Professional Documents
Culture Documents
Version 12.10.30
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: (86) 755 26771900
Fax: (86) 755 26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
The contents of this document are protected by copyright laws and international treaties. Any reproduction or distribution of
this document or any portion of this document, in any form by any means, without the prior written consent of ZTE CORPO-
RATION is prohibited. Additionally, the contents of this document are protected by contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE CORPORATION
or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions are dis-
claimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose, title or non-in-
fringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the use of or reliance on the
information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications covering the subject
matter of this document. Except as expressly provided in any written license between ZTE CORPORATION and its licensee,
the user of this document shall not acquire any license to the subject matter herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
Revision History
Purpose At first, thank you for choosing NetNumen U31 Unified Manage-
ment System of ZTE Corporation!
NetNumen U31 Unified Management System is the intermediate
system between lower level NE and upper layer operation. It
mainly realizes the centralized topology management, centralized
alarm management, centralized performance management and
centralized report management of lower level NE.
This manual provides procedures and guidelines that support the
operation of NetNumen U31 (IP Network) Unified Management
System.
Intended This manual is intended for the following engineers:
Audience
� On-site maintenance engineers
� Network monitoring engineers
� System maintenance engineers
Prerequisite Skill To use this manual effectively, users should have a general un-
and Knowledge derstanding of IP communications technology. Familiarity with the
following is helpful:
� ZXR10 devices
� UMS working principle
What Is in This This manual contains the following chapters:
Manual
Chapter Summary
Chapter Summary
Typeface Meaning
Typeface Meaning
Resource Configuration
Frame
Table of Contents
Resource Configuration Frame Overview ................................ 1
Basic Operation of Main Interface ......................................... 2
Resource Configuration
Frame Overview
Resource configuration module becomes more and more important
in the network management. It not only can be used for network
plan but also has the instruction function on the following network
maintenance. Also it can implement the centralized management
of NE and real time statistics.
Resource configuration frame can implement the following func-
tions:
� Network resource management
NE information management is one of the most important
functions in network management system. It mainly includes
querying NE basic information, expansion information and
management information and adding topology management.
� Layer 2 management
It is applied to management function of data link layer in stan-
dard network protocol including link management, medium
visit and so on.
� Layer 3 management
It is applied to management function of network layer in stan-
dard network protocol including addressing and route selec-
tion.
� Service management
Traditional routing protocol calculates the shortest path for-
warding traffic. Even if some path is blocked, traffic would
not be switched to other paths. When network traffic is small,
this problem is not serious. But the application of network be-
comes more and more widely, traditional shortest path priority
has many problems. In service management, carrier can pre-
Type Selection Click the drop-down menu of device type, all added NE device
Tree types is displayed. In type selection tree, multiple device types
can be selected. When selection is completed, click any location
out of drop-down menu, the drop-down menu is concealed. At this
time, NE and resource configuration tree will be filtered according
to selected device type.
The rule of filter is as follows:
1. NE selection tree: It displays all NEs which have selected de-
vice type, other types of NEs will be concealed.
2. Resource configuration tree: It displays the resource node that
supports selected device type, that is, only the nodes on re-
source configuration tree support all selected device types, can
the source node be displayed. Otherwise it is not displayed.
NE Selection Tree In NE selection tree, select NE so that the related resource can be
queried in resource view area. Users can operate on packet node
and create new packets, modify packets and delete packets.
Resource Resource configuration tree is also named as “resource function
Configuration Tree tree”. Because all resource-related functions are loaded on this
tree, that is, click different resource configuration tree nodes, the
corresponding resource view area will be opened on the right view.
If select NE Information, the NE basic information page will be
opened on the right.
To make users more conveniently operate, some tool buttons such
as expand, collapse, search, filter, customization view can be dis-
played above resource configuration tree, as shown in Figure 2.
Resource View Resource view area is the operation area that users create, modify
Area and configure related services. It corresponds to selected resource
node one-by-one.
The following introduces the common concepts in resource view
area:
� “export” button
The main function is to export the data in the list. In drop-
down menu, the displayed data or all data can be exported.
Generally, use Excel format to export list data.
� “import” button
The main function is to import the data. Generally, use Excel
format to import data. The format of importing table must
meet the specification. The detailed chapter will introduce the
format of importing table.
� “refresh” button
load resource from database again and the resource is dis-
played in service table (generally, the search condition can be
configured) .
� “create” button
Create the resource instance related to this service, such as
create NE.
� “delete” button
� “save” button
Save some resource instances after modification to database.
� “upload” button
Upload means backing up data on device to network manage-
ment server. After uploading, the data status becomes “syn-
chronized”. The operation of uploading includes three policies:
i. add: add the data that does not exist on network manage-
ment server but on devices. If this policy is not selected,
even if some data exists on the device, after uploading,
these data will not exist on the server.
ii. remove: delete the data that does not exist on devices
but on network management server. If this policy is not
selected, when some data that does not exist on the device
but on server are uploaded, these data will not be deleted
on the server.
iii. modify: when the data of network management server is
different from that of devices, modify the data of server. If
this policy is not selected, when the data of network man-
agement server is different from that of devices, the data
of server will not be modified.
� “deploy” button
Generally, the data of network management server has two
sources. One is established in network management client
end, another is backed up from network management device.
Deployment means recovering the data of network manage-
ment or configuring the data on the device. The operation of
deployment only can be implemented on the “saved” data. Af-
ter deployment, the state of resource on network management
server is “synchronized”.
i. add: configure the data of network management server on
the device. If this policy is not selected, even if some data
exists on the server, when deployment is implemented,
these data will not be configured on the device.
ii. remove: remove the data that does not exist on network
management server but on the device. If this policy is
not selected, even if some data that does not exist on the
device but on server is deployed, these data will not be
deleted on the device.
iii. modify: when the data of network management server is
different from that of devices, modify the data of server. If
this policy is not selected, even if the data of network man-
agement server is different from that of devices, when they
are deployed, the data on the device will not be modified.
At the same time, the deployment includes three types of re-
source audit policies:
i. Audit before deployment: compare the difference between
the data on the sever and that on the device before the data
on network management server is deployed on the device.
� “audit” button
The procedure of comparing the data on the device and the cor-
responding data on the network management sever is named
as audit. After audit, if the data on both sides is same, the
data state on network management server is “synchronized”.
