Professional Documents
Culture Documents
Version 14.2
ECI's qualification lab is accredited by A2LA for competence in electrical testing according to
the International Standard ISO IEC 17025-2005 General Requirements for the Competence of
Testing and Calibration Laboratories.
3.2.2 Understand the relationship between physical and technology layers .................................. 3-9
3.2.3 Logical Elements (LEs) in a technology layer ......................................................................... 3-11
3.2.4 Grouping selected elements in any topology layer ............................................................... 3-11
3.3 Bookmarks in LightSOFT ...................................................................................................... 3-11
3.3.1 Create a custom bookmark ................................................................................................... 3-11
3.3.2 Edit a custom bookmark ....................................................................................................... 3-12
3.3.3 Delete a custom bookmark ................................................................................................... 3-12
Related documents
What's New Guide: Outline of the new features added in the latest version, and links to the relevant
topics.
LightSOFT Management Guides: Topology, Trails, Tunnels, Services: Documents major actions that
can be performed in LightSOFT, including creating and managing network topology, creating,
managing and performing actions on SDH/SONET, data, and optical trails, MPLS tunnels, and
L2VPN/L3VPN services, and adding protection appropriate for the technology type.
Fault Management and Performance Monitoring Guide: How to view performance and alarm
information and perform troubleshooting and fault management.
Supporting Information: Supplementary information related to this User Guide.
Contact information
Telephone Email
Revision history
Revision Section Description
1 N/A New
The following figure illustrates the layers in a network with IP/MPLS, MPLS-TP, Ethernet, SDH/SONET, and
optical technologies, highlighting some of the intricacies of network management.
Figure 1-1: Multiple technologies in a typical SP network
For example, a Layer 2 Ethernet service can be provisioned on an MPLS-TP tunnel, which in turn, is
configured on an MPLS over Transport (MoT) low-order (LO) SDH VC-3 client connection that resides on a
high-order SDH VC-4 server connection. This VC-4 link is deployed on a LightPath (LP) trail, the client of an
Optical Channel (OCH) trail, which in turn, is a client of an Optical Multiplex Section (OMS) trail. Finally the
OMS trail needs to be configured on top of a physical fiber that is in a shared-link risk group (SLRG).
Successful provisioning and monitoring of the Ethernet service requires correct management of all
infrastructure layers below it - obviously a definite challenge to the network manager.
A carrier that starts with an SDH/SONET network can manage the network topology using LightSOFT's
SDH/SONET layer. When L2/L3 VPN services are added, all that has to be done is to activate the
Ethernet/MPLS layer already built into LightSOFT.
The next stage, typically, is to acquire additional capacity via WDM technologies using the same physical
infrastructure. Again, LightSOFT is ready, with an optical management layer that manages the DWDM,
CWDM, LP, ODU, OCH, and OMS trails.
LightSOFT also supports full ASON protection, smoothly integrated into the SDH layer.
LightSOFT functions at the NML, while a variety of different Element Management Systems (EMSs) are
controlled through the LightSOFT umbrella function at the EML. Each EMS (EMS-NPT, EMS-NPT, etc.) is
tailored to a specific type of NE. A northbound interface connects either the EMS or LightSOFT to your
Operations Support System (OSS). In addition, the platforms are equipped with LCT applications, providing
fast connectivity to the NE and enabling installation, configuration and management functions.
LightSOFT provides crystal-clear management control of the physical, SDH/SONET, data and optical layers:
Physical layer: sites, equipment racks, NEs, fibers, and electrical or radio connections.
SDH/SONET layer: ADMs, cross connects (XCs), terminals, and service trails from 2 Mbps to STM-256,
including ASON protection and recovery capabilities integrated seamlessly into the rest of the
network.
Data layer: L2VPN/L3VPN services, logical topologies between cards and data bridges, IP/MPLS
networks, MPLS-TP and Provider Bridge (PB) based Carrier Ethernet services. MPLS tunnels may be
configured over Ethernet (MoE), over fabric (MoF), over Generic Routing Encapsulation (GRE, known
as MoG), or over SDH/SONET (MoT) connections. Rapid Spanning Tree Protocol (RSTP) and Ethernet
Ring Protection (ERP) mechanisms are available, as well as the structured design advantages of
hierarchical VPLS (H-VPLS) domains and logical administrative groups.
Optical layer: DWDM Muxes, DeMuxes, amplifiers, and optical ADMs. E2E optical trails can be
configured over ODU and OCH interfaces, with optical DRI and multiroute OCH providing robust
protection options.
LightSOFT makes navigation between the physical and service layers transparent. You can easily perform all
monitoring, maintenance, and management operations via the GUI or standard CORBA interfaces. This
layered architecture concept provides comprehensive control of all transport equipment in your network.
Figure 1-4: One management system
The layered architecture concept provides comprehensive control of all transport equipment in your
network. LightSOFT updates and monitors network topology status, provides statistical and inventory
reports, defines E2E tunnels and services, downloads software, performs alarm filtering, configures
elements in the network, and runs PM tests.
The network management suite includes comprehensive configuration, fault management, PM,
administration, maintenance, and security tools for all the technologies in your network, ensuring efficient
resource control, streamlined operation, and high QoS. You can view all aspects of the network at a glance
and fully control all elements. In addition, multiple users can simultaneously configure the network without
causing access conflicts.
Network configuration and provisioning tasks for MPLS-TP tunnels, Ethernet services (L2VPN and L3VPN),
OTN links, and optical trails are native to LightSOFT. The intuitive point-and-click interface facilitates
Ethernet/MPLS-TP tunnel configuration and top-down provisioning, as well as LP, ODU, and OCH
provisioning. E2E tunnel and service provisioning utilizes a sophisticated PathFinder algorithm. Downtime is
significantly reduced due to fast alarm handling, flexible management, and comprehensive logs. Failsafe
database backup and disk mirroring ensure uninterrupted operation and data integrity.
LightSOFT provides a holistic solution for your network management challenges: simple, smart, scalable,
and centralized. Its intuitive front-end GUI is backed up by sophisticated server engines. Its on-demand
service provisioning and pinpoint bandwidth allocation dramatically reduce equipment and operating costs
usually incurred by multiple management systems.
With our hierarchical approach to network management, LightSOFT serves as a global E2E management
'umbrella' for the entire network. Every family of products has its own EMS.
LightSOFT provides a completely scalable solution by managing thousands of NEs via their respective EMSs.
When you look at the whole picture, it's obvious that LightSOFT is truly a carrier class act!
Efficient user and security management through controlled user access according to the carrier's
organizational needs.
Fast fault resolution with short mean time to repair (MTTR).
Migration at your own pace to IP/MPLS (or other NGN). LightSOFT's single user interface and familiar
look and feel allow you to start managing additional networks quickly with minimal training. Typically,
a LightSOFT user is able to perform full management, monitoring, and provisioning for the
SDH/SONET, IP/MPLS, and DWDM domains of the network.
Supported Carrier Ethernet/MPLS network types include:
Hierarchically organized MPLS network, using VPLS logical elements (LEs) organized into logical
domains connected by MPLS tunnels.
PB networks, using Bridge LEs and VPLS LEs connected by Ethernet I-NNI (Internal Network to
Network Interface) links.
MPLS/PB network combinations, enabling network operators to design network configurations
that take advantage of the best that each option has to offer, for optimum operational and cost
efficiency.
Easy implementation of additional new technology layers.
New revenue potential by leveraging architecture through CNM. LightSOFT's integrated approach
and flexibility allow you to configure the security scheme according to logistical and organizational
needs without the complexities of dealing with several different NMSs.
In today's competitive telecommunications market, consumers require guaranteed carrier class service
delivery from access to core. The classic definition of carrier class service includes rigorous standards for
QoS, reliability, security, scalability, multiprotocol support, and E2E service management.
Figure 1-5: Carrier class Ethernet requirements
For a detailed overview of LightSOFT's features, see the End to End Management Suite General Description.
Profiles define combinations of capabilities that users in a user group may perform on applicable resources
(for example, configuring security or provisioning trails) and associated EMSs. Resource-only profiles allow
privileges to apply to a specific resource. Multiple resource-only profiles for multiple resource domains can
be assigned to the same user group, providing in-depth control over user access privileges to different
network elements.
True multi-configurator mode is supported, enabling most users with overlapping privileges to log in and
work in LightSOFT simultaneously.
Activity and security logs monitor user operations, system accesses, and password definitions directly from
LightSOFT windows without the use of UNIX commands.
OPTIONAL FEATURE: Running a web session is a fully integrated add-on capability, available
on a cost basis. If not purchased, this feature is unavailable.
X-Terminal:
Log in to a workstation with the LightSOFT client installed (for example, via Telnet).
At the command prompt, enter the following text:
/opt/NMS/client/sh/start_NMSclient.sh &
(The " &" can be added optionally to enable LightSOFT to continue working in the background if
the UNIX window is closed.)
NOTE: You can limit the number of users that can login concurrently. For details contact your
local Customer Support representative.
To log in to LightSOFT:
1. In the LightSOFT Login window, enter your user name and password.
2. Click Login.
Details of your last login are displayed if you logged in previously.
1. Click
2. Click Lock.
All open windows are hidden and the Unlock window appears, showing the locked user name.
The LightSOFT GUI Cut Through (GCT) enables you to easily and efficiently access EMS information or
perform EMS operations on selected objects without having to start an individual EMS session.
Figure 2-1: GCT to EMS
2. Click Logout.
OR
Field Description
LightSOFT Client SW Version Version of the client software.
Number of EMSs Number of EMSs managed by LightSOFT.
Disconnected EMSs Number of EMSs currently disconnected from LightSOFT.
Number of MEs Total number of MEs from all managed EMSs.
Number of Active Users Total number of LightSOFT users currently logged in.
NOTE: This procedure is valid only for database sizes which are less than 50GB.
The following script may be run on any LightSOFT server, or in the case of a cluster configuration, on the
main server.
NOTE: In some procedures and contexts, the term platform is referred to in the GUI as a shelf.
The LightSOFT graphic user interface makes it simple to manage complex networks. All main LightSOFT
functions are accessed from the main window, which provides the background for all other windows and
dialog boxes.
The LightSOFT main window provides an overall view of the network topology and its elements in a choice
of topology views. You can view information about elements, links, and trails, create network objects, and
perform a variety of operations, according to your security permissions.
The LightSOFT main window is always open unless minimized.
Figure 3-1: LightSOFT main window
NOTE: The profile of the user group of which you are a member determines the objects that
appear in LightSOFT views and the functions you can perform. If an option in a window or
dialog box applies to a function not available to your user group, the option will be
unavailable.
In the LightSOFT main window, you can open multiple windows simultaneously to see different views of the
network or subnetworks, with selected topology groups or objects. Each view can display a different
topology layer independent of other layers, having its own perspective in the network and allowing
different operations. The views can be cascaded or tiled on the view screen, as required.
The main window includes:
Map View: Graphical representation of the network and its objects, for the selected topology or
technology layer.
Inventory Tree: Hierarchical view of the network, enabling easy location of objects.
Navigator: Zoom into and quickly navigate to a specific area of the network.
LightSOFT Ribbon: Access the main LightSOFT functions from the ribbon. For information about each
menu command and its corresponding toolbar icon (if applicable), see Summary of Commands in
LightSOFT Supporting Information.
