Professional Documents
Culture Documents
15.11
A50023-K4045-X040-01-76D1
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This documentation is intended for the
use of Coriant customers only for the purposes of the agreement under which the document is
submitted, and no part of it may be used, reproduced, modified or transmitted in any form or
means without the prior written permission of Coriant. The documentation has been prepared to
be used by professional and properly trained personnel, and the customer assumes full respon-
sibility when using it. Coriant welcomes customer comments as part of the process of contin-
uous development and improvement of the documentation.
The information or statements given in this documentation concerning the suitability, capacity,
or performance of the mentioned hardware or software products are given "as is" and all liability
arising in connection with such hardware or software products shall be defined conclusively and
finally in a separate agreement between Coriant and the customer. However, Coriant has made
all reasonable efforts to ensure that the instructions contained in the document are adequate
and free of material errors and omissions. Coriant will, if deemed necessary by Coriant, explain
issues which may not be covered by the document. Coriant will correct errors in this documen-
tation as soon as possible.
IN NO EVENT WILL CORIANT BE LIABLE FOR ERRORS IN THIS DOCUMENTATION OR
FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDIRECT,
INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED TO
LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR
DATA,THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN
IT.
This documentation and the product it describes are considered protected by copyrights and
other intellectual property rights according to the applicable laws.
Other product names mentioned in this document may be trademarks of their respective
owners, and they are mentioned for identification purposes only.
Copyright © Coriant 2015. All rights reserved.
2 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
Table of Contents
Table of Contents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1 Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.1 Intended audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2 Structure of this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.3 Symbols and conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.4 TNMS NCT documentation set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.5 Other documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.6 History of changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2 Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1 Checking the delivered components . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2 Hardware requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3 Supported Operating Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.4 Prerequisites by component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.5 Configuring the BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
A50023-K4045-X040-01-76D1 3
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
6 Final configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.1 Handling logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
List of Figures
Figure 1 Local Security Settings - Audit Policy window . . . . . . . . . . . . . . . . . . . . 18
Figure 2 ASCII characters.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
A50023-K4045-X040-01-76D1 5
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
6 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
List of Tables
Table 1 Structure of the manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Table 2 List of symbols and conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Table 3 History of changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Table 4 Minimum hardware requirements for new installations of TNMS NCT . 13
Table 5 Operating System recommendations for Full and Client installation . . 14
Table 6 TNMS NCT software prerequisites and their installation sequence . . . 14
Table 7 User Account Control Policy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 25
A50023-K4045-X040-01-76D1 7
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
8 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Preface
1 Preface
This Installation and Upgrade Manual contains a complete description of the installation,
upgrade and initial configuration of TNMS NCT.
g Some features described in this documentation may not be available. To identify the
features released for the product, see the Customer Release Notes delivered together
with the product.
A50023-K4045-X040-01-76D1 9
Issue: 1 Issue date: November 2015
Preface Installation Manual (IMN, Windows)
Representation Meaning
10 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Preface
Representation Meaning
[square brackets] A key to be pressed on a PC keyboard, for example [F11].
Keys to be pressed simultaneously are concatenated with a “+”
sign, for example [CTRL]+[ALT]+[DEL].
Keys to be pressed one after another are concatenated with
spaces, for example [ESC] [SPACE] [M].
> The greater than symbol “>” is used to concatenate a series of
GUI items in order to depict a GUI path. This is an abridged pre-
sentation of a procedure to be carried out in order to perform an
action or display a window or dialog box.
Examples:
A simple menu path: File > Save as
A more complex GUI path:
> Main window > File menu > Change Password command >
Change Password dialog box
x For convenience, card names are sometimes listed with a lower
(in card names) case x variable, in order to concisely represent multiple cards.
Example:
I01T40G-x (is to be interpreted as I01T40G-1 and I01T40G-2)
(parentheses) For convenience, card variants are sometimes listed with a
section of their name between parentheses, in order to concisely
represent both card variants.
Example:
CCEP-3(/S) (is to be interpreted as CCEP-3 and CCEP-3/S)
Screenshots of the graphical user interface are examples only to illustrate principles.
This especially applies to a software version number visible in a screenshot.
A50023-K4045-X040-01-76D1 11
Issue: 1 Issue date: November 2015
Preface Installation Manual (IMN, Windows)
Release notes
Where applicable, contains installation hints, patch descriptions, list of supported NEs,
list of supported cards and any relevant last-minute information.
12 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Preparation
2 Preparation
A50023-K4045-X040-01-76D1 13
Issue: 1 Issue date: November 2015
Preparation Installation Manual (IMN, Windows)
Throughout this and the following chapters the designation of the several operating
systems is often abbreviated to allow for better readability. Always refer to the table
above for the exact versions supported for TNMS.
g A dedicated Java JRE installation is not mandatory given that the TNMS Software
already includes its own JRE versions. However you can manually install another Java
JRE if required by other software. For your convenience Coriant distributes a Java JRE
package in the prerequisites folder of the TNMS installation media. However Coriant
does not guarantee that this is the latest update of Java JRE available at the time you
are performing the installation. So, if the update included is not the latest, use the latest
update instead.
For additional information refer to the Oracle Java documentation.
14 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Preparation
w The instructions in this chapter refer to HP machines and may differ depending on
hardware configurations.
To access the BIOS, boot the machine and press F9 at the startup screen.
ವ Disable the network:
Go to System Options > Embedded NICs > NIC # Boot Options and set to Dis-
abled. Where # represents the network interface card number.
ವ Processor options:
ವ Go to
System Options > Processor Options > Intel Virtualization Technology
and set to Disabled.
ವ System Options > Processor Options > Intel VT-d, and set to Disabled.