If the data on both sides is not same, there are two kinds of
operation policies, one is to deploy after audit, that is, deploy
the different data to the network management server. Another
is to upload after audit, that is, back up the different data to
network management server.
There are two actions after audit:
i. upload: after audit, when the data on the device is different
from that on the network management server, implement
upload operation.
ii. deploy: after audit, when the data on the device is different
from that on the network management server, implement
deployment operation.
� “remove” button
The data on the device and the corresponding data on net-
work management library are deleted. If users open the client
end, the state of corresponding data will be changed to “un-
synchronized” before “refresh” is not implemented. “save” can
be implemented to save the data on the page to network man-
agement library. If “refresh” is implemented, the data which
is removed will disappear.
Network Resource
Table of Contents
NE Information .................................................................. 9
Interface Management .......................................................14
NE Time Management ........................................................27
Link Resource Configuration ................................................39
NE Information
NE information management is one of the most important func-
tions in network management system. It includes the following
functions:
� Basic information
It mainly includes addition, modification, deletion, deployment
and uploading function of NE. The detailed NE version, de-
tailed description and establishing time can be queried by list
method.
� Expansion information
NE includes some expansion information including supplier, de-
livery time, batch No., serial number.
� Management information
The mode of implementing management NE information in-
cludes SNMP-related parameter configuration and CLI com-
mand line interface configuration.
FIGURE 4 NE INFOMATION
i. Tick the Number check boxes of several NEs and then click
on the tool bar. A dialog box appears.
ii. Select the NEs in the Instance List. By default, only Mod-
ify Operation is ticked in Operation Policy area. Click
Execute. The result is displayed.
iii. The link aggregation port information on the NE and that in
the UMS has been synchronized. The Status on NE Basic
Information tab page is “Synchronized”.
If a piece of basic information does not exist on the NE,
the information does not change after upload. If some
attributes of the basic formation in the UMS and the NE
are different, The information in the UMS will be synchro-
nized. If the information is completely the same, there is
no change.
2. Audit the basic information on an NE and that in the UMS.
i. Tick the Number check boxes of several NEs and then click
on the tool bar. A dialog box appears.
ii. Users can operate on the information on the Audit dia-
log box. Select “Upload” or “Deploy” in the Select Action
pull-down list box and then click Execute. The result is
displayed in the Audit Result area. The differences are in
red. Click Close.
3. Deploy the information in the UMS to NEs.
i. Tick the Number check boxes of several NEs and then click
on the tool bar. A dialog box appears.
ii. Select an instance in the Instance List area, select Add
Option or Modify Option in Operation Policy area and
then click Execute. The result is displayed in the Deploy
List.
4. Create a poll task
i. Click on the tool bar. A dialog box appears.
ii. Select NEs and then click Modify. A dialog box appears.
Users can set the interval (in the range of 15~2147483647)
and the task state. Click OK.
Configuring NE Expansion
Information
This topic describes how to view and configure the expansion in-
formation of NEs managed by UMS.
Prerequisite � Network management system is normally enabled and re-
source configuration management has been opened.
� Network management server has connected with NE device.
1. Click Network Resource > NE Information > NE Expan-
sion Information on the resource configuration management
topology tree. Expansion information is displayed.
Management Information
SNMP parameters and CLI parameters can be configured in man-
agement information.
Prerequisite � Network management system is normally enabled and re-
source configuration management has been opened.
� Network management server has connected with NE device.
Configuring SNMP Users can configure parameters of Simple Network Management
Protocol (SNMP) on NEs to make network management easier.
1. Click Network Resource > NE Information > NE Manage-
ment Information > SNMP on the resource configuration
management topology tree. SNMP information is displayed.
2. Point to a button on the tool bar, the description of the button
will be displayed. For the detailed information about the button
functions, please refer to Configuring NE Basic Information.
3. Dismount and delete SNMP information on an NE. Before dis-
mounting, the information on the NE should be synchronized
with that in the database.
i. Tick the Number check box of one or several NEs and then
click on the tool bar. A window appears.
ii. Select a node in the Instance List, the detailed commands
of the NE is displayed in the Deploy List. Click Execute.
The state will be displayed in Whether Successful col-
umn.
4. Tick the Number check box of one or several NEs and then
button. An interface for manual testing appears. Wait a
moment and the testing result will be displayed.
Configuring CLI Users can configure parameters of Command Line Interface (CLI)
to make network management easier.
1. Click Network Resource > NE Information > NE Manage-
ment Information > CLI on the resource configuration man-
agement topology tree. SNMP information is displayed.
2. Point to a button on the tool bar, the description of the button
will be displayed. For the detailed information about the button
functions, please refer to Configuring NE Basic Information.
3. Tick the Number check box of one or several NEs and then
button. An interface for manual testing appears. Wait a
moment and the testing result will be displayed.
Interface Management
NE interface management provides rich functions of physical in-
terfaces and logical interfaces, including displaying, querying, sta-
tistics, navigation of function configuration, and so on.
Parameter Description
Mode It is the interface mode. After the NE is selected, the Mode is set as Ethernet
physical interface automatically.
Type It is the interface type. The interface type depends on the selected mode.
END OF STEPS
2. From left to right, the buttons shown on tool bar are export
data shown on table, refresh and create, save and upload, up-
load from NE and deploy, audit and so on. Point to a button
on the tool bar, the description of the button will be displayed.
The following content describes the newly-added functions.
Property Description
Property Description
IMA Alpha 1 ~ 2
IMA_Beta 1 ~ 5
IMA_Gamma 1 ~ 5
Note:
� When configuration is created, master port and slave port
cannot be same, but VLAN numbers can be same.
� One port can appear in the different protect groups.
NE Time Management
At present, NE time management function only supports IP trans-
mission platform product.
clock time management function includes:
NTP time management
� NE time management
� NTP server management
� NTP synchronization mode
1588 configuration
� PTP global configuration management
� PTP port configuration management
clock source management
� absolute time port configuration
� SSM clock synchronization configuration
� SSM clock source configuration
� External clock source port management
� Synchronization network border management
NE Time Management
Users can search and set the time zone and time information of
NEs manually through NE time configuration. Users also can com-
pare the time zone and time on NEs with that in UMS server.
