605 OptiX RTN 605 radio
transmission system
OptiX RTN 610 OptiX RTN 610 radio
transmission system
OptiX RTN 620 OptiX RTN 620 radio
transmission system
OptiX RTN 910 OptiX RTN 910 radio
transmission system
OptiX RTN 950 OptiX RTN 950 radio
transmission system
OptiX RTN 5000S OptiX RTN 5000S radio
transmission system

17.7 Manageable PTN Series Equipment


Manageable PTN series equipment is listed as follows:

Table 17-10 Manageable PTN series equipment

Category Equipment Description


PTN series OptiX PTN 1900 OptiX PTN 1900 optical
network PTN series
multi-service packet
transmission platform
OptiX PTN 3900 OptiX PTN 3900 optical
network PTN series
multi-service packet
transmission platform
OptiX PTN 912 OptiX PTN 912 optical
network PTN series
multi-service packet
transmission platform
OptiX PTN 910 OptiX PTN 910 optical
network PTN series
multi-service packet
transmission platform
OptiX PTN 950 OptiX PTN 950 optical
network PTN series
multi-service packet
transmission platform

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-17


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

17.8 Manageable FTTx Series Equipment


Manageable FTTx series equipment are listed as follows:

Table 17-11 Manageable FTTx series equipment

Category Equipment Description


OLT series MA5600T SmartAX MA5600T Multi-service
Access Module
MA5603T SmartAX MA5603T Optical Access
Equipment
MA5680T SmartAX MA5680T Optical Access
Equipment
MA5683T SmartAX MA5683T Optical Access
Equipment
MA5606T SmartAX MA5606T Optical Access
Equipment, Only the version of
V800R105 support.
ONU series MA5606T SmartAX MA5606T Optical Access
Equipment
MA5620 SmartAX MA5620 Multiple Dwelling
Unit
MA5626 SmartAX MA5626 Multiple Dwelling
Unit
MA5620E SmartAX MA5620E EPON Multiple
Dwelling Unit
MA5626E SmartAX MA5626E EPON Multiple
Dwelling Unit
MA5620G SmartAX MA5620G GPON Multiple
Dwelling Unit
MA5626G SmartAX MA5626G GPON Multiple
Dwelling Unit
MA5610 SmartAX MA5610 Multi-service Access
Module
MA5612 SmartAX MA5612 Multi-service Access
Module
MA5616 SmartAX MA5616 Multi-service Access
Module

17-18 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Category Equipment Description


MA5651 SmartAX MA5651 Multiple Dwelling
Unit
MA5651G SmartAX MA5651G Multiple Dwelling
Unit
MA5652G SmartAX MA5652G GPON Multiple
Dwelling Unit
MA5635 SmartAX MA5635 Multi-service Access
Module
ATN930 ATN930 FMC Multi-service Access Unit
SRG2220 SRG2220 Service Router Gateway

17.9 Manageable MSAN Series Equipment


Manageable MSAN series equipment are listed as follows:

Table 17-12 Manageable MSAN series equipment

Category Equipment Description


UA5000 series UA5000 UA5000 Universal Access Unit
UA5000(PVU) UA5000 Universal Access Unit
UA5000(IPMB) UA5000 Universal Access Unit
UA5000(PVMV1) UA5000 Universal Access Unit
MD5500 series MD5500 MD5500 Multi-service
Distribution Module

17.10 Manageable DSLAM Series Equipment


Manageable DSLAM series equipment are listed as follows:

Table 17-13 Manageable DSLAM series equipment

Category Equipment Description


MA5100 series MA5100V1 SmartAX MA5100 Multi-service
MA5100V2 Access Module

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-19


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

Category Equipment Description


MA5105 series MA5105 SmartAX MA5105 Multi-service
Access Module
MA5605 series MA5605 SmartAX MA5605 Multi-service
Access Module
MA5615 series MA5615 SmartAX MA5615 Broadband
Access System
MA5300 series MA5300 SmartAX MA5300 Broadband
Access System
MA5600 series MA5600V3 SmartAX MA5600 Multi-service
Access Module
MA5600V8 series MA5600T SmartAX MA5600T
Multi-service Access Module
MA5603T SmartAX MA5603T
Multi-service Access Module
MA5606T SmartAX MA5606T
Multi-service Access Module

17.11 Manageable Router Series Equipment


Manageable router series equipment are listed as follows:

Table 17-14 Manageable router series equipment

Category Device Description


NE series routers NE05 Net engine 05 router
NE08 Net engine 08 router
NE16 Net engine 16 router
NE08E Net engine 08E router
NE16E Net engine 16E router
NE20 Net engine 20 router
NE20E Net engine 20E router
NE40 Net engine 40 universal switching router
NE80 Net engine 80 universal switching router
NE40E/NE80E Net engine 40E/80E core router
NE5000E Net engine 5000E core router

17-20 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Category Device Description


R/AR series routers R series routers R series routers
AR18 Advanced router 18 serials router
AR28 Advanced router 28 serials router
AR46 Advanced router 46 serials router
AR19 Advanced router 19 serials router
AR29 Advanced router 29 serials router
AR49 Advanced router 49 serials router

17.12 Manageable Switch Series Equipment


Manageable switch series equipment are listed as follows:

Table 17-15 Manageable switch series equipment

Category Device Description


S8500 series switches S8505 Quidway S8505 routing switch
S8505E Quidway S8505E routing switch
S8508 Quidway S8508 Lanswitch
S8512 Quidway S8512 routing switch
S6500 series switches S6502 Quidway S6502 Lanswitch
S6503 Quidway S6502 Ethernet switch
S6506R Quidway S6506R Ethernet
switch
S6506 Quidway S6506 Ethernet switch
S5000 series switches S5000 series switches Quidway S5000 Lanswitch
S5500 series switches Quidway S5500 Lanswitch
S5600 series switches Quidway S5600 Lanswitch
S3000 series switches S3000 series switches Quidway S3000 Lanswitch
S3500 series switches Quidway S3500 Lanswitch
S3900 series switches Quidway S3900 Lanswitch
S2000 series switches S2000 series switches Quidway S2000 Lanswitch
S2400 series switches Quidway S2400 Lanswitch

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-21


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

Category Device Description


box series switches S2300 series switches Quidway S2300 Ethernet switch
S3300 series switches Quidway S3300 Lanswitch
S5300 series switches Quidway S5300 Lanswitch
frame series switches S9300 series switches Quidway S9300 Lanswitch

17.13 Manageable Metro Service Platform Equipment


Manageable Metro service platform equipment are listed as follows:

Table 17-16 Manageable Metro service platform equipment

Category Device Description


CX series devices CX200 Quidway carrier switch platform 200
CX200C Quidway carrier switch platform 200C
CX200D Quidway carrier switch platform
200D
CX300 Quidway carrier switch platform 300
CX380 Quidway carrier switch platform 380
CX600 Quidway carrier switch platform 600

