Vous êtes sur la page 1sur 86

TELLIN-USAU

Routine Operation Manual Contents

Contents

1 BAM Server Operations............................................................................................................1-1


1.1 Overview.......................................................................................................................................................1-2
1.2 BAM Manager ..............................................................................................................................................1-2
1.3 BAM Service Management ...........................................................................................................................1-6
1.4 Application of the File STXBAM.ini ............................................................................................................1-8
1.5 Data Backup ..................................................................................................................................................1-9
1.5.1 Automatic Backup................................................................................................................................1-9
1.5.2 Manual Backup ..................................................................................................................................1-10
1.6 Data Recovery.............................................................................................................................................1-15
1.6.1 Through Installation Program ............................................................................................................1-15
1.6.2 Through SQL Server Enterprise Manager..........................................................................................1-15
1.7 BAM Communication Gateway..................................................................................................................1-21

2 USAU Client Operations ..........................................................................................................2-1


2.1 Overview.......................................................................................................................................................2-2
2.2 Starting the Client..........................................................................................................................................2-2
2.3 Managing the Office Information..................................................................................................................2-3
2.4 the Client .......................................................................................................................................................2-4
2.4.1 Overview..............................................................................................................................................2-4
2.4.2 Logging in............................................................................................................................................2-4
2.5 Changing Password and Default Password ...................................................................................................2-6
2.5.1 Changing Password..............................................................................................................................2-6
2.5.2 Changing the Default Password ...........................................................................................................2-7
2.6 Re-login and Logout .....................................................................................................................................2-7
2.7 Output File Settings.......................................................................................................................................2-8
2.8 Using Command Time Out Setting ...............................................................................................................2-9
2.9 Saving Input Command and End Command Saving .....................................................................................2-9
2.10 Carrying out Batch Commands .................................................................................................................2-10
2.11 MML Client...............................................................................................................................................2-12
2.12 Components of MML Input Tool ..............................................................................................................2-13

3 Security Management................................................................................................................3-1
3.1 Overview.......................................................................................................................................................3-2

Issue 04 (2006-11-10) Huawei Technologies Proprietary i


TELLIN-USAU
Contents Routine Operation Manual

3.2 Operator Management...................................................................................................................................3-2


3.2.1 Adding an Operator Account................................................................................................................3-2
3.2.2 Modifying an Operator Account ..........................................................................................................3-4
3.2.3 Deleting an Operator Account..............................................................................................................3-4
3.2.4 Querying the Status of Password .........................................................................................................3-4
3.3 Workstation Management..............................................................................................................................3-5
3.3.1 Adding a Workstation...........................................................................................................................3-6
3.3.2 Modifying a Workstation .....................................................................................................................3-7
3.3.3 Deleting a Workstation.........................................................................................................................3-7
3.3.4 Locking the Workstation ......................................................................................................................3-7
3.4 Command Group Management .....................................................................................................................3-9

4 Device and Memory Management .........................................................................................4-1


4.1 Device Management......................................................................................................................................4-2
4.2 Memory Management ...................................................................................................................................4-6

5 Alarm Workstation Operations ...............................................................................................5-1


5.1 Overview.......................................................................................................................................................5-2
5.2 Starting the Alarm Workstation .....................................................................................................................5-3
5.3 Setting System Customization.......................................................................................................................5-4
5.4 Viewing Alarm ..............................................................................................................................................5-5
5.5 Querying Alarm...........................................................................................................................................5-10
5.6 Managing Alarm..........................................................................................................................................5-12
5.7 Printing Options ..........................................................................................................................................5-21

ii Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual Figures

Figures

Figure 1-1 BAM Manager startup window ........................................................................................................1-3


Figure 1-2 Configuring startup information .......................................................................................................1-6
Figure 1-3 Services.............................................................................................................................................1-7

Figure 1-4 BAM Service Properties ...................................................................................................................1-7


Figure 1-5 Editing STXBAM.ini........................................................................................................................1-9
Figure 1-6 Enterprise Manager......................................................................................................................... 1-11

Figure 1-7 SQL Server Enterprise Manager ..................................................................................................... 1-11


Figure 1-8 Specifying database and backup mode ...........................................................................................1-12
Figure 1-9 Selecting the path and name of the backup data file.......................................................................1-13

Figure 1-10 Backup progress............................................................................................................................1-13


Figure 1-11 Saving registry file........................................................................................................................1-14
Figure 1-12 Services.........................................................................................................................................1-16

Figure 1-13 BAM Service Properties ...............................................................................................................1-16


Figure 1-14 SQL Server Service Manager .......................................................................................................1-17
Figure 1-15 Selecting the Restore Database menu ...........................................................................................1-18

Figure 1-16 Restoring database ........................................................................................................................1-19


Figure 1-17 Choosing restore devices ..............................................................................................................1-20
Figure 1-18 Choosing restore destination.........................................................................................................1-20

Figure 1-19 BAM communication gateway .....................................................................................................1-21


Figure 1-20 Creating a new connection............................................................................................................1-22
Figure 1-21 Terminating a connection..............................................................................................................1-24
Figure 2-1 SAU terminal maintenance system...................................................................................................2-2
Figure 2-2 Setting office information.................................................................................................................2-3
Figure 2-3 Operator login...................................................................................................................................2-5
Figure 2-4 Main interface of the Client ..............................................................................................................2-5
Figure 2-5 Output report settings .......................................................................................................................2-8

Issue 04 (2006-11-10) Huawei Technologies Proprietary iii


TELLIN-USAU
Figures Routine Operation Manual

Figure 2-6 Command time out setting................................................................................................................2-9

Figure 2-7 Executing batch file ........................................................................................................................2-10


Figure 2-8 Executing the batch process immediately.......................................................................................2-11
Figure 2-9 Setting the breakpoint .....................................................................................................................2-12
Figure 2-10 MML Client window ....................................................................................................................2-13
Figure 3-1 Adding an operator account ..............................................................................................................3-3
Figure 3-2 Adding a workstation........................................................................................................................3-6
Figure 3-3 Prompt box for unlocking a workstation ..........................................................................................3-8
Figure 3-4 Modify the lock time ........................................................................................................................3-8
Figure 4-1 Maintenance navigation tree.............................................................................................................4-2
Figure 4-2 Device management window............................................................................................................4-3
Figure 4-3 Device panel .....................................................................................................................................4-3
Figure 4-4 Right-click shortcut menu.................................................................................................................4-4

Figure 4-5 Querying memory usage according to location ................................................................................4-6


Figure 4-6 Querying memory usage according to module number ....................................................................4-7
Figure 4-7 Memory usage ..................................................................................................................................4-7

Figure 4-8 Query memory contents....................................................................................................................4-8


Figure 4-9 Information of RAM memory...........................................................................................................4-8
Figure 4-10 Query setting domain......................................................................................................................4-8

Figure 4-11 Information of Flash memory .........................................................................................................4-9


Figure 4-12 Dump memory ................................................................................................................................4-9
Figure 5-1 Logging in to alarm workstation.......................................................................................................5-3
Figure 5-2 System setup .....................................................................................................................................5-4
Figure 5-3 Fault alarm window ..........................................................................................................................5-5
Figure 5-4 Event alarm window .........................................................................................................................5-6
Figure 5-5 History alarm window ......................................................................................................................5-6
Figure 5-6 Shortcut menus for Fault and History alarms ...................................................................................5-7
Figure 5-7 Shortcut menus for Event alarms......................................................................................................5-7

Figure 5-8 The Alarm Explanation Details window...........................................................................................5-7


Figure 5-9 Remarks for Fault alarms..................................................................................................................5-8
Figure 5-10 Saving an alarm ..............................................................................................................................5-9

Figure 5-11 Alarm filter setting ..........................................................................................................................5-9