1. Click Network Resource > Clock Management > NTP Time
Management > Network Element Time Management on
the resource configuration management topology tree to set
the NE time and time zone.
2. Click the pull-down arrow on the tool bar to select NEs.
3. Click on the tool bar to obtain the NE time and time zone.
4. Select a piece of NE time management information and then
click on the tool bar. A dialog box appears. There are three
methods to modify time and time zone, including Use netnu-
men time and timezone, Use netnumen time and custom
timezone and Customize time and timezone. After modi-
fication, click OK.
5. Select the server address and locking state. The server address
is the address in NTP server management.
6. Click Add to finishing adding an NE and a server.
Property Description
Property Description
ranging from -7 to 1. The
default value is 0.
Property Description
Property Description
Property Description
Property Description
Property Description
priorityValue 1 ~ 255
Property Description
3. Select a link in the list and then click on the tool bar. A
dialog box appears. The link status and link name can be mod-
ified. After modification, click Modify.
4. Select a link in the list and then click on the tool bar. A
dialog box for confirmation appears. Click OK to delete the
link.
Layer 2 Management
Table of Contents
Link Aggregation Management ............................................43
LLDP Management .............................................................45
Configuring Port Mirroring...................................................47
VLAN Management ............................................................48
MAC Address Resource Management ....................................58
Link Aggregation
Management
Abstract Link aggregation is also called Trunk. It is to bind several physical
ports into a logical port to realize load sharing of outgoing traffic
and incoming traffic on the member ports. Users can configure
load sharing policies on switch ports to designate the member port
through which the messages are sent.
When a switch detects that the link of a member ports is inter-
rupted, the switch stops sending messages to this port until the
link of the port recovers. Link aggregation is an important technol-
ogy to increase link bandwidth and realize link transmission flexi-
bility and redundancy.
In link aggregation management interface, aggregation port infor-
mation is listed in the list above. The list below is member port
interface. Generally, link aggregation information is automatically
got by NE uploading.
The following introduces manual creation procedure.
1. Click Layer 2 Management > Link Aggregation Manage-
ment > Link Aggregation Information on the resource con-
figuration management topology tree. Aggregation port infor-
mation is displayed.
2. Create a link aggregation port
Parameter Description
NE Display Name It is the name displayed in the list. Select an NE in the pull-down
list of NE Display Name, the name displayed is the NE name. By
default, it is an IP address. The item with “*” mark is required to
fill in.
System Priority The range is 1~65535, and the default value is 32768.
*Channel No. It is the number of an aggregation port, in the range of 1~32. The
item with “*” mark is required to fill in.
Group Agg Mode It is the mode to bind physical ports. There are two modes, protocol
and static.
Load Balance Mode It is the load sharing mode of outgoing traffic and incoming traffic
on member ports. There are the following modes, source MAC and
destination MAC, destination IP, destination MAC, source IP and
destination IP, source IP, source MAC, destination IP and destination
port, source IP and source port.
tion and then click on the tool bar. A dialog box for confir-
mation appears. Click OK to delete the information in UMS.
LLDP Management
LLDP is a new protocol defined in 802.1ab. It makes neighbor de-
vices send messages between each other to update the physical
topology information and establish a device management informa-
tion base. The working flow of LLDP is described below.
1. A local device sends link and management information to the
neighbor devices.
2. The local device receives link and management information
from the neighbor devices.
3. The network management information of neighbor devices is
stored in the local Management Information Base (MIB). The
network management software can query Layer 2 connection
information in the MIB.
NE Information
1. Click Layer 2 Management > LLDP Management > NE Info
on the resource configuration management topology tree. NE
information is displayed.
2. The information in black can be modified in the list directly.
Users can double-click LLDP Enable, Message Interval, and
so on to modify the information.
3. The background of the modified information is pink and the
Status is “Not Saved”. Click on the tool bar to save the
data. The background becomes normal and the Status be-
comes “Saved”.
Port Information
1. Click Layer 2 Management > LLDP Management > Port
Info on the resource configuration management topology tree.
Port information is displayed.
2. The information in black can be modified in the list directly.
Users can double-click Port Administration Status to modify
the information.
3. The background of the modified information is pink and the
Status is “Not Saved”. Click on the tool bar to save the
data. The background becomes normal and the Status be-
comes “Saved”.
VLAN Management
Configuring a VLAN Port
Switches and IP transport platform products support VLAN port
configuration.
1. Click Layer 2 Management > Vlan Management > Vlan
Port Config on the resource configuration management topol-
ogy tree. VLAN port information is displayed.
2. For adding a VLAN port, the basic data of the VLAN port is the
same to the basic interface information. Therefore, configure
interface information of NE, and then add VLAN port of the NE.
Click on the tool bar. A dialog box appears, as shown in
Figure 27. Select an NE and then click OK. A VLAN port is
added.
Configuring a VLAN
Switches and IP transport platform products support VLAN config-
uration.
1. Click Layer 2 Management > Vlan Management > Vlan
Config on the resource configuration management topology
tree. VLAN Information is displayed.
2. Create a VLAN.
i. Click on the tool bar. A dialog box appears.
FIGURE 29 SELECT
iv. Click OK, and then click OK in Figure 28. The new VLANs
are displayed.
3. Select a VLAN domain and then click on the tool bar. A dialog
box appears. Users can modify the Vlan Domain Name and
Vlan Domain Description. After modification, click OK.
4. Select a VLAN domain to save and then click on the tool bar.
The Status of the domain becomes “Saved”.
5. Select a VLAN domain to delete and then click on the tool
bar. A dialog box for confirmation appears. Click Yes. The
VLAN domain is deleted from database and the list. If there
are VLAN services running in the VLAN domain in the database,
the VALN domain cannot be deleted.
6. Select a VLAN domain and then click on the tool bar. A win-
dow appears. The detailed VLAN domain information is dis-
played. All attributes cannot be edited.
ii. Select a VLAN domain and set the Execute Mode. Click
Timing Execute. A dialog box appears, prompting that a
VLAN discovery service is added successfully.
iii. Click VLAN Service Discovery Log Management tab.