17.14 Manageable Broadband Access Series Equipment


Manageable broadband access series equipment are listed as follows:

Table 17-17 Manageable broadband access series equipment

Category Device Description


Multi-service MA5200E Multiservice access 5200E service gateway
gateways
MA5200F Multiservice access 5200F service gateway
MA5200G Multiservice access 5200G service gateway
ME60 series Multiservice engine 60 serials service gateway

17-22 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

17.15 Manageable VoIP Gateway Equipment


Manageable VoIP gateway equipment are listed as follows:

Table 17-18 Manageable VoIP gateway equipment

Category Device Description

VoIP Gateway VG10 VoIP gateways 10


VG20 VoIP gateways 20
VG80 VoIP gateways 80
XE series

17.16 Manageable WLAN Series equipment


Manageable WLAN Series equipment are listed as follows:

Table 17-19 Manageable WLAN series equipment

Category Device Description


WLAN WA10 AP WLAN 10
WA12 AP WLAN 12

17.17 Manageable Firewall Series Equipment


Manageable firewall series equipment are listed as follows:

Table 17-20 Manageable firewall series equipment

Category Device Description

Eudemon Eudemon 8040 Eudemon 8000 series Firewall


Eudemon 8080 Eudemon 8000 series Firewall
Eudemon 1000 Eudemon 1000 series Firewall
Eudemon 500 Eudemon 500 series Firewall
Eudemon 300 Eudemon 300 series Firewall
Eudemon 8080E Eudemon 8000E series Firewall
Eudemon 8160E Eudemon 8000E series Firewall

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-23


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

Category Device Description


Eudemon 1000E-U2 Eudemon 1000E series Firewall
Eudemon 1000E-U3 Eudemon 1000E series Firewall
Eudemon 1000E-U5 Eudemon 1000E series Firewall
Eudemon 1000E-U6 Eudemon 1000E series Firewall
Eudemon 200E_B Eudemon 200E series Firewall
Eudemon 200E_C Eudemon 200E series Firewall
Eudemon 200E_F Eudemon 200E series Firewall
Eudemon 200S Eudemon 200S series Firewall
Eudemon 100E Eudemon 100E series Firewall
Eudemon 6080E Eudemon 6000E series Firewall
USG USG9210 USG9210 Unified Security Gateway
USG9220 USG9220 Unified Security Gateway
USG9310 USG9310 Unified Security Gateway
USG9320 USG9320 Unified Security Gateway
USG5320 USG5320 Unified Security Gateway
USG5330 USG5330 Unified Security Gateway
USG5350 USG5350 Unified Security Gateway
USG5360 USG5360 Unified Security Gateway
USG3030 USG3030 Unified Security Gateway
USG3040 USG3040 Unified Security Gateway
USG2130 USG2130 Unified Security Gateway
USG2130W USG2100 Unified Security Gateway
USG2130P USG2100 Unified Security Gateway
USG2130WP USG2100 Unified Security Gateway
USG2130BSR USG2100 Unified Security Gateway
USG2130BSR-W USG2100 Unified Security Gateway
USG2130HSR USG2100 Unified Security Gateway
USG2130HSR-W USG2100 Unified Security Gateway
USG2130HSR-P USG2100 Unified Security Gateway
USG2130HSR-WP USG2100 Unified Security Gateway
USG2120BSR USG2100 Unified Security Gateway

17-24 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Category Device Description


USG2110 USG2110 Unified Security Gateway
USG2160 USG2100 Unified Security Gateway
USG2160W USG2100 Unified Security Gateway
USG2160P USG2100 Unified Security Gateway
USG2160WP USG2100 Unified Security Gateway
USG2160BSR USG2100 Unified Security Gateway
USG2160BSR-W USG2100 Unified Security Gateway
USG2160HSR USG2100 Unified Security Gateway
USG2160HSR-W USG2100 Unified Security Gateway
USG2160HSR-P USG2100 Unified Security Gateway
USG2160HSR-WP USG2100 Unified Security Gateway
USG5120 USG5100 Unified Security Gateway
USG5120-D USG5100 Unified Security Gateway
USG5120BSR USG5100 Unified Security Gateway
USG5120BSR-D USG5100 Unified Security Gateway
USG5120HSR USG5100 Unified Security Gateway
USG5150 USG5100 Unified Security Gateway
USG5150BSR USG5100 Unified Security Gateway
USG5150HSR USG5100 Unified Security Gateway
USG2210 USG2210 Unified Security Gateway
USG2220 USG2220 Unified Security Gateway
USG2230 USG2230 Unified Security Gateway
USG2250 USG2250 Unified Security Gateway
USG50 USG50 Unified Security Gateway
USG9110 USG9110 Unified Security Gateway
USG9120 USG9120 Unified Security Gateway
SRG SRG1210-S SRG1200 Secure Routing Gateway
SRG1210 SRG1200 Secure Routing Gateway
SRG1210W SRG1200 Secure Routing Gateway
SRG1210P SRG1200 Secure Routing Gateway
SRG1210WP SRG1200 Secure Routing Gateway

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-25


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
17 Management Capability Product Description

Category Device Description


SRG1220 SRG1200 Secure Routing Gateway
SRG1220W SRG1200 Secure Routing Gateway
SRG1220P SRG1200 Secure Routing Gateway
SRG1220WP SRG1200 Secure Routing Gateway
SRG20-11 SRG20 Secure Routing Gateway
SRG20-12 SRG20 Secure Routing Gateway
SRG20-15 SRG20 Secure Routing Gateway
SRG20-20 SRG20 Secure Routing Gateway
SRG20-21 SRG20 Secure Routing Gateway
SRG20-30 SRG20 Secure Routing Gateway
SRG20-31 SRG20 Secure Routing Gateway
SRG20-31-D SRG20 Secure Routing Gateway
SRG3230 SRG3200 Secure Routing Gateway
SRG3230-D SRG3200 Secure Routing Gateway
SRG3240 SRG3200 Secure Routing Gateway
SRG3240-D SRG3200 Secure Routing Gateway
SRG3250 SRG3200 Secure Routing Gateway
SRG3260 SRG3200 Secure Routing Gateway
EGW EGW2130 EGW2100 series Enterprise Gateway
EGW2160 EGW2100 series Enterprise Gateway

17.18 Manageable Service Inspection Gateway Equipment


Manageable service inspection gateway equipment are listed as follows:

Table 17-21 Manageable service inspection gateway equipment

Category Device Description


SIG SIG9810 SIG9810 Service Inspection
Gateway
SIG9820 SIG9810 Service Inspection
Gateway

17-26 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 17 Management Capability

Category Device Description


SIG9800 Server SIG9800 Server Service
Inspection Gateway Server

17.19 Manageable SVN Series Equipment


Manageable SVN series equipment are listed as follows:

Table 17-22 Manageable SVN series equipment

Category Device Description


SVN SVN3000 SVN3000

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 17-27


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 18 Standards Compliance

18 Standards Compliance

This topic describes the standards that the U2000 is compliant with.
The U2000 is developed according to the network management system model that the ITU-T
TMN series standards define. The information model is constructed based on the
object-oriented concept. Complying with multiple standards, the U2000 has good
expandability and reusability. The U2000 complies with the following international standards
and protocols:
 RFC 793 Telnet/TCP/IP standards
 RFC 1155, RFC 1157, RFC 1212, RFC 1213 and RFC 1215 SNMP V1 series standards
 RFC 1905, RFC 1906, RFC 1907, RFC 1908, RFC 2011, RFC 2012, RFC 2013, RFC
2571, RFC 2572, RFC 2573, RFC 2574, RFC 2576, RFC 2578, RFC 2579, and RFC
2580 SNMP V2 series standards
 RFC 3411, RFC 3412, RFC 3413, RFC 3414, RFC 3415, RFC 3416, RFC 3417, and
RFC 3418 SNMP V3 series standards
 RFC 3164 Syslog standards
 ISO 8824 and ISO 8825 ASN.1 standards
 ITU-T standards for managing the telecommunications management network: M.3000,
M.3010, M.3020, M.3100, and M.3400 (without accounting)
 HTTP and JAVA interface protocols and standards
 W3C SOAP 1.1/WSDL
 TL1 (Telcordia GR-811, GR-831, etc.)
 The XML service delivery and inventory query are based on the MTOSI standards as
follows: TMF 517, TMF 608, and TMF 854
 CORBA 2.5 protocol
 ISO 8824 and ISO 8825 ASN.1 standards
 The CORBA alarm northbound interface complies with the MTNM standards as
follows: TMF 513, TMF 608, and TMF 814
Table 18-1 lists the details of the standards and protocols.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 18-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
18 Standards Compliance Product Description

Table 18-1 Details of the Standards and Protocols

Standards
and
Protocols Description
RFC 793 Transmission Control Protocol (Darpa Internet Program Protocol
Specification)
RFC 1155 Structure and Identification of Management Information for TCP/IP-based
Internets
RFC 1212 Concise MIB Definitions
RFC 1213 Management Information Base for Network Management of TCP/IP-based
Internets: MIB-II
RFC 1215 A Convention for Defining Traps for use with the SNMP
RFC 1905 Protocol Operations for Version 2 of the Simple Network Management
Protocol
RFC 1906 Transport Mappings for Version 2 of the Simple Network Management
Protocol
RFC 1907 Management Information Base for Version 2 of the Simple Network
Management Protocol
RFC 1908 Coexistence between Version 1 and Version 2 of the Internet-standard
Network Management Framework
RFC 2011 SNMPv2 Management Information Base for the Internet Protocol using
SMIv2
RFC 2012 SNMPv2 Management Information Base for the Transmission Control
Protocol using SMIv2
RFC 2013 SNMPv2 Management Information Base for the User Datagram Protocol
using SMIv2
RFC 2571 An Architecture for Describing SNMP Management Frameworks
RFC 2572 Message Processing and Dispatching for the Simple Network Management
Protocol
RFC 2573 SNMP Applications
RFC 2574 User-based Security Model (USM) for version 3 of the Simple Network
Management Protocol
RFC 2576 Coexistence between Version 1, Version 2, and Version 3 of the
Internet-standard Network Management Framework
RFC 2578 Structure of Management Information Version 2 (SMIv2)
RFC 2579 Textual Conventions for SMIv2
RFC 2580 Conformance Statements for SMIv2
RFC 3411 An Architecture for Describing Simple Network Management Protocol
(SNMP) Management Frameworks

18-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 18 Standards Compliance

Standards
and
Protocols Description
RFC 3412 Message Processing and Dispatching for the Simple Network Management
Protocol (SNMP)
RFC 3413 Simple Network Management Protocol (SNMP) Applications
RFC 3414 User-based Security Model (USM) for version 3 of the Simple Network
Management Protocol (SNMPv3)
RFC 3415 View-based Access Control Model (VACM) for the Simple Network
Management Protocol (SNMP)
RFC 3416 Version 2 of the Protocol Operations for the Simple Network Management
Protocol (SNMP)
RFC 3417 Transport Mappings for the Simple Network Management Protocol (SNMP)
RFC 3418 Management Information Base (MIB) for the Simple Network Management
Protocol (SNMP)
RFC 3164 BSD syslog Protocol
ISO Information Technology - Abstract Syntax Notation One (ASN.1):
8824-4-200 Parameterization of ASN.1 Specifications Amendment 1: ASN.1 semantic
0 model
ISO Information Technology - ASN.1 Encoding Rules: Specification of Packed
8825-2-199 Encoding Rules (PER) Second Edition; Technical Corrigendum 1:
8 12/15/1999; Amendment 1: 12/01/2000
ITU-T Overview of TMN recommendations
M.3000
ITU-T Principles for a telecommunications management network
M.3010
ITU-T Considerations for a telecommunications management network
M.3013
ITU-T Framework for the integrated management of hybrid circuit/packet networks
M.3017
ITU-T TMN interface specification methodology
M.3020
ITU-T Generic network information model
M.3100
ITU-T Managed Object Conformance statements for the generic network
M.3101 information model
ITU-T Catalogue of TMN management information
M.3180
ITU-T TMN management services and telecommunications managed areas:
M.3200 overview

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 18-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
18 Standards Compliance Product Description

Standards
and
Protocols Description
ITU-T TMN F interface requirements
M.3300
ITU-T TMN management functions
M.3400
ITU-T Management information model
X.720
ITU-T Definition of management information
X.721
ITU-T Guidelines for the definition of managed objects
X.722
ITU-T Information technology - Open Systems Interconnection - Systems
X.733 Management: alarm reporting function
ITU-T Information technology - Open distributed processing - Reference Model:
X.903 architecture
ITU-T Network node interface for the synchronous digital hierarchy (SDH)
G.707
ITU-T Protocol suites for Q-interfaces for management of transmission systems
G.773
ITU-T Synchronous digital hierarchy (SDH) - Management information model for
G.774 (01, the network element view
02, 03, 04)
ITU-T Characteristics of synchronous digital hierarchy (SDH) equipment
G.783 functional blocks
ITU-T Synchronous digital hierarchy (SDH) management
G.784
ITU-T Architecture of transport networks based on the synchronous digital
G.803 hierarchy (SDH)
ITU-T Management capabilities of transport networks based on the synchronous
G.831 digital hierarchy (SDH)
ITU-T Management of the transport network - Application of the RM-ODP
G.851.1 framework
ITU-T Enterprise viewpoint for simple subnetwork connection management
G.852.1
ITU-T Enterprise viewpoint description of transport network resource model
G.852.2
ITU-T Enterprise viewpoint for topology management
G.852.3

