Professional Documents
Culture Documents
Operation: System Administration Omn-Sy
Operation: System Administration Omn-Sy
System Administration
OMN-SY
A50016-D3131-Q901-1-7619
OMN-SY Operation
System Administration
Trademarks:
All designations used in this document can be trademarks, the use of which by third parties for their
own purposes could violate the rights of their owners.
2 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
Issue History
Issue Date of issue Reason for Update
Number
A50016-D3131-Q901-1-7619 3
OMN-SY Operation
System Administration
4 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
Contents
1 Introduction (IN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.1 Administration of the MP platform. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1.1 System time at SGSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1.2 Message Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.2.1 Event Report Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.2.2 Log Control Function. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.3 Q3 Access Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.1.3.1 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.1.3.2 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.1.3.3 Alarming in the Case of Access Violation . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.1.3.4 File Access Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.1.4 Alarm Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.1.4.1 Alarm Indication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.1.4.2 Alarm Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.1.4.3 External Alarms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.1.4.4 Alarm Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.1.5 Data Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.1.6 Input Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.1.6.1 Administration of Input Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.1.6.2 Input Log Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.1.7 Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.1.7.1 SAM File Arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.1.7.2 File Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.1.7.3 File Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.2 Administration of the SP Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.2.1 System Time at GGSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.2.2 Accounting File Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.2.3 Alarm Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.2.4 File Handling with FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.3 Appendix: International Alphabet No. 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
A50016-D3131-Q901-1-7619 5
OMN-SY Operation
System Administration
1 Introduction (IN)
The OMN-SY describes the administration tasks to be performed in order to maintain
the operating functions of the system in the PS domain of the core network while the
network node is in service .
The general packet radio service (GPRS) allows the mobile subscriber access to the In-
ternet or other packet data networks. The GPRS core network consists of two different
network nodes, the Serving GPRS Support Node (SGSN) and the Gateway GPRS Sup-
port Node (GGSN). The nodes are connected via the Gn interface within the backbone
network.
The SGSN mainly handles the radio-related protocols and the mobility of the subscrib-
ers. The SGSN serves the base station controller (BSC) via the Gb interface. The SGSN
consists of an MP platform and an SP platform.
The GGSN performs the connection to the ISP via the Gi interface. The GGSN consists
of an SP platform and an accounting file server (AFS). (For detailed information on the
hardware architecture of the CN, see the System Description.)
According to the platforms integrated into the different network nodes of the core net-
work the introduction and the task list of this manual are divided into the following parts:
• Administration of the MP platform (see chapter 1.1)
• Administration of the SP platform (see chapter 1.2)
Depending on the network node you wish to administrate, please refer to the chapter of
the manual describing this platform and select the topic needed.
The following documentation deals with subjects closely related to the information given
in the present manual:
– in the manual OMN-NNC the configuration of the network nodes in the PS domain
is explained
– in the manual OMN-CM the administration of interfaces and connections is ex-
plained
– the Switch Commander documentation informs about the handling and the function
of the SC
6 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
Switch
FTP Commander
different hard
MP:OAM TCP/IP
MPs disk
Work-
bench
MP platform
A50016-D3131-Q901-1-7619 7
OMN-SY Operation
System Administration
8 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
What’s more, up to five capacity alarm thresholds can be defined (parameter: Capacity
alarm thresholds). If the capacity of an event log reaches any of the threshold values, a
capacity alarm message is generated.
The storage of event log records in the event log can be explicitly suppressed (param-
eter: Administrative state).
Depending on the Event log parameter, DISP EVLOG displays the status information of
one or more event logs. Detailed information is output for an actual event log.
The settings for an event log can be changed with MOD EVLOG. Note that parameters
can only be added after being entered with CR EVLOG.
Canceling an event log (CAN EVLOG) deletes all records in the log.
Event log records can be displayed with DISP EVRECF. You can also specify the range
of records to be displayed (parameter: Record range). The volume of data to be dis-
played for records can be reduced by entering filter criteria (parameter: Detailed filter).