Figure 5-12 Alarm query setting.......................................................................................................................5-10

iv Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual Figures

Figure 5-13 Alarm query result ........................................................................................................................ 5-11

Figure 5-14 Clearing history alarm ..................................................................................................................5-12


Figure 5-15 Mask of Alarm ..............................................................................................................................5-13
Figure 5-16 Alarm mask query window ...........................................................................................................5-13
Figure 5-17 Querying alarm parameter ............................................................................................................5-14
Figure 5-18 Alarm configuration query result ..................................................................................................5-15
Figure 5-19 Alarm box control .........................................................................................................................5-15
Figure 5-20 Querying alarm statistics ..............................................................................................................5-17
Figure 5-21 Alarm statistics query result..........................................................................................................5-18
Figure 5-22 Setting alarm screen level .............................................................................................................5-19
Figure 5-23 Getting alarm screen level ............................................................................................................5-19
Figure 5-24 Deleting alarm ..............................................................................................................................5-20
Figure 5-25 Real-time print filter setting..........................................................................................................5-21

Issue 04 (2006-11-10) Huawei Technologies Proprietary v


TELLIN-USAU
Routine Operation Manual Tables

Tables

Table 1-1 Shortcut icons .....................................................................................................................................1-3


Table 1-2 BAM Manager window elements .......................................................................................................1-4
Table 1-3 Options to manage processes..............................................................................................................1-5

Table 1-4 Startup types of BAM Service ............................................................................................................1-8


Table 1-5 Description of connection configuration items.................................................................................1-22
Table 2-1 Shortcut keys ......................................................................................................................................2-6

Table 2-2 Shortcut icons on the tool bar .............................................................................................................2-6


Table 2-3 Meaning of each registry key for password........................................................................................2-7
Table 2-4 Methods of querying help information .............................................................................................2-14

Table 2-5 Command shortcut icons ..................................................................................................................2-14


Table 2-6 Shortcut keys in MML Input Tool ....................................................................................................2-15
Table 3-1 Values set for the operation authority .................................................................................................3-3

Table 3-2 Description of the running result ........................................................................................................3-5


Table 4-1 The meanings of the icons in the window ..........................................................................................4-4
Table 5-1 Description of the parameter ............................................................................................................5-10

Table 5-2 Description of the options.................................................................................................................5-16

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-1


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

1 BAM Server Operations

About This Chapter

Operations on BAM Server

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-1


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

1.1 Overview
The universal signaling access unit (USAU) adopts the Client/Server structure.
Each maintenance terminal is the client of the entire system, and provides the maintenance
and operation functions.
The back administration module (BAM) is the server of the entire system, and provides the
multi-point maintenance and remote maintenance.
As the server, the BAM performs two main functions, as follows:
z The function of database
Implementing the storage and transferring data such as alarm information, traffic
statistics data
z The function as the bridge of communication between the USAU host and the
maintenance terminal
Sending the maintenance and operation commands from a client (remote/local) to the
USAU host and receiving the execution results from the host
The BAM server application software includes a service process manager (BAM Manager)
and several processes (such as Warn and Dataman) based on:
z Windows 2000 Server operating system
z MS SQL Server 2000 database system

1.2 BAM Manager


Starting BAM Manager
The BAM Manager is auto started when the operating system is started. The BAM service of
the USAU monitors whether the BAM Manager is started. If not, the computer will be
restarted. The BAM Manager startup window is as shown in Figure 1-1.

1-2 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Figure 1-1 BAM Manager startup window

Introducing Window Elements of BAM Manager


The BAM Manager window consists of the following four parts:
z Menu bar
z Tool bar
z Main window
z Status bar
The BAM Manager shortcut icons on the tool bar provide easy and quick access to many
routine operations. The functions of some frequently used shortcut icons are listed in Table
1-1.

Table 1-1 Shortcut icons


Icons Actions Remarks

Exits application None.

Starts the selected service Before using these shortcut keys, you have to
choose a process in the list.
Stops the selected service z If the selected process is running, the Start
icon is disabled.
z If the selected process is stopped, the Stop
icon is disabled.
Stops all running services None.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-3


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Icons Actions Remarks

Displays window These two icons provide a convenient method


to display or close the application program
window.
Hides window

Sets startup type It can be used to modify the Startup status of


each process.
Starts/stops Real-time To start or stop real-time monitoring of the
Monitoring Service processes.
About It displays version information and other
details about the BAM Manager.

Closing the BAM Manager will lead to interruption of communication between the BAM and all the
maintenance workstations (WSs), the network management software, and the host.

The main window of the BAM Manager consists of four list items as shown in Table 1-2.

Table 1-2 BAM Manager window elements


List items Meanings Remarks

Service Name of the system process None.


Status Status of the process z Started: The process is running.
z Stopped: The process has been stopped.
z Exception: The process is not normal. For
example, it is suspended or hung.
Startup Type of BAM Manager start z Automatic: The BAM Manager auto
up restarts the process when it finds that a
process is stopped.
z Manual: The BAM Manager does not
auto start the process. It has to be started
manually.
z System: It indicates that the process is
one under the system management.
z Disabled: It indicates that the process is
invalid or disabled.
ImagePath Path of the executable file None.
corresponding to the process

1-4 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Managing Service Process


The BAM Manager can be used to monitor and manage various processes running on the
BAM Server at the same time, including:
z Alarming
z Data management
z Maintenance
z Performance monitoring
z MML command
z Switching
z Traffic statistics task management
The BAM Manager provides three options to manage processes as listed in Table 1-3.

Table 1-3 Options to manage processes

Option Description

Start a specified z From the BAM Manager window, choose the process to be started.
process
z Then choose File > Start menu or click on the tool bar. The
selected process will be started.
Stop a specified z From the BAM Manager window, choose the process to be stopped.
process
z Then choose File > Stop menu or click on the tool bar. A
message is displayed prompting you to confirm stopping the process.
When you click Yes, the selected process will be stopped.
Stop all
Choose File > Stop All menu or click on the tool bar.
processes

The Start and Stop options in the File menu are enabled or disabled based on whether the selected
process is running or stopped. That is:
The Start option is enabled only when the process is stopped.
The Stop option is enabled only when the process is running.

Monitoring Process in Real Time


This function will monitor each process whose startup mode is Automatic or System. If a
process whose startup mode is Automatic or System is stopped or some exception causes it
to stop, it will be auto restarted. The status of each process will be updated in the Status
column of the BAM Manager interface. If real-time monitoring is not enabled then the
process has to be restarted manually in case the process is stopped or an exception causes the
process to stop functioning.

To enable real-time monitoring, choose Options > Realtime Monitor or click on the
tool bar.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-5


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Configuring Server Startup Information


Through configuring the startup information you can specify how to start the BAM Server
when the computer is restarted. The startup includes the following four types:
z Automatic: The BAM Server is auto started up when the system starts up.
z Manual: The BAM Server is started up manually after the system starts up.
z Disabled: The BAM Server startup is not allowed.
z System: The startup mode of the BAM Server is specified by the system.

To configure the startup information, choose Options > Startup menu or click on the
tool bar. The dialog box as shown in Figure 1-2 will pop up.

Figure 1-2 Configuring startup information

Choose the proper option and then click OK.

In normal cases, the Startup Type is set to Automatic.

1.3 BAM Service Management


The BAM Service is mainly used to monitor whether the BAM Manager is active or not.
When the BAM Service runs normally, it will auto restart the BAM Server if it finds the BAM
Manager has exited, which is equivalent to the function of Software Watchdog.
During the system debugging, this function can be controlled manually in the following
procedure:
Step 1 Choose Start > Programs > Administrative Tools > Services in the BAM. The Services
window is displayed as shown in Figure 1-3.