18-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description 18 Standards Compliance

Standards
and
Protocols Description
ITU-T Enterprise viewpoint for trail management
G.852.6
ITU-T Common elements of the information viewpoint for the management of a
G.853.1 transport network
ITU-T Subnetwork connection management information viewpoint
G.853.2
ITU-T Information viewpoint for topology management
G.853.3
ITU-T Information viewpoint for trail management
G.853.6
ITU-T Computational interfaces for basic transport network model
G.854.1
ITU-T Computational viewpoint for topology management
G.854.3
ITU-T Computational viewpoint for trail management
G.854.6
Rational Rational Unified Process
Unified
Process 5.5
Sif99025 EML-NML interface models
TMF513 Multi-Technology Network Management Business Agreement NML-EML
V2.0 Interface Version 2.0
TMF608 Multi-Technology Network Management Information Agreement
V2.0 NML-EML Interface Version 2.0
TMF814 Multi Technology Network Management Solution Set Conformance
V2.0 Document Version 2.0
TMF814 Multi Technology Network Management Solution Set Conformance
V2.0 Document Version 2.0

Issue 03 (2010-11-02) Huawei Proprietary and Confidential 18-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description A Glossary

A Glossary

A
Abnormal Resource When the NMS carries out the operation of device resource polling
on the device management module or the module is refreshed
manually, the physical resources of some devices, such as the card,
sub-card and port, cannot be accessed because they have been
deleted or have some faults. So, after the NMS carries out the
operation of device resource polling on the device management
module or the module is refreshed manually again, the result of
polling the physical resources differ from the first time. The
physical resources that cannot be polled in the second time are
called the abnormal resource.
AIS insertion If there are excessive errors in a channel, AIS can be inserted in this
channel to indicate it is unavailable. For a line board, you can set
whether to insert AIS when there are excessive errors in the B1, B2
and B3 bytes. For a tributary board at the E1 or T1 level, you can
set whether to insert AIS when there are excessive errors in BIP-2.
For a tributary board at the E3 level or higher, you can set whether
to insert AIS when there are excessive errors in the B3 byte.
AIS Alarm Indication Signal. A signal sent downstream in a digital
network if an upstream failure has been detected and persists for a
certain time.
Alarm correlation In the case alarm2 is raised within five seconds after alarm1 is
analysis raised, and alarm2 complies with the conditions defined in the
alarm correlation analysis rule, you can either suppress the alarm2
or raise its severity level according to the behavior defined in the
alarm correlation rule. Such a process is called alarm correlation
analysis.
Alarm Level Alarm level is to identify the severity of an alarm or event. It is
divided up into four levels: critical, major, minor, warning alarm.
Alarm Status Device reports the trap information to NMS. NMS displays the
received information on the alarm start on the topological view.
The alarm state contains four types: urgent alarm, important alarm,
subordinate alarm and prompt alarm.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential A-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
A Glossary Product Description

Auto Discovery NMS tests the remote device by using PING or the SNMP
parameter module configured in advanced to discover the IP device
or the device that supports SNMP and to add the discovered devices
automatically.
Alarm reversion For the port that has already been configured but not actually loaded
with services, this function can be used to avoid generating relevant
alarm information, thus preventing alarm interference.
Alarm severity According to ITU-T recommendations, the alarm is classified into
four severities: Critical, Major, Minor, and Warning.
Alarm suppression The suppressed alarm of a specific object is not reported. The object
here may be the networkwide equipment, a specific NE, a specific
board and even a specific function module of a specific board.
Alarm A visible or an audible indication to notify the person concerned
that a failure or an emergency has occurred. See also Event.
ATM protection An ATM protection group refers to the logically bound ATM VP
group network or subnetwork connections that share the same physical
transmission channel. In the VP group (VPG), a pair of VP
connections (working connection and its protection connection) is
used for monitoring the automatic protection switching, called
monitoring connections (APS VPCs). If the monitoring connections
switch over, the whole VPG will switch over to quicken the ATM
protection switching (as quick as the protection switching of the
SDH layer.
ALS Automatic Laser Shutdown. ALS is turned on when the optical
interface board does not carry services or the optical fibre is faulty.
Its service life can be prolonged by decreasing the duration during
which laser is on.
Attribute Property of an object.
Automatic switching When the active board or path fails, the standby one can
automatically take over the job of the active one.

B
Band Width In the data communication area, bandwidth specifies the maximum
value of the rate when the data passes through some data channel.
Baseline Select the test result when the line is in good condition as the line
test baseline, to provide a basis of comparison and analysis for the
following line test result.
Baseline collection One of the test types for submarine line. In the case of deployment
test or fault restoration, or when updating the baseline is required, you
need to collect the baseline, to provide reference for comparison
tests, and alerts or alarms.
Binding In virtual concatenated payload configuration, designating one
binding number to identify the VC4s of the same virtual
concatenated payload is called "bind". If a fault occurs to one of the
bound services, all bound services will switch as a whole.

A-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description A Glossary

Bit error alarm When the bit error reaches a specific limit, the equipment will
threshold report an alarm. This limit is the bit error alarm threshold. The
threshold can be divided into crossing threshold and defect
threshold.

C
Comparison test in One of the test types for submarine line. Carry out polling tests for
periodic mode multiple lines on the same LMU board periodically, compare the
test result with the baseline data in in-service mode, and provide
alerts or alarms for the line.
Comparison test in One of the test types for submarine line. Test a line by using test
single-test mode parameters of the baseline collection test in in-service mode,
compare the test result with the baseline data, and provide alerts or
alarms for the line.
Check alarms The check feature compares one (or more) uncleared alarm on the
NMS with that on the NE. If an alarm is included in the current
alarms on the NE, it is kept on the NMS. If not, it will be removed
from the NMS.
Client A kind of terminal (PC or workstation) connected to a network that
can send instructions to a server and get results through a user
interface. See also server.
Clock View The Clock View provides a visible platform to enable:1. NE clock
settings2. Networkwide clock synchronisation status query3. Clock
tracing and search functions
Configuration data The data that configures the NE hardware for coordination between
this NE and other NEs in the entire network and operation of
specified services. Configuration data is the instruction file of NEs,
and it is the key for efficient network running. The typical
configuration data includes board configuration, clock configuration
and protection relationship.
Configuration Configuration management enables inventory query of network
management configuration resources, including relevant configuration of NMS
or SNMS, NE, subnet, links, SNC, route, TP, edge point,
equipment, and so on. Real-time inventory change report can also
be provided through this resource, it will be timely reported to the
upper NMS to notify the carrier of the current network operation
status and ensure data consistency of the upper NMS or SNMS.
Configure To set the basic parameters of an operation object.
Connection point A reference point where the output of a trail termination source or a
connection is bound to the input of another connection, or where the
output of a connection is bound to the input of a trail termination
sink or another connection. The connection point is characterized by
the information which passes across it. A bidirectional connection
point is formed by the association of a contradirectional pair.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential A-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
A Glossary Product Description

Connection A "transport entity" which consists of an associated pair of


"unidirectional connections" capable of simultaneously transferring
information in opposite directions between their respective inputs
and outputs.
Current alarms Alarms that do not clear, or has cleared but is not acknowledged.
Current performance The performance data stored in the current register is called current
data performance data. The current 15-minute or 24-hour register (only
one for each) is applied to collect the performance data in the
current monitoring period. It changed within the monitor period.
Change Audit Change Audit Service is developed to record the change on the
Service network device, including the changes on the information about the
device, the configuration and the mapping. It provides one
integrated database. Every application program records these
changes in the database and ensures that these changes in the
database are reflected on other applications.
Cluster The cluster is an administrative domain composed of a set of
switches. It consists of a command switch and multiple member
switches. The management over all the switches within the cluster
is realized through a public IP address.
Configuration File Text file, including various configuration on the device.