CAN EVREC deletes a record or a range of records in an event log.
1.1.3.1 Authentication
Task MOD AUTHDEF is used to set a global default authentication for unknown initia-
tors (Default authent.). The default authentication can be:
– Allow
– Abort association
– Deny with response
The response to unauthorized access can also be set.
Initiators are assigned to users (user groups) who work with Switch Commander appli-
cations allocated to them. Which user is allowed to use an application is administered in
the Switch Commander. Each initiator is identified by an AET (application entity title).
The relationship between users and initiators is shown in the example in Fig. 1.2.
A50016-D3131-Q901-1-7619 9
OMN-SY Operation
System Administration
Switch Commander
Network Node
10 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
• Denial response
Response to an access attempt refused because of a lack of default access rights
(Deny or Abort).
• Security administrator
The security administrator is a special AET. He or she has access to the system at
all times (see 1.1.3.1) and access to the access control database.
The authentication data of the security administrator is stored in a file without gen-
eration. After an online fallback, the administrator is the only AET whose authentica-
tion data is available both as part of the new generation and of the valid generation.
A security administrator must be specified before the individual rules are defined.
• Rule restriction
The rule types can be limited using the rule restriction so as to simplify the complex
access control system. For example, it is useful to only permit Allow rules and at the
same time to set the default access rights to Deny.
The security administrator should administer the initiator groups, target groups and
rules.
Do not change the default access rights before defining the security administrator and
! fixing the access rights by rules. Otherwise each Q3 operation could be rejected and no
further administration is possible.
Rules
A rule is created with task CR ACRULE. In addition to specifying the concerned initiators
and target groups, the rule type is defined. The period of validity of a rule can also be
limited (start and stop times or daily/weekly periods).
The types of rules are as follows:
– Allow rule: An allow rule permits access, provided that no deny rule applies.
– Deny rule: A deny rule causes rejection of access attempts.
– Abort rule: An abort rule aborts the connection to an initiator whenever an access is
attempted.
– Global rule: A global rule defines the global access rights for a referenced initiator
group. It does not reference any target group.
– Common rule: A common rule defines the general access rights for a referenced tar-
get group. It does not reference any initiator group.
Note the following when modifying a rule (MOD ACRULE):
– You cannot change a common rule (no initiator group) to a non-common rule or vice
versa. In other words, only an existing initiator group can be modified.
– You cannot change a global rule (no target group) to a non-global rule or vice versa.
In other words only an existing target group can be modified.
– You cannot change an Allow rule to a Deny rule or vice versa. In other words, a rule
type can only be changed from Deny to Abort or vice versa.
– Time parameters can only be modified if the have been created with CR ACRULE.
Example
A50016-D3131-Q901-1-7619 11
OMN-SY Operation
System Administration
Create a security administrator (a user with the AET <admin_aet> has been created):
MOD ACCFG: Sec. administrator = <admin_aet>;
Create an initiator group (STDGRP1), which should have access rights to all objects
(global rule - no Target group list):
CR ACINIGRP: Initiator group = STDGRP1, AET list = <aet1> >aet2>;
CR ACRULE: Rule = STDQ3ACCESS, Rule type = Allow,
Initiator group list = STDGRP1;
Create the default access rights and the permitted rule types:
MOD ACCFG: Default access = {M-ACTION = Deny, M-CREATE = Deny,
M-DELETE = Deny, M-GET = Deny, M-SET = Deny}, Denial response = Deny,
Rule restriction = Allow rules;
12 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
A50016-D3131-Q901-1-7619 13
OMN-SY Operation
System Administration
Example
An event destination is created for communications alarms, equipment alarms, etc.