1-6 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Figure 1-3 Services

Step 2 Right-click on BAMService, and choose Properties in the shortcut menu. The BAMService
Properties window is displayed as shown in Figure 1-4.

Figure 1-4 BAM Service Properties

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-7


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

There are three options for Startup type, as shown in Table 1-4.

Table 1-4 Startup types of BAM Service


Startup Types Meanings

Automatic The BAM Service will be auto restarted if it is found to be in the


stopped status.
Manual It is required to restart the BAM Service manually.
Disable It is forbidden to auto start the BAM Service.

In normal cases, the Startup type is set to Automatic.

----End

1.4 Application of the File STXBAM.ini


All the configuration information of the USAU is included in the file STXBAM.ini. The
default path to the file is D:\SAU.

The initialization information of the BAM is saved in the BAM configuration file
STXBAM.ini. The information is of great importance to the operation of the BAM; therefore,
in normal cases do not modify the values, especially those values with remarks specifying that
the value cannot be modified.
If you must modify the value of a certain registration item, it is better to close the
corresponding application before modifying.

Before modifying the STXBAM.ini text file, you must back it up and rename it for the sake
of recovery operation if an error occurs in the modification. And then double-click the
STXBAM.ini file. An editor window pops up, as shown in Figure 1-5. Modify the content of
the sub-item according to actual needs. After you finish the modification, restart the process
this sub-item belongs to, and it will make the modification take effect.

1-8 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Figure 1-5 Editing STXBAM.ini

z Enter a character string if the set item is a character string.


z Enter XXXXX (X is a decimal number) if the set item is a decimal number.
z Enter 0xXXXX (X is a hexadecimal number) if the set item is a hexadecimal number.

1.5 Data Backup


Data backup is to back up the data crucial to the normal running of the system. All the
configuration data are stored in the BAM database. It is very important to backup the data
regularly. In case the data are corrupted due to some hardware or software problems, the data
can be restored from the backup. The USAU database backup operation mainly aims at:
z BAM database
z BAM registry
There are two modes for backing up the BAM database and the registry:
z Automatic backup
z Manual backup

1.5.1 Automatic Backup


The default backup auto starts at 4:30 am each day. The backup data file is under F:\SAU by
default.

You must ensure that there is enough disk space in disk F.


At least 22 backup media are required for the backup (22 erasable/writable CDs or 22 tapes),
among which:
6 backup media: used to save the data backup from Monday to Saturday of the current week
(ordinary backup)
4 backup media: used to save the data backup of the recent four Sundays (weekly backup)
The remaining 12 backup media: used to save the data backup of day 1 of each month in the
current year (monthly backup)

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-9


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Automatic Backup of BAM Database


The backup of the BAM database is performed in a scrolling manner and up to 11 database
files can be backed up. The backup file of the BAM database includes:
z Data backup in the recent seven days (except Sunday). These six files are named in the
following format: BamYYYYMMDD.dat.
z Database backup on recent four Sundays during the past 28 days. These four files are
named in the following format: BamYYYYMMDD.dat.
z Backup of the BAM database on the first day of each month, which is named in the
following format: BamMonthBak.dat.

Automatic Backup of BAM Registry


The registration information of the BAM in the Windows 2000 registry is auto backed up each
day. Only the latest backup is retained with the file name BamReg.bak.

In the STXBAM.ini file, start time for automatic backup of BAM database and registry can be set by
modifying the following setting in the DataMan:
BkpDbStartHour (start hour for database backup)
BkpDbStartMin (start minute for database backup)
The DataMan process has to be restarted for the new setting to take effect after the automatic backup
time is modified.
In the format YYYYMMDD, YYYY stands for the year, MM stands for the month, and DD stands for
the date. For example, 20041230 stands for Dec. 30, 2004.

1.5.2 Manual Backup


You have to back up the BAM database and the registry manually before upgrading or loading
in the special situations such as:
z Expansion
z Upgrading
z Loading
There are two ways in which manual backup can be accomplished:

Manual Backup Through Command (BKP DB)


In MML window run BKP DB to back up the current BAM database and the registry under
the default directory F:\USAU.

Manual Backup Through Enterprise Manager of SQL Server


Step 1 In the Windows 2000 Server on the BAM, choose Start > Programs > Microsoft SQL
Server and log in to the Enterprise Manager. The Enterprise Manager window is displayed as
shown in Figure 1-6.

1-10 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Figure 1-6 Enterprise Manager

Step 2 Suppose the name of the BAM is L24094B (Windows NT). Browse to Console Root >
Microsoft SQL Servers > L24094B (Windows NT) > Databases. Right-click on Databases.
A menu pops up as shown in Figure 1-7.

Figure 1-7 SQL Server Enterprise Manager

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-11


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Step 3 Choose All Tasks > Backup Database. A window pops up as shown in Figure 1-8.
Step 4 Choose Bam from the Database box to specify the database to be backed up.
Step 5 Under Backup, specify to back up all the data or data that has been modified.
Step 6 Under Destination, choose the default data backup file name and click Remove to remove the
value. Then click Add to set the path where the backup file is located and the file name as
shown in Figure 1-9.
Step 7 Under Overwrite, choose Overwrite existing media if you want to overwrite on the existing
data. If you do not want to overwrite the data, choose Append to media and then click OK.

Figure 1-8 Specifying database and backup mode

1-12 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Figure 1-9 Selecting the path and name of the backup data file

Step 8 The backup is started after confirmation. The progress of the backup process is displayed as
shown in Figure 1-10.

Figure 1-10 Backup progress

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-13


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Step 9 After the data are backed up successfully, a prompt will pop up to indicate the success.

For BAM database backup, the system does not back up the data in the transaction log in the
case of BKP DB command while it does in the case of SQL Server Enterprise Manager.
The file generated from manual backup is named based on the date. If it is necessary to take
backups several times within one day, the file name of the last backup has to be modified
manually.
Before BAM database backup, run the command for supplementary service data backup to
ensure that the data of the services stored in the BAM database is the latest one.

----End

Manual Backup of the Registry


Step 1 Choose Start > Run menu. Enter and run the command regedit to open the registry editor. In
the navigation tree on the left of the window, choose the item HKEY_LOCAL_MACHINE
> SOFTWARE > HuaWei > USAU.
Step 2 Choose Registry > Export Registry File menu. The Export Registry File window is
displayed as shown in Step 3.

Figure 1-11 Saving registry file

1-14 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Step 3 Choose the path to save the file and enter the file name. Click Save.
----End

1.6 Data Recovery


The operation of data recovery is carried out on the BAM in the following two ways:
z Run the installation program of the terminal system
z Use the SQL Server Enterprise Manager tool
It is recommended to run the installation program to recover the data.

1.6.1 Through Installation Program


If the BAM environment and data have been backed up before, you can choose Restore SAU
Environment and Data in the Setup Instruction page in the installation process to restore
the SAU environment and data from the backup file.

1.6.2 Through SQL Server Enterprise Manager


The data recovery procedure by using the SQL Server Enterprise Manager includes four steps.
Step 1 Close the BAM Service process.
Step 2 Exit all BAM processes and close the BAM Manager.
Step 3 Stop and restart the SQL Server.
Step 4 Start the Enterprise Manager to restore the data.
----End

BAM Service will surely restart Windows 2000 when it detects the BAM system has stopped running
during data recovery. However, the BAM must stop running during the data recovery. To avoid Windows
2000 from being restarted, BAM Service must be stopped before data recovery.

Stop BAM Service Process


Step 1 Choose Start > Programs > Administrative Tools > Services. The Services window is
displayed as shown in Figure 1-12.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-15


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Figure 1-12 Services

Step 2 Right-click on BAMService, and choose Properties option on the shortcut menu. The
BAMService Properties window is displayed as shown in Figure 1-13.