D
DCC Within an STM-N signal there are two DCC channels, one is the
192 kbit/s DCC-R channel composed of bytes D1-D3, and the other
is the 576 kbit/s DCC- channel composed of bytes D4-D12. All
NEs can communicate with one another through the DCC-R. The
DCC-M is not the regenerator section overhead and does not
support communications among regenerators, and it is used to
support communication channels of more universal purpose.
DNI Dual Node Interconnection. The protection mode defined in G. 842
Recommendation for the inter-ring service . By using the
recommended protection modes, the protection of the
interconnecting service between two ring networks composed of the
devices from different manufacturers and in different protection
modes can be realised. Moreover, in case of fibre failure or node
failure, services can also be protected.
Domain The domain of the NMS specifies the scope of address or functions
which are available to a certain user.
Dump Dump is a process of exporting alarm data from the database to the
customized file and meanwhile the exported data is cleared in the
database.

A-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description A Glossary

EMU Environment Monitoring Unit. As one type of power and


environment monitoring unit, EMU is installed on the top of the
OptiX 155/622H equipment cabinet to monitor the environment
variables, such as the power supply and temperature. With external
signal input through the relay, fire alarm, smoke alarm, burglary
alarm, and so on can be monitored as well. Displayed on the NMS,
the change of environment can be monitored timely and accurately.
Equipment set An aggregate of multiple managed equipment. Equipment set
facilitates the user authority management on equipment in the
management domain of the NMS. If some operation authorities
over one equipment set are assigned to a user (user group), these
operation authorities over all equipment of the equipment set are
assigned to the user (user group).

F
Failure The fault cause persisted long enough to consider the ability of an
item to perform a required function to be terminated. The item may
be considered as failed; a fault has now been detected.
Fault A fault is the inability of a function to perform a required action.
This does not include an inability due to preventive maintenance,
lack of external resources, or planned actions.
Filter The filter is used to filter the matched logs and have the unmatched
one left.
Forced switch This command performs the ring switch from working channels to
the protection channels. This switch occurs regardless of the state of
the protection channels, unless the protection channels are
satisfying a higher priority bridge request.

H
History alarms Alarms that have cleared and been acknowledged.
History performance The performance data stored in the history register and the
data auto-report performance data stored on the NMS are called history
performance data in a unified way.

I
Intermediate office It refers to the equipment used for optical fibre management and
dispatch in the metropolitan area. It has multiple pairs of interfaces
for the optical fibre connection. Every two interfaces in a pair are
connected with each other to form a longer physical optical fibre
path. The physical optical fibre path connecting the transmission
equipment can comprise two or more sections of optical fibre
cascaded via the intermediate office. There is an intermediate office
information list for some fibre & cable connections, which shows
the section information about the fibre & cable.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential A-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
A Glossary Product Description

In-Service Mode One of the test modes for submarine line. By using the in-service
test mode , you can test submarine cables and repeaters without
damaging the existing services of the submarine system.
Image (OS) Binary file, equivalent to the OS of the device and a part of the
device version.
IP address In the TCP/IP protocol, it is used to uniquely identify the address of
the communication port, which consists of four bytes in decimal
digits, for example, 129.9.161.55.

J
Jitter This index shows the delay stability of many Ping operations with
the unit of ms.

L
Label A mark on a cable, a subrack, or a cabinet for identification.
Layer A concept used to allow the transport network functionality to be
described hierarchically as successive levels; each layer being
solely concerned with the generation and transfer of its
characteristic information.
LCT Local Craft Terminal. The LCT provides the user with single-layer
management network solutions to the transmission network of up to
five NEs to realise integrated management of multi-service
transmission network. Usually it uses the cross-over cable or serial
port cable to connect one NE, so as to configure and maintain a
single NE. See also U2000 LCT.
Licence A permission provided by a vendor to authorise the use of specific
functions of a product. Usually the licence consists of encrypted
codes, and the operation authority varies with different level of
licence.
Link The link is responsible to transmit the data from one station to next
neighbour station correctly.
Lock NE login This function prohibits the users at lower levels from logging in NE
and forces logged NE users with lower level to log out.

M
Main Topology The default NMS client interface and all topology management
functions are accessed here.
Management The signal passing across an access point.
information
Manual switch When the protection channel is efficient and there is no higher-level
switching request, this mode switches the service from the working
channel to the protection channel, thus testing whether network still
has the protection capability.

A-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description A Glossary

Manual test One of the test types for submarine line. You need to set test
parameters manually, start the test, and save the test result as the
baseline of the in-service mode.
MO Managed Object. The management view of a resource within the
telecommunication environment that may be managed via the agent.
Examples of SDH managed objects are: equipment, receive port,
transmit port, power supply, plug-in card, virtual container,
multiplex section, and regenerator section.
MS Multiplex Section. A multiplex section is the trail between and
including two multiplex section trail termination functions.
MSP Multiplex section protection. The nodes online achieve protection
switching through the K1 and K2 bytes in the multiplex section,
including linear 1+1 MS protection switching link, linear 1:n MS
protection switching link, dedicated MS protection ring and shared
MS protection ring.