On the left pane, it is the service discovery task record tree
and theses records are displayed by time. Click a node on
the tree, the detailed records are displayed in the table in
the right pane.
iv. Double-click a line in the table, the detailed information of
the VLAN service discovery task is displayed. Click Print
to print the data of the nodes on the tree, and click Save
As to save the data of the nodes on the tree as a file. Click
Delete to delete the task record.
4. Double-click a VLAN service or select a VLAN service and then
click on the tool bar. Users can view the detailed information
of the VLAN service. The attributes cannot be edited.
Property Description
VlanId 1 ~ 4096
3. Select a MAC address in the list and then click on the tool
bar. A dialog box for confirmation appears. Click OK.
4. Curing and Non-Curing
Curing a MAC address is to make a dynamic MAC address not
participate in aging. Non-curing is a reverse process.
i. Select a dynamic MAC address and then click on the tool
bar. A dialog box appears.
ii. Click OK. The aging status becomes No.
Property Description
Layer 3 Management
Table of Contents
Route Management............................................................63
Routing Protocol ................................................................68
ARP Management .............................................................72
Route Management
Route Topology Analysis
This topic describes how to view the detailed route topology infor-
mation and how to operate a route topology, including uploading,
viewing and displaying the topology.
1. Click Layer 3 Management > Route Management > Route
Topo Analysis on the resource configuration management
topology tree. Route topology analysis information is dis-
played.
2. Click on the tool bar. A window appears, as shown in Figure
38.
Static Route
A static route is a piece of route information that is configured
by a network administrator manually. When the network topology
structure or the status of a link changes, the network administra-
tor needs to modify the static route in the routing table manually.
By default, static routing information is private and it is not trans-
mitted to other routers. The network administrator can also set
the static route to be shared. Usually, static routes are used on
simple networks. In such situations, it is easy for network admin-
istrators to know the topologies and configure routing information
correctly.
At present, static route function is supported by IP transmission
platform products.
1. Click Layer 3 Management > Route Management > Static
Route on the resource configuration management topology
tree. Static route information is displayed.
2. Click on the tool bar. A window appears, as shown in Figure
39. Select an NE and input the destination network address,
mask, next hop, and so on. Click add info to add the new static
route to the list at the bottom. Users can click to delete a
selected static route. Click apply to make the configuration
valid.
Parameter Description
Subnet Mask It is used to divide an IP address into two parts, a network address
and a host address.
Next Hop It is the egress or an IP address through which the router reaches
the destination network.
Parameter Description
Interface It is the local network interface. Here, it is the mng interface, vrf
interface and global routing table interface.
Tag It is optional.
Whether to Deploy It is used to identify whether the message has been deployed to the
device.
ii. Select an NE and set the network address, mask and the
maximum number path (That is, the maximum number of
links can be added). Set this value according to the device.
iii. Input the next hop address and set the tag value (in the
range of 150~255). Click add info to add the static route
to the list at the bottom. Users can click to delete a
selected static route. Click apply to save the load balance
configuration to database.
Routing Protocol
RIP Protocol Management
RIP is a kind of interior gateway protocols, which realizes dynamic
route selection as the first one of routing protocol. It is realized on
the basis of local network-based distance vector routing algorithm.
RIPv1 is defined by RFC1058, and RIPv2 is defined by RFC1723.
ZTE devices support RIPv1 and RIPv2 fully. RIPv2 is used by de-
fault. Comparing with RIPv1, RIPv2 has the following advantages,
� Supports Classless Inter-Domain Routing (CIDR) and Variable
Length Subnet Mask (VLSM).
� Protocol packet can bring authentication information.
� Protocol packet can adopt multicast mode.
At present, RIP protocol management is supported by all data de-
vice except low-end switches.
1. To show the information of the interface related to RIP, click
Layer 3 Management > Router Protocol > RIP Manage-
ment > RIP Interface Config Information on the resource
configuration management topology tree.
ARP Management
When a network device sends data to another network device, IP
address and physical address (MAC address) of destination device
3. Select an ARP information item from the list on the ARP Global
Configuration interface. Click , a dialog box appears to
indicate whether IP address and MAC address is bound. Click
, a dialog box appears to indicate that release the binding
between IP address and MAC address.
4. Select an ARP information item from the list on the Interface
limit number configuration interface, as shown in Figure 43.
Set Enable interface default limit-number and Interface
limit number, the range is 1 ~ 65535. Default value is 8912.
Service Management
Table of Contents
Traffic Engineering Basic Configuration Management ..............75
MPLS LSP Management ......................................................80
Parameter Description
Min Label It is used to configure the minimum label. The range is 16~59390.
The default value of 16.
Max Label It is used to configure the maximum label. The range is 16~59390.
The default value of 59390.
GR Loss Count It is to configure the Hello loss count of GR function. When the actual
count is larger than the value set, neighbors judges that it is lost. The
range is 4~10. The default value is 4.
TE Interface Management
This topic describes how to view TE information on a service inter-
face.
1. Click Service Management > Traffic Engineering Basic
Config Management > Interface TE Management on the
resource configuration management topology tree. Interface
TE Management tab is displayed.
2. Click on the tool bar. A dialog box appears, as shown in
Figure 46. Select an NE on the topology tree on the left and
then input parameter values in the right pane. Click OK.
ii. Select a node on the topology tree on the left, input the
process ID and select a router ID on the right. Click create.
A dialog appears, as shown in Figure 48.
iii. Input the area ID and enable TE, and then click OK. The
OSPF area created is displayed in the list in Figure 47. Users
can click modify to modify the status of Enable TE and
click delete to delete an item selected.
iv. Click IS-IS config tab in Figure 47. IS-IS config tab is
displayed, as shown in Figure 49.
Parameter Description
Type It is used to configure the level of the router. There are level-1,
level-2-only and level-1-2.
vi. Tick the check boxes in the list and then click OK. The
parameter setting is finished.
Tunnel Management
Tunnel management is to manage the information of tunnels be-
tween source devices and destination devices. Users can create
or modify a tunnel according to creation guide.
1. Click Service Management > MPLS LSP Path Management
> Tunnel Management on the resource configuration man-
agement topology tree. Tunnel Management tab page is dis-
played.