ವ Power management options:
ವ Go to
System Options >Power management options > HP Power Profile
and set to Maximum performance.
ವ Go to
System Options > Power management options > HP Power Regulator
and set to HP Static High Performance Mode
A50023-K4045-X040-01-76D1 15
Issue: 1 Issue date: November 2015
Preparation Installation Manual (IMN, Windows)
16 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Initial system configuration
g Proceed to configure the Audit policy only if your network has legacy, NEC-interfaced
NEs, that is, other than hiT 7300 or hiT 7100.
A50023-K4045-X040-01-76D1 17
Issue: 1 Issue date: November 2015
Initial system configuration Installation Manual (IMN, Windows)
In the details pane double-click the following policy settings to open the properties
window:
ವ Audit Account Logon Events, to track user’s logon and logoff - select the
check boxes ‘Success’ and ‘Failure’.
ವ Audit Account Management, to report changes to user account - select the
check boxes ‘Success’ and ‘Failure’.
ವ Audit Directory Service Access, to report access and changes to the directory
service - No auditing (no check box selected).
ವ Audit Logon Events, to report success/failure of any local or remote access-
based logon - select the check boxes ‘Success’ and ‘Failure’.
ವ Audit Object Access, to report file and folder access - select the check boxes
‘Success’ and ‘Failure’.
g The auditing configuration for the individual object (file or folder) must be set
within its properties.
ವ Audit Policy Change, to report group policies changes - select the check boxes
‘Success’ and ‘Failure’.
ವ Audit Privilege Use, to report when permissions (read, write...) are used -
select only the check box ‘Failure’.
ವ Audit Process Tracking, to report when process and programs fail (not security
related) - No auditing (no check box selected).
ವ Audit System Events, to report standard system events (not security related) -
select the check boxes ‘Success’ and ‘Failure’.
18 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Initial system configuration
w Only perform this configuration if legacy or Embargo NE versions, which only support
FTP, are to be managed by TNMS NCT.
g This default site does not have the correct settings and there might be configuration
conflicts if you add new FTP sites without removing this one.
In the right pane tree, select Add FTP Site. This opens the Add FTP Site window.
Enter the FTP site name.
In Physical Path, change the folder to “C:\inetpub\ftproot”, click OK and
Next.
In the Binding and SSL Settings step, configure the IP Address or leave as default.
In SSL, select Allow SSL. Click Next.
A50023-K4045-X040-01-76D1 19
Issue: 1 Issue date: November 2015
Initial system configuration Installation Manual (IMN, Windows)
20 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Initial system configuration
w For security reasons unselect File and Storage Services (selected by default) if you are
not planning to use these roles.
g This default site does not have the correct settings and there might be configuration
conflicts if you add new FTP sites without removing this one.
In the right pane tree, select Add FTP Site. This opens the Add FTP Site window.
Enter the FTP site name.
In Physical Path, change the folder to “C:\inetpub\ftproot”, click OK and
Next.
In the Binding and SSL Settings step, configure the IP Address or leave as default.
In SSL, select Allow SSL and select the certificate WMSVC. Click Next.
In the Authentication and Authorization Information step, select Authentication
as Basic.
In Authorization allow access to “All users”, permissions “Read” and “Write”.
Click Finish.
A50023-K4045-X040-01-76D1 21
Issue: 1 Issue date: November 2015
Initial system configuration Installation Manual (IMN, Windows)
g This default site does not have the correct settings and there might be configuration
conflicts if you add new FTP sites without removing this one.
In the right pane tree, select Add FTP Site. This opens the Add FTP Site window.
Enter the FTP site name.
In Physical Path, change the folder to “C:\inetpub\ftproot”, click OK and
Next.
In the Binding and SSL Settings step, configure the IP Address or leave as default.
In SSL, select Allow SSL. Click Next.
In the Authentication and Authorization Information step, select Authentication
as Basic.
In Authorization allow access to “Specified users” and enter the name of the
Windows user you created above.
22 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Initial system configuration
w The TNMS NCT installer will check if the hosts file is correctly configured. In case the
server belongs to a domain, make sure FQDN matches the domain.
If no domain exists and the hosts file is not configured, the installation will not proceed.
A50023-K4045-X040-01-76D1 23
Issue: 1 Issue date: November 2015
Initial system configuration Installation Manual (IMN, Windows)
g TNMS NCT enforces this setting during its installation. However, to avoid warnings while
installing TNMS NCT, configure the dynamic port range before the installation (required
for Server and Netserver machines), as described below.
Execute the following procedure to ensure the correct configuration of the Server and
Netserver machines:
Open the command line (cmd) as Administrator.
Execute the command:
netsh int ipv4 show dynamicport tcp
If the reported start port is not 49152, then execute the command:
netsh int ipv4 set dynamicport tcp start=49152 num=16384
persistent
Windows is now prepared concerning dynamic port range configuration.
24 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Software prerequisites installation
A50023-K4045-X040-01-76D1 25
Issue: 1 Issue date: November 2015
Software prerequisites installation Installation Manual (IMN, Windows)
g Make sure you have enough disk space and memory before continuing.
26 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Software prerequisites installation
g If you have the version 2.1.2.7 installed, you must first uninstall it, reboot your system
and then install version 2.1.2.9.
After the new version is installed a new reboot is required.
A50023-K4045-X040-01-76D1 27
Issue: 1 Issue date: November 2015
Software prerequisites installation Installation Manual (IMN, Windows)
In the output of this command identify the MAC address of the network interface card
you will configure OSI Stack to bind.
Open OSI stack as administrator via Start > Control Panel > OSI Stack, right-click
OSI Stack and select Run as administrator.
You may need to switch to the classic view or click “View as small icons” or use the
search field for OSI Stack.