and one for security alarms:
CR EVDEST: Event destination = <destination1>, Destination = <aet_list>,
Dest. with backup = <backup_aet_list>, Event filter = {,,communicationsAlarm},
{,,environmentAlarm}, {,,equipmentAlarm}, {,,processingErrorAlarm}, {,,qualityofSer-
viceAlarm}, {,,objectDeletion}, {,,stateChange};
CR EVDEST: Event destination = <destination2>, Destination = <aet_list>,
Dest. with backup = <backup_aet_list>,
Event filter = {,,securityServiceOrMechanismViolation}, {,,timeDomainViolation},
{,,integrityViolation}, {,,operationalViolation};
All system alarms (including the CP) are compiled in the MP using the Standard Alarm
Balance Monitor (STALBAMO). The alarms are selected according to object classes,
events types and probable causes. A further Alarm Balance Monitor (PCM) can be cre-
ated for PCM alarms in the CP (CR ALRELAIS, see also 1.1.4.3). Under the control of
the STALBAMO, alarms for all Alarm Balance Monitors are indicated by means of the
lamps on the ALI module (CRITICAL, MINOR, MAJOR). DISP ALBALMON is used to
display an overview of the created monitors and their alarms.
It is not possible to suppress alarm indication on the MP.
Example
An alarm log “AlarmLog” for communications, equipment and similar alarms and an
alarm log “SAL_AlarmLog” for security alarms are created:
CR EVLOG: Event log = AlarmLog, Event filter = {,,communicationsAlarm}, {,,envi-
ronmentAlarm}, {,,equipmentAlarm}, {,,processingErrorAlarm}, {,,qualityofService-
Alarm}, {,,objectDeletion}, {,,stateChange};
CR EVLOG: Event log = SAL_AlarmLog,
14 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
MP SC
Lines
A50016-D3131-Q901-1-7619 15
OMN-SY Operation
System Administration
16 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
Magnetic disk
The two magnetic disks of the MP are permanently installed in the system. They can be
deactivated (for maintenance purposes for example) and reactivated with the task
CONF MDDMP. When they are activated, it is possible to determine whether or not their
content is to be discarded, i.e. whether or not the content of the hard disk is to be over-
written by copying.
The following properties of the magnetic disks can be verified with the task DISP MD-
DMP:
– free memory space
– total memory space
– MP alarm profile
– board and board type
– mounting location (rack, shelf, pitch).
Magneto-optical disk
The two magneto-optical disks of the MP are operated with random access, i.e like a
hard disk. Prior to a change of medium, the device must be deactivated and then reac-
tivated, using the task CONF MODMP in both cases. For activated disks, it is possible
to determine whether or not the content of the redundant magneto-optical disk is to be
overwritten by copying.
The following properties of the magneto-optical disks can be verified with the task DISP
MODMP:
– free memory space
– total memory space
– MP alarm profile
– board and board type
– mounting location (rack, shelf, pitch).
A50016-D3131-Q901-1-7619 17
OMN-SY Operation
System Administration
<name> This is the user-specific part of the file name. It corresponds to the Log
file name parameter of the SET INPLOG task. If this file name is not spec-
ified, the current system time is indicated here as the character string.
<number> This part of the file name is automatically assigned. The first layer man-
agement log file is numbered ‘001’. Following further configuration, this
part is numbered in ascending order, provided that <ext> remains un-
changed.
<ext> This part of the filename is automatically assigned incrementally. The first
Q3 files are assigned the extension ‘A1’. The value range is from A1 to
Z9. The master file always has the extension ‘A0’.
When activating the logging function, a maximum size of the log files can be defined
(Swap file size parameter). If this limit is reached (combined volume of Q3 binary files
and Q3 text files), the files are automatically closed and new files are created with an
incremented <ext> in the filename.
Example
The input logging function is activated and the indicated files are created. The maxi-
mum size of the log files is not indicated and the files therefore have the default size
(20 Mbytes).
SET INPLOG: Log file name = MCH1;
LG.MCH1.A0.MASTER
LG.MCH1.A1.Q3B
LG.MCH1.A1.Q3T
LG.MCH1.A1.LM001 (if configuration of the layer manager is performed)
LG.MCH1.A1.LM002 (if a second configuration of the layer manager is performed).