Figure 1-13 BAM Service Properties

1-16 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Step 3 If the Service status is Started, click Stop to end the service. In the Startup type combo box
choose Disabled option. Click Apply and then click OK.
----End

Exit All BAM Processes and Close BAM Manager Process


Exiting all BAM processes can avoid failure due to some data being accessed by the processes.
For details, see section 1.2 BAM Manager.

Stop and Restart SQL Server


Stopping and restarting SQL Server can avoid failure due to some data on BAM Server being
accessed by the SQL Server. The procedure of stopping the SQL Server is as follow:
Step 1 Choose Start > Programs > Microsoft SQL Server > Service Manager. The SQL Server
Service Manager is displayed as shown in Figure 1-14.

Figure 1-14 SQL Server Service Manager

Step 2 Click to end the SQL Server. A message is displayed prompting you to confirm
stopping the SQL Server. Click Yes. The communication between the host and the BAM of
the USAU will be interrupted.

Step 3 Click to restart the SQL Server.


----End

Start Enterprise Manager and Restore Data


Step 1 Choose Start > Programs > Microsoft SQL Server > Enterprise Manager to log in to the
database server.
Step 2 Choose Console Root > Microsoft SQL Servers > <Computer name> (WindowsNT) >
Databases. Right-click on Databases. A shortcut menu is displayed as shown in Figure 1-15.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-17


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Figure 1-15 Selecting the Restore Database menu

Step 3 Choose All Tasks > Restore Database in the shortcut menu. A dialog box is displayed as
shown in Figure 1-16.

1-18 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Figure 1-16 Restoring database

Step 4 Choose Bam in the Restore as database combo box. Under Restore, choose From device.
Specify other parameters based on actual requirements (complete database restoration,
restoration of different databases, and so on.). In general, the latest backed up device data file
is displayed under Devices. If the device data file to be recovered is correct, skip Step 5.
Otherwise, go to Step 5.
Step 5 If the device data in the window as shown in Figure 1-16 are not the backed up device data,
follow the steps below:
Click Select Devices and then the Choose Restore Devices dialog box is displayed as shown
in Figure 1-17.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-19


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Figure 1-17 Choosing restore devices

Choose device files in the list and click Remove All. Then click Add. A dialog box is
displayed as shown in Figure 1-18.

Figure 1-18 Choosing restore destination

Choose the Backup device button and choose the device to be recovered from the drop-down
list box according to the equipment name. Click OK.
Step 6 Choose the data backup file to be recovered and click OK. The recovery is started and a
window pops up showing the progress of the data recovery.
Step 7 After the data recovery is completed, set the BAM Service to automatic start mode and then
restart the BAM.
----End

1-20 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

1.7 BAM Communication Gateway


The communication gateway tool is an add-on software and is an expansion of the BAM
communication layer. It is used for the mutual conversion of messages between Transmission
Control Protocol/Internet Protocol (TCP/IP) and the serial port. On one hand, the connection
is set up between the software and BAM through TCP/IP. On the other hand, the software is
connected with other serial port equipment through the serial port so that the data can be
transferred transparently between the BAM and the serial port equipment.
For the BAM, the command sent from any serial port equipment is considered as being sent
from an IP address, and the data sent from BAM is considered to flow to an IP address. The
possibility that the data may eventually drop on serial port equipment, such as the super
terminal or alarm box, is not taken into consideration.

Start Conditions
The conversion relationship between each serial port and TCP/IP created by the
communication gateway software is called a connection. The software supports several
connection instances with each of them monitored by a conversion thread, which can be set
up or closed at any time.
The software can directly run on the BAM, or run on the LAN where the BAM is located, or
even on any machine capable of TCP/IP communication with the BAM on WAN, and the
serial port of the machine can be used to provide services to the client WS.

Starting BAM Communication Gateway


On the server maintenance terminal, choose Start > Programs > SAU Operation and
Maintenance Center > SAU Server Gateway Tool. The BAM Communication Gateway is
started as shown in Figure 1-19.

Figure 1-19 BAM communication gateway

If there are some connections made successfully in the previous running process, the system
will auto record the connection configuration information in the registry (path:
HKEY_LOCAL_MACHINE > SOFTWARE > huawei > USAU > convert). If the
automatic reconnection function is set for some of them, those connections will be auto

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-21


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

created upon restart according to the information saved in the registry and be configured in
accordance with the information saved after the previous successful connection creation.

Creating a Connection

Choose Operation > Create connection or click on the tool bar. The Create a new
connection dialog box is displayed as shown in Figure 1-20.

Figure 1-20 Creating a new connection

The description of each field is as shown in Table 1-5.

Table 1-5 Description of connection configuration items


Field name Meaning Configuration notes

Serial port Number of serial port to It is used to choose the serial port number
be used used for the current connection.
BAM IP IP address of the BAM It is used to choose the IP address of the
Address Server to be connected wanted BAM Server. If the communication
gateway software runs on BAM, 127.0.0.1
may be used.
Client Client application type The class of the serial device, such as
Application Graphic User Interface (GUI), Alarm box
class and 112 test system.

1-22 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 1 BAM Server Operations

Field name Meaning Configuration notes

Serial Port Serial port configuration It is used for setting the communication
Configuration information serial port.
By default, the values of Baud and Data bit
are 9600 and 8 respectively while Parity is
None and Stop bit is 1.
Compress Compressed It is used to specify whether the current
transmission information transmission is to be
compressed or not. It is not compressed by
default.
Auto Reconnect Reconnecting to server It indicates whether to auto create the
automatically previous connections after the
communication gateway software is
restarted.
Use modem dial Use modem and dial by If modem is required for the connection,
by hand hand choose Use modem dial by hand check
box; meanwhile specify the telephone
number under Modem configuration.

Click Create after the above steps and the system will create the conversion connection
according to the setting.
Any of the following abnormity will lead to the failure in a connection:
z The selected serial port does not exist.
z The configuration information of the serial port is not correct.
z The IP address of the BAM is wrong.
z The BAM is not started normally even if its IP address is correct.
z The selected serial port has been seized.

Ensure the hardware devices involved in the application of this tool are correctly installed and
configured.
Ensure the IP address of the BAM Server is correctly configured, since repeated connection
will be made without any check in case of an incorrect one.
The compress involves compressing and decompressing.
Ensure BAMs alarm console operates normally before the alarm box is used.
When a gateway application instance is running, startup of another one will result in the end
of the former one, namely, only one gateway instance is kept running.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 1-23


TELLIN-USAU
1 BAM Server Operations Routine Operation Manual

Terminating a Connection
Choose Operation > Interrupt Connection to pop up a dialog box as shown in
Figure 1-21. Specify the proper serial port and click OK. The connection will be terminated.

Figure 1-21 Terminating a connection

1-24 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 2 USAU Client Operations

2 USAU Client Operations

About This Chapter

z Operation methods of USAU Client


z Interface meanings of USAU Client

Issue 04 (2006-11-10) Huawei Technologies Proprietary 2-1


TELLIN-USAU
2 USAU Client Operations Routine Operation Manual

2.1 Overview
As shown in Figure 2-1, the terminal maintenance system running on the USAU WS includes
SAU Operation and Maintenance Center (Client), SAU Alarm Management System
(Alarm WS), SAU Print Service, SAU Trace Viewer, and so on. This chapter describes how
to log on to SAU Operation and Maintenance Center (Client) and explains the interface
elements.

Figure 2-1 SAU terminal maintenance system

If the USAU signaling access sever program is installed on the SAU BAM, there will be two more items:
SAU Server and SAU AutoLogin Tool on the menu.

The USAU Client (hereafter referred to as the Client) is a friendly graphical interface that
facilitates maintenance besides supporting MML commands.