In Bind to Network Interface Card select the network interface card identified with
the correct MAC address (step 2).
By default the OSI Stack is configured as end system (ES) and, due to this configu-
ration, is only allowed to bind to one Network Interface Card. If run as intermediate
system (IS) the OSI stack can bind to more than one network interface card. If, for
this reason you need to set the OSI Stack to IS, do as follows:
D In the OSI Stack Configuration window, press [CTRL]+[i] to open the IS-IS con-
figuration window.
Select Enable IS-IS.
Click OK.
E (Optional) In the OSI Stack Configuration window, click ES-IS.
Disable Enable emission of ES hello.
Click OK.
If you require the OSI stack to run as IS press [CTRL]+[i] to open the IS-IS configu-
ration window and select Enable IS-IS. In this case you can, in the OSI Stack Con-
figuration window, click ES-IS and disable Enable emission of ES hello.
Exit the OSI Stack Configuration window and either restart the OSI Stack service
or reboot the machine in order to reset the variables.
g If you want to connect hiT 7500 3.60 and 3.70 NEs with secure connection, you must
download and install the “SecPack_Strong.zip” secure package after you install and
configure the OSI Stack.
You can obtain the secure package in the Coriant Customer Portal:
https://coriant.force.com/customer.
After you install the package, reboot the system.
28 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Software prerequisites installation
Open Start > Control Panel > Administrative Tools > Services.
Select the OSI stack service and click Stop.
Open Start > Control Panel > Add/Remove Programs.
Select the OSI stack from the software list.
Click Uninstall.
Click Finish and restart your computer.
4.4 CopSSH
CopSSH is a Secure Shell (SSH) File Transfer Protocol (SFTP) and Secure Copy (SCP)
server used for transferring data to and from some types of NEs.
Using SFTP / SCP is recommended since these protocols are more secure than FTP.
In order to support SFTP or SCP transactions via the LCT, you must install and config-
ure CopSSH in TNMS.
w Some Embargo NE versions only support FTP. These NEs require an FTP server.
CopSSH installation is required for netservers if there are hiT 7100, hiT 7300 or ADVA
NEs in your network.
A50023-K4045-X040-01-76D1 29
Issue: 1 Issue date: November 2015
Software prerequisites installation Installation Manual (IMN, Windows)
30 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Software prerequisites installation
Port 22
Compression delayed
LogLevel INFO
TCPKeepAlive yes
LoginGraceTime 120
Protocol 2
MaxAuthTries 6
MaxSessions 10
Subsystem sftp internal-sftp -l ERROR
Match User copuser
PasswordAuthentication yes
PubkeyAuthentication no
AllowTcpForwarding no
MaxSessions 10
# Catch All
Match User *
AllowTcpForwarding no
MaxSessions 0
PasswordAuthentication no
PubkeyAuthentication no
A50023-K4045-X040-01-76D1 31
Issue: 1 Issue date: November 2015
Software prerequisites installation Installation Manual (IMN, Windows)
Port 22
Compression delayed
LogLevel INFO
TCPKeepAlive yes
LoginGraceTime 120
Protocol 2
MaxAuthTries 6
MaxSessions 100
MaxStartups 150
Subsystem sftp internal-sftp -l ERROR
Match User copuser
PasswordAuthentication yes
PubkeyAuthentication no
AllowTcpForwarding no
MaxSessions 100
# Catch All
Match User *
AllowTcpForwarding no
MaxSessions 0
PasswordAuthentication no
PubkeyAuthentication no
g Note that, if you run the CopSSH's Control Panel after the procedure above, all the
changes to the sshd_config file will be reset. In order to keep your changes, for further
CopSSH restarts use the “Openssh” service through the Windows services.
32 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Software prerequisites installation
FTPUser:unused:10001:545:U-VMTNMSIV120\FTPUSER,S-1-5-21-1360065861-1024548484-
1154038739-1012:/cygdrive/c/program files (x86)/icw/home/FTPUser:/bin/bash
If the password file does not contain the details of the SFTP user, grant write access
to the ICW folder to the Windows user that is used to install COPSSH.
4.5 Antivirus
To protect TNMS NCT against viruses, refer to the software release notes to see the cer-
tified antivirus.
A50023-K4045-X040-01-76D1 33
Issue: 1 Issue date: November 2015
Software prerequisites installation Installation Manual (IMN, Windows)
34 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) TNMS NCT installation
w You must run the TNMS NCT installation packages from the target machine since TNMS
NCT installation from a network drive is not supported.
ವ User password. Enter a password for the DB user that complies with the
Password complexity rules.
ವ Re-enter user password.
ವ Database name (SID): the name of the Oracle database you created earlier (DB
instance), which, by default, is xe (see 4.2 Oracle Express).
ವ User ‘sys’ password: fill in with the password defined in 4.2 Oracle Express for
the Oracle default database administrator user SYS.
Click Next to continue
A50023-K4045-X040-01-76D1 35
Issue: 1 Issue date: November 2015
TNMS NCT installation Installation Manual (IMN, Windows)
On the Installation Folder step enter the path for the TNMS NCT installation folder,
the TNMS NCT Data folder (see note below) and the LCT installation folder. Default
paths are provided.
Click Next to continue.
g Make sure that the TNMS NCT Data folder is empty. If not, backup and remove the
data or select a different folder.
In the Choose Shortcut Folder step configure the options of the icons and short-
cuts to be created during installation.
Click Next to continue.
Decide whether to have Coriant’s as your default desktop wallpaper.
Click Next to continue.
A summary of the installation settings is given in the Pre-Installation Summary
step. If the settings are correct, click Install to start the installation.
The results of the installation are presented in the Installation Results step.