18 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
The user-specific part of the file name <name> and the maximum size of the log files
can be modified with task MOD INPLOGFILE. The file size can only be modified togeth-
er with the name. The old log files are closed and regenerated. This may take some time
since, before they are closed, all database changes which have already been started
must be completed. If log jobs (activities recorded by input logging) are still active after
30 minutes, the MOD INPLOGFILE task is rejected.
Task RSET INPLOG terminates the input logging operation and closes all log files. In
this case it is necessary to wait until all the initiated database changes have been com-
pleted. If log jobs are still active after one hour, they are terminated and alarm messages
reports will be lost.
The current status of the input logging function can be checked with STAT INPLOG.
The log files can be transferred via FTP to the operation terminal where they can be
viewed and edited. Requests should only be deleted and not inserted in the Q3 text file
since, during the subsequent export (see section 1.1.6.2), the Q3 text file is interpreted
(as it relates to the sequence of operations) while the associated data from the Q3 binary
file is used.
A50016-D3131-Q901-1-7619 19
OMN-SY Operation
System Administration
Error handling
If errors occur during incorporation of the contents of the input log files into the database
of the network node, various information is written into the following error log files:
– LG.<name>.LEXERR.nnn (on the MP hard disk)
– LG.<name>.LEXLMR.nnn (on the MP hard disk)
– LG.LEXOUT.nnn (on the CP hard disk)
The placeholder <name> corresponds to the <name> part of the input log file that is to
be incorporated. nnn is a number (001 to 999) which will be incremented when the same
input log file (<name>) is incorporated.
Error log file LG.<name>.LEXERR.nnn is created at the start of incorporation and con-
sists of the following parts:
• Start header
This part consists of a time stamp (beginning of incorporation), the start parameters,
a short explanation of the function of the file and the abbreviations used in the file.
• Error entries
This part contains a one-line entry for each erroneous Q3 request or MML command
with
– the sequence number of the request or command
– the expansion of the log file concerned
– the application which caused the rejection (AS (Application server), MMI, LEX
(Log executor), LM (Layer management))
– a part which describes a detailed reason
– a warning code
The warning code is set if the Layer management or Application server applications
have rejected the request/the command. If one of these applications also responds
with a rejection when the second attempt is made, no warning is written into the error
log file.
• Stop time stamp or end of execution code
For Layer management entries the sequence number and the \NET.RESULT file for the
Layer management Configuration file (see manual OMN-NNC, OSI over TCP), which
cannot be copied in are copied into log file LG.<name>.LEXLMR.nnn. Log file LG.<File-
Name>.LEXLMR.nnn contains the copy of all \NET.RESULT files of all Layer manage-
ment Configuration files which could not be copied in and which are stored in the
LG.<FileName>.A0.MASTER input log file.
Entries for MML command which could not be incorporated are written into Error log file
LG.LEXOUT.nnn on the CP hard disk. To identify the outputs in log file LG.LEX-
OUT.nnn the procedure is as follows:
– Select the MML command (to be found in the MML log file) with the sequence num-
ber from LG.LEXOUT.nnn and
– compare it with the entries in LG.LEXOUT.nnn; the result is after the matching com-
mand.
20 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
1.1.7 Files
This section deals with the management of files on the local data media such as mag-
netic disk (MD) and magneto-optical disk (MO). For information on the data media itself,
see section 1.1.5.
A50016-D3131-Q901-1-7619 21
OMN-SY Operation
System Administration
ture which causes the writing is to be deactivated at first to avoid further writings into
SAMAR’s files during or after making the safety copies.
Initiator groups
When creating an initiator group with task CR FSINIGRP, a list of initiator IDs is as-
signed to the group. The group can be modified with MOD FSINIGRP (i.e., replaced, re-
duced, expanded). DISP FSINIGRP and CAN FSINIGRP display and cancel initiator
groups respectively.