2.2 Starting the Client


After installing the USAU maintenance system software successfully on WS, you can start the
Client from the Start menu by selecting Start > Programs > SAU Operation and
Maintenance Center > SAU Operation and Maintenance Center.

2-2 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 2 USAU Client Operations

2.3 Managing the Office Information


When the Client is launched for the first time, the interface is auto displayed as shown in
Figure 2-2, where the active window is Manage Office Information dialog box.

Figure 2-2 Setting office information

Setting Office Information


Enter appropriate office name and IP address in the dialog box as shown in
Figure 2-2. Click Set to complete the setting.

Deleting Office Information


You can delete some office which is no longer required. To delete an office, choose it in the
dialog box as shown in Figure 2-2and click Delete.

Modifying Office Information


In Office Management dialog box as shown in Figure 2-2, choose the office to be modified
and then modify the information (such as its IP address or office name). Click Set.

Only IP address can be modified, as a new office direction will be added if the office name is changed.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 2-3


TELLIN-USAU
2 USAU Client Operations Routine Operation Manual

2.4 the Client


2.4.1 Overview
By default, the system sets the expiry day of a new account to Jan. 1, 1980. So when logging
in to the system for the first time, you should modify the password at once because it is due. If
you should not modify the password, you are forced to exit the LMT.
As for the account that has been used to log in to the system, the system auto checks the
expiry day of the password against each login. The prompts are as follows:
z If the password comes to the threshold of prompting expiry days of password, the LMT
prompts the user to modify the password, which is not forceable.
z If the password is due, the LMT forces the user to modify the password. In this case,
when the user refuses to modify the password, he is forced to exit the LMT.
Any password, if being input incorrectly for five times (default), will be locked by the system.
In this case, the user cannot log in to the system. The administrator can unlock the locked
password by means of password modification. If the administrator account Admin is locked,
the locked duration is five minutes (default). After five minutes, it is unlocked.

z The account of the system administrator is fixed as "Admin". The account of the common operator is
defined by the operator according to actual situations.
z When repeated login occurs at a WS, the system prompts " This BAM has already been login by
other maintenance system, Please select another BAM!", as only one user can use the same WS.
z If the user logs in the maintenance WS without setting any office data, the system pops up a dialog
box prompting the user to run the alarm panel to set the office data before logging in the system.
z If a password is input repeatedly wrongly for five times (default), you should not use this account to
log in to the system.

2.4.2 Logging in
The Operator Login dialog box pops up as shown in Figure 2-3 every time you log in the
client.
Input the appropriate values for Operator Name and Password. Choose the proper Office
Name if several offices exist. The Client will be entered after confirmation. In the case of
failure, please check if the IP address, user name or password is correct.

The operator names and passwords of ordinary operators are set by the system administrator.
The Operator name and Password are case-sensitive .

2-4 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 2 USAU Client Operations

Figure 2-3 Operator login

If the WS with USAU maintenance system is not in the same network segment as the BAM, choose
Start > Programs > SAU Operation and Maintenance Center > SAU Workstation Gateway Tool to
set the IP address of the gateway.

After successful login, the main interface of the Client pops up as shown in Figure 2-4, where
routine operations are available through menus and shortcut keys.

Figure 2-4 Main interface of the Client

(1) Main menus (2) Toolbar (3) Navigation pane


(4) Prompt box (5) IP address used to connect BAM

Issue 04 (2006-11-10) Huawei Technologies Proprietary 2-5


TELLIN-USAU
2 USAU Client Operations Routine Operation Manual

The shortcut keys on the MML Client are as listed in Table 2-1.

Table 2-1 Shortcut keys


Keys Action

F1 Pops up online help window about MML commands.


F2 Displays or hides the navigation pane.
F3 Displays or hides the prompt box.
F4 Displays or hides MML command input box.
F7 Selects the previous MML command in the MML command input box.
F8 Selects the next MML command in the MML command input box.
F9 Run a MML command in the MML command input box.
F12 Locks the client maintenance system.

The functions of F1, F7, F8 and F9 are available only in the MML command input box.

Table 2-2 lists the meaning of the shortcut icons in the tool bar.

Table 2-2 Shortcut icons on the tool bar


Icons Action Icons Action

Logs on again for the operator Displays/hides the navigation pane


(Re-login) (Navigation Tree)
Displays/hides the prompt box Displays/hides the MML command
(Output Window) input box (Command Window)
Print Offers help (Help Topics)

2.5 Changing Password and Default Password


2.5.1 Changing Password
An ordinary operator can change his password by selecting System > Change Password on
the USAU Client main interface.
z An ordinary operator can only change his own password and he should provide the
correct old password when changing it. If an ordinary operator fails to remember his
password, he has to contact the system administrator to get a new one.
z When the system administrator changes his own password, he must provide the correct
old password. However, when modifying the password of an ordinary operator, the
system administrator does not need to provide the ordinary operators old password.

2-6 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 2 USAU Client Operations

z The password should be updated once every 90 days (default).


z You cannot use any one of the five passwords (default) that have been used in the nearest
past.
z The password should contain at least six characters (default), consisting of numbers and
letters (including upper case and lower case). The first and last characters of a password
should not be space.

2.5.2 Changing the Default Password


The methods are as follows:
Select My Computer in the Windows window. The My Computer window is displayed and
select D:\SAU.The SAU window is displayed and open the STXBAM.ini file. Modify the
MML configuration according to the actual situation. When the user information is modified,
restart the MML process to make the modification effective.
The meaning of each registry key for password is listed in Table 2-3.

Table 2-3 Meaning of each registry key for password


Key name Description

ExpiryDayofPa The expiry days of the password. Its value range is 1365 (the unit is
sswd day). The default value is 90.
ThresholdProm The threshold of prompting the expiry days of the password. Its value
ptDay range is 1365 (the unit is day). The default value is 10.
RepeatPassWd The repeatability of the password, that is, how many passwords that have
Num been used in the nearest past cannot be used again as the new one. Its
value range is 112 (the unit is times). The default value is 5.
AllowLoginFai The number of acceptable login failure. Its value range is 15 (the unit is
lTimes times). The default value is 5.
LockCC08Min The locked duration for the administrator account Admin. Its value range
utes is 160 (the unit is minute). The default value is 5.
The at least length of password. Its value range is 615,The default value
PassWdLength
is 6.

2.6 Re-login and Logout


Re-login and logout are contrary to each other. An operator must log in before the Client is
started. Only after a successful login, can the operator use any command within his authority.
The operations involved are as follows:

Choose System > Re-login on the USAU Client main interface or click on the tool bar
to log in again. Choose System > Logout to log out.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 2-7


TELLIN-USAU
2 USAU Client Operations Routine Operation Manual

The user name of the system administrator is set during the installation of BAM terminal system. It is
Admin by default.
The user names of ordinary operators can be defined as per the requirements.

2.7 Output File Settings


The size of the displayed results of some command reports may be too large to be viewed in
the maintenance output window, thus you may expect to save the command output reports
generated in a certain period of time in the form of files for future reference. This requires the
setting for saving the command output reports.
The operations involved are as follows:
Choose System > Output Window Setting on the USAU Client main interface and the
Output Window Configuration window pops up as shown in Figure 2-5.

Figure 2-5 Output report settings

In the window, you can set the number of rows for maintenance, alarm, traffic statistics and
test output. You can also choose To printer to output the result to the printer. Click to
choose the file path and file name. The default path of the file is D:\SAU\Output.
z The default file name of maintenance output is MML-OUTPUT.txt.
z The default file name of alarm output is ALARM-OUTPUT.txt.
z The default file name of traffic statistics output is STATISTICS-OUTPUT.txt.
z The default file name of test output is DEBUG-OUTPUT.txt.
If you choose the file to be saved, the box behind the file name will be auto selected,
indicating that the report will be output to the specified file. When setting the file name, pay
attention that the name is not repeated, thus avoid overwriting the old record.