Click Done to finish the installation.
g A warning message may be displayed stating that the firewall is enabled. However,
if you use the Windows Firewall, in some cases, the firewall window displays the
disabled status. Such contradiction arises due to the TNMS NCT Installer use of the
netsh adv commands to check the firewall status which can return a different
status from that presented in the GUI.
To configure the firewall refer to the Administration Manual, Security Hardening
chapter.
g It is recommended that you store all logins and passwords of the database, CopSSH
and TNMS NCT for any future re-installation or upgrade/updates.
36 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) TNMS NCT installation
Figure 2 displays the valid characters for the password (white background):
- the first two rows display ASCII control characters (not valid);
- the remaining characters are ASCII printable characters;
- additional characters not displayed in this table are not valid.
Login on the operating system with a user that has administrative rights.
Extract the TNMS NCT software to a directory in your machine.
Go to the TNMS_Installer folder, within the directory where the TNMS NCT software
files were extracted to, right click TNMS.exe and run it as administrator.
Click Next on the Introduction step.
On the License Agreement step, select
I accept the terms of the License Agreement and click Next.
On the Choose Install Set step, select Client.
Click Next.
On the Choose Components step select the LCTs to be installed.
Click Next.
On the Installation Folder step enter the path for the TNMS NCT installation folder,
the TNMS NCT Data folder (see note below) and the LCT installation folder. Default
paths are provided.
Click Next to continue.
g Make sure that the TNMS NCT Data folder is empty. If not, backup and remove the
data or select a different folder.
In the Choose Shortcut Folder step configure the options of the icons and short-
cuts to be created during installation.
Click Next to continue.
A50023-K4045-X040-01-76D1 37
Issue: 1 Issue date: November 2015
TNMS NCT installation Installation Manual (IMN, Windows)
g A warning message may be displayed stating that the firewall is enabled. However,
if you use the Windows Firewall, in some cases, the firewall window displays the
disabled status. Such contradiction arises due to the TNMS NCT Installer use of the
netsh adv commands to check the firewall status which can return a different
status from that presented in the GUI.
To configure the firewall refer to the Administration Manual, Security Hardening
chapter.
38 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Final configuration
6 Final configuration
w If you decide to harden the system’s security, you must do it before starting TNMS NCT
in a production environment. See TNMS NCT Administration Manual for instructions.
Information about the login is also described in the Administration Manual.
After installing TNMS NCT, there is a set of configurations which you can perform at any
point and are therefore described in the Administration Manual.
After the first installation TNMS NCT has a trial license of 30 days. During this period
you have permissions to access all TNMS NCT features.
After the 30 days expire you need to acquire and install license keys.
Refer to the Administration Manual for more information on how to manage licenses.
g The C:\Coriant\TNMS is the default directory. Make sure you use actual path names.
A50023-K4045-X040-01-76D1 39
Issue: 1 Issue date: November 2015
Final configuration Installation Manual (IMN, Windows)
40 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) TNMS NCT uninstallation
g When the application is uninstalled the TNMS NCT data folder is kept on the system.
A50023-K4045-X040-01-76D1 41
Issue: 1 Issue date: November 2015
TNMS NCT uninstallation Installation Manual (IMN, Windows)
42 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Abbreviations
Abbreviations
These abbreviations are intended for the entire TNMS product range and may not apply
to this document in particular.
CC Cross Connection
DB Database
EM Element Manager
A50023-K4045-X040-01-76D1 43
Issue: 1 Issue date: November 2015
Abbreviations Installation Manual (IMN, Windows)
GM Generic Mediator
HW Hardware
IP Internet Protocol
LE Load Equivalent
LO Low Order
44 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Abbreviations
NE Network Element
NEC NE Controller
NG Next Generation
NW Network
OS Operating System
A50023-K4045-X040-01-76D1 45
Issue: 1 Issue date: November 2015
Abbreviations Installation Manual (IMN, Windows)
PC Personal Computer
PT Physical Trail
RE Route Element
SFTP Secure File Transfer Protocol, or Secure Shell File Transfer Protocol
SW Software
46 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows) Abbreviations
TN TransNet
TP Terminal Point
VC Virtual Container
XC Cross Connection
X-NE Cross-NE
A50023-K4045-X040-01-76D1 47
Issue: 1 Issue date: November 2015
Abbreviations Installation Manual (IMN, Windows)
48 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Glossary
Glossary
These glossary entries are intended for the entire TNMS product range and may not
apply to this document in particular.
@CT @CT is a web-based craft terminal (that is, element manager) software which provides
web access to hiT 7300 network elements (NEs) in the customer network without the
use of a management system. It communicates via SNMP with the NEs and uses the
FTPS for upload/download of software or other data configuration (for example, log
files).
3DES Triple DES is the common name for the Triple Data Encryption Algorithm (TDEA or
Triple DEA) symmetric-key block cipher, which applies the Data Encryption Standard
(DES) cipher algorithm three times to each data block.
Actual Creation Is the current state of the path which results from the accumulation of the actual creation
State (ACS) states of the path’s route elements.
Advanced Encryp- Is a specification for the encryption of electronic data. AES is based on a design principle
tion Standard (AES) known as a substitution-permutation network, and is fast in both software and hardware.
Alarm An alarm is a management mechanism intended to inform the user that there is a
standing fault condition in the system.