File groups
When creating a file group (CR FSFGRP), a file list and an operation list are assigned
to the file group. The file list can contain up to 20 fully or partially qualified file names.
The maximum lengths of file names differ between CP and MP (17 characters in the CP
and 48 in the MP).
The operation list defines one or more file operations for the file group (read, write, cre-
ate, cancel or read the attributes). A rule applied to the file group defines whether the
operations are permitted or not. In addition, a password can be defined for each opera-
tion. This password is only evaluated if an Allow rule applies to the particular operation.
The file lists and operation lists can be modified with task MOD FSFGRP. Note that op-
erations cannot be added or deleted at the same time. To delete an operation protected
by a password, you must enter the password.
To modify or reset the password for a file operation, use task MOD FSFGRPPW or
RSET FSFGRPPW respectively. Task RSET FSFGRPPW may only be set by adminis-
22 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
trators with a high level of authorization as it is possible to reset a password with this
task without knowing the old password.
The tasks DISP FSFGRP and CAN FSFGRP are provided for displaying and canceling
files groups respectively.
Rules
A rule is defined with task CR FSRULE. In addition to specifying the initiator groups and
file groups concerned, the rule type is defined. The validity of a rule can be limited in time
(start and stop times or daily/weekly periods).
The types of rules are as follows:
• Allow rule
An Allow rule permits file accesses, provided no Deny rules apply.
• Deny rule
A Deny rule causes rejection of file access attempts.
• Global rule
The global rule does not reference a file group. Instead, it defines the global access
rights for a referenced initiator group, i.e., for all files and file operations.
• Common rule
A Common rule does not reference an initiator group. Instead, it defines the general
access rights for a referenced file group, i.e., it applies to all initiators.
Note the following when modifying a rule (MOD FSRULE):
– You cannot change a common rule (no initiator group) to an non-common rule or
vice versa. In other words, only an existing initiator group can be modified.
– You cannot change a global rule (no file group) to an non-global rule or vice versa.
In other words, only an existing file group can be modified.
– Only time parameters created with CR FSRULE can be modified.
A50016-D3131-Q901-1-7619 23
OMN-SY Operation
System Administration
Network Node
MP
Magnetic
Disk SC / OS / PC
Hard disk
Magneto-
optical
Disk
Disk
24 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
SGSN
different hard Q3
MPs MP:OAM
disk
MP platform
internal
Switch
connections
Commander
IPMDD
SP:BSSGP SP:GTP SNMP
MCP Work-
LCT
bench
Gb
SP platform
GGSN
MCP SNMP
A50016-D3131-Q901-1-7619 25
OMN-SY Operation
System Administration
The alarm data collector (ADC) receives the traps and converts them into the X.733
alarm format. The alarm store service stores the alarms in the alarm DB. The alarm pre-
sentation service applications are informed about incoming alarms and perform presen-
tation or forwarding.
Alarms and events are also stored at the SP platform and can be viewed for system,
card and port level at the LCT application.
26 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
Example:
The character "[" is represented in hexadecimal form as 5B.
0 1 2 3 4 5 6 7
0 NUL DLE SP 0 @ P ´ p
1 SOH DC1 ! 1 A Q a q
2 STX DC2 " 2 B R b r
3 ETX DC3 # 3 C S c s
4 EOT DC4 $ 4 D T d t
5 ENQ NAK % 5 E U e u
6 ACK SYN & 6 F V f v
7 BEL ETB ’ 7 G W g w
8 BS CAN ( 8 H X h x
9 HT EM ) 9 I Y i y
A LF SUB * : J Z j z
B VT ESC + ; K [ k {
C FF IS4 , < L \ l |
D CR IS3 - = M ] m }
E SO IS2 . > N ^ n ¯
F SI IS1 / ? O _ o
6C = (lowercase) letter "l", 7C = <vertical line>
A50016-D3131-Q901-1-7619 27
OMN-SY Operation
System Administration
28 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
Display commands are only specified in the procedures when they are absolutely necessary. Generally,
i display commands are not necessary for confirming the execution of a command. It can already be seen
from the command acknowledgment output by the system whether the command entered was correctly
executed. If it should be necessary for administrative reasons to receive an acknowledgment of the ex-
ecuted tasks in addition to the run listing, the contents of the database can be displayed, for example,
before and after or only after each task using the appropriate commands (see TML).