Alarm Counter Bar: Display the number of alarms or TCAs that meet specified criteria (see the
LightSOFT Fault Management and Performance Monitoring Guide).
Status Bar: Displays the current date and time. The and icons indicate the alarm state that
is currently in effect, showing alarm severity color coding in map windows for all alarmed objects or
only those that are unacknowledged.
LightSOFT can also be configured to use multiple physical monitors (for example, two or three monitors
placed side-by-side, or six monitors in a 2 x 3 array) as one large virtual display (Xinerama-style).
Figure 3-2: Xinerama
NOTE: You can automatically place LEs for all or for selected MEs/UMEs in the same position
as their equivalent objects at the physical layer. See Set LE location in the Topology
Management Guide.
(Zoom In)
(Zoom Out)
( Fit to View)
For example, in the Ethernet/MPLS layer, all MPLS objects are listed under the ETH/MPLS root . The
objects under the root include the following logical elements:
IP/MPLS elements
[unmanaged IP/MPLS elements (UMEs) have a similar router design but are tinted blue ]
MPLS elements
PB elements
EA-HVPLS elements
Port types are represented in the tree by the following icons:
PDH/Async
SDH/SONET
OTN aggregate
OTN tributary
Data port with UNI interface
Data port with I-NNI or E-NNI interface
All other data ports
The background color of a node icon (for example, or ) indicates the object’s usability state or
alarm severity. If the node is a parent, the icon color indicates the most severe status of the nodes
contained by it.
As you type, if bookmarks exist whose names include the partial string text, the Bookmarks panel
opens showing all relevant bookmarks.
OR
3. Click the arrow in the Search entry panel to view a bookmarked object.
4. Select a bookmark in the list.
7. Click .
The search is performed using the selected criteria and the first match is highlighted in the map view
area and the tree view.
NOTES:
Only nodes and links in the currently open technology layer are included in the current
search request. For example, when opening a trail list from the physical layer, the trail list
map portrays the SDH/SONET layer. You would therefore search for and add nodes using
their SDH/SONET layer name, not their physical layer name.
If more than one object with the same name is defined in the network, this search
mechanism locates the first instance. So if you have one instance that is already included
in the current view, and a second instance that is not included, this mechanism only
locates the first instance that is already included.
3. Enter names of the nodes or rings to be searched in the appropriate Find Objects pane (Nodes,
Rings).
Multiple names can be entered, separated by commas. Name strings must match exactly.
4. Click Find to start the network search.
Search results are listed in the lower section of the window, organized into the relevant panes
(Found Nodes, Found Rings, or Not Found Objects).
5. Click Apply to close the window and add the located items to the open map.
NOTE: LightSOFT, as a universal management system, can manage networks working in either
SDH or SONET network contexts, or even both. LightSOFT can be configured at installation to
display port labels identifying the SDH interface rates, the SONET interface rates, or both
SDH/SONET interface rates.
This enables greater flexibility when working with equipment in various network contexts. For
example, when working under LightSOFT configured in SDH mode:
Network operators working with Apollo equipment can configure SONET ports on Apollo
platforms.
Optical (LP) trails can be provisioned for either SDH or SONET interfaces.
ETH/MLPS layer: Displays LEs representing Ethernet bridges, MPLS-TP PEs, IP/MPLS PEs, and all
Ethernet transport elements. Links in this layer reflect physical connections between elements. The
ETH/MPLS layer also enables you to define logical network connections between LIFs on IP/MPLS PEs,
Ethernet and MPLS services, EoS trails, and MoE links.
Optical layer: View all nodes that represent logical elements of the optical layer. Links in this layer
reflect physical connections between elements. Optical trails are acquired (created) and monitored
from this layer. See Optical trail provisioning in the Trails Management Guide.
OCH layer: Filtered view of the Optical layer, showing OCH logical connections when building traffic in
the OTN network. The OCH layer includes virtual links based on OCH trails, physical links that are
servers to LP trails, and LEs containing relevant ports. The OCH layer hides the WDM network
complexity, which may not always be relevant to OTN users.
You can create LP trails in the OCH layer. However any configuration of topology objects such as
groups or LEs must be performed in the Optical layer.
LightSOFT automatically recognizes the relationships between layers. The displayed layer shows its own
objects and links, as well as "virtual" link representations of trails from an underlying technological layer.
Each topology layer displays only the relevant alarm indicators, to enable fault management per technology
type.
NOTES:
When multiple topology layers are available, LightSOFT opens in the Physical layer by
default. The default can be changed in the relevant .ini file. Contact Customer Support for
more details.
Mapping of ports to layers is not supported for SYNCOM or Luminet equipment.
The following diagram shows how physical elements are represented in their own technology layer in a
client-server architecture.
Figure 3-4: Layered management approach
2. In the main window General tab, in the Viewing group, click Create Bookmark .
The Create Bookmark window opens.
4. Click OK.
The bookmark is listed in the Bookmarks panel with a custom bookmark symbol in its Status
cell.
You can add or remove elements from an existing custom bookmark.
You can also modify the name and access level.
Option Description
Print Prints the contents of the current list or map window. See Print.
Help Help: Opens the window context sensitive help page.
About LightSOFT: Displays information about your LightSOFT installation, including the
licensed optional features. See About LightSOFT window.
Lock Locks the client station, closing only EMS windows.
Your user name and password are required to unlock the station. See Lock or unlock a client
session.
Logout
Logs out the current user, closing all windows.
Your user name and password are required to log in again. See Log out of LightSOFT.
Exit Exits the client.
Option Description
Inconsistency Counters
Trail Inconsistency Shows number of trail inconsistencies.
Indicator (TCI) counter See Create and manage alarm and inconsistency counters in the Fault
Management and Performance Monitoring Guide.
Tunnel Inconsistency Shows number of inconsistent tunnel segments.
counter See Create and manage alarm and inconsistency counters in the Fault
Management and Performance Monitoring Guide.
Service Inconsistency Shows total Inconsistent + Incomplete + Not Admitted services.
counter See Service inconsistency counter in the Fault Management and Performance
Monitoring Guide.
Option Description
Viewing
Search Searches individual objects (MEs, LEs and UMEs) or groups or locates
bookmarked objects throughout any currently open map view.
Add Objects Add node and/or ring objects to the current topology view. See Add objects
to current topology view.
Create Bookmark Applies a permanent bookmark to objects selected in the map view.
Refresh Refreshes the current map view.
Fit to View Fits the active Topology View so that you can see all selected NEs.
Option Description
Zoom In Increases the magnification of objects in the Map view. See Zoom in or out of
the map.
Zoom Out Decreases the magnification of objects in the Map view.
Faults
Current Alarms Displays the Current Alarms window.
See Introducing the fault management GUI windows in the Fault
Management and Performance Monitoring Guide.
Current TCA Displays the Current Threshold Crossing Alert (TCA) window.
Traffic
Create Trail Displays the Create Trail window.
See Create SDH/SONET and EoS/MoT trails in the Trails Management Guide.
Trail List Displays the Trail List window.
See Access the trail list window in the Trails Management Guide.
Create Tunnel Displays the Create Tunnel window.
See MPLS tunnel provisioning in the Tunnels Management Guide.
Tunnel List Displays the Tunnel List window.
See Tunnel operations in the Tunnels Management Guide.
Create L2VPN Service Displays the Create L2VPN Service window.
See Create a service in the Services Management Guide.
L2VPN Service List Displays the L2VPN Service List window.
See L2VPN service operations in the Services Management Guide.
Create L3VPN Service Displays the Create L3VPN Service window.
See Create a service in the Services Management Guide.
L3VPN Service List Displays the L3VPN Service List window.
See L3VPN service operations in the Services Management Guide.
Topology
Topology Link Creates a new physical link between selected endpoints.
See Topology link management in the Topology Management Guide.
Properties Displays the properties of a selected item. The information displayed
depends on the type of item selected. There are info windows for MEs,
UMEs, EMSs, LEs, groups, ports, alarms, events and for LightSOFT itself.
Delete Deletes a selected object.
See Delete objects in the Topology Management Guide.
IP Network Management Displays the IP Network Management window.
See Create an IP network in the Topology Management Guide.
Map Operations
Expand Displays individual objects that are members of the selected groups in the
current view.
See Expand or collapse a group in the Trails Management Guide.
Option Description
Expand in New View Displays individual objects that are members of the selected groups in a new
view.
Expand All Displays individual objects that are members of all existing groups in the
current view.
Collapse Displays selected objects as members of their respective groups by showing
the group icons in the map instead of the individual object icons.
Collapse All Displays all objects as members of their respective groups by showing the
group icons in the map instead of the individual object icons.
Open in New View Opens a new map window displaying only the objects selected in the current
map window.
Lock Locks the elements so that they cannot be moved.
See Move objects in the LightSOFT map.
Move Only Enables you to drag the elements to the new position. The action is only valid
for the current session.
Move and Save Enables you to drag the elements to the new position. LightSOFT saves the
new location for future sessions.
Views
Views Shows which additional window views are currently open and enables you to
select one as the primary view.
Option Description
Create
ME Creates a new ME using GCT to the relevant EMS.
See Create MEs in the Topology Management Guide.
UME Creates a new ME based on a template.
See Create UMEs in the Topology Management Guide.
Group Creates a new group based on selected objects.
See Create groups in the Topology Management Guide.
Topology Link Creates a new physical link between selected endpoints.
See Topology link management in the Topology Management Guide.
Logical Data Link Creates a new LDL link designed to provide ASON protection to non-ASON-
enabled elements in the trail path. See Create an LDL link in the Topology
Management Guide.
EMS Creates a new EMS.
See Create an EMS in the Topology Management Guide.
Option Description
LE Creates a new logical element.
See LE management in the Topology Management Guide.
MS-SPRing Creates a new MS-SPRing protection ring.
See Create an MS-SPRing ring in the Supporting Information Guide.
Modify ME/LE
LEs Modifies the ports distribution between a primary and secondary LE.
See Modify LE ports in the Topology Management Guide.
Add to Group Adds an object to a group.
See Add MEs, LEs, and groups to a group in the Topology Management Guide.
Remove from Group Removes an object from a group.
See Remove MEs, LEs, and groups from a group in the Topology Management
Guide.
Move ME Move one or more MEs from one EMS to another.
See Move MEs between EMSs in the Topology Management Guide.
Unified Migration Migrate one or more NEs to a different NE type, while retaining the
functionality of the original NE.
See Unified Migration in the Topology Management Guide.
MCIPS Migration Opens the MCIPS Migration window, enabling different migration types such
as CPS to MCIPS.
Modify Links
Insert ME/UME Inserts an element into a topology link.
See Insert elements in SDH/SONET links in the Topology Management Guide.
Remove ME/UME Removes an element from a topology link.
See Remove an element from a link in the Topology Management Guide.
Insert PE Inserts an MPLS PE to an existing MoT trail or MoE link.
See Insert MPLS PEs into MoT/MoE links in the Topology Management Guide.
Remove PE Removes an MPLS PE from an MoT trail or MoE link.
See Remove MPLS PEs from MoT/MoE links in the Topology Management
Guide.
Migrate Links & Trails Opens the Migrate Topology Links and Trails window.
Lists
EMS List Opens the EMS List window for viewing or creating EMSs.