Alarm log An alarm log provides a list of the alarms associated with a managed object, and
provides the following information about each of the alarms:
ವ the identification of the affected object
ವ the identification of the failed NE or the NE in which the failed unit resides
ವ the alarm severity
ವ the time the event occurred
ವ the indication whether the alarmed event is service affecting or not
ವ the location and the affected traffic
Alarm severity Each failure is assigned a severity. The following values are used:
ವ indeterminate
ವ critical
ವ major
ವ minor
ವ warning
ವ cleared alarms
ವ not Existent
ವ not Alarmed
Element Manager (EM) can configure the severity which is assigned to each fault cause
by an alarm severity assignment profile. In addition, EM can specify that a fault cause
shall not be alarmed. These fault causes will be blocked, hence do not lead to any LED
alarm indications, log entries or alarm reporting.
Alien wavelength A wavelength that does not originate from a transponder or muxponder card, but is still
allowed to be multiplexed into the aggregate line signal for transport as an optical
channel by the system.
Automatic Laser Is a technique used to automatically shut down the output power of the transmitter in
Shutdown (ALS) case of fiber break. This is a safety feature that prevents dangerous levers of laser light
from leaking out of a broken fiber, provided ALS is provisioned on both ends of the fiber
pair.
Alarm Severity The Alarm Severity Assignment Profile is a feature that allows the management of Alarm
Assignment Profile Severity profiles in TNMS and also at the NE side. .
(ASAP)
Automatically- ASON domains are built on the VC4 layer of hiT 7065, 7070 or 7080, and on OCh layer
Switched Optical of hiT 7300 and on ODU2 layer of hiT 7100, which have a Control Plane. The Control
Networks (ASON) Plane uses network-generated signaling and routing protocols to set up or release a
connection, and can restore one when it fails. ASON domains can be built up as part of
the transport network. They provide the benefit of easy end-to-end provisioning, and
fault and protection management. Soft permanent connections (SPCs) connect both
endpoints (NE1 and NE2) within an ASON domain. If a path fails, an alternative path is
automatically used.
ASON Call A Call is a Soft Permanent Connection between two end-points (inside the same domain
or between different domains) and defines the type and attributes of the connection. The
establishment of a Call leads to having a path (and/or multiple alternative paths) con-
necting the end-points that respect the constraints and attributes defined in the Call.
Bidirectional Self- Is a telecommunications term for loop network topology, a common configuration in tele-
healing Ring (BSHR) communications transmission systems, this loop or ring is used to provide redundancy.
The system consists of a ring of bidirectional links between a set of stations. In normal
use, traffic is dispatched in the direction of the shortest path towards its destination. In
the event of the loss of a link, or of an entire station, the two nearest surviving stations
"loop back" their ends of the ring. In this way, traffic can still travel to all surviving parts
of the ring, even if it has to travel "the long way round".
Capacity Planning Capacity planning is the process of determining the capacity needed by a system to
meet future needs.
Card A card is a plug-in unit that occupies one (or multiple) shelf slots. Cards perform specific
electrical and/or optical functions within an NE.
Each card has a faceplate with information LEDs and, in most cases, several ports for
interconnection of optical fibers and/or optical interfaces.
Card slot A card slot is the insertion facility for a card in a shelf. Each card slot is designed for one
or several particular card types.
Mechanical coding elements make sure that each card can be fully inserted only into a
card slot that is suitable for the given card type. Therefore, fundamental shelf equipping
errors (which might cause hardware damage or fatal malfunctions) are impossible.
Ethernet Connectiv- Is an end-to-end perservice Ethernet layer OA&M protocol. IEEE 802.1ag CFM is a
ity Fault Manage- service level OA&M protocol that provides tools for detecting and isolating connectivity
ment (CFM) failures in the network. This includes proactive connectivity monitoring, fault verification
and fault isolation for large Ethernet Metropolitan Area Networks (MANs) and WANs.
Committed Informa- Is the guaranteed average rate (in Mbit/s) at which the information units are transferred
tion Rate (CIR) through the port over a measurement interval.
CLFI CLFI Codes provide a standard, mnemonic naming scheme to uniquely identify cable
Controller card NE controller cards provide the central monitoring and controlling functions of the
system, as well as the MCF to operate the Q and QF Ethernet interfaces.
The controller card performs the following main functions: Fault Management, Perfor-
mance Management, Configuration Management, Security Management, Equipment
Management, Communication Management, Software Management (performing all
software downloads, uploads, and software integrity functions) and controlling the NE
alarm LEDs.
Data Communica- Data Communications Network is a management network for telecommunication trans-
tion Network (DCN) port systems.
A DCN domain interconnects several NEs for the purpose of network management. The
communication is established via the Optical Supervisory Channel (OSC) of the optical
links and an Ethernet/L2 switching network implemented by the NEs.
Data Encryption Is a widely-used method of data encryption using a private key. DES applies a 56-bit key
Standard (DES) to each 64-bit block of data. The process can run in several modes and involves 16
rounds or operations.
Dynamic Host Con- Is a standardized networking protocol used on IP networks that dynamically configures
figuration Protocol IP addresses and other information that is needed for Internet communication. DHCP
(DHCP) allows computers and other devices to receive an IP address automatically from a
central DHCP server, reducing the need for a network administrator or a user from
having to configure these settings manually.
Domain TNMS allows you to restrict user groups to operate only a set of NEs or DCN subnets
instead of the entire network. This partitioning is called a “Domain” and limits the oper-
ation on nodes outside of their partitions by assigning user groups to domains. Further,
you can also assign policies to domains for further control and security, limiting the user
groups to specific menu entries and actions.This arrangement is required, for example,
in network centers that are responsible for maintaining only a subset of the nodes. The
main purpose is security: it avoids that a login to the system grants access to the entire
network.TNMS now supports the creation, modification or deletion of multiple domains,
granting or restricting their accesses. By default, all NEs belong to the GLOBAL domain
which cannot be modified or deleted.