N
NE database There are three types of database on NE SCC board as following:
(1) DRDB: a dynamic database in a dynamic RAM, powered by
battery; (2) SDB: a static database in a power-down RAM; (3)
FDB0, FDB0: permanently saved databases in a Flash ROM. In
efficient operation, the NE configuration data is saved in DRDB
and SDB at the same time. Backing up an NE database means
backing up the NE configuration data from SDB to FDB0 and
FDB1.
NE Explorer NE Explorer is the main operation interface of the NMS. For easy
navigation, the NE Explorer window presents an expandable
directory tree (Function Tree) in the lower left pane. The
configuration, management and maintenance of the equipment are
accessed here.
NE Network Element. NE includes the hardware unit and the software
running on it. Usually, one NE has at least an SCC (system control
and communication) board which responsible for the management
and monitoring of the NE. The NE software runs on the SCC board.
NM Network Management. In the telecommunication management
network structure, the NMS is located between the NE level and
network level, which can supports all functions at NE level and part
of the network level management functions. See also U2000.
NNI Network Node Interface. NNI identifies the interface between the
ATM network nodes. See also SDH NNI.
Node Node is one of the topology objects and the minimum unit that
represents the device displayed on the topological view. The device
is displayed with the node icon on the topological view. The type of
the node includes the router, the switch and the 3rd-party device and
the virtual node.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential A-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
A Glossary Product Description

O
Online help An indexed collection of information on all aspects of the NMS.
They can be accessed at any time from the Help menu or by
pressing the F1 key.
Optical time domain OTDR is an optical fault locator and analysis tool for optical fiber
reflectormeter networks. The OTDR features a light, compact, hand-held design
with an intelligent user interface that is easy and quick to use. The
color LCD display and backlight design makes testing work more
comfortable and convenient, whether during daylight or at night.
Out-of-Service One of the test modes for submarine line. By transmitting detection
Mode light with high power, the out-of-service test can detect the fiber
status and repeater status, to realize the status detection and fault
point location after fiber cut. In general, when detecting that a line
is abnormal during a test in in-service mode, you can carry out a test
in out-of-service mode to locate the fault.
OWSP Optical Wavelength Shared Protection. OWSP is a bidirectional
ring, where each node is equipped with an OWSP. There are two
channels (λ1 and λ2) in the main optical path on the internal and
external rings in each span on a ring. The fibre and the OWSP on
the main optical path are connected with the optical ports inputting
λ1 and λ2 on the mux/demux board (unnecessary to be connected
with the OTU), and thus λ1 and λ2 can be added and dropped at
every node.

P
Path protection The working principle of path protection: When the system works
in path protection mode, the PDH path uses the dual-fed and signal
selection mode. Through the tributary unit and cross-connect unit,
the tributary signal is sent simultaneously to the east and west lines.
Meanwhile, the cross-connect matrix sends the signal dually sent
from the opposite end to the tributary board through the active and
standby buses, and the hardware of the tributary board will
selectively receive the signal from the two groups of buses
automatically according to the AIS number of the lower order path.
Path A trail in a path layer.
Performance register Performance register is the memory space for performance event
counts, including 15-min current performance register, 24-hour
current performance register, 15-min history performance register,
24-hour history performance register, UAT register and CSES
register.
Performance Performance events usually have upper and lower thresholds. When
threshold the performance event count value exceeds the upper threshold, a
performance threshold-crossing event is generated; when the
performance event count value is below the upper threshold for a
period of time, the performance threshold-crossing event is ended.
In this way, performance jitter caused by some sudden events can
be shielded.

A-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description A Glossary

PMU One type of power and environment monitoring unit.


Private line Both communication parties are connected permanently.
Procedure A generic term for an action.
Process A generic term for a collection of actions.
Protection path A specific path that is part of a protection group and is labeled
protection.
Protection strategy In case the service route provides multiple service protections,
different protection strategies can be selected as required. Protection
strategy refers to the protection mode given the priority in use for
the trail: protection, no protection, and extra traffic. Of the above,
the protection preference is divided into trail protection and
sub-network connection protection.
Protection subnet The resources that form a protection subnetwork include NEs and
fiber cables. The creation of the protection subnetwork actually
means that corresponding logical system is configured for each NE
by means of creating the protection subnetwork, the optical
interfaces (or VC4) of each board are mapped into the logical
system, and then these independent logical systems are connected
with one another to form a complete network structure.
Packets Loss Ratio This index shows the packet loss ratio after many Ping operations
with the unit of %.
Poll Status The NMS polls the device status and other configuration data
periodically and displays the polling results on the topology view.
The polling status contains normal, unknown, off-line, light fault,
subordinate fault, important fault and urgent fault.

R
ROADM Reconfiguration Optical Add/Drop Multiplexing. ROADM helps
you to terminate or pass through any one wavelength at every node
without affecting the existing services. At the same time, ROADM
can change wavelengths through the NMS remotely, to adjust
wavelengths added or dropped in a quick and convenient manner. In
addition, ROADM enables power equalization at path level through
a built-in power equalization function, and thus adjusts power for
pass-through paths in a better way than a band-based dynamic gain
equalizer (DGE) does.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential A-9


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
A Glossary Product Description

Route The IP route selection is in table driving mode. In each host and
each router of the Internet, there is a routing table that contains
information about how the service is transmitted from the source to
the sink, providing a basis for route selection. Ethernet static
routing in ET1 refers to the mapping relationship between the
Ethernet port and the bound path. Its routing type includes port
routing and VLAN routing. Port routing: It means configuring a
route between the Ethernet port and the bound path port, which is
usually used for point-to-point networking communication; VLAN
routing: It means configuring a route between the Ethernet port and
the bound path port based on the VLAN service. It can be used
flexibly in point-to-point, point-to-multipoint or
multipoint-to-multipoint communication. The implementation is to
divide and converge the data stream according to the VLAN flag of
the packet. As a VLAN flag can be added to the Ethernet port, the
equipment can be applied more flexibly.
Report The report that is generated manually in a real-time fashion.
RTT RTT is the round trip time, which is the time delay of the ping task.

S
Script file It is the text file describing the physical information and
configuration information of the entire network, including the NE
configuration file, port naming file, end-to-end configuration file,
NE physical view script file, NM information file and service
implementation data script file.
Schedule Task The report on schedule task that is generated at a interval along with
the periodical running of the schedule tasks.
Script A list of instructions for performing a specific task or action,
written in a scripting language.
SDH NNI SDH Network Node Interface. It is applied to build
communications connection with the equipment beyond the NMS
management area. Usually, the NM creates an SDH NNI by
creating a logical system on the port of an idle line board, and the
NE must be a TM without protection and fibre connection.
Section A trail in a section layer.
Settings Parameters of an operation that can be selected by the user.
Severity See Alarm Severity.
Subnet mask Also referred to as the network mask off code, it is used to define
network segments, so that only the computers in the same network
segment can communicate with one another, thus suppressing
broadcast storm between different network segments.
Subnet number Subnetwork number is used to differentiate the different network
sections in the sub-network conference. Actually it is the first
several digits (one or two) of the user phone number. An orderwire
phone number is composed of the sub-network number and the user
number.

A-10 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description A Glossary

Subnet Sub-network is the logical entity in the transmission network and


comprises a group of network management objects. A sub-network
can contain NEs and other sub-networks. A sub-network planning
can better the organisation of a network view.
Support The frame on the bottom of a cabinet, when installing the cabinet on
the antistatic floor.
Synchronise NE Send the system time of the NMS server to NEs so as to
time synchronise all NEs with the server.