See View the EMS list in the Topology Management Guide.
Link List Opens the Link List window for performing actions on selected links.
See Work with multiple links and LEs in the Topology Management Guide.
LE List Opens the LE List window for performing actions on selected LEs.
MS-SPRing List Opens the MS-SPRing List window listing the MS-SPRing rings defined in the
network.
See MS-SPRing list window fields in the Supporting Information Guide.
Option Description
IP Networks
IP Network Management Displays the IP Network Management window.
Option Description
Alarms
Current Alarms Displays the Current Alarms window.
Current TCA Displays the Current Threshold Crossing Alert (TCA) window.
Events
Event Log Displays the Event Log window.
Event Log History Displays the Event Log History window.
See View historical events in the Fault Management and Performance
Monitoring Guide.
Event Log Configuration Allows you to archive excess or older records, view archived events and
periodically clear archived files. You can also set types of events which trigger
the logging of an event.
See Configure event log, archive, and historical view in the Fault
Management and Performance Monitoring Guide.
Counters
Alarm Counters Displays the Alarm Counters window.
See Create and manage alarm and inconsistency counters in the Fault
Management and Performance Monitoring Guide.
Alarm Indicators Displays the Alarm Indications window.
See Create and manage alarm and inconsistency counters in the Fault
Management and Performance Monitoring Guide.
Configuration
Option Description
Fault Management Allows you to customize the color coding of alarm statuses and change the
Preferences alarm state mode.
See Customize fault color coding , which determines if objects with all alarms
acknowledged should be separately color coded in map windows.
See Change the alarm state mode.
Alarm Forwarder Implements the Alarm Forwarder features, as described in Alarm forwarding
Configuration by FTP to remote servers and Alarm forwarding by SMS and email in the Fault
Management and Performance Monitoring Guide.
Option Description
General
Create Trail Displays the Create Trail window.
See Create SDH/SONET and EoS/MoT trails in the Trails Management Guide.
Trail List Displays the Trail List window.
See Access the trail list window in the Trails Management Guide.
Trail Consistency Opens the Trail Consistency Indicator (TCI) window, where you can view
details of trail inconsistencies for selected trails.
See Trail synchronization in the Trails Management Guide.
Trail Filters Displays the Trail Filters window.
See Create a custom filter.
Utilities
Use Exclusive Enables an SP user to temporarily change the Exclusive status of CNM
Resources:None resource domains to allow trail provisioning using those resources, for
example to facilitate CNM requests for SP assistance in creating trails or
troubleshooting.
See Provisioning mode.
Import Trails Enables importing trails from an XML file.
See Import trails in the Trails Management Guide.
Option Description
Plan Trail Enables you to design networks ahead of time by fully provisioning "planned"
trails even while prospective resources are currently occupied and exporting
them to XML until needed. When the new network design is ready to be
implemented, planned trails may be imported to LightSOFT as part of the
active network.
See Planned trails in the Trails Management Guide.
Discover Optical Trails Automatically acquires all optical trails associated with selected or all optical
links that do not already have trails configured, in a single operation.
See Create optical trails through discovery in the Trails Management Guide.
Migrate Trails Enables optical trail migration to facilitate upgrading and expanding your
optical network.
See Optical trail migration in the Trails Management Guide.
Option Description
General
Create Tunnel Displays the Create Tunnel window.
See MPLS tunnel provisioning in the Tunnels Management Guide.
Tunnel List Displays the Tunnel List window.
See Tunnel operations in the Tunnels Management Guide.
Tunnel Consistency Opens the Tunnel Segment Consistency (TSC) window, where you can view
details of tunnel inconsistencies for selected tunnel segments.
See Tunnel synchronization in the Tunnels Management Guide.
Tunnel Filters Displays the Tunnel Filters window.
See Create a custom filter.
Automation
Create Tunnel Mesh Opens the Create Tunnel Mesh window which connects each two points of a
set of PEs with tunnels.
See Automatic multitunnel creation in the Tunnels Management Guide.
Option Description
Create Multiple Bypass Opens the Create Multiple Bypass window, which creates bypass tunnels for
comprehensive protection to multiple nodes and links.
See Automatic multitunnel creation in the Tunnels Management Guide.
Create Root and Leaf Opens the Create Root and Leaf Tunnels window, which creates multiple
Tunnels tunnels in a multi-rooted topology, providing the tunnel infrastructure for
P2MP services.
See Automatic multitunnel creation in the Tunnels Management Guide.
Utilities
Import Tunnels Utilities Enables importing tunnels from an XML file.
See Import tunnels in the Tunnels Management Guide.
Option Description
L2VPN
Create L2VPN Service Displays the Create L2VPN Service window.
See Create an L2VPN service in the Services Management Guide.
L2VPN Service List Displays the L2VPN Service List window.
See Access the L2VPN service list window in the Services Management Guide.
L2VPN Service Consistency Opens the L2VPN Service List window with the filter set to Inconsistent
services.
For information about inconsistent services, see L2VPN service acquisition
and ESI in the Services Management Guide.
L2VPN Service Filters Displays the L2VPN Service Filters window.
See Create a custom filter.
L2VPN Utilities
Import L2VPN Services Enables importing services from an XML file.
See Import L2VPN services in the Services Management Guide.
Policer Profile List Opens the Policer Profiles List window, which is used to manage policer
profiles.
See Manage policer profiles in the Services Management Guide.
Option Description
L3VPN
Create L3VPN Service Displays the Create L3VPN Service window.
See Create an L3VPN service in the Services Management Guide.
L3VPN Service List Displays the L3VPN Service List window.
See Access the L3VPN service list window in the Services Management Guide.
L3VPN Service Consistency Opens the L3VPN Service List window with the filter set to Inconsistent
services.
See Manage L3VPN service inconsistencies in the Services Management
Guide.
L3VPN Service Filters Displays the L3VPN Service Filters window.
See Create a custom filter.
L3VPN Utilities
Import L3VPN Services Enables importing services from an XML file.
See Import an L3VPN service in the Services Management Guide.
Option Description
BGP
BGP Configuration Opens the BGP Configuration window, enabling BGP configuration of
objects according to BGP Global properties, route selection and routing
policy.
See BGP configuration in the Services Management Guide.
Discover BGP Peer Opens the Discover BGP Peer window, enabling peer discovery according to
selected PEs and VRF.
See Discover BGP Peer in the Services Management Guide.
BGP RR Configuration Opens the BGP RR Configuration window, enabling the configuration of
route reflectors in BGP.
IP Multicast
PIM Configuration
Opens the PIM Configuration window, enabling PIM configuration of
objects according to object properties, PIM interfaces, static and anycast RP
configurations.
See PIM configuration in the Services Management Guide.
Option Description
IGMP Configuration
Opens the IGMP Configuration window, enabling IGMP configuration
according to IGMP interface configuration and static MC groups.
See IGMP configuration in the Services Management Guide.
MC View Opens the MC View window, enabling multicast configuration of MC
routers and interfaces.
See MC View in the Services Management Guide.
DHCP
DHCP Relay Agent Opens the DHCP Relay Agent window, enabling the display of DHCP Relay
Agent properties on an L3-LIF according to server name, LIF name and
router address.
See DHCP Relay Agent in the Services Management Guide.
Option Description
Maps
Availability Map Opens the Availability Map window, which shows available resources for each
link at various rates.
See View resource availability on links in the Topology Management Guide.
RSTP/ERP Map Opens the RSTP.ERP Map windows, which show the currently active RSTP/ERP
configurations.
See View RSTP/ERP information in the Services Management Guide.
Timing Map Opens the Timing Map window, which allows you to monitor the network's
timing topology.
See Monitor timing sources in the Fault Management and Performance
Monitoring Guide.
Control Map Opens the Control Map window, which allows you to view all LightSOFT-
supported control entities from a single location.
See View and manage network control entities in the Fault Management and
Performance Monitoring Guide.
Background Maps
Upload Map File Implements a new map in all LightSOFT map views.
See Install a background map.
Option Description
Remove Background Removes the background map from map views, replacing it with default or
Map configured color schemes.
See Remove the map.
Positioning
Fit to Map Enables you to fit the view to the map location if you cannot find the map.
Adjust Nodes to Moves batches of nodes to specific areas of the new map as required.
Region
Set LE Location Set LE Location: Places LEs in the corresponding SDH/SONET or Optical topology
map views.
See Set LE location in the Topology Management Guide.
Messaging
Notepad Opens the Notepad text editor. See Use notepad.
Bulletin Board
Opens the Bulletin Board for posting messages to LightSOFT users.
See Post messages to a bulletin board.
Send Message Sends a message to any user logged in to the system.
See Send messages to logged-in users.
Analyses
Failure Analysis Performs trail failure analysis to identify network traffic vulnerabilities.
See Perform trail failure analysis in the Topology Management Guide.
OTDR
OTDR Links
Focus on OTDR links in the topology map.
See Highlight OTDR links in the Topology Management Guide.
Option Description
Security
Security Configuration Configures the various aspects of user access security.
See Security.
Change Password Changes the system access password for your user name.
See Change your password.
Active Users Displays the users that are connected to the server to send a message or
force a logout if required.
See Monitor active users.
Option Description
Activity Log Enables you to monitor user operational activities.
See Activity and security logs.
Security Log Enables you to monitor user system access (login and logout) and password
definition.
Tools
Preferences Opens the User Preferences window for determining the parameters
available in traffic list windows and aspects of Create traffic entity behavior.
See User and system preferences configuration.
LightSOFT Info Displays basic information about your LightSOFT application.
See View licensing information (page 2-4).
Ping Pings an ME to determine whether it is connected to the network and the
quality of the connection.
See Ping an object in the Topology Management Guide.
Set Route Opens a UNIX window and activates the Set Route script for setting EMS IP
routing data that regulates the communication between the EMS and its
managed NEs.
See Set EMS IP routing data in the Topology Management Guide.
Set Printers Enables you to access the EMS printer configuration window where you can
set the standard printer device.
See Set printers in the Topology Management Guide.
Close GCT Session Closes GCT sessions to all EMSs, closing all open EMS windows.
See Access an EMS via LightSOFT in the Topology Management Guide.
ASON/WSON ME Triggers download of metric data for ASON/WSON MEs. This is enabled only
Parameters Download if metrics are not aligned through the system preferences settings.
See ASON/WSON configuration preferences.
IP Multicast ME Click OK to download the IP Multicast parameters.
Parameters Download
Force Upload
EMS Force uploads the selected EMSs.
See Force EMS uploads in the Topology Management Guide.
ME Force uploads the selected MEs.
See Force an ME upload in the Topology Management Guide.
ME and Connections Force uploads the selected MEs with internal subnetwork connections (cross
connects).
Alarms Force uploads the alarms of the selected EMSs.
NOTE:
Many of the features described below are also available by right-click on an empty area
in the map view.
Click Show Network in the menu as follows:
Option Description
Map
Expand All Displays individual objects that are members of all existing groups in the
current view.
See Expand or collapse a group in the Topology Management Guide.
Collapse All Displays all objects as members of their respective groups by showing the
group icons in the map instead of the individual object icons.
Refresh Refreshes the current map view.
Move
Lock Locks the elements so that they cannot be moved.
Move Only Enables you to drag the elements to the new position.