Ethernet Linear Pro- Is a protection scheme defined in the ITU-T G.8031 standard designed to protect point-
tection (ELP) to-point Ethernet paths such as VLAN based Ethernet networks. To achieve protection
ELP uses two disjointed paths, a working path and a protection path, traffic is carried
firstly on the active path (working path) andin case of failure, traffic is switched to the
protection path. Both paths can be monitored using OAM protocols like CFM.ELP
provides 1:1 bi-directional protection switching with revertive mode capabilities.ELP
must first be configured at the NE side via the LCT, only then they are visible in TNMS
so that you can use it in the E-LAN and E-Line service creation via the New Ethernet
Service wizard.ELP is supported in specific network elements and cards only. Refer to
the NE dedicated documentation fore more information.
Element Manager Network elements enable the user to perform operation, administration and mainte-
(EM) nance tasks with the NE system in a GUI environment.
Fault management Fault management reports all hardware and software malfunctions within an NE, and
monitors the integrity of all incoming and outgoing digital signals.
Forward Error Cor- Forward Error Correction (FEC) or channel coding is a technique used for controlling
rection errors in data transmission over unreliable or noisy communication channels.
File Transfer FTP is a network protocol used to transfer files from one computer to an NEand vice-
Protocol (FTP) versa through the network.
Frequency Frequency is a physical attribute of a wave (for example, an optical wave), defined as
the number of wave cycles per time unit. The frequency is directly related to the wave-
length.
Generalized Multi- Is a protocol suite extending MPLS to manage further classes of interfaces and switch-
Protocol Label ing technologies other than packet interfaces and switching, such as time division mul-
Switching (GMPLS) tiplex, layer-2 switch, wavelength switch and fiber-switch.
Internet Protocol (IP) Is the principal communications protocol in the Internet protocol suite for relaying data-
grams across network boundaries. Its routing function enables internetworking, and
essentially establishes the Internet.
Internet Protocol Is a connectionless protocol for use on packet-switched networks. It operates on a best
version 4 (IPV4) effort delivery model, in that it does not guarantee delivery, nor does it assure proper
sequencing or avoidance of duplicate delivery. These aspects, including data integrity,
are addressed by an upper layer transport protocol, such as the Transmission Control
Protocol (TCP).
Link Aggregation Within the IEEE specification the Link Aggregation Control Protocol (LACP) provides a
Control Protocol method to control the bundling of several physical ports together to form a single logical
(LACP) channel. LACP allows a network device to negotiate an automatic bundling of links by
sending LACP packets to the peer (directly connected device that also implements
LACP).
Link Aggregation Allows a bridge to treat multiple physical links between two end-points as a single logical
(LAG) link, referred to also as a port-channel. The feature can be used to directly connect two
switches when the traffic between them requires high bandwidth and/or reliability, or to
provide a higher bandwidth connection to a public network. For this purpose, all the
physical links in a given port-channel must operate in full-duplex mode and at the same
speed.If a physical port or the related link of a LAG fails, the traffic previously carried
over the failed link automatically is switched to the remaining link(s) of the LAG (rapid
reconfiguration). Bandwidth degradation is an obvious impact if the sum of throughput
of the two/multiple aggregated links are higher than the throughput of the remaining
link(s). Be aware that certain link failures are not always visible to both ends of a link.
Link Aggregation Control Protocol (LACP) and Automatic Laser Shutdown (ALS)
enabled, guarantees that both ends of a link properly detect all failures and perform the
correct response.LAG groups must first be created at the NE side via the LCT, only then,
they are visible in TNMS so that you can use it in the E-LAN and E-Line service creation
via the New Ethernet Service wizard. LAG is supported in specific network elements and
cards only. Refer to the NE dedicated documentation fore more information.
Laser A laser is a device that generates an intense narrow beam of light by stimulating the
emission of photons from excited atoms or molecules.
Laser safety Laser safety rules are a group of mechanisms and actions necessary to protect all users
from harmful laser light emissions.
Local Craft network LCT is a client-based craft terminal (that is, element manager) software which provides
(LCT) access to network elements (NEs) in the customer network without the use of a man-
agement system.
Lightweight Direc- Is an application protocol for accessing and maintaining distributed directory information
tory Access Protocol services over an Internet Protocol network.
(LDAP)
Line interface A line interface is a transponder interface that faces the line side of the link. Contrast
with “client interface” which faces the client equipment side of the link.
Long Haul (LH) hiT 7300 LH segment is a DWDM application characterized by a reach of more than 500
km and up to 1200 km.
Label Switched Path Is a path through an MPLS network, set up by a signaling protocol such as LDP, RSVP-
(LSP) TE, BGP or CR-LDP. The path is set up based on criteria in the forwarding equivalence
class (FEC).
Label switch router Sometimes called transit router, is a type of a router located in the middle of a Multipro-
(LSR) tocol Label Switching (MPLS) network. It is responsible for switching the labels used to
route packets. When an LSR receives a packet, it uses the label included in the packet
header as an index to determine the next hop on the Label Switched Path (LSP) and a
corresponding label for the packet from a look-up table. The old label is then removed
from the header and replaced with the new label before the packet is routed forward.
Maintenance Associ- Are points at the edge of the domain that define the boundaries and sends and receives
ation End Points CFM frames through the wire side (physical port) or relay function side.
(MEP)
Management Infor- Is used for backup purposes where you can plan automatic upload jobs.
mation Base (MIB)
MX Juniper MX Series Universal Edge Routers are Ethernet-centric services routers that
are purpose-built for demanding carrier and enterprise applications (font: Juniper web-
site).
Network Craft NCT is a network management craft terminal (that is, element manager) software which
Terminal (NCT) is used for either local or remote network management.
Network Element A network element (NE) is a self-contained logical unit within the network. The NE can
(NE) be uniquely addressed and individually managed via software.