Parameter Description
Create PRI 0 ~ 7
Hold PRI 0 ~ 7
Parameter Description
3. Select a link from the right topology to create tunnel. Click Add
explicit path on Te Operate Guide, the Explicit path config
management interface appears. For more information, refer
to Explicit Path Management. Click Save Temp Guide to save
tunnel operation template. A prompt will appear to indicate
whether use this template when create tunnel next time. Click
Sve to database to save the newly-added tunnel to network
management database. Click Save and deploy to save the
newly-added tunnel and deploy it to device. Click Close to
close the Te Operate Guide interface
Security Management
Table of Contents
Time Range Management ...................................................87
ACL Management ..............................................................93
User And Account ..............................................................97
ii. Input the template name and then click in Added Time-
range Information area. A dialog box appears, as shown
in Figure 54.
iii. There are two types of time ranges, absolute time range
and periodic time range. If Absolute Time-range is se-
lected, the detailed information to set is shown in Figure
54. Set the start time and end time. The end time must be
later than the start time. The seconds must be a multiple
of 15. Click OK. The new time range will be displayed in
the list in Figure 53.
iv. If Periodic Time-range is selected in Figure 54, the de-
tailed information to set is shown in Figure 55.
v. Select Day Set or Day Range. The end time must be later
than the start time. The seconds must be a multiple of 15.
Click OK. The new time range is added. A time range may
include an absolute time range and several periodic time
ranges. Click OK. A time range is added.
vi. Click OK. A time range template is created.
3. Select a time range template and then click on the tool bar.
A dialog box appears. Users can modify the information of
the template. The time range type can not be modified. The
information in black can be modified in the list directly by dou-
ble-clicking the cell.
4. Select a time range and then click on the tool bar. A dialog
box for confirmation appears. Click OK to delete the template.
5. The background of the modified information is pink and the
Status is “Not Saved”. Click on the tool bar to save the
data. The background becomes normal and the Status be-
comes “Saved”.
iii. All time range templates suiting the NE are displayed. Se-
lect a template according to demand and then click OK
to return to Create Time-range dialog box, as shown in
Figure 57.
ACL Management
At present, Access Control List (ACL) management is supported by
IP transmission platform product, ZXR10 8900 series MPLS rout-
ing switches, ZXR10 5900/5200 series gigabit intelligent routing
switches and ZXR10 3900A/3200A series Layer 3 intelligent Eth-
ernet switches.
1. Click Security Management > ACL_Manage > Switch ACL
Config on the resource configuration management topology
tree. ACL configuration is displayed. The ACL rules are dis-
played in the second list.
2. Create an ACL and rule.
i. Click on the tool bar. A dialog box appears, as shown in
Figure 58.
Extended ACL Matching the following items: source IP address, destination IP address,
IP protocol types, Transfer Control Protocol (TCP) source port number, TCP
destination port number, User Datagram Protocol (UDP) source port number,
UDP destination port number, Internet Control Message Protocol (ICMP) type,
ICMP Code, Differentiated Services Code Point (DSCP), Type Of Service (ToS)
and Precedence
Layer 2 ACL Matching the following items: source MAC address, destination MAC address,
source VLAN ID, Layer 2 Ethernet protocol type and 802.1p priority
Hybrid ACL Matching the following items: source MAC address, destination MAC address,
source VLAN ID, source IP address, destination IP address, TCP source port
number, TCP destination port number, UDP source port number and UDP
destination port number
iii. Input the rule ID (in the range of 1~1000) and source IP
address. Select the active style. Users can click to select
a time range. Click Ok to finish adding an ACL rule.
iv. Click OK in Figure 58. The new ACL is displayed in the list.
3. Click on the tool bar. A dialog box with auditing result ap-
pears. Information in red is the differences between the data-
base and the NE.
4. Bind an ACL to a physical interface.
i. Select an ACL and then click in the list. A dialog
box appears, as shown in Figure 60.
4. Input the user name and password. Select the user level. The
range of user level is 1~15. The default value is 1. Bind differ-
ent levels to different users. The lower user level is, the less
commands are available for the user. The higher user level is,
the more commands are available for the user. Usually, the
user level of administrators are 15, that is, administrators can
use all commands. Users of other levels only can use a few
maintenance commands. Click OK to finish adding a user.
5. Select a user in the list and then click Modify to modify the
user authority configuration.
6. Select a user in the list and then click Delete to delete the
user.
Operation and
Maintenance
Table of Contents
Virtual Circuit Test .............................................................99
Loop Test ....................................................................... 100
CFM Configuration ........................................................... 101
Ethernet OAM ................................................................. 110
MPLS OAM TRACE............................................................ 112
Performance Monitor ........................................................ 115
BFD ............................................................................... 121
Zero-Touch Deployment ................................................... 124
Configuration Template Managemet ................................... 129
File Management ............................................................. 134
ing”. The test result will be displayed and the status will be
“Test Successfully” after wait a moment.
Loop Test
Port loop detection is used to detect whether switch port has loop.
Port has loop, which causes MAC address learning error, broadcast
storm and switch or network paralysis. Use loop detection on a
port, disable the port which has loop, which can easily release the
influence caused by port loop.
Working mechanism of port loop detection is that a switch sends a
detection packet from a port, and if the packet is received by the
port without any change or only with a tag header that means the
port has loop.
The detection packet sent by switch contains the following three
parameters,
� Source MAC address: switch MAC address, and the MAC ad-
dress of every switch is unique.
� Port number: Port number corresponds to the ID of port on
switch one by one.
� VLAN ID: VLAN ID corresponds to the VLAN ID enabled by port
on switch one by one.
� Identifier area: The numeric signature of every switch and ev-
ery port is unique.
If the four parameters containing in the packet sent by and re-
ceived by a port are total same, the port has loop.
At present, port loop detection is supported by IP transmission
platform product, ZXR10 8900 series 10 Gigabit MPLS routing
switch and ZXR10 8900 series 10 Gigabit routing switch, all
low-end switch.
Parameter Description
CFM Configuration
IEEE 802.1ag standard, that is, the Connectivity Fault Manage-
ment (CFM) function, is a draft of Institute of Electrical and Elec-
tronics Engineers (IEEE) at present. This function mainly aims at
management of “service” level. It provides easy and fast function
for fault discovery, detection and management on networks. It is
effective for users to check and isolate VLANs and generate fault
reports.