See Move objects in the LightSOFT map. The action is only valid for the
current session.
Move and Save Enables you to drag the elements to the new position and LightSOFT saves
the new location for future sessions.
Select
Select All Selects all the elements in the current topology layer.
Inverse Selection Selects all the elements in the current topology layer that are not currently
selected and deselects those that are currently selected.
Zoom & Navigation
Back Reverts to the map positions corresponding to earlier-found object views, or
the view before Fit to View was last selected.
Forward Reverts to the map positions corresponding to later-found object views, or
the view after Fit to View was last selected.
Fit to View Fits the active Topology View so that you can see all selected NEs.
Option Description
Zoom In Increases the magnification of objects in the Map View. See Zoom in or out
of the map.
Zoom Out Decreases the magnification of objects in the Map View.
Display
Tree Alternately shows/hides the Inventory Tree.
See Inventory tree.
Navigator Alternately shows/hides the Navigator window.
See Navigator window.
Ribbon Alternately shows/hides the main window option tabs.
Status Bar Alternately shows/hides the main window status bar.
Show/Hide
MPLS Shows/hides MPLS network topology components and their associated links
in the map view and tree (enabled when the ETH/MPLS layer is selected).
See MPLS networks in the Topology Management Guide.
PB Shows/hides PB network topology components and their associated links
(enabled when the ETH/MPLS layer is selected).
See Provider Bridge (PB) networks in the Tunnels Management Guide.
Empty Primary LE Shows/hides empty primary LEs (where all associated components split out
to secondary LEs are hidden). Their split secondary LEs remain in the view.
For information about secondary LEs, see Create secondary LEs in the
Topology Management Guide.
IP NW Shows only the relevant IP network to prevent overcrowding on the screen.
Note that this user preference is not preserved after logout.
Show UMEs Shows/hides UMEs while in the Physical (EMS) topology view.
Show Only Radio Links Shows/hides radio links in the Map View in the Physical (Site), SDH/SONET
and ETH/MPLS views.
Labels Shows/hides NE labels in the Map View.
Window
Cascade Displays all open windows, one on top of the other, including their title bars.
Tile Horizontally Tiles all open windows horizontally.
Tile Vertically Tiles all open windows vertically.
Views Shows which additional window views are currently open and enables you to
select one as the primary view.
Option Description
Element
Open Opens a GCT session for the selected EMS.
See Access an EMS via LightSOFT in the Topology Management Guide.
Properties Displays the properties of a selected item. The information displayed
depends on the type of item selected. There are info windows for MEs,
UMEs, EMSs, LEs, groups, ports, alarms, events and for LightSOFT itself.
Delete Deletes a selected object.
See Delete objects in the Topology Management Guide.
Map
Open in New View Displays selected objects in a new Map window.
See Expand or collapse a group in the Topology Management Guide.
Expand Displays individual objects that are members of the selected groups in the
current view.
Expand in New View Displays individual objects that are members of the selected groups in a new
view.
Collapse Displays selected objects as members of their respective groups by showing
the group icons in the map instead of the individual object icons.
2. To customize the color for a specific object, click the relevant color swatch.
A color selection panel opens.
3. Click the color you require, or click for an extended list of colors.
4. Select the color you want.
5. Click OK.
NOTE: When moving nodes that are part of a group, the group must be expanded and all
nodes specifically selected.
TIP: To focus on specific types or subsets of information, table data can be filtered. See
Filtering list table information.
7. To define the row height, enter the relevant value in the row height selector .
8. To save, click .
The Configure Columns panel closes and you return to the list table.
2. Click Preferences .
The Preferences window opens.
3. Select the Divide Table to Pages checkbox.
4. In the Maximum Number of Rows per Page dropdown list, select the number of rows you want to
display per page.
5. Click OK.
The table view is updated.
The following object statistics are shown in the status bar at the bottom of the List Table:
Total objects: n/n (for example, 9/9 - number of filtered objects out of the total number of objects
that can be displayed.
Selected: n - total number of selected objects (with marked checkboxes).
NOTE: To enable the List Table to open quickly, it is recommended that you apply the No
Trails/No Tunnels/No Services filter (as relevant) to be the default filter. You can then apply a
predefined, custom or quick filter to view the objects you require.
You can also create or edit a custom filter. See Create a custom filter and Edit a custom filter.
You can filter the objects displayed in the object List Table. See Filter the list table using quick filter.
TIP: Custom filters can be created for trail, tunnel and service objects. The filter creation
mechanism is the same for all three types of objects. Some of the options will differ,
depending on the object type.
The following procedure steps include sample screenshots for creation of a custom trail filter.
The actual filter options listed as you work will vary, depending on the type of object selected.
( , , , ).
The selected Filters window opens showing a list of available filters.
2. Click New.
The Create Filter window opens.
6. If multiple dropdown list selections are required for a parameter, open the list again and select
additional values.
The multiple selections are displayed in the Value area.
7. Repeat the previous steps for as many parameters as needed.
8. To filter by selected resources with which the filtered objects are associated click .
The Topology Tree opens.
13. To remove an object, select the object in the Topology tab and click Remove .
14. (Trails only) To filter by resource role, in the Resource Role dropdown list, select:
All Trails (default): Include only trails that either end in or traverse the selected objects.
Terminating: Include only trails that end in the selected objects.
Through: Include only trails that traverse the selected objects.
Intersecting: Include only trails that start and end at the selected objects.
15. Click Save.
The filter is saved and appears in the Filter dropdown the next time you open the List Table.
5. To edit the filter criteria, select the filter and click Edit.
The Edit Filter window opens.
6. In the Filter By area, select the parameter checkbox.
When a parameter is selected, the Value area shows either:
Text entry field (see text entry note at the end of this section)
Dropdown list of possible values
Radio buttons
From/To date/time entry fields
7. Specify the required value.
8. If multiple dropdown list selections are required for a parameter, open the list again and select
additional values.
The multiple selections are displayed in the Value area.
9. Repeat the previous steps for as many parameters as needed.
10. To filter by selected resources with which the filtered objects are associated click .
The Topology Tree opens.
11. In the Layer dropdown, select the relevant topology layer.
12. Expand the tree and select the object(s) that you want to include.
15. To remove an object, select the object in the Topology tab and click Remove .
16. (Trails only) To filter by resource role, in the Resource Role dropdown list, select:
All Trails (default): Include only trails that either end in or traverse the selected objects.
Terminating: Include only trails that end in the selected objects.
Through: Include only trails that traverse the selected objects.
Intersecting: Include only trails that start and end at the selected objects.
17. Click Save.
The changes are saved.
TIP: The List window may be time consuming if the default filter is one that returns a large
number of results.
To ensure the List window opens quickly, define the No Objects filter as the default filter. You
can then apply the filter you want after the List window opens.
The List Table is dynamically updated to display only entries that match the criteria specified.
1. In the List Table, click Quick Filter ( , , , at the right side of the table.
The Quick Filter bar appears above the List Table.
2. In the Filter Fields dropdown, select the number of search field options you want.
The number of cells displayed changes accordingly.
The criteria specified in each search field are cumulative, so only results that satisfy all criteria are
returned.
3. In each filter field, click and select one or more criteria you want to use.
The table below lists all the filter criteria available for each type of object.
4. Select All to search all criteria. If not specified, All criteria are selected by default.
NOTE: If using the same type of criteria in more than one field:
Force Filter: The search uses the operator OR
(e.g. filter searches for either Label A or Label B).
Quick Filter: The search uses the operator AND
(e.g. filter searches for Label containing both A and B).
5. (Optionally) In each filter field, click and select one or more of the following additional options:
Case sensitive/Case insensitive: Indicate whether the search should be case sensitive.
Use wild cards: Select to activate use of wildcards for that search field.
Match from start: Return only results that match the text entered from the start of the entry.
Match exactly: Return only results that match the text entered exactly.
Match anywhere: Return results that contain the text entered at any place in the entry.
6. In each field, enter the criteria you want to search for.
7. To save the entry for future use, press ENTER.
The entry will appear in a dropdown list next time you click the cell.
The List Table is automatically updated to show only the results that fulfill the filter criteria.
1. In the List Table, click Quick Filter ( , , , ) at the right side of the table.
The Quick Filter bar appears above the List Table.
2. In the Filter Fields dropdown list, select the number of search field options you want.
The number of cells displayed changes accordingly.
The criteria specified in each search field are cumulative, so only results that satisfy all criteria are
returned.
3. In each filter field, click and select the criteria you want to use.
See Filter the list table using quick filter for a table listing all the filter criteria available for each type
of object. Only one criteria can be applied per field.
NOTE: If using the same type of criteria in more than one field:
Force Filter: The search uses the operator OR
(e.g. filter searches for either Label A or Label B).
Quick Filter: The search uses the operator AND
(e.g. filter searches for Label containing both A and B).
4. Optionally, in each search field, click and select one or more of the following additional options:
Match from start: returns only results that match the text entered from the start of the entry.
Match exactly: returns only results that match the text entered exactly.
Match anywhere: returns results that contain the text entered at any place in the entry.
5. For each search field, enter the criteria or part of the criteria you want to apply.
The text you enter is saved automatically for future use and appears in a dropdown list next time you
click the cell.
You can also select a list of ports, LEs, or groups in the Ethernet layer Inventory tree, which adds them as an
additional selection criteria.
Entity Selection Criterion Comment
Port List of Ports Services with any endpoint in the list are included.
LEs List of LEs Services with any endpoint on the LE are included.
Groups List of Groups Services with any endpoint in the list are included.
The possible transport architecture configurations are represented in the following diagram.
Figure 7-1: Transport architecture
These types of trail - tunnel - service layering are supported by LightSOFT and described in the sections that
follow.
The topology configuration decisions (for example, SDH/SONET over optical vs. physical) are based on the
network architecture.
The transport infrastructure that different services traverse involves trail and tunnel client-server layering
according to their technologies. For example:
A topology that includes an optical layer can have SDH/SONET or Ethernet services traversing it,
benefiting from optical layer rate flexibility.
If an optical layer is unavailable, traffic can be carried over SDH/SONET rings, directly traversing the
physical optical fiber.
Ethernet traffic usually traverses SDH/SONET rings (EoS), but can also traverse the optical layer
directly. MoT trails must traverse the SDH/SONET layer.
For information about how the various traffic entities are managed, see the following topics in the Trails
Management Guide, Tunnels Management Guide and the Services Management Guide.
Ethernet service provisioning
MPLS tunnel provisioning
SDH/SONET and EoS/MoT trail provisioning
Optical trail provisioning
Provisioning
These sections describe how to create the traffic infrastructure:
SDH/SONET and EoS/MoT trail provisioning describes how to create SDH/SONET and SDH/SONET-
based Ethernet trails with the Create Trail window and planned trails with the Plan Trail window,
involving a variety of trail creation options and protection mechanisms.
MPLS tunnel provisioning describes how to create MPLS tunnels, the infrastructure for L2VPN/L3VPN
services.
Ethernet service provisioning describes how to create MPLS and VPLS L1 and L2 carrier class E2E
L2VPN services.
Optical trail provisioning describes how to create OMS, OCH and LP optical trails using various
methodologies.