T
TDA clock source TDA is short for Tone Data Access. For the 2500+ NE equipment,
it can be installed with the external TDA board for which the clock
source must be set so that the TDA board can switch according to
the set clock source sequence when clock source switching occurs.
TMN Telecommunications Management Network. The entity which
provides the means used to transport and process information
related to management functions for the telecommunications
network.
Topology The NMS topology is a basic component of the man-machine
interactive interface. The topology clearly shows the structure of the
network, the alarms of different NEs, sub-networks in the network,
the communication status as well as the basic network operation
status.
Trail management A network level management function of the NMS. Through trail
function management, you can configure end-to-end services, view graphic
interface and visual routes of a trail, query detailed information of a
trail, filter, search and locate a trail quickly, manage and maintain
trails in a centralised manner, manage alarms and performance data
by trail, and print a trail report.
Trail A trail is a kind of transport entity, mainly engaged in transferring
signal from the input of the trail source to the output of the trail
sink, and monitoring the integrality of the transferred signal.
According to the different levels of the trail, the trail includes
various types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail,
VC4, VC3 and VC12). Among them, OTS, OCH and OMS
represent the trails in a DWDM layer network. For the ADM and
TM equipment in the SDH network, each optical fibre connection
corresponds to an SPI, RS or MS trail, and a trail is the general
name for service carriers, including SDH and PDH services.
Tributary loopback A fault can be located for each service path by performing loopback
to each path of the tributary board. There are three kinds of
loopback modes: No loopback, Outloop and Inloop.
Threshold The alarm range will be defined after the performance data is
collected. The threshold contains the upper and lower one, related
with the unit and index.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential A-11


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
A Glossary Product Description

U
U2000 To be oriented to the future network trend, the iManager U2000 that
is the unifed network management system (NMS) combines all-IP
and FMC, and manages carrier equipment and access equipment in
a centralized manner.
UAT Unavailable Time. A UAT event is reported when the monitored
object generates 10 consecutive severely errored seconds (SES) and
the SESs begin to be included in the unavailable time. The event
will end when the bit error ratio per second is better than 10-3
within 10 consecutive seconds.
UNI UNI is the abbreviation for User Network Interface. It identifies the
interface between the user and the ATM network node.
Unprotected Services transmitted through an ordinary way, once a failure or
interruption occurs, the data cannot be restored for lack of
protection mechanism.
Upload Report all or part of the configuration data of the NE to the NM and
overwrite the configuration data saved in the NE layer on the NM
side.
User group User set refers to the set of NMS users with the same management
authorities. The default user group includes: system administrator,
system maintainer, system operator and system supervisor. The
attributes of user set include name and detailed description.
User The user of the NMS client, and the user and his/her password
define the corresponding authority of operation and management of
the NMS.

V
VC4 loopback The fault of each VC4 path on the optical fibre can be located by
setting loopback for each VC4 path of the line. There are three
kinds of loopback modes: No loopback, Outloop, Inloop.
VC4 server trail The path rate of the VC4 server trail is 150.336Mbit/s. The VC4
server trail provides transparent channels (that is, circuit group) for
circuit-layer network nodes (for example, a switch) in a path-layer
network, and acts as the basic unit of inter-office communication
path. When the VC4 server trail is configured, only the higher order
cross-connection of VC4 is generated in the intermediate NE, but
no cross-connection is generated at the two ends, that is, no service
is added/dropped. Therefore, the VC4 server trail is not a traditional
service. It is only the basis for VC3 and VC12 trail creation.
VCI The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in
both NNI cell or UNI cell. It indicates the virtual channel in the
path. The VPI and VCI together indicate a virtual connection.

A-12 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description A Glossary

View Organize and display rules and filter conditions of the topology
data. Customize the view according to requirements of every
product and organize the data in the view displayed by the topology
module, such as the layer 2 view, VPN view and IP view. By
default, the platform provides the physical view. The topology view
can be planned according to the domain, maintenance relationship
and so on.
Edits and displays the rule of the topology data or the filter
conditions. It can be tailored according to the requirements
Virtual fibre A virtual fibre is created between SDH equipment that has WDM
equipment in between. From SDH equipment perspective, creation
of virtual fibres disassociates its fibre connection with WDM
equipment and prevents impact on the auto fibre search function,
ensuring independence of SDH trail management.From WDM
equipment perspective, its service bearer layer is a virtual fibre
instead of a true one after the virtual fibre is created. Deletion of the
true fibre does not affect trail management.
Virtual NE Like a common NE, a virtual NE is also displayed with an icon on a
view, but it is only an NE simulated according to the practical
situation, which does not represents an actual NE. Therefore, the
actual status of this NE cannot be queried and its alarm status
cannot be displayed with colours. Usually, when the trail
management function is used for the NEs or sub-networks the NMS
cannot manage, or the equipment is interconnected with other
vendors' NEs for service configuration, the end-to-end service
configuration method and the trail management capability are
provided.
VLAN ID Namely, it is the virtual LAN identifier. One Ethernet port can
support 4K VLAN routes, and one NE can support up to 8K VLAN
routes.
VPI The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the
NNI cell, and 8 bits in the UNI cell.

W
Wavelength The wavelength protection group is important to describe the
protection group wavelength protection structure. Its function is similar to that of the
protection sub-network in the SDH NE. The wavelength path
protection can only work with the correct configuration of the
wavelength protection group.
WDM service The WDM service is accessed at the client side of the OTU board
that can access SAN services.
Web LCT In the TMN architecture, the Web LCT is located in the NE
management level, which can manage the RTN series and NG
WDM series equipment.
Working path A specific path that is part of a protection group and is labelled
working.

Issue 03 (2010-11-02) Huawei Proprietary and Confidential A-13


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
A Glossary Product Description

WTR time A period of time that must elapse before a - from a fault recovered -
trail/connection can be used again to transport the normal traffic
signal and/or to select the normal traffic signal from.
WTR Wait to Restore. This command is issued when working channels
meet the restoral threshold after an SD or SF condition. It is used to
maintain the state during the WTR period unless it is pre-empted by
a higher priority bridge request.
WXCP Wavelength Cross-Connection Protection. It is a path protection
type for ring networks. In this protection mode, services are
switched between the primacy and secondary rings through
cross-connection based on the dual fed signal selection principle.