2-8 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 2 USAU Client Operations

2.8 Using Command Time Out Setting


Choose System > Command Timeout Setting on the USAU Client main interface and the
Command Time Out window pops up as shown in Table 2-6.

Figure 2-6 Command time out setting

You can set the MML Command Time Out and Monitor Command Time Out in the
window as follows:
z MML Command Time Out
A MML command will be treated as a failure if it costs more time than being specified
by this value from submitting of this command to returning of the results. The variable
ranges from 20 to 600 and it is 80 seconds by default.
z Monitor Command Time Out
A binary command will be treated as a failure if it costs more time than being specified
by this value from submitting of this command to returning of the results. The variable
ranges from 10 to 100 and it is 20 seconds by default.

The binary commands are usually some commands for maintenance operations, for example, the GUI
operations or query of the CPU occupation rate. They are not the operations through the MML
commands.

2.9 Saving Input Command and End Command Saving


It is available to save, in the form of text, a batch of commands that are executed in sequence.
If the same set of operations is to be executed again, you can invoke the file directly without
inputting the commands one by one. This file can be conveniently edited with tools like
Notepad. In addition, the commands under execution can be auto written into such file by
means of Log Commands or Stop Logging Commands.
The operations involved are as follows:
Step 1 On the USAU Client main interface, choose System > Log Commands or press the shortcut
keys Ctrl+S and a dialog box is shown.
Step 2 By default the file name is given in the following format: CMD-Year Month Date Hour
Minute.txt, where Year, Month, Date, Hour and Minute are of 2-digit. The default
directory of the file is D:\SAU\Output. Of course, you can specify a directory by yourself as

Issue 04 (2006-11-10) Huawei Technologies Proprietary 2-9


TELLIN-USAU
2 USAU Client Operations Routine Operation Manual

required. We recommend you to use the default path. After confirmation, the Log
Commands menu under System changes to Stop Logging Commands.
Step 3 Input and run a batch of commands in the MML command input box. Choose System > Stop
Save Input Commands and then the batch of commands will be auto saved under the default
directory D:\SAU\Output. Meanwhile, the Stop Save Input Commands menu will change
to Save Input Commands. After that, you are free to read the batch file in text format under
the specified directory.
----End

2.10 Carrying out Batch Commands


The USAU Client provides a facility to carry out batch commands, which facilitates carrying
out multiple commands in a batch.
The operations involved are as follows:
Step 1 Create a text file with the batch of MML commands to be run by means of Saving input
command or Notepad.
Step 2 On the USAU Client main interface, choose System > Execute Batch Commands or press
the shortcut keys Ctrl+E and a dialog box as shown in Figure 2-7 pops up.

Figure 2-7 Executing batch file

2-10 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 2 USAU Client Operations

Step 3 Choose the batch file to be executed and specify an execution mode.
z Immediate execution: The batch commands will be run immediately.
z Timely execution: The batch commands will be run at the specified time on the
specified date. When selecting this option, you must also specify the date and time when
the batch commands need to be run. Click Add to add a batch command file to be
executed.

You can specify multiple batch command files to be executed at different periods on different days, but
at one time point on one date, the system permits only one batch file to be executed.

Step 4 If a batch command file is specified to be executed at a particular time on a particular date, it
will be automatically and continuously executed at the very time. Meanwhile, System >
Execute Batch Commands will become disabled while System > Stop Execute Batch
Commands will become enabled. The execution can be stopped once this option is selected.
If a batch command file is specified to be executed immediately, confirmation will lead to an
Execute Batch Process Immediately window as shown in Figure 2-8.

Figure 2-8 Executing the batch process immediately

(1) Command line to be executed (2) Find tool bar


(3) Command line execution type (4) Execution result display bar

Step 5 Click Browse to choose the batch command file to be executed. In order to easily view the
process of the execution, choose an appropriate execution type from the following items
under the Execution Type frame.
z Execute All: All command lines in the file are auto executed one after another.
z Execute Step by Step: The commands are executed one after another with manual
intervention.
z Execute with Break Point: The commands are auto executed until it comes to a
specified breakpoint. If the execution is expected to continue, click Go, and the
execution will continue until the next breakpoint. When this option is selected, you must
set break points in the expected command file by clicking Set Break Point. There will
be a visible red circle before the specified command line (see Figure 2-9). If a command
line already labelled as a breakpoint is selected, its breakpoint label will be removed by
clicking Set Break Point.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 2-11


TELLIN-USAU
2 USAU Client Operations Routine Operation Manual

Figure 2-9 Setting the breakpoint

z Execute Range From Line: The commands falling within a range of rows/lines will be
executed. If this option is selected, it is required to define the range of command lines in
the text file.
Step 6 Click Go to run the batch commands and meanwhile both execution success and failure (with
quantity and location for failure) are displayed in the result display bar.
----End

2.11 MML Client


The USAU maintenance system provides the function for command line input. Choose View

> Command Window or click on the tool bar or press F4. The MML Client window
pops up as shown in Figure 2-10.

2-12 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 2 USAU Client Operations

Figure 2-10 MML Client window

1) Result output area 2) Command input box 3) Assistant command input area

2.12 Components of MML Input Tool


MML input tools interface can be divided into the following parts:

Result Output Area


It is the part at the top. Results after command execution can be viewed in the result output
area.

Command Input Box


It is the part in the middle. You can directly input one or more commands with parameters in

this area followed by pressing F9 or clicking ; you can also create a script command file
with the help of Notepad and then copy it to this area for execution.

Assistant Command Input Area


It is the part at the bottom. In this area a command can be set quickly and conveniently with
the help of assistants. Parameters in red are mandatory which must be filled or a value must
be selected for them; parameters in black are optional which may be filled or a value may be
selected for them as per the requirements.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 2-13


TELLIN-USAU
2 USAU Client Operations Routine Operation Manual

Navigation Window
Navigation window contains the logical grouping of commands in a tree structure, which is
known as Navigation Tree. A set of related commands are grouped under a node; a set of
related nodes are grouped under a main node. The navigation tree consists of many such main
nodes, nodes and commands. When you expand and click a command in the Navigation tree,
the command is automatically entered into Command Input window (but not executed) and
the corresponding help information is displayed in the help window.

Help Window
The help information related to a command is displayed here. You can navigate between help
and result window by pressing CTRL+Tab keys or clicking on the required tab. The help
information of a particular can be obtained in three ways, as shown in Table 2-4.

Table 2-4 Methods of querying help information


Methods Description

Pressing F1 You can type a command in the Command Input window and
press F1 to see the related help.
Clicking on the If you know under which node (in the navigation tree) the
command in the command is listed, you can expand the nodes and sub-nodes and
Navigation tree click the command to view the help.
Searching You can search for help by typing the name of the command in the
Search window.

Search Window
It enables you to find the commands and related help information. By default the Search
window will be behind the Navigation window and thus will not be visible. To view the
Search window you should click Search tab (present below toolbar) in the MML Input Tool
window.
The shortcut icons used for command execution in the MML Client are as listed in Table 2-5.

Table 2-5 Command shortcut icons


Icons Action

Generates the input interface (It can also be done by pressing Enter after the
command is input.).
Run the command.

Selects the next command. Any of the 30 commands operated previously are
available.
Selects the previous command. Any of the 30 commands operated previously are
available.

2-14 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 2 USAU Client Operations

The shortcut keys available in MML Input Tool are described in Table 2-6.

Table 2-6 Shortcut keys in MML Input Tool


Keys Action

Ctrl+F Display the Search box.