At present, ZXR10 8900 series switches of V4.08.22 and V4.08.30
and IP transmission platform product.
Configuring an MD
Through Maintenance Domain (MD) management, users can cre-
ate, upload, deploy, audit, delete and dismount an MD.
1. Click Operation & Maintenance > CFM > Domain Re-
source Config > MD on the resource configuration manage-
ment topology tree. MD information is displayed.
2. Click on the tool bar. A dialog box appears, as shown in
Figure 63. Input the MD name and level (in the range of 0~7).
Click the pull-down arrow of Device Name to select an NE.
When users do not input the MD index, the system will config-
ure an index for the NE automatically (in the range of 1~16 and
the index increments). If there is a vacant index, the vacancy
is complemented. Device name and MD index are displayed in
the list. Users can click to delete the information in the list
and select an NE to create an MD again. The items with “*”
are required to fill in. Click Apply to apply the configuration to
the database.
FIGURE 63 CREATE MD
3. Click on the tool bar. A dialog box appears. Tick the check
boxes before the devices and then click OK. The devices se-
lected are displayed in the list.
4. Select a piece of MD information and then click on the tool
bar. A dialog box for MD modification appears. Users can add
or delete NEs in the MD, or modify the MD index corresponding
to an NE. Click OK to finish the modification.
Configuring an MA
Through Maintenance Association (MA) management, users can
create, upload, deploy, audit, delete and dismount an MA.
1. Click Operation & Maintenance > CFM > Domain Re-
source Config > MA on the resource configuration manage-
ment topology tree. MA information is displayed.
2. Click on the tool bar. A dialog box appears, as shown in
Figure 64.
FIGURE 64 CREATE MA
Configuring an MEP
Through Maintenance association End Point (MEP) management,
users can create, upload, deploy, audit, delete or dismount an MEP.
1. Click Operation & Maintenance > CFM > Domain Re-
source Config > MEP on the resource configuration manage-
ment topology tree. MEP information is displayed.
2. Click on the tool bar. A dialog box appears, as shown in
Figure 65.
Configuring an RMEP
Through Remote Maintenance association End Point (RMEP) man-
agement, users can create, upload, deploy, audit, delete and dis-
mount an RMEP.
1. Click Operation & Maintenance > CFM > Domain Re-
source Config > RMEP on the resource configuration
management topology tree. RMEP information is displayed.
Configuring an MIP
Through Maintenance domain Intermediate Point (MIP) manage-
ment, users can create, upload, deploy, audit, delete and dismount
an MIP.
1. Click Operation & Maintenance > CFM > Domain Re-
source Config > MIP on the resource configuration manage-
ment topology tree. MIP information is displayed.
2. Click on the tool bar. A dialog box appears, as shown in
Figure 69.
LBM Management
This topic describes how to view all LBM information in the system.
Users can send designated LBM configuration information through
LBM management.
1. Click Operation & Maintenance > CFM > LBM Manage-
ment on the resource configuration management topology
tree. LBM information is displayed.
2. Select one or several pieces of LBM information in the list and
then click on the tool bar. A dialog box appears. The LBM
check result is displayed.
3. Select one or several pieces of LBM information in the list and
then click on the tool bar. A dialog box for confirmation
appears. Click Yes to delete the selected LBM configuration.
LTM Management
This topic describes how to view LTM information in the system.
Users can send designated LTM configuration information through
LTM management.
1. Click Operation & Maintenance > CFM > LTM Manage-
ment on the resource configuration management topology
tree. LTM information is displayed.
2. Select one or several pieces of LTM information in the list and
then click on the tool bar. A dialog box appears. The LTM
check result is displayed.
3. Select one or several pieces of LTM information in the list and
then click on the tool bar. A dialog box for confirmation
appears. Click Yes to delete the selected LTM configuration.
Ethernet OAM
Ethernet technologies have developed rapidly in recent years. The
proportion of Ethernet network architectures is increasing. Eth-
ernet devices are used widely on access networks, convergence
networks and backbone networks. Therefore, OAM functions in
Ethernet devices become a focus. The main protocols related to
Ethernet OAM are listed below.
� IEEE 802.3ah (Operations, Administration, and Maintenance-
OAM)
� IEEE 802.1ag (Connectivity Fault Management) (draft)
� ITU-Y 1731 (OAM functions and mechanisms for Ethernet
based networks) (draft)
IEEE 802.3ah mainly aims at the management of “link” level. It
can be used to monitor and handle faults on point-to-point (or
virtual point-to-point) Ethernet links on networks.
At present, Ethernet OAM is supported by ZXR10 8900 series
switches (V4.08.22), IP transmission platform product and ZXR10
2900 series switches (after V2.0.11), ZXR10 ZSR intelligent
integrated multi-service routers (after V2.8.11).
Remote Loopback
This topic describes how to view port basic information and re-
mote loopback information. Users can enable or disable remote
loopback and refresh the results.
1. Click Operation & Maintenance > Ethernet OAM > Re-
mote Loopback on the resource configuration management
topology tree. Remote loopback information is displayed.
2. Point to a button on the tool bar, the description of the button
will be displayed.
3. Click on the tool bar to obtain the port information discov-
ered successfully last time.
4. Before remote loopback is enabled, the remote loopback infor-
mation is shown. The Loopback Status is “off”.
Link Monitoring
This topic describes how to view port basic information and link
event information. Users can enable or disable link monitoring
and refresh results.
1. Click Operation & Maintenance > Ethernet OAM > Link
Monitor on the resource configuration management topology
tree. OAM link information is displayed.
2. Point to a button on the tool bar, the description of the button
will be displayed.
3. Click on the tool bar to obtain the port information discov-
ered successfully last time. The information is refreshed auto-
matically every 10 seconds. The numbers of different types of
error frames are displayed.
4. Select a piece of link information in the list and then click
on the tool bar to enable link monitoring on the link. A dialog
box with information indicating success or failure will appear.
5. Select a piece of link information of which the link monitoring
is enabled in the list and then click on the tool bar. The
link monitoring will be disabled. A dialog box with information
indicating success or failure will appear.