A-14 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description B Acronyms and Abbreviations

B Acronyms and Abbreviations

A
AAA Authorization, Authentication and Accounting
ACE Adaptive Communication Environment
ACL Access Control List
AIS Alarm Indication Signal
ALC Automatic Level Control
APE Automatic Power Equilibrium
ARP Address Resolution Protocol
ASN.1 Abstract Syntax Notation One
ASON Automatically Switched Optical Network
ATM Asynchronous Transfer Mode

B
BFD Bidirectional Forwarding Detection
BGP Border Gateway Protocol
BML Business Management Layer
BRAS Broadband Remote Access Server

C
CAR Committed Access Rate
CC Continuity Check
CORBA Common Object Request Broker Architecture
CLI Command Line Interface
CoS Class of Service

Issue 03 (2010-11-02) Huawei Proprietary and Confidential B-1


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
B Acronyms and Abbreviations Product Description

CPU Central Processing Unit


CWDM Coarse Wavelength Division Multiplexing

D
DC Data Center
DCC Data Communications Channel
DCN Data Communication Network
DDN Digital Data Network
DHCP Dynamic Host Configuration Protocol
DNI Dual Node Interconnection
DNS Domain Name System
DPPS Dual Path Protection Switching
DWC Dynamic Wavelength Control
DMS Datacom network Management System
DWDM Dense Wavelength Division Multiplexing

E
ECC Embedded Control Channel
EML Element management Layer
EMS Element Management System
EPL Ethernet Private Line
EPLAN Ethernet Private LAN
ESCON Enterprise System Connection
EVPL Ethernet Virtual Private Line

F
FCAPS Fault Management, Configuration Management, Accounting
Management, Performance Management, Security Management
FTP File Transfer Protocol

G
GNE Gate Network Element
GUI Graphical User Interface

B-2 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description B Acronyms and Abbreviations

H
HA High-Availability
HGMP HUAWEI Group Management Protocol
HQoS Hierarchical QoS
HSI High Speed Internet
HTML Hyper Text Markup Language
HTTP Hyper-Text Transmission Protocol

I
ID IDentification
IEEE Institute of Electrical and Electronics Engineers
IF Intermediate Frequency
IGMP Internet Group Management Protocol
IMA Inverse Multiplexing for ATM
iMAP Integrated Management Application Platform
ION Intelligent Optical Network
IP Internet Protocol
IPA Intelligent Power Adjustment
ISDN Integrated Services Digital Network
ISO International Organization for Standardization
ISP Internet Service Provider
ITU-T International Telecommunication Union- Telecommunication
Standardization Sector

L
LAN Local Area Network
LCAS Link Capacity Adjustment Scheme
LCD Liquid Crystal Display
LCT Local Craft Terminal
LLID Locate Loopback ID
LPT Link-state Pass Through
L2TP Layer 2 Tunneling Protocol

Issue 03 (2010-11-02) Huawei Proprietary and Confidential B-3


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
B Acronyms and Abbreviations Product Description

LLDP Link Layer Discovery Protocol


LSP Label Switched Path

M
MA Maintenance Association
MAC Media Access Control
MCA Multi-channel Spectrum Analyzer Unit
MEP Maintenance association End Point
MD Maintenance Domain
MDI Multi-Document Interface
MDP Message Dispatch Process
Mgr Manager
MIB Management Information Base
MIP Maintenance association Intermediate Point
MIT Managed Object Instance Tree
MML Man Machine Language
MO Managed Object
MPLS Multiprotocol Label Switching
MS Multiplex Section
MSP Multiplex Section Protection
MSTP Multi-Service Transmission Platform
MTBF Mean Time Between Failures
MTTR Mean Time to Repair
NBI Northbound Interface

N
NE Network Element
NEL Network Element Level
NML Network Management Layer
NMS Network Management System
NSAP System Network Service Access Point

B-4 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description B Acronyms and Abbreviations

OADM Optical Add/Drop Multiplexer


OAM Operation Administration and Maintenance
OAMS Optical fiber (cable) line Automatic Monitoring System
OCH Optical Channel
OEQ Optical Equalizer
ODU Optical Demultiplexer Unit
ODU Outdoor Unit
OIF Optical Internetworking Forum
OLA Optical Line Amplifier
OMS Optical Multiplex Section
OMU Optical Multiplexer Unit
OSC Optical Supervisory Channel
OSF Operation System Function
OSI Open Systems Interconnection
OSN Optical Switch Network
OSNR Optical Signal-to-Noise Ratio
OSS Operation Support System
OTDR Optical Time Domain Reflectometry
OTM Optical Terminal Multiplexer
OTS Optical Transmission Section
OTU Optical Transponder Unit
OWSP Optical Wavelength Shared Protection
OSPF Open Shortest Path First

P
PC Personal Computer
PSTN Public Switched Telephone Network
PDH Plesiochronous Digital Hierarchy
PP Path Protection
PPP Point-to-Point Protocol
PRBS Pseudo-Random Binary Sequence
PSTN Public Switched Telephone Network

Issue 03 (2010-11-02) Huawei Proprietary and Confidential B-5


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
B Acronyms and Abbreviations Product Description

Q
QoS Quality of Service

R
RAID Redundant Array of Inexpensive Disk
RAS Reliability, Availability, Survivability
RDBMS Relational Database Management System
RPR Resilient Packet Ring
RMON Remote Monitoring
ROADM Reconfiguration Optical Add/drop Multiplexer
RPT Repeater
RS Regenerator Section
RSVP Resource Reservation Protocol
RTN Radio Transmission Node
RUP Rational Unified Process

S
SDH Synchronous Digital Hierarchy
SLM Submarine Line Monitor
SLTE Submarine Line Terminal Equipment
SML Service Management Layer
SMS Service Management System
SNCMP Sub-Network Connection Multiple Protection
SNCP Sub-Network Connection Protection
SNCTP Sub-Network Connection Tunnel Protection
SNML Sub-Network Management Layer
SNMS Subnetwork Management System
SONET Synchronous Optical Network
SSL Security Socket Layer
SAP Service Access Point
SNMP Simple Network Management Protocol
STP Spanning Tree Protocol

B-6 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
Product Description B Acronyms and Abbreviations

T
TCM Tandem Connection Measurement
TCP/IP Transmission Control Protocol / Internet Protocol
TDA Tone & Data Access Unit
TFTP Trivial File Transfer Protocol
TM Terminal Multiplexer
TMF TeleManagement Forum
TMN Telecommunication Management Network
TPS Tributary Protection Switching

U
UML Unified Modeling Language
UPS Uninterrupted Power Supply

V
VB Virtual Bridge
VCI Virtual Channel Identifier
VCS Veritas Cluster Server
VOA Variable Optical Attenuator
VPI Virtual Path Identifier
VLAN Virtual Local Area Network
VPN Virtual Private Network
VGMP VRRP Group Management Protocol
VRRP Virtual Router Redundancy Protocol
VVR Veritas Volume Replication
VVR VERITAS Volume Replicator
VxVM Veritas Volume Manager

W
WDM Wavelength Division Multiplexing
WSF Work Station Function
WTR Wait-to-Restore
WXCP Wavelength Cross-Connection Protection

Issue 03 (2010-11-02) Huawei Proprietary and Confidential B-7


Copyright © Huawei Technologies Co., Ltd.
iManager U2000 Unified Network Management System
B Acronyms and Abbreviations Product Description

B-8 Huawei Proprietary and Confidential Issue 03 (2010-11-02)


Copyright © Huawei Technologies Co., Ltd.

You might also like