Ctrl+F4 Disconnect the current connection.
Ctrl+M Move the cursor to the output window.
Ctrl+S Start/Stop saving commands into file.
Ctrl+P Start the printing.
Ctrl+T Display the navigation tree.
F1 Display help.
F2 Create new connection.
F3 Run the batch commands.
F4 Clear the output window.
F5 Input command.
F6 Move to the next window.
F7 Select the previous MML command in the MML command line input
window.
F8 Select the next MML command in the MML command line input window.
F9 Run an MML command in the MML command line input window.
F11 Start/stop the saving execution result.
F12 Pause/Resume report output.

The F1, F7, F8 and F9 can function only when the cursor is in command line input window.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 2-15


TELLIN-USAU
Routine Operation Manual 3 Security Management

3 Security Management

About This Chapter

Security management on USAU client

Issue 04 (2006-11-10) Huawei Technologies Proprietary 3-1


TELLIN-USAU
3 Security Management Routine Operation Manual

3.1 Overview
Authority management in USAU Client falls into three classes, as follows:
z Operator management
z Workstation management
z Command group management
By using these applications, the authorized operator can perform operations or maintenance
on the equipment within a valid scope so that the equipment can run normally and stably.

3.2 Operator Management


To maintain USAU signalling access system, any operator must have a valid account. By
default USAU is valid. USAU owns the highest authority and is capable of performing any
operation on the USAU signalling access system. System administrator can add a new
operator account as per the requirements, and, in order to ensure security, password must be
set for system administrator and ordinary operator.

The system administrators account is set during the installation of BAM maintenance system.

3.2.1 Adding an Operator Account


The procedure of adding an operator account is as follows:
Step 1 Choose Authority Management > Accounts > Add in the USAU Client. The Accounts
Management dialog box is displayed, as shown in
Figure 3-1.

3-2 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 3 Security Management

Figure 3-1 Adding an operator account

Step 2 Enter proper values for the operator authority.


The values are described in Table 3-1.

Table 3-1 Values set for the operation authority


Value Description

Operator Name A serial of char, it cannot be null and it cannot be the same as any
registered one. It is case-sensitive.
Start time and End Specify the time duration. The operators authority will only be
time valid in this duration, which is called Time Limit. The system
administrator and Guest have no Time Limit. For the ordinary
operators, if the two fields are not set, they will have no Time Limit.
Password The password is a string of 615 valid characters, It contains at least
six characters that are composed of letters (upper case together with
lower case) and numbers.
Operator Command The USAU system administrator is entitled to have the highest
Group authority (G_SYS authority command group) and to use any
command.

Step 3 Click OK and an operator account will be added.

It is also possible to add an operator account by executing ADD OP in MML input window. After
adding the operator account, the SET OPCG and SET OPTM commands must be executed to set
operator command group and operation time limit.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 3-3


TELLIN-USAU
3 Security Management Routine Operation Manual

3.2.2 Modifying an Operator Account


The procedure of modifying an operator account is as follows:
Step 1 Choose Authority > Accounts > Modify... on the USAU Client interface. A window pops up,
which displays the added operator accounts and their online status.
Step 2 Choose the account to be modified and click OK. The Accounts Management dialog box is
displayed. From there you can modify the existing values (such as login password, valid time
and authority command group) except Operator accounts and Operator description.
Step 3 Click OK and an operator account will be modified.

The accounts of the system administrator (Admin) cannot be modified.


It is also possible to modify the validity time of an account by running SET OPTM in the MML input
window.

----End

3.2.3 Deleting an Operator Account


The procedure of deleting an operator account is as follows:
Step 1 Choose Authority > Accounts > Delete... on the USAU Client interface. A dialog box pops
up, which displays the added operator accounts and their online status.
Step 2 Choose the account to be deleted and click Delete. The selected account will be deleted.

The accounts of the system administrator (Admin) and Guest cannot be deleted.
It is also available to delete an account by running RMV OP in the MML input window.

----End

3.2.4 Querying the Status of Password


The administrator can check the expiry days of common accounts while a common account
can check only the expiry days of its own. In the MML command window, input LST
MUSTMODPWD to check the status of a password. For example, to check the password
status of the account admin, run the above command and the running result is as follows:
++ HW-SAU 2006-09-26 13:37:56
O&M #229
%%LST MUSTMODPWD: OP="admin";%%
RETCODE = 0 Operation succeeded

List status of password


------------
Status of modifying password = OFF
Expiry number of days of password = 90
Threshold of prompting expiry number of days = 10
(Result number=3)

--- END

3-4 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 3 Security Management

Table 3-2 lists the description of the running result.

Table 3-2 Description of the running result


Item Description

Status of The value is ON or OFF (default).


modifying ON means the password is forced to be modified.
password
OFF means the password is not forced to be modified.
Expiry number The password should be updated once every 90 days.
of days of
password
Threshold of Ten days before the expiry of password, the system prompts the expiry
prompting day of it when you log in to the system through the account.
expiry number
of days

3.3 Workstation Management


A WS is the computer used by an operator after login. BAM can also be regarded as a WS,
named the super WS. An operator has the right to perform maintenance operations on USAU
merely through an authorized WS. The intersection shared by both WS authorities and
operator authorities is the set of authorities owned by the current operator actually.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 3-5


TELLIN-USAU
3 Security Management Routine Operation Manual

3.3.1 Adding a Workstation


The procedure of adding a WS is as follows:
Step 1 Choose Authority > Workstation > Add on the USAU Client main interface. The WS
Management dialog box pops up, as shown in Figure 3-2.

Figure 3-2 Adding a workstation

Step 2 Enter the WS name and IP address. Choose the WS authority.


Step 3 Click OK and a WS will be added.
During the course of adding a WS, a successful prompt will be given to the operator, asking if
to continue adding the WS; otherwise, the system will prompt the operator a failure message
that the WS name is already in use or the IP address had been registered.
The system administrator has to choose Authority > Accounts > Add to assign a valid
account and password for an operator so that he can log on to the USAU terminal
maintenance system.
You can also add a WS by means of MML command. The steps are: run ADD WS and then
run SET WSCG.

z The WS Name is not case-sensitive, but it cannot be NULL or named repeatedly.


z The IP address must be valid and it cannot be used repeatedly.
z The WS Authority Setting must be done after adding a WS; otherwise, the system assigns the lowest
authority G_GUEST for the WS by default.

----End

3-6 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 3 Security Management

3.3.2 Modifying a Workstation


The procedure of modifying a WS is as follows:
Step 1 Choose Authority > Workstation > Modify on the USAU Client main interface. A
window for selecting the WS pops up, which displays the added WSs, their IP addresses and
online status.
Step 2 Choose the WS to be modified and click OK. A dialog box for modifying the WS pops up.
Here you can modify its authorities
Step 3 Click OK and a WS will be modified.
----End

3.3.3 Deleting a Workstation


The procedure of deleting a WS is as follows:
Step 1 Choose Authority > Workstation > Delete on the USAU Client main interface. A window
for selecting the WS pops up, which displays the added WSs, their IP addresses and online
status.
Step 2 Choose the WS to be deleted from the displayed list and click Delete. A dialog box pops up
prompting you to confirm deletion.
Step 3 Click OK and a WS will be deleted.

Only the system administrator has the right to delete a WS. After the deletion, the authorities formerly
attached to it will also be deleted.
BAM super WS cannot be deleted.
If the WS being deleted is being used, the current authority of the operator using this WS will be reduced
to the level of G_GUEST.
It is also possible to modify a WS by running RMV WS in the MML input window.

----End

3.3.4 Locking the Workstation


When an operator wishes to leave the WS temporarily, the system must be locked. This
feature is designed to ensure security of the system. It will deny access to any illegal user
when the authorized user is away.