6. For the search function, please refer to the contents in Device
Global Configuration.
ii. Input the MAC TRACE name. Click after Source Device
IP text box to select a source device. Select “CE” in the
pull-down list of Source Device Role. Select an interface
in the pull-down list of Source Device Outband Interface
Index. Input the destination device MAC address. Tick the
check boxes of both Internal Vlan ID and External Vlan
ID, or tick the check box of External Vlan ID only, or tick
the check boxes of neither Internal Vlan ID nor External
Vlan ID. Click Ok to finish MAC TRACE creation.
iii. In Figure 70, select “PE” in the pull-down list of Source
Device Role, and select “Outband Interface Trace” in the
Parameter Description
Mpls Trace Name It is the name of MPLS TRACE, within 10 letters and numbers.
Trace Type It is the TRACE type, including LDP Trace and Rsvp-Tunnel Trace.
LDP Dest Net Segment It is the LDP LSP destination mask, in the range of 1~32.
Mask Length
ii. Input the parameter values and then click Ok to finish MPLS
TEACE creation.
iii. Select “Rsvp-Tunnel Trace” in the pull-down list of Trace
Type, and select an interface in the pull-down list of Tun-
nel-Interface Index. Do not change other settings. Click
Ok to finish MPLS TEACE creation.
3. Select a piece of MPLS TRACE information in the list and then
click on the tool bar. The system will prompt start success
or failure in the Status column in the list.
Performance Monitor
Performance monitoring provides monitoring function of packet
sending delay, flapping and packet loss rate between a source NE
and a destination NE. The source NE and destination NE can be
either connected directly or indirectly.
Performance monitoring is supported by high-end routers, ZXR10
8900 series 10 Gigabit MPLS routing switch and IP transmission
platform products.
Task Matrix
Configure ping 1. To show all tasks as list, select Task List tab.
task
2. To create a detection task, click on tool bar, as shown in
Figure 72.
2. Input the task group name (letters and numbers only, not more
than 10 characters) and select a ping type. Click the Select
Source. A dialog box appears, as shown in Figure 74.
3. Select the source NE and then click Ok and then click Select
Dest in Figure 73. A window appears, as shown in Figure 75.
4. Select the destination NE and then click Ok. The source and
destination addresses are displayed.
Note:
Users can create 10 task groups at most, with 10 destination
addresses at most for each task group. That is, up to 100
sub-tasks can be created. Therefore, it is called a task matrix.
Note:
A parameter model must be created before user configure a
task matrix. Otherwise, no parameter model can be selected.
7. Select the start time and the end time and then click Create
in Figure 76. If there are sub-tasks in a task group, sub-task
information will be displayed in TaskMatrix pane. A task ma-
trix is created.
Task Parameters
1. Click Operation & Maintenance > End To End Test > Task
> Task Parameter on the resource configuration manage-
ment topology tree. Task parameter information is displayed.
2. Click on the tool bar. A window appears, as shown in Figure
78. Input the ParaModelName and SendPacketCounts.
Click Create.
Result Matrix
1. Click Operation & Maintenance > End To End Test > Re-
sult > Result Matrix on the resource configuration manage-
ment topology tree. The result matrix information is displayed.
2. Select the TaskGroupName, Index (packet loss ratio,
timedelay and jitter) and Statistics Type (MaximumValue,
MinimumValue and AverageValue, thresholdvalue). Thresh-
old Value is the percentage of the selected parameters. For
example, packet loss ratio is 50%, then input 50 in the text
box of ThresholdValue. Minvalue, Maxvalue and Average
are the minimum, maximum or average value of the generated
result. Granularity has five options, hour, week and day,
month and year. After setting, click to display the result, as
shown in Figure 79.
Result List
1. Click Operation & Maintenance > End To End Test > Re-
sult > Result List on the resource configuration management
topology tree. The result list is displayed.
2. To generate result list, select Task, StatisticsType and
TimeRange, and then click on the tool bar.
Result Graphic
1. Click Operation & Maintenance > End To End Test > Re-
sult > Result Graphic on the resource configuration manage-
ment topology tree. The result graphic is displayed, as shown
in Figure 80.
BFD
BFD is used to improve the speed of fault detection and recovery.
As a draft standard of Internet Engineering Task Force (IETF), BFD
provides an easy method to detect links or the ability to forward
transmission flows of the system.
BFD provides invalidation detection between systems of different
types, including direct-connected physical links, virtual links, tun-
nels, MPLS LSPs and multi-hop routing paths. BFD can be un-
derstood as a simple “Hello” protocol. Many aspects of BFD are
similar with the detection part of routing protocols. A pair of sys-
tems send BFD messages on each path periodically. If a system
cannot receive the message from the other system during a period
long enough, it is certain that a fault occurs on the bidirectional
path between the systems. In some situations, the systems can
negotiate with each other not to send BFD messages periodically
to decrease load.
At present, BFD function is supported by IP transmission platform
products.
Note:
If the status of the NE selected is off, system will prompt that
“The NE selected must be on”. If users select several NEs
among which some are on and some are off, the NEs in off
status will be filtered during uploading.
BFD Session
This topic describes how to view BFD session information. Users
can create, delete, dismount and upload BFD session information.
1. Click Operation & Maintenance > BFD > BFD Session on
the resource configuration management topology tree. BFD
session information is displayed.
Parameter Description
BFD Performance
This topic describes how to monitor the performance information
of BFD sessions.
Click Operation & Maintenance > BFD > BFD Performance
on the resource configuration management topology tree. BFD
performance information is displayed. The system refresh the in-
formation saved in the database every 10 seconds.
Note:
If there is no BFD session, there will be no BFD performance in-
formation.
Zero-Touch Deployment
Context Zero-Touch deployment service means that version file and config-
uration file of middle/low-end switch are saved in the Zero-Touch
deployment server.
Middle/low-end switch can communicate with Zero-Touch deploy-
ment server by private protocol and get version and configuration
from Zero-Touch deployment server.
The purpose is to upgrade running version of middle/low-end
switch in batch and configure the middle/low-end switch in batch
to help user lower the intensity of work and maintenance cost.
Steps 1. Select Operation & Maintenance > Zero-Touch Deploy-
ment on the resource configuration management topology
tree to enter Zero-Touch Deployment interface.
Note:
Please strictly use the template to configure Zero-Touch De-
ployment NE. MAC must not be null but legal. Otherwise this
line of date cannot be imported for operation.