Synchronization
These sections describe how to reconcile differences between traffic entity definitions in LightSOFT and an
EMS, or acquire traffic entities defined at the EMS level:
Trail synchronization describes how to use the Trail Consistency Indicator window to reconcile
differences between trail definitions in LightSOFT and an EMS, or acquire optical trails defined at the
EMS level.
Tunnel synchronization describes how to reconcile tunnel differences.
Ethernet service synchronization describes how to perform service ESI operations.
IMPORTANT:
The capability profile of your user group determines the functions you may perform.
The resource domain of your user group determines the objects you may manage. See
Resource domain management in the Services Management Guide.
The constraints described in this section are applied on a preliminary selection of potential paths that
satisfy least-intersection criteria.
PathFinder chooses from among potential paths according to link quality. If the potential paths include a
mixture of link qualities (links are not all unprotected), the PathFinder preference depends on the
requested protection type. For example, if the user requests the trail to have:
Current protection - paths on unprotected links have the highest priority.
Underlying protection - paths on full protected links have the highest priority.
OPTIONAL FEATURE:
The rich set of configurable PathFinder criteria are all optional features.
Configurable criteria include the number of hops, number of MEs, link availability, cost
and quality assignments, and so on.
Users can also define the PathFinder path diversity preferences (heuristic [faster], or
guaranteed [slower]).
Alternatively, you can direct PathFinder to exclude links below or above a certain availability. For example:
Not to use links which are totally unused and then set the first choice maximum to be less than 100%,
for example 99%.
To leave links with some spare capacity (say 15%) and then set the second choice minimum to be
more than 0%, for example 15%.
NOTE:
The values 100% and 0% denote exactly 100% and 0%.
For other values, the actual percentage used is just below the next whole number. For
example, 99% denotes just under 100%.
Y EFEC 13
Y FEC 18
Y EFEC 16
Bit Rate Tunable Non-tunable Line Code FEC type Minimum OSNR
40G RZ-DQPSK Both 13.5
NOTE:
Note that higher OSNR Weight values correlate with better signal quality.
Not all trails require the highest OSNR Weight value possible.
Depending on traffic and QoS requirements, some trails may require extremely clear
signals that correlate with the highest OSNR Weight values.
Other trails may provide perfectly satisfactory services with much lower OSNR Weight
values.
The PathFinder algorithm is activated when a tunnel is completed i.e. when all tunnel parameters are set
and you click Complete.
PathFinder applies the constraints described in this section.
Optimization Pane
This pane displays the optimization constraints that can be defined for PathFinder consideration when
determining new tunnel paths:
Optimization Criterion: Select the parameter which the PathFinder should optimize:
Min Metric: Minimum tunnel cost i.e. the sum of costs of all links through which the tunnel
traverses. See Link TE Metric parameter in Link Properties - TE other tab in the Trails
Management Guide. For details of how Min Metric minimizes tunnel cost, and the other
parameters involved in the process, see Minimize tunnel cost.
Min Hops: Minimum number of hops.
Min Length: Minimum tunnel length i.e. sum of the lengths of all links through which the tunnel
traverses.
For a description of these parameters, see Create Tunnel Window - Tunnel Parameters - General
parameters pane in the Supporting Information Guide.
Tunnel Hop Limit: The maximum number of PEs (up to 255) that a tunnel can traverse, including the
Source and Destination PEs.
Link vs. Node Protection Penalty: Enter a value (up to 1,000,000) to add to the cost of a "Link
protected" link direction (meaning the more robust "Node protected" links are preferred). The value 0
means Node protection has no preference over Link protection. This is relevant when an FRR
Guarantee applies. See parameter description in Create Tunnel Window - Advanced tunnels
parameters pane in the Supporting Information Guide.
Promote Sharing Among P2MP Subtunnels checkbox: Select the checkbox to encourage the sharing
of links used by subtunnels with the same Tunnel ID. LightSOFT accomplishes this by considering the
link cost (metric, length or hops) to be zero, thereby favoring such links in path selection.
Maximum Sharing: Select the checkbox to enable maximum link sharing between the actual path and
the provisioned path.
SRLGs Pane
This pane determines how SRLGs should be considered by PathFinder in the Bypass path selection decision.
For more information about SRLGs and how the PathFinder considers them, see SRLG avoidance in bypass
path selection in the Supporting Information Guide.
Common SRLGs Penalty checkbox: When the checkbox is not selected (default), PathFinder
automatically disqualifies paths that share any SRLGs with the protected path from being considered
as a Bypass path. When selected, those paths are not automatically disqualified and are considered in
path selection based on how they satisfy other optimization criteria.
NOTE: If a Bypass tunnel is node-protecting (rather than link-protecting), the protected node
and all of its links are automatically disqualified from PathFinder consideration, regardless of
SRLG assignments.
For the default color correspondences per severity, see Severity breakdown pane in the Tunnels
Management Guide.
The colors can be customized according to your needs, with system-wide application.
A standard customization procedure is used. See Customize LightSOFT object status colors.
Messages Pane
Select a checkbox to enable the messages and warnings you want to appear in the course of the
tunnel management process (checkboxes are enabled by default).
Behavior Pane
The checkboxes set map endpoint and tunnel display preferences in the Create Tunnel and Tunnel List
window map views (enabled by default):
Automatically select the trail endpoints: When selected, the Tunnel List window map automatically
shifts to display at least one endpoint of each displayed tunnel. This is useful when working with large
topologies having widely separated elements, avoiding manually scrolling to the relevant tunnel
endpoints. Note that the automatic shift of the map may take some time.
Show only the PEs and links over which the tunnel traverses: When selected, only the links and
elements over which a tunnel traverses are highlighted when selecting a tunnel in the Tunnel List
window.
Colors Pane
To customize the appearance of the Create Tunnel and Tunnel List windows, for each of the elements
listed select the relevant color from the dropdown list.
OPTIONAL FEATURE:
Automatic tunnel creation when provisioning a new customer service type is a fully
integrated add-on capability, available on a cost basis. If not purchased, the functionality
and related menu options are unavailable.
Customer service types include MP2MP, Rooted MP, P2P, P2MP (E-Tree), Freeform and
CES. (see Create an L2VPN Service in the Services Management Guide).
Tunnel Selection With Service CAC, applies to services where Service CAC is calculated. See
Understanding MPLS CAC and service overbooking in the Services Management Guide:
Most residual bandwidth: PathFinder prefers tunnels that have the greatest amount of
bandwidth available, thereby enabling more services to be built later in the same tunnels.
Min. residual bandwidth: PathFinder prefers tunnels that have the least bandwidth available
after the service is assigned, thereby minimizing unused bandwidth in tunnels.
Tunnel Selection Without Service CAC, applies to services where Service CAC is not relevant:
Min. configured services: PathFinder prefers tunnels that have the least number of services
already configured, thereby spreading out services amongst available tunnels.
Max. configured services: PathFinder prefers tunnels that have the greatest number of services
already configured, thereby concentrating services on fewer tunnels.
Selectable I-NNI Links for Manual S-VLAN Registration: allows (RSTP Enabled) or disallows (RSTP
Disabled) RSTP to be used for EoS trails selected for P2P or P2MP service creation in PB networks.
RSTP is generally disallowed for P2P service creation in PB networks. It can be allowed, for example,
to implement P2P "back door" protection (see Configuring PB P2P services between cards in the
Services Management Guide). In this case, the Create Trail - EoS/MoT Configuration pane RSTP
Enabled checkbox must also be selected (see the RSTP Enabled parameter description in EoS/MoT
configuration pane in the Trails Management Guide).
For PB P2P or P2MP services, whether or not RSTP Enabled trails will be employed, the Preference
parameter (above) and the EoS/MoT Configuration pane RSTP Enabled checkbox selections must
always match (whether both RSTP Enabled or both RSTP Disabled). Otherwise the PB P2P service will
not complete.
Use existing bypass tunnels and create Node/Link bypass tunnels for unprotected hops (full
FRR protection not guaranteed): If a hop is not protected, create new bypass tunnels where
possible. Full FRR protection is not guaranteed because if a bypass tunnel cannot be created for
one or more hops, tunnel creation is still permitted.
Use existing bypass tunnels and create eFRR Bypasses for unprotected hops (full FRR
protection not guaranteed): If a hop is not protected, create new bypass tunnels where
possible. Full FRR protection is not guaranteed because if a bypass tunnel cannot be created for
one or more hops, tunnel creation is still permitted.
If no option is selected, LightSOFT does not attempt to create missing tunnels. If there are gaps in the
tunnels available, service provisioning fails and an error message is displayed.
NOTE: During automatic tunnel creation, the defined preferences and system defaults are
applied. We recommend that you view and edit tunnels created automatically via the Tunnel
List window, to ensure that the tunnel parameters fulfill all operator requirements.
5. Click OK.
In the Availability Ranges pane, you can modify the availability percentage ranges and color coding for the
Availability Map and the Sub Lambda View of Optical Availability tables.
You can change the percentages for each range in the From and To columns, as follows:
Upper limit extends to just below the next whole number (e.g. 51-99% denotes 51% or more, and less
than 100%. Note: (100-100) and (0-0) ranges denote exactly 100% and exactly 0%.
Any ranges can be defined, provided the upper and lower limits of adjacent ranges are continuous
(without gaps) and not overlapping.
In the Availability Status Pane, you can change the color coding of availability status in the Lambda View of
the Optical Channel tables. Five ranges can be defined - Free, In-use, Blocked, Mixed and Undeterminable
(not associated with a range). For the availability status definitions, see Optical availability tables.
3. In the Availability Ranges pane select the percentage range for each category.
4. Select the associated color(s) from the relevant color swatch(es).
5. In the Availability Status pane select colors for the 5 ranges of status specified.
6. Click Defaults.
This changes the colors in the RSTP Map Preferences window to the system default values.
5. Click Apply to save the changes to the database.
The Preferences window closes.
6. Click OK.
The selected view of the RSTP Map window is automatically refreshed reflecting the new preferences.
The legend in the status bar indicates the color correspondence for each quality.
The changes remain in effect for your user profile until you change them. The same color preferences
apply in all layers.
To configure TE preferences:
1. In the main window System tab, select Preferences.
The Preferences window opens.
2. In the System tab, select the appropriate TE Configuration category.
3. Set the fields accordingly.
The TE Configuration workspace provides general TE parameters for new links, and LSP tunnel
restoration preferences. See TE preferences.
The CoS workspace provides CoS values on new PEs. See CoS preferences.
The CAC workspace provides CAC values on MoT/MoE ports when a link is created. See CAC
preferences.
The EXP workspace provides EXP mapping values on MoE/MoT ports when a link is created. See EXP-
CoS mapping preferences.
NOTES:
System factory defaults apply when LightSOFT is opened the first time.
You can change the initial defaults in the Preferences window.
The configurations of existing PEs or links can be changed through their corresponding
Properties windows.
MPLS equipment which is not yet upgraded to MPLS Layer capabilities continue to use
CoS, CAC, and TE configuration parameters derived from their respective PE's network
properties.
Traffic management operational category or Advanced operation profile security
capabilities are needed to change parameters. Otherwise system preference workspaces
open in Read Only mode.
WARNING: If system preference TE parameters are changed while PEs exist in LightSOFT, you
will be prompted that specific PE properties may not be synchronized with system
preferences, resulting in a TE Mismatch. For details about how to correct this, see TE
mismatch problem in the Topology Management Guide.