Each task contains only the parameters or identifiers characteristic for that particular task.
2.1 MP Platform
2.1.1 System Time at SGSN
(See Introduction (IN), section 1.1.1 "System time at SGSN")
Display general MP data describing the network node, here system time . . . . . DISP ME
Display the system time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DISP SYSTIME
Modify the system time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MOD SYSTIME
Change the system time from winter time to summer time and vice-versa . . . . . MOD SYSTIME
A50016-D3131-Q901-1-7619 29
OMN-SY Operation
System Administration
30 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
2.2 SP Platform
2.2.1 Accounting File Storage
(See Introduction (IN), section 1.2.2 "Accounting File Storage")
Accounting File Server and accounting and billing center
Enter IP address for GGSN accounting file server nodes . . . . . . . . . . . . . . . . MOD GACCFSN
Display IP address for GGSN accounting file server nodes . . . . . . . . . . . . . . . . DISP GACCFSN
Enter IP address for accounting and billing center. . . . . . . . . . . . . . . . . . . . . . MOD GACCBILLC
Display IP address for accounting and billing center. . . . . . . . . . . . . . . . . . . . . . DISP GACCBILLC
FTP user
Display all FTP user for accounting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DISP GACCFTPUS-
ER
Display one FTP user for accounting
using parameter User index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DISP GACCFTPUS-
ER
Create an FTP user for accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CR GACCFTPUSER
Modify an FTP user for accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MOD GACCFTPUS-
ER
Cancel an FTP user for accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CAN GACCFTPUS-
ER
Create an FTP user at SP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CR FTPUSER
A50016-D3131-Q901-1-7619 31
OMN-SY Operation
System Administration
32 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration
A50016-D3131-Q901-1-7619 33
OMN-SY Operation
TS-130 System Administration
Remark:
Tasks with the comment "if required" are omitted if they have already been carried out in another step.
34 A50016-D3131-Q901-1-7619
Operation OMN:PS-SY
System Administration TS-660
Remark:
Tasks with the comment "if required" are omitted if they have already been carried out in another step.
A50016-D1702-Q906-1-7619 35
OMN:PS-SY Operation
TS-660 System Administration
Remark:
Tasks with the comment "if required" are omitted if they have already been carried out in another step.
36 A50016-D1702-Q906-1-7619
Operation OMN-SY
System Administration
A50016-D3131-Q901-1-7619 37
OMN-SY Operation
TP-120 System Administration
TP-120
DISP ACRULE:
Initiator group
Y
Alternatively, the rule can be
CAN ACRULE: modified with MOD ACRULE in
Rule such a way that it no longer ref-
erences the Access Control Ini-
tiator Group to be canceled.
CAN ACINIGRP:
Initiator group
38 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration TP-122
TP-122
A50016-D3131-Q901-1-7619 39
OMN-SY Operation
TP-195 System Administration
TP-195
40 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration TP-195
A50016-D3131-Q901-1-7619 41
OMN-SY Operation
TP-196 System Administration
TP-196
DISP FSRULE:
Initiator group
Y
Alternatively, the rule can be
CAN FSRULE: modified with MOD FSRULE in
Rule such a way that it no longer ref-
erences the File Security Initia-
tor Group to be canceled.
CAN FSINIGRP:
Initiator group
42 A50016-D3131-Q901-1-7619
Operation OMN-SY
System Administration TP-197
TP-197
DISP FSRULE:
File group
CAN FSFGRP:
File group
A50016-D3131-Q901-1-7619 43