Each NE consists of hardware and software components to perform given electrical and
optical functions within the network.
Network Manage- The network management layer includes all the required functions to manage the optical
ment network in an effective and user-friendly way, such as the visualization of the network
topology, creation of services, and correlation of alarms to network resources.
Network topologies A topology of a network is defined by the list of NEs included in the network and the list
of links that connect those NEs (for example, point-to-point, chain, ring, and so on).
Network to Network Is an interface which specifies signaling and management functions between two net-
Interface (NNI) works. NNI circuit can be used for interconnection of IP (e.g. MPLS) networks.
Optical Channel A predefined wavelength that can be used to transmit a bit stream by means of a mod-
ulated light signal.
Optical Network An ONN is an NE where the incoming channels are either dropped or routed to a line in
Node (ONN) a different direction, outgoing channels can also be added locally. Apart from multiplex-
ing and demultiplexing an ONN NE implements optical or 3R signal regeneration and
dispersion compensation.
Optical path The path followed by an optical channel from the first multiplexer to the last demulti-
plexer.
Path Computation Implements, sets up and manages PCEP, while also notifying OM when PCEP is avail-
Engine Protocol able or unavailable to send/receive PCEP Route messages.
(PCEP)
Performance man- Performance monitoring and signal quality analysis provide information for detecting
agement and alerting, a cause that could lead to a degraded performance before a failure is
declared.
Peak Information Is a burstable rate set on routers and/or switches that allows throughput overhead.
Rate (PIR) Related to Committed Information Rate which is a committed rate speed guaran-
teed/capped. For example, a CIR of 10 Mbit/s PIR of 12 Mbit/s allows you access to 10
Mbit/s minimum speed with burst/spike control that allows a throttle of an additional 2
Mbit/s.
Pseudo-Random Is a known sequence of bits that can be used as a test signal to measure transmission
Binary Sequence delay and bit error rate of a channel. In this test, one port inserts the PRBS signal in the
(PRBS) channel (source port) and another detects if the sequence was received correctly (sink
port). This kind of test is traffic affecting since the test sequence is inserted into the
OPUk until the test is stopped.
Physical Trails (PT) Trails are represented as Physical Trails (PTs). They connect two Physical Termination
Points (PTP) on a physical layer rate, but can also contain non-physical layers.
Planning Tool Con- Interfaces Coriant TransNet/Intelligent Optical Control DWDM network planning tool.
nector (PTC)
PTX Juniper Packet Transport Routers are Converged Supercore platforms that deliver
powerful capabilities based on the Junos Express chipset and forwarding architectures
optimized for MPLS and Ethernet, with integrated, coherent 100GbE technology (font:
Juniper website).
Qualitative System Quality System Requirements are non-functional requirements that must be meet by a
Requirements System such as Reliability, Availability, Performance, Scalability, Security, Maintainabil-
ity, Portability, etc.
Required Creation Is the desired state of the path, which is set by the user upon creation.
State (RCS)
Optical Signal to OSNR is the ratio of an optical signal power to the noise power in the signal.
Noise Ratio (OSNR)
Ring network A ring network is a network topology in which each NE connects to exactly two other
NEs, forming a circular optical path for signals (that is, a ring).
Synchronous Digital Is a standardized protocol that transfer multiple digital bit streams over optical fiber using
Hierarchy (SDH) lasers or highly coherent light from light-emitting diodes. At low transmission rates data
can also be transferred via an electrical interface. The method was developed to replace
the Plesiochronous Digital Hierarchy system for transporting large amounts of telephone
calls and data traffic over the same fiber without synchronization problems.
Security manage- Security Management controls the individual access to particular NE functions via the
ment network management system and/or via a craft terminal, using a hierarchical security
management user ID, and password concept.
State Event Machine In computation, a finite-state machine is event driven if the transition from one state to
(SEM) another is triggered by an event or a message.
Secure Hash Algo- Is a family of cryptographic hash functions that takes an arbitrary block of data and
rithm (SHA) returns a fixed-size bit string, the cryptographic hash value, such that any (accidental or
intentional) change to the data will (with very high probability) change the hash value.
The data to be encoded are often called the message, and the hash value is sometimes
called the message digest or simply digest.
Simple Network SNMP is used in network management systems to monitor network-attached devices for
Management conditions that warrant administrative control. It consists of a set of standards for
Protocol (SNMP) network management, including an application layer protocol, a database schema, and
a set of data objects.
Software manage- Software management performs all software downloads, uploads, and software integrity
ment functions.
Secure Shell (SSH) Is a cryptographic network protocol for secure data communication, remote command-
line login, remote command execution, and other secure network services between two
networked computers that connects, via a secure channel over an insecure network, a
server and a client (running SSH server and SSH client programs, respectively).
Synchronous Synchronous Optical Networking and Synchronous Digital Hierarchy are standardized
Optical Networking protocols that transfer multiple digital bit streams over optical fiber using lasers or highly
(SONET) coherent light from light-emitting diodes.
Throughput Throughput measures the number of work units performed in a given time unit.
Topological Con- Defines a containment relationship between other topological container and/or NEs.
tainer (TC) This means they can contain NE symbols and other TCs. The network map is always
associated with one TC, which corresponds to a network view.
Tandem Connection TCMs are configurable parameters (via Element Manager) of the transponders. They
Monitoring (TCM) provide a Performance Management of all the Optical Transport Network (that is, end-
to-end connection) or specific sections only and implement an Optical channel Data Unit
(ODU) termination provisioned to support up to six TCM levels.
Transmission Is one of the core protocols of the Internet protocol suite (IP), and is so common that the
Control Protocol entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked
(TCP) delivery of a stream of octets between programs running on computers connected to a
local area network, intranet or the public Internet. It resides at the transport layer.