You can view a list of PEs and ports whose TE parameters are not consistent with the current
MPLS Layer parameters (TE Mismatch) and reconfigure them. See Work with multiple links and
LEs in the Topology Management Guide.
7.11.1 TE preferences
The TE Configuration workspace in the Preferences window is used to configure default general TE
configuration parameters for ports on new links created in the MPLS Layer.
This window is also used to define the preferences used in LSP tunnel restoration for bidirectional tunnels.
Refer to the TE Configuration Parameters table below for a description of the configurable parameters
displayed here. See also Configure LSP tunnel restoration in the Tunnels Management Guide. The
configuration on each port of an existing link can be changed through the link Properties windows. See Link
Properties - TE other tab in the Topology Management Guide.
Maximum Sharing Select to ensure PathFinder uses the same route (segments) as the original route
checkbox where possible. This option overrides all other optimization criteria.
(optional)
Parameter Description
Other
TE Metric The TE Metric Reference Rate is used in the process of tunnel optimization that
Reference Rate would yield a minimum tunnel cost. It is the default reference rate for ports used in
(Mb/s) the Link TE Metric calculation to yield a wider distribution of relative link costs,
facilitating comparison between links being considered for a tunnel path. Default is
10,000 representing the 10 Gig Ethernet port rate.
For details of how Min Metric uses this and the other parameters involved in the
process, see Minimizing tunnel cost.
Defaults Restores all field values to network defaults.
Column Description
CoS Name Values are either CoS 0 to CoS 7 or CoS 0, CoS 2, CoS 4 and CoS 6, according to the
card type as indicated by the EMS.
Priority Select High or Low for a single threshold CoS.
All CoS values above this are automatically assigned High and all CoS values below
this are automatically assigned Low.
(Defaults High – CoS 6/7, Low – CoS 0-5.)
A different definition of Peak Information Rate applies to High vs. Low priority
packets. See Peak information rate in the Tunnels Management Guide.
Booking Factor Overbooking ratio allowed to tunnels per CoS on this network. For example the
booking factor 2.0 implies 100% bandwidth overbooking, booking factor 1.0
(minimum and default) implies no overbooking.
This factor affects the Committed Information Rate allowed to the specific CoS on
this network. See Understanding CIR, EIR, and overbooking in the Tunnels
Management Guide.
BE (Best Effort) (Default disabled) If enabled, the bypass tunnel protects all assigned tunnels
Protection regardless of their bandwidth. If disabled, the bandwidth sum of the tunnels
protected is limited by the bypass tunnel bandwidth.
BE (Best Effort) CoS (Default disabled) If enabled, the CoS has zero bandwidth and can be set with only
zero bandwidth tunnels. All tunnels on all PE ports set in the BE CoS must have
zero bandwidth.
Zero bandwidth unprotected, protected or bypass tunnels can be set only on a BE
CoS. Tunnels on other CoS instances must have at least a minimum bandwidth.
Similarly, an E-LSP tunnel CoS which is defined as BE must be with zero bandwidth,
and all E-LSP tunnels which use a specific BE CoS must have zero bandwidth.
BE CoS also applies to bypass tunnels and protected tunnels with BE. CoS must be
protected by a bypass tunnel with the same BE CoS.
A bypass tunnel using BE CoS has zero bandwidth and supplies protection to BE
CoS protected tunnels as long as the network is not fully loaded with bandwidth of
non BE CoS instances.
BE CoS implementation rules
A CoS can be enabled as BE CoS only if:
- it is Low Priority
- no tunnels (with bandwidth) exist on it
Conversely, you can disable a BE CoS:
- if no tunnels (with zero bandwidth) exist on it
This causes it to become a Low Priority CoS again.
RoundDownCoS Enable or disable rounding down an illegal CoS value to the nearest legal value.
For example, assume that bandwidth can be configured for any even integer from
0 to 100 (i.e. in steps of 2). If the user tries to configure a bandwidth value of
7Mbps, then if RoundDownCoS is enabled, the system will simply round the 7
down to a 6 - the nearest legal value below the selected value, rather than
triggering an error.
Defaults Sets the network default values to field values.
Refer to the CAC Preference Parameters table below for a description of the configurable fields displayed
here.
LIMITATIONS: This is not applicable for NPT and NPTI (IP/MPLS NE). For other products the
implementation is aligned and LightSOFT downloads the EXP mapping as per the system
preference configuration.
In EXP and Out EXP refer to the inside and outside EXP mapping parameters of the port. In EXP is for
tunnels incoming to the port and Out EXP is for tunnels outgoing from the port.
In the Preferences window a single value is defined which applies to both In EXP and Out EXP for a CoS-
Color on both endpoint ports.
The EXP mapping of endpoint ports can be changed, or a different mapping can be assigned to input and
output ports on either endpoint port, via the corresponding Properties window. See Link Preferences - EXP
tab in the Topology Management Guide.
EXP Mapping configuration is relevant only for MoE/MoT links supporting EXP Mapping and traversing E-
LSP tunnels. See Tunnel mode in the Tunnels Management Guide.
Refer to the EXP Mapping Preference Parameters table below for a description of the configurable fields
displayed here.
NOTES:
For the NPT family, LightSOFT doesn’t download the EXP-CoS mapping defined in System
Preferences.
The default EXP-CoS mapping from the EMS-MPT is uploaded to LightSOFT.
If you want to have the EXP-CoS map as defined in your System Preferences, you should
edit it via a link properly. Refer to EXP mappings for ports of existing links.
However the EXP-CoS mapping as defined in your System Preferences can be
downloaded automatically for newly created links by altering the relevant .ini file. Please
contact Customer Support for assistance in this.
2. Click the selected CoS (Clear a CoS) to remove the checkmark from a color combination that is not
required.
The checkmark is removed.
3. Click a combination that is not currently selected (Select a CoS) to choose a color combination.
A checkmark appears.
4. Repeat steps 2 and 3 above until the table shows the required CoS - color combinations.
5. For any CoS - color combination, click the EXP selector icon to open a list of the available EXP mapping
values.
6. Select the required value.
7. When your configuration is completed, save the changes to the system preferences.
ASON and WSON configuration parameters are organized by category. The following tables describe the
parameters available in the ASON/WSON System Preferences windows, organized by category.
Max Hope Count The maximum number of hops that can be included when searching for a path. This
value is considered when WSON Metric Type is Hop-Count.
Max Cost Count Maximum link cost that can be considered when searching for a path. This value is
considered when WSON Metric Type is Cost.
Trail Max Length The maximum trail length that can be used when searching for a path. This value is
considered when WSON Metric Type is Length.
If you change the ASON/WSON Metric, you are prompted to update the link properties as needed.
If you change the Low Priority Delay, you are prompted to update the ME properties as needed.
NOTE: To define link metrics, see Update link metric values and Define LDL link metric values.
Group Membership Recs workspace is used to set the upper limit of the maximum number of
SSM and ASM group membership records. See Group Membership Recs.
System factory defaults apply when LightSOFT is opened the first time.
The Preferences window is used to change the initial defaults.
1. In the System tab of the main toolbar, click the Preferences icon .
The Preferences window opens.
2. Click the System tab within the window.
This will determine how the system behaves after a predefined BW limit has been reached e.g. none
(default), warning, block.
6. In the Link Bandwidth Threshold (%) workspace define the BW threshold values 1 to 5.
The default threshold value, which is set at 100%, can be changed to anything from 0% to 1000%.
7. Click OK.
A confirmation message appears. The value set for the Service CAC in the System Preferences will
automatically be copied to the newly created link and the IP network in LightSOFT.
3. Click Properties.
The Link Properties window opens.
The threshold, policy and bandwidth details are displayed in the Service CAC tab of the Link
Properties window.
Figure 7-2: Link properties - service CAC tab
In this example the link carries a bandwidth threshold of 60%, defined as Threshold 3. This means
that only 600MB of service will be allowed to pass through this link (60% x 1GB).
When you attempt to complete the L2VPN service, if the traffic exceeds this rate then a warning will
be displayed, as defined by the Policy.
CAUTION: According to the warning policy, the service creation will still go ahead even though
the threshold is exceeded on a problematic link name, and a Warning message will be
displayed. If the message indicates a block policy, the service creation will be prevented if the
threshold is exceeded on a problematic link name and a Failure message will be displayed.
6. Click OK.
7. Right-click on the link on the map.
A menu appears.
8. Click Expand on the menu.
The Actual Links Between Elements window appears showing the properties of the selected link.
In the Service CAC tab, the Link Occupied BW field now shows 1000MB as the warning has been
overridden and the traffic limit has been increased beyond the original Threshold 3 values.
NOTE: The Default threshold as previously set in the Preferences window is applicable for all
newly created links. This is manually configurable. You can change a link to the default value from
the Link Properties window (above) by pressing the Default button.
2. In the main icon toolbar, in the Topology tab, Lists section, click the Link List icon .
3. Select the relevant links by checking the boxes to the left side of the link names.
5. Edit the Link Threshold and Link Policy fields using the dropdown lists.
6. Click Apply.
A links update confirmation message appears.
Changes made will appear in the Link List window.
NOTE: It is also possible to edit Service CAC properties for the IP network by the same
process. Select the IP network on the map and edit the Service CAC properties using the IP
Network Management icon in the main icon toolbar as above.
1. In the System tab of the main toolbar, click the Preferences icon .
The Preferences window opens.
2. Click the System tab within the window.
4. In the Alarm Monitoring during Tunnel/Service creation fields at the top right-hand side select the
Enable button.
5. Click Apply.
6. Click OK.
Alarms will be automatically monitored during the tunnel or service creation process according to
your selection.
2. In the Object Status Colors area, select the color you want to associate with an alarm status in the
dropdown list.
3. To select a color that is not in the standard list, click the arrow at the bottom of the swatch.
4. Customize your own color and brightness. See Customize LightSOFT object status colors.
5. Click Apply.
The changes are applied.
6. Click Reset to reset changes to the previous settings. (optional)
7. Click Restore System Defaults to restore all colors to the factory defaults. (optional)
8. Click Set System Defaults to apply the modified color scheme as the system default. (authorized users
only).
A confirmation message is displayed.
9. Click Yes.
The system default is updated to reflect the selected colors.
The system defaults only apply to users who have not customized alarm colors for their user profile.
LightSOFT is updated to reflect the changes.
Actual alarm state (default): alarmed objects are color coded according to the highest severity of
all associated alarms (acknowledged and unacknowledged).
Unacknowledged alarm state only: color of alarmed objects indicates the highest severity of
unacknowledged alarms associated with the object. If all of an object's alarms are acknowledged, the
objects are color coded according to the Acknowledged Alarm State scheme. See Customize fault
color coding.
Separate color coding of objects with acknowledged alarms enables you to identify new alarms on crowded
maps more easily. For more information, see View only unacknowledged notifications in the Fault
Management and Performance Monitoring Guide.
Choosing the Unacknowledged alarm state mode does not affect the color coding of the individual alarm
records listed in fault windows. These continue to reflect their actual fault status, and alarm counters
continue to reflect the actual numbers of alarms of each severity in the system.
Alarms will only be removed from the Current Alarms list after the user has acknowledged them. After
these changes have been made you see the bell icon and the cleared time (similar to the one in the
Event Log window) in the Current Alarms window.