When NE is created, copied or saved on the panel, mac must
not be null but legal, and same macs do not exist.
If network management is Chinese, use Chinese template. If
network management is English, use English template.
Configuration Template
Managemet
Configuration Template Overview
Configuration template management includes common template.
There are two default sorts, SNMP configuration and STP config-
uration. Users can define general template according to their re-
quirements. The configuration processes of different templates
are the same. Here, take SNMP configuration as example.
The brief procedure to configure a template: create sort in com-
mon template, create templates in sort catalogs, and then add
configuration instances and deploy the instances.
Sort Operations
1. Right-click Common Template and select New Sort from the
shortcut menu. A dialog box appears, as shown in Figure 85.
Input the sort name and then click Ok. A new template sort
is created. SNMP configuration and STP configuration are cre-
ated already. Users also can define new sort according to their
requirements.
3. Select Modify Sort from the shortcut menu. A dialog box ap-
pears. Users can modify the sort name. After modification,
click Ok.
4. Select Delete Sort from the shortcut menu. A dialog box ap-
pears. Click Ok to delete the sort.
Template Management
This topic describes how to configure the created template. Here,
take SNMP configuration as an example.
1. Right-click a template and select Modify Template from the
shortcut menu, or click on the SNMP Config tab page. A
dialog box appears. Users can modify the template name and
script. After modification, click Ok.
2. The information in black in the list can be modified directly on
the SNMP Config interface. Users can double-click Script and
Parameter to modify the information.
3. Right-click a template and select Delete Template from the
shortcut menu, or click on the tool bar on SNMP Config
tab page. A dialog box for confirmation appears. Click OK to
delete the template.
File Management
File Management Overview
File management consists of version file management and config-
uration file management.
Version file management of IP NEs enables users to manage NE
versions easily. It helps user finish version upgrade and mainte-
nance of NEs in batch quickly and reliably.
Operations in NE Area
The operations in the NE area includes obtaining NE version infor-
mation and deleting an NE.
1. Click in the NE area on Version File Management tab page
to obtain NE information. The operations being operated are
displayed in the Current Operation list. NE version informa-
tion is also displayed.
2. In the NE area on Version File Management tab page, click
to delete the all current operations in the NE area.
3. In the NE area on Version File Management tab page, click
to delete the all current operations on the current page.
Rebooting NE
Rebooting NE means rebooting device on NE for user's convenient
management.
1. Select NEs with the same type in NE area of Version File Man-
Managing Files on an NE
1. Select an NE in the NE area on the Version File Management
tab page and then click on the tool bar. A window appears.
2. Users can double-click drwx in the list to view the files in the
direction. The detailed information is displayed at the bottom
pane of the window. Users can create a new direction, rename
a file or delete a file on this window.
Deleting a File
Select a file in the file area on the Version File Management tab
page and then click on the tool bar. A dialog box for confirma-
tion appears. Click Yes to delete the file. Click No to cancel the
deletion.
Status Description
Modifying a Task
Modifying a task means modifying task option and executing mode.
Task option includes version file name, configuration file name and
reboot option. Executing mode includes "once" and "period".
The tasks with same type NE and same task type can be modified
in bulk.
1. Select the task need to be modified in task area of Version
File Management, click to popup the Modify task option
interface. Click the OK button to finish modification.
2. Select the task to be modified in task area of Version File
Management, click to popup the Modify execute man-
ner interface. Execute mode and execute time can be modi-
fied, click the OK button to finish modification.
Task Operation
For task operation, the tasks of a running file can be started im-
mediately, paused and continued, deleted. For more information,
please refer to Task and Task History Operation.
1. Select a task from the Version File Management tab page,
history of the task is displayed at the right table.
Managing NE
Steps
1. In Patch File Management interface, click button to enter
Manage Files on NE interface, as shown in Figure 99.
Table of Contents
Querying Performance...................................................... 151
Performance Report List ................................................... 152
Alarm Management.......................................................... 154
Querying Performance
For performance query, performance data can be queried, sum-
marized and comparison according to different time granularities.
1. Click Network Management > NE Information > NE Ba-
sic Information on the resource tree to enter the NE Basic
Information interface. Select Performance Query tag.
2. Set query condition. The first step of performance query is to
set query condition.
Alarm Management
Alarm management can make users conveniently check device
alarms and real time alarms and provide root reason analysis. The
alarm function that resource configuration management provides
is only for search analysis. The detailed alarm management mod-
ule content refers to NetNumen Unified Network Management Sys-
tem Data Product User Manual (Performance and Alarm).
ACL
- Access Control List
BGP
- Border Gateway Protocol
CFM
- Connectivity Fault Management
CIDR
- Classless Inter-Domain Routing
CLI
- Command Line Interface
CLNS
- ConnectionLess Network Sevice
DSCP
- Differentiated Services Code Point
EBGP
- External Border Gateway Protocol
FRR
- Fast Reroute
GR
- Graceful Restart
IBGP
- Interior Border Gateway Protocol
ICMP
- Internet Control Message Protocol
IEEE
- Institute of Electrical and Electronics Engineers
IETF
- Internet Engineering Task Force
IGP
- Interior Gateway Protocol
IP
- Internet Protocol
LAN
- Local Area Network
LBM
- Loopback Message
LSP
- Label Switched Path
LTM
- Linktrace Message
MA
- Maintenance Association
MAC
- Medium Access Control
MD
- Maintenance Domain
MED
- MULTI_EXIT_DISC
MEP
- Maintenance association End Point
MIB
- Management Information Base
MIP
- Maintenance domain Intermediate Point
MPLS
- Multi Protocol Label Switching
NTP
- Network Time Protocol
OSPF
- Open Shortest Path First
PDU
- Protocol Data Unit
PTP
- Precision Time Protocol
RMEP
- Remote Maintenance association End Point
RSVP-TE
- Resource ReSerVation Protocol - Traffic Engineering
SNMP
- Simple Network Management Protocol
SPF
- Shortest Path First
SVLAN
- Selective VLAN
TCP
- Transfer Control Protocol
TDR
- Time Domain Reflectometry
TE
- Traffic Engineering
TTL
- Time To Live
ToS
- Type Of Service
UDP
- User Datagram Protocol
VLSM
- Variable Length Subnet Mask