TNMS Core TNMS Core is an integrated solution designed for large, medium and small size net-
works. It supports NEs with DWDM, OTH, SDH, PDH, Ethernet in line, star, ring and
mesh network configurations. TNMS Core can be used to manage networks in the
access, edge, metro, core and backbone levels.
TNMS CT TNMS CT is a transparent software platform for SDH and DWDM NEs using QD2, QST,
QST V2, Q3 or SNMP telegram protocols. It supports line, star, ring and mesh networks
and provides access to NEs via Ethernet interface or via a serial line interface (RS232).
TNMS NCT TNMS NCT is a lighter version of TNMS for smaller networks. It uses GM or MVM-based
mediations and includes the basic functionalities for network management.
TransNet Planning of a hiT 7300 network is done by the Coriant TransNet tool. Coriant TransNet
is a sophisticated software simulation tool developed specifically for designing and/or
upgrading optical DWDM networks with hiT 7300. It runs on PCs using Microsoft
Windows operating systems.
Trail Trace Identifier TTI is a transponder card parameter (configurable via Element Manager) of which is
(TTI) used to verify correct cabling or correct Tandem Connection Monitoring (TCM) configu-
ration. The basic principle is that specific overhead bytes are reserved for Trace
Messages of the user's choosing. By specifying the Actually Sent (transmitted) and the
Expected (received) trace messages, the system can automatically verify that fiber con-
nections have been made as intended. This is accomplished by comparing the expected
Trace Message to that actually received. If they differ, an alarm is raised, alerting per-
sonnel of the incorrect connections.
Transponder card A transponder card receives an optical input signal and converts it to an optical output
signal suitable for DWDM multiplexing and transmission.
Transponder Loopbacks are diagnostic tests that can be activated via Element Manager. Loopbacks
loopback return the transmitted signal back to the sending device after the signal has passed
across a particular link. The returned signal can then be compared to the transmitted
one. Any discrepancy between the transmitted and the returned signal helps to trace
faults.
User Datagram Is one of the core members of the Internet protocol suite (the set of network protocols
Protocol (UDP) used for the Internet). With UDP, computer applications can send messages, in this
case referred to as datagrams, to other hosts on an Internet Protocol (IP) network
without prior communications to set up special transmission channels or data paths.
UDP uses a simple transmission model with a minimum of protocol mechanism. It has
no handshaking dialogues, and thus exposes any unreliability of the underlying network
protocol to the user's program. As this is normally IP over unreliable media, there is no
guarantee of delivery, ordering or duplicate protection. UDP provides checksums for
data integrity, and port numbers for addressing different functions at the source and des-
tination of the datagram.
Ultra Long Haul hiT 7300 ULH segment is a DWDM application characterized by long path lengths of up
(ULH) to 1600 km.
User-to-Network Is a demarcation point between the responsibility of the service provider and the respon-
Interface (UNI) sibility of the subscriber. This is distinct from a Network to Network Interface (NNI) that
defines a similar interface between provider networks.
Universal Network Universal Network Objects are software NEs that can be configured and used to repre-
Object (UNO) sent network elements which are not supported by TNMS. UNO also supports devices
with restricted functionalities, for example, without supervising interfaces.
They are also used to represent network services between third parties and TNMS net-
works.
Virtual Local Area In computer networking, a single layer-2 network may be partitioned to create multiple
Networks (VLAN) distinct broadcast domains, which are mutually isolated so that packets can only pass
between them via one or more routers; such a domain is referred to as a Virtual Local
Area Network, Virtual LAN or VLAN.
Wavelength Wavelength is a physical attribute of a wave (for example, an optical wave), defined as
the distance between corresponding points of two consecutive wave cycles.
The wavelength is directly related to the frequency of the wave.
Wait to restore time The time in minutes that TNMS waits until it tries to switch to the working path again,
(WTR) assuming the Revertive option is selected.
eXtensible Markup Is a markup language that defines a set of rules for encoding documents in a format that
Language (XML) is both human-readable and machine-readable. The design goals of XML emphasize
simplicity, generality, and usability over the Internet. It is a textual data format with strong
support via Unicode for the languages of the world. Although the design of XML focuses
on documents, it is widely used for the representation of arbitrary data structures, for
example in web services.
Index Oracle 26
template files 26
Uninstalling 27
A OSI Stack 27
Antivirus 33 configure 27
Audit policy 17 install 27
OSI stack
Installation 27
B uninstalling 28
BIOS 15
P
C Password
Component delivery 13 complexity rules 36
Component Services 19 Power management 24
CopSSH Prerequisites 14, 25
configure 30
install 29
S
troubleshooting 32
System Hosts configuration 23
D
T
Domain Verification 23
Dynamic Port range 24 Template files 26
Third-party software
OSI stack 27
H TNMS NCT 35
Hardware 13 installation 35
client 13 unistallation 41
large configuration 13 TNMS NCT Client
medium configuration 13 installation 37
netserver 13
requirements 13
U
server 13
Uninstallation 41
User Account Control 25
I
Installation
W
CopSSH 29
full 35 Windows Server 2008 19, 20, 22
Hardware 13 FTP 19
OSI stack 27 Windows server 2012
TNMS NCT Client 37 FTP 21
J
Java
JRE 14
JRE 14
L
Log
TNMS NCT 39
O
Operating Systems 14
A50023-K4045-X040-01-76D1 59
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
60 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
A50023-K4045-X040-01-76D1 61
Issue: 1 Issue date: November 2015
Installation Manual (IMN, Windows)
62 A50023-K4045-X040-01-76D1
Issue: 1 Issue date: November 2015