Actual Alarms
Unacknowledged Alarms
3. Click Apply to save the new setting.
The window remains open for additional definitions if needed.
See also Customize fault color coding.
IMPORTANT: Click Reset to reverse any changes in the window since the last time Apply or
OK was used.
1. In the main window Tools tab, in the Messaging group, click Send Message.
The Send Message window opens.
2. Select one or more users in the Active Users pane.
3. Click .
The users are moved to the Selected Users pane.
4. Type the message in the note area.
5. Click Send.
The message is sent and a confirmation message is displayed.
2. Click .
The LightNote window opens.
3. Enter the note text into the typing area.
4. Click Save.
5. In the Save LightNote window, enter a title for the note.
6. Click OK.
A note icon is added to the User Notes pane.
1. In the main window Tools tab, in the Messaging group, click Notepad .
The Notepad window opens.
2. Enter the note text into the typing area.
3. Click Save .
6. To post a LightNote to your client desktop, click Post LightNote or Post Selection .
NOTE: Install and configure the local printer as the default printer according to the operating
system on your workstation.
1. Click .
2. In the Print window check Print to File.
The Print to File window opens.
3. Navigate to the directory where you want to save the file.
4. Click OK.
Details: Prints visible attributes in the Trails pane and information about the trail endpoints and
resources for each selected trail.
1. In the relevant List window or alarms filter window, click Export to CSV .
The Export window opens.
2. Select the directory where you want to save the file.
3. In the Export options area Delimiter field, enter any delimiting character (for example, a comma ",")
as the record separator in the output file.
4. In the File name field enter a name for the file.
5. In the Files of type dropdown list, select All Files and then click Export.
The CSV file is created.
file_name XML file name. Any number of XML files can be specified.
file_name.csv CSV output file name. All the XML files are concatenated into a
single CSV format file, with a separation line between each file
name.
2. Print the CSV file to your UNIX terminal, using the following command: ParseAlm.pl
1. On the main window Trails tab, in the Utilities group, click Use Exclusive Resources .
The Provisioning Mode window opens.
2. Select the required option: None, All or a specific resource domain selection.
3. Click OK to implement the new provisioning mode.
OPTIONAL FEATURE: CNM is a fully integrated add-on capability, available for users with the
appropriate license only.
Secure file transfer from LightSOFT is encrypted using the SSH protocol. However if a user chooses to send
information via unsecured means (such as FTP) then such information is not automatically encrypted.
NOTE: The appropriate combination of capabilities (View User Security AND Security
Configuration) is required to perform actions on security objects.
1. In the main window System tab, in the Security group, click Security Configuration.
The Security Configuration window opens displaying the Users tab.
NOTE: A resource domain or profile that is used by a user group or network operator cannot
be deleted.
OPTIONAL FEATURE: The ability to define resource domains down to the port level is
available for licensed users only. If not purchased, NE-level granularity is supported only.
Resource Visibility
The resource domain assigned to your user group determines the objects and resources that you can view.
This includes:
the resources shown in the Resource Tree
the alarms in the Current Alarms List
the TCAs in the TCA List
trails in the Topology Views and Trails List
The following rules control what you can view:
If you have access to at least one resource within an object (for example, a site group) you can view
the parent object.
If you have access to a port which has access to all Connection Termination Points (CTPs) contained
within that port, you can view them.
Trails and links are visible only if all endpoints are in your assigned resource domain.
You can perform operations only on resources that are part of your user-assigned resource domains,
for example:
You cannot delete or edit a trail if not all resources are assigned, even if you have access to both
endpoints.
Viewing card alarms is limited unless you have at least one PTP in the alarmed card.
Service alarms are shown on subnetwork connections only if they participate in a trail whose
endpoints are in your resource domain.
You can view detailed trail and link information if relevant endpoints appear in your assigned
domains. However, you can determine which trail or link is using a resource if the resource is within
your domain, even if the trail/link is not managed by you (such as when some of the trail/link
resources are outside your domain). For example, if a PTP is connected to a link whose other endpoint
is not in your domain, you cannot see the name of the link that uses the PTP.
NOTE: For security, old Event Logs cannot be deleted from the system. This ensures that a
permanent audit trail record is always maintained.
NOTE: Click Used By to see a list of the user groups and network operators that are using the
selected resource domain. See View used by information.
The Used By window opens, displaying user group, network operator and resource profile
information.
Fully colored nodes with icon: at least one sub-resource in the node is not available. The parent
resource is unavailable if any of its sub-resources is unavailable, or if the parent node is an LE or
group.
Shaded sub-nodes: associated sub-resources are already assigned to other resource domains or
unavailable.
9. In the Available Resources pane select the resources that you want to add to the resource domain.
10. Expand the nodes and use the CTRL or SHIFT keys to choose multiple elements.
11. Click .
Resources are added to the Selected Resources area.
12. Click Save.
The resource domain is created and the selected resources assigned to the domain.
To view a profile:
1. In the main window System tab, in the Security group, click Security Configuration.
The Security Configuration window opens displaying the Users tab.
2. Click the Profiles tab.
3. Select the profile that you want to view.
The Profile Details pane displays the capabilities and the users associated with the profile.
4. Select a capability.
To add a profile:
1. In the main window System tab, in the Security group, click Security Configuration.
The Security Configuration window opens displaying the Users tab.
2. Click the Profiles tab.
3. Click Add.
The Add Profile window opens.
8. Click .
9. To select multiple capabilities, expand the nodes as required and use the CTRL or SHIFT keys.
The capabilities are added to the Selected Capabilities pane.
By default, the minimal EMS Operation Observer and General Monitoring capabilities are selected.
They can be removed if required.
10. Click Save.
The profile is created and added to the Profiles list.
NOTE: When a capability is selected in the Available Capability or Selected Capability pane,
its description is shown in the Capability Description area.
To edit a profile:
1. In the main window System tab, in the Security group, click Security Configuration.
The Security Configuration window opens displaying the Users tab.
2. Click the Profiles tab.
3. Select the profile you want to edit.
4. Click Edit.
The Edit Profile window opens.
5. Edit the profile as needed.
6. Click Save.
The changes are saved.
To delete a profile:
1. In the main window System tab, in the Security group, click Security Configuration.
The Security Configuration window opens displaying the Users tab.
2. Click the Profiles tab.
3. Select the profile you want to delete, using SHIFT or CTRL keys to select multiple profiles.
4. Click Delete.
A confirmation message opens.
5. Click Yes.
The profile is deleted.
3. Click Add.
The Add Network Operator window opens.
4. In the Name field, enter a unique name for the network operator.
5. In the Network Type field, select one of the following:
SP: Service provider owner of the overall network.
Sharable: Regular VPN operators, typically representing regional subdivisions of the network.
Exclusive: Regular CNM operators, typically representing regional subdivisions of the network.
7. In the Resource Allocation pane, select the resource domain(s) that you want to assign to the
network operator, using the CTRL or SHIFT keys to select multiple domains.
8. Click .
Only resource domains of the appropriate type are listed (Shared or Exclusive).
9. Click Save.
The network operator is created and added to the Network Operators list.
NOTE: All user groups assigned to the network operator ID must be deleted before deleting
the ID.
When adding or editing a user group, if you are a Security Extended Admin user and you select a
network operator other than your own for your user group, the list of available resource domains is
that of the selected network operator (regardless of whether your user group being created/edited
has Security Extended Admin capabilities).
When you add a user group with the Security Extended Admin capability (or edit its profile to include
that capability), your group must be assigned all the resource domains of the applicable network
operator. Otherwise, an error message appears after clicking Save.
Component Description
Profile General profile assigned to the user group, which determines what functions
group members can perform on resources in assigned resource domains not
governed by specific resource profiles.
Network Operator Network operator (subnetwork) to which the user group is assigned.
User Group Details fields
Users Users assigned to the user group.
Resource Domain Resource domains on which members of the group can operate.
Resource Profile Shows the applicable profile - either the General profile assigned to the user
group, which governs actions on all assigned resources by default, or a specific
Resource Only profile which overrides the General profile for the indicated
resource domain.
4. In the Name field, enter a unique name for the user group.
5. Optionally, in the Description field, enter a description for the user group.
6. In the Network Operator dropdown list select the network operator (subnetwork) to which you want
to assign the user group.
7. In the General Profile dropdown list select the general profile that you want to assign to the user
group (represents the capabilities allowed to group members).
Only profiles (built-in or added) for user groups in the selected network operator are listed.
If the User Group Login Limit option is enabled, the Concurrent Users field will be available.
8. Select the maximum number of simultaneous logins you want to permit. See User Group Login Limit.
9. In the Resource Allocation area select the resource domains you want to add.
10. Click using the CTRL or SHIFT keys to select multiple domains.
NOTE: If the selected profile has Security Extended Admin capability, the security operator
can assign capabilities beyond those of the user, but limited to resources allocated to the
network operator.
11. If a Resource Only profile is required for a selected resource domain to override the General profile
for that specific domain, open the dropdown list of available resource profiles.
NOTE: The network operator assigned to a user group cannot be modified. To change the
network operator, the user group must be deleted and recreated.
You cannot edit the user group associated with a logged-in user (including your own) in order
to add resource domains or change the profile.
NOTE: All users must be removed from a user group before attempting to delete the group.
OPTIONAL FEATURE: The number of users that are allowed to login to LightSOFT at any one
time is limited and depends on the configurator license agreement.
1. In the main window System tab, in the Security group, click Active Users .
The Active Users window opens.
Field Description
Password Expires At Date on which the user account password expires.
Last Login Last date and time that the user logged into LightSOFT.
Last Logout Last date and time that the user logged out of LightSOFT.
User Starts At User cannot login before the date and time specified.
User Expires At User account expires at the date and time specified.
Description Description of the account.
Inactivity Timeout Period of inactivity after which the account will timeout.
Becoming Idle If No Login System becomes idle, if the user does not login for the number of days
For specified.
If the system becomes idle, the account may be disabled, depending on the
security preferences.
See Customize security preferences.
Unsuccessful Login Number of times the user has attempted to login unsuccessfully.
Attempts
3. Click Add.
The Add User window opens.
If using LDAP or RADIUS with CUA enabled, see Adding new users when CUA is enabled.
4. Enter the relevant information, as described in the following table and click Save.
The account is created.
Component Description
User Expires At Do not allow user login after the specified date and time.
Select checkbox and enter a date and time.
If the user is logged on they receive a warning shortly before the expiry
time. If they do not log out, a force logout is executed at the time
specified, and the message User System has terminated your logon is
displayed.
Description Free-text description of the user account.
Inactivity Timeout (min) Period of inactivity after which the login session is automatically logged
out.
Select either:
Unlimited: The user is never locked out.
The number option where you enter a value (up to 1000 minutes).
Override the default is defined in the Preferences tab of the Security
Configuration window.
Select Unlimited to deactivate the timeout for the user.
Become Idle If No Login For Select value from the dropdown list (days).
Default number of days that can pass before the system becomes idle if
the user has not logged in.
If the account becomes idle, the account may be disabled, depending on
the security preferences.
See Customize security preferences.
Configure SMS/Email Enables transmission of alarm notifications to the user by SMS or email.
SMS number and email address are filled in automatically from the LDAP
server if they appear in the mapping schema, otherwise the information
must be entered manually.
NOTE: All selections in the Security Preferences tab apply to all user accounts, including
administrator accounts.
Option Description
Password Reuse History Minimum number of times that a password must be changed before an old
password may be reused.
Max. Unsuccessful Login Number of consecutive invalid login attempts permitted before the account is
Attempts locked. The counter is reset after each successful login.
(1-5) To re-enable login, the password may be set by a user with Security
Administration capabilities. Alternatively, you can wait until the Delay Until
User Re-enable period expires.
Available options:
From 1 to 5: You can make the selected number of login attempts. If all
attempts are unsuccessful, the account is locked.
Unlimited: You can make an unlimited number of login attempts and the
account is never locked.
Login Reactivation Time in minutes that must elapse until a user account is automatically
(2-1440 minutes) reactivated after being locked out because of too many unsuccessful login
attempts.
Available options:
From 2 to 1440: You must wait the specified number of minutes before
attempting to login again.
Unlimited: Password is permanently deactivated. In this case, an
administrator must assign you a new password.
Default Inactivity LightSOFT automatically performs the action described in Inactivity Timeout
Timeout Action if no activity is detected for the specified time period:
(10-1000 minutes) Enter a time (max 1000 min).
Unlimited: Users are never logged out.
This field can also be changed per user.
Inactivity Timeout Default Inactivity Timeout value can result in either:
Action Lock (default): Lock user account.
Logout: Log user out of LightSOFT.
When a user is logged out, all active processes that he/she initiated are
automatically aborted.
Strong Password Enforce strong password requirement.
Enforcement Enabled: Passwords must:
include letters and digits.
not include the user login ID or full name.
not include three or more consecutive letters or numbers.
not include three or more repeated characters.
Disabled: Pattern checks are not performed.
Changing this parameter does not affect passwords defined for existing users. It
applies upon a change of password.
Minimum Password Minimum amount of time that can pass before you are prompted to change
Change Interval your password.
Select value from the dropdown list (mins).
Option Description
Become Idle If No Login Select value from the dropdown list (days).
For Default number of days that can pass before the system becomes idle if you
have not logged in.
Action Upon Becoming Select one of the following actions for an account on becoming idle:
Idle Record in Log: create a log entry when an account becomes idle.
Log and Inhibit: disable the user account and create a log entry. To
reaccess LightSOFT the user account must be deleted and recreated.
NOTE: The password can include any characters. It is subject to Strong Password
Enforcement restrictions (if applicable) and Minimum Password Length.
See parameter descriptions in Customize security preferences.
1. In the main window System tab, in the Security group, click Change Password .
The Change Password window opens.
OPTIONAL FEATURE: This feature requires the appropriate LightSOFT CUA license.
LightSOFT's Central User Administration (CUA) integration centralizes user authentication details and
access capabilities, and uses them to authenticate access to LightSOFT. A (CUA) system enables you to
manage user information centrally, so that changes are effective over all company applications at once.
CUA provides:
A single point of authentication: to prevent security threats and illegal login attempts, to control
access from different IP addresses and to control access authority of NMSs from different equipment
domains and vendors.
A single point of user management: to simplify management of user authentication and
authorization. CUA services provide a single sign on where one password for a user is shared between
different services and applications, so a user needs only one username and password to login to a
variety of services, including LightSOFT.
CUA can be implemented using either:
Remote Authentication Dial In User Service (RADIUS) network application
Standalone Lightweight Directory Access Protocol (LDAP) server.
When a LightSOFT user is authenticated via CUA-based services, he/she is granted access to all services
authorized by the user groups to which his/her user ID is a member, including services for the
corresponding EMSs.
NOTE: In this section, CUA and LDAP/RADIUS may be used interchangeably to describe the
integration and server functionality.
CNM Users
CNM users are typically created in LightSOFT. They are not synchronized with CUA unless they are also
added to the CUA database.
When a CNM user is defined in the CUA, synchronization with CUA is applied, as per the mapping schema.
You can choose whether login and password definitions and authentication are performed by CUA or
remain local to LightSOFT. This is defined via the relevant .ini file. For more information contact your
Customer Support representative.
Offline Capabilities
You can configure the CUA installation to include an offline group capability whereby authorized CUA users
can be authenticated locally in LightSOFT in the event that the CUA server is not available.
If offline mode is not configured, or when a user is not added to the offline group, only CNM users can be
authenticated locally. If the CUA server is down, CUA users without offline capabilities are denied entry to
LightSOFT until they are authenticated by the CUA server. See Offline Support.
NOTES:
It is not recommended to create new users in LightSOFT Internal mode, when moving to
CUA.
Create all new users via the relevant LDAP or RADIUS server, or complete the move to
LDAP or RADIUS mode and then create users in LightSOFT.
2. Ensure the LDAP or RADIUS server data is configured. See Configure and edit LDAP/RADIUS protocol.
3. Modify the relevant .ini file to include LDAP or RADIUS mode.
4. Restart the LightSOFT server. LightSOFT restarts in CUA mode.
If you have been working in Internal mode for an extended period, and users have already been
created in LightSOFT Internal mode, passwords of all LightSOFT Internal users are automatically
deleted from the system for all users that do not have offline capabilities.
EMS passwords are not deleted automatically. It is recommended that the System Administrator
delete EMS users from the relevant EMSs, to prevent a conflict between EMS passwords and those of
the CUA server.
5. Add CUA users to the CUA database (specific procedures vary according to the application used, and
are out of the scope of this guide).
6. If creating a user automatically, ensure the CUA database contains the relevant group and network
operator for that user.
7. Create CUA user accounts in LightSOFT either:
Automatically (automatic user creation is permitted): If working in CUA mode, and the users
exists in the CUA server, a user account is created in LightSOFT automatically the first time the
user logs on to LightSOFT with their CUA ID and password. Additional (LightSOFT-only)
parameters (such as Full Name) can be added manually by the System Administrator. The CUA
parameters (user group and network operator) must match the LightSOFT database records,
otherwise authentication fails.
Manually: Create new users via LightSOFT:
LDAP mode: Select one or more users from the LDAP database. The user credentials are
copied from the LDAP server, and recreated in LightSOFT. See Add a new user with LDAP
authentication.
RADIUS mode: Create the user manually in LightSOFT, in the same way as an internal user.
If the user is not a CNM user, does not have offline capabilities or offline mode is disabled,
the password name should be left blank. The password is taken from login data entered by
the user when RADIUS server authenticates the user. LightSOFT ignores the Password
expiry, user start/end dates and Becoming idle if no log for fields for all user IDs managed
by the RADIUS server. See Add a new user with RADIUS authentication. The user should
already exist in the RADIUS database before logging in to LightSOFT.
When LightSOFT parameters are mapped in the schema mapping attribute list to CUA user parameters, the
CUA values are automatically specified in the field as read-only.
LightSOFT-only fields that are not mapping-schema-related can be entered manually in LightSOFT.
In both cases, parameters in the LightSOFT user record which are included in the schema mapping attribute
list are automatically synchronized with CUA upon successful login. If CUA values differ from those in the
LightSOFT database, CUA values automatically override the LightSOFT values. Only information that is
mapping schema-related is synchronized with CUA.
NOTES:
The procedure for editing the LDAP/RADIUS protocol is the same as configuring the
protocol for the first time.
LightSOFT must be configured as Internal mode to configure LDAP/RADIUS server data
for the first time.
3. In the relevant RDR Primary tab (LDAP or RADIUS), enter the following information:
IP Address: IP address of the primary and optionally the secondary server.
(RADIUS only) Shared Secret: string used for building encrypted passwords, as defined on the
RADIUS server. The secret string must be defined on both LightSOFT and RADIUS servers.
(RADIUS only) Confirm Shared Secret: reenter the shared secret string.
Authentication Port: relevant authentication port. (Default for RADIUS = 1812, default for LDAP
= 389).
(RADIUS only) Transaction Timeout: maximum time LightSOFT waits for RADIUS to respond
before declaring a timeout.
(RADIUS only) Number of Retries: number of times LightSOFT attempts to authenticate a user
after receiving a RADIUS timeout.
4. (RADIUS only): To check the connectivity of the primary server (and secondary server if applicable),
click Check Connectivity.
If the connectivity check succeeds, a message is displayed Server is connected.
If the connectivity check fails, a message is displayed Connection Check Failed.
5. Check the server details are correct, and the RADIUS server is running. For further support, contact
Customer Support.
6. Manually copy the details of RDR Primary tab to the RDR Mirror tab.
7. For RADIUS servers to copy the RDR Primary details automatically in the RDR Mirror tab, click Copy
from RDR Primary.
8. Click Apply.
The information is saved to the LightSOFT database.
9. Ensure LDAP/RADIUS mode is configured in LightSOFT. This is done by editing the relevant .ini file.
10. For further details, contact your local Customer Support representative.
3. In the Name and Password fields, enter a unique username and password for the user.
4. Enter the User Group and Network Operator.
These fields should match the User Group and Network Operator groups defined in the RADIUS
server.
For a CNM user, select CNM Operator.
For an offline user, select the group with Offline capabilities.
RADIUS definitions always override LightSOFT definitions.
5. Enter the relevant information, as described in the following table.
6. Click Save.
The account is created.
NOTE: You must enter a password for CNM and offline users.
Read-only with LDAP-assigned values if they are included in the Schema Mapping Attribute list.
Read/write if they are not specified in Schema Mapping Attribute list. Enter the applicable values
manually later in the LightSOFT Edit User window.
Other parameters are relevant only if they are included in the Schema Mapping Attribute list. Values of
parameters included in the list are input automatically to the LightSOFT user record. If you do not enter a
value for a mapped parameter, the field remains empty in LightSOFT and the information must be added
manually in LightSOFT later. You can also manually add values for parameters that are not included in the
Schema Mapping Attribute list later using the Edit User window.
NOTE: The maximum number of log records in the database at any one time will be the lesser
of the Maximum Capacity and Maximum Period constraints. If the constraints are modified
upwards, incremental records will start to accumulate only from that time. Previously deleted
records are not reinstated.
NOTE: If CUA server authentication is used, and the User Group defined in the CUA server is
different from that defined locally in LightSOFT, the privileges in the CUA server override those
in LightSOFT. This action is logged in the Activity log for all attributes except passwords.
Column Description
Client Name System name of computer and UNIX user where the action was performed, in the
format <display>_<UNIX name>. (e.g. zoom:0.0_nms.)
Security Event Type of action:
Login
Logout
Change password
Invalid user name
Invalid password
Password is blocked
Blocking password
User is already logged in
User authentication failure
User is not authorized
CUA invalid user name
CUA server failure
CUA bad data
CUA internal error
1. In the Activity Log/Security Log window, click the Filter Properties icon or select Filter > Create
New Filter.
The Filter window opens.
2. In the Name dropdown list select the name of the filter you want to edit, or the filter on which you
want the new filter to be based.
NOTES:
Changes to system-predefined filters, for example the No Filter template, must be saved
under another name.
Filter names are case-sensitive.
To customize the default settings, contact your local Customer Support representative.
2. Set the Records: the maximum number of records that can remain in the log window.
3. Set the Days: the maximum number of days that a record can remain in the log window.
Records that exceed the set values are automatically archived.
8. Click Yes.
The XML log file opens, displaying the information in Excel format.