Manual Locking
Choose System > Lock System on the main interface of USAU Client. The system will lock
the WS and display a prompt box for unlocking the WS, as shown in Figure 3-3.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 3-7


TELLIN-USAU
3 Security Management Routine Operation Manual

Figure 3-3 Prompt box for unlocking a workstation

Automatic Locking
The USAU maintenance system will be auto locked if no operation is performed on it for a
specified period of time.
Choose System > Auto Lock Setting and modify Lock Time to specify interval for auto
locking the WS, as shown in Figure 3-4.

Figure 3-4 Modify the lock time

Unlocking the Workstation


The procedure of unlocking a WS is as follows: Input the correct password in the Please
Enter Your Password dialog box as shown in Figure 3-3. Click OK.

3-8 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 3 Security Management

3.4 Command Group Management


Command group is adopted in the USAU system to assign authority to operator or WS. In
order to improve the efficiency of authority management, a set of related commands are
organized into a command group and the command group, instead of each command, is
assigned to a WS or an operator.
There are some command groups that are already defined by the system, as follows:
z Subscriber management
z Ticket query
z GUEST
z SYS
Operator can directly modify and use these command groups except SYS. In addition, some
empty command groups are reserved so that operator can define commands included as per
the requirements.

Only system administrator has the right to perform various operations regarding authority management.

The procedure of command group management is as follows:


Step 1 Choose Authority > Command Group > Modify Command Item on the USAU Client
main interface. A dialog box for selecting command group is displayed.
Step 2 Choose the command group to which the commands must be added and click OK. The
Command Group Authority Setting window pops up.
Step 3 Choose the commands included in the group according to actual situations and click OK.

System administrator has the right to modify commands in any command group, while such operation
can only be performed through the super WS. If it is done on any other WS, a message will be displayed
indicating the WS does not have the adequate authority.
It is also possible to set a command group by running ADD CCG in the MML input window.

----End

Issue 04 (2006-11-10) Huawei Technologies Proprietary 3-9


TELLIN-USAU
Routine Operation Manual 4 Device and Memory Management

4 Device and Memory Management

About This Chapter

z Device management
z Memory management

Issue 04 (2006-11-10) Huawei Technologies Proprietary 4-1


TELLIN-USAU
4 Device and Memory Management Routine Operation Manual

4.1 Device Management


Viewing the Device Panel
The device panel displays the currently configured shelves and the corresponding boards.
Step 1 Click the Management tab on the USAU Client. The navigation tree is displayed as shown in
Figure 4-1.

Figure 4-1 Maintenance navigation tree

Step 2 Double-click the Device Management. The Device Management window is displayed as
shown in Figure 4-2.

4-2 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 4 Device and Memory Management

Figure 4-2 Device management window

Step 3 Double-click the shelf you want to view, and then a device panel is displayed as shown in
Figure 4-3.

Figure 4-3 Device panel

(1) Frame (2) Board


(3) Pinch board status indicator (4) Backplane status indicator
(5)Detail information for board

The board in green indicates that the active board is normal; the board in blue indicates that
the standby one is normal; the board in red indicates abnormity.
The indicator of a pinch board or a backplane in green indicates normal; the indicator of a
pinch board or a backplane in red indicates abnormity.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 4-3


TELLIN-USAU
4 Device and Memory Management Routine Operation Manual

The meanings of the icons in the window are as shown in Table 4-1.

Table 4-1 The meanings of the icons in the window


Icons Meanings Icons Meanings

Visit Shelf View Refresh

Customize View Show/Hide Failure Bar

Expand all Frames Collapse all Frames

Open CPU Usage Window Open Memory Usage Window

----End

Displaying a Board
The procedure of displaying a board is as follow:
Step 1 On the device panel, right-click on the board to be viewed. A shortcut menu pops up as shown
in Figure 4-4.

Figure 4-4 Right-click shortcut menu

Step 2 Choose the Display Board option, and then a window pops up, displaying the board
information such as board name, status, CPU usage, memory usage and so on.
----End

Resetting a Board
To reset a board is to send the hot startup command to the board processor through the BAM.
The processor will restart the board after receiving the command and initializing the board
program.
The resetting operation is to restore a board which is not normal due to some logical disorder
in the program running process. However, if the board is physically damaged, resetting will
be of little help.
The resetting procedures are as follows:

4-4 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 4 Device and Memory Management

Step 1 On the device panel, right-click on the board to be reset. A shortcut menu pops up as shown in
Figure 4-4.
Step 2 Choose Reset Board. You are prompted to confirm board resetting.
Step 3 Click Yes.

Resetting should be performed with caution, as it may cause short-time effect on the service
subscribers on the board.
It is prohibited to reset a board frequently.
If a board is working normally, do not reset it.

----End

Swapping a Board
Board swapping refers to the operation of changing between the active board and the standby
board. After the board is swapped, the active becomes standby and the standby becomes
active.
The swapping procedures are as follows:
Step 1 On the device panel, right-click the board to be swapped. A shortcut menu pops up as shown
in Figure 4-4.
Step 2 Choose Swap Board to pop up a dialog box. You are prompted to confirm board resetting.
Step 3 Click OK.

In normal cases, do not swap a board. This operation should be performed with caution.

----End

Querying CPU Usage


Step 1 On the device panel, right-click the board whose CPU usage needs to be queried. A shortcut
menu pops up as shown in Figure 4-4.
Step 2 Choose the Display CPU Usage option. A window indicating the CPU usage pops up.
----End

Querying Memory Usage


Step 1 On the device panel, right-click the board whose memory usage needs to be queried. A
shortcut menu pops up as shown in Figure 4-4.
Step 2 Choose the Display Memory Usage option. A window indicating the memory usage pops up.
----End

Issue 04 (2006-11-10) Huawei Technologies Proprietary 4-5


TELLIN-USAU
4 Device and Memory Management Routine Operation Manual

4.2 Memory Management


Querying Memory Usage
There are two ways for querying memory usage:
z Query according to location
z Query according to module number
The procedure of query according to location is as follow:
Step 1 Click the Management tab on the USAU Client. The navigation tree is displayed as shown in
Figure 4-1.
Step 2 Double-click the Memory Usage, a dialog box for querying memory usage pops up as shown
in Figure 4-5.
Step 3 In Query Type, choose Position.
Step 4 Choose the Frame Number and Slot Number of the board whose memory usage you want to
query.
Step 5 Click Add, the task is added to the memory usage query list.
The procedure of query according to module number is as follow:

Figure 4-5 Querying memory usage according to location

The procedure of query according to module number is as follow:


Step 6 In the window as shown in Figure 4-5, choose Module as Query Type. The dialog box will
change as shown in Figure 4-6.

4-6 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 4 Device and Memory Management

Figure 4-6 Querying memory usage according to module number

Step 7 Choose the Module Number of the board whose memory usage you want to query.
Step 8 Click Add, the task is added to the memory usage query list.
The result of memory usage is as shown in Figure 4-7.

Figure 4-7 Memory usage

----End

Querying Memory Contents


There are two ways for querying memory contents:
z Query Random Access Memory (RAM)
z Query Flash
The procedure of querying RAM is as follow:
Step 1 Double-click the Memory Contents as shown in Figure 4-1, a dialog box for querying
memory contents pops up as shown in Step 2.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 4-7


TELLIN-USAU
4 Device and Memory Management Routine Operation Manual

Figure 4-8 Query memory contents

Step 2 In Query Type, choose RAM.


Step 3 Choose the Module Number of the memory you want to query.
Step 4 Enter the Start Address (in hexadecimal) of the memory you want to query.
Step 5 In Main or Back Up flag, choose Main or Backup according to the module status.
Step 6 Click Query, the information of the memory is listed as shown in 0.

Figure 4-9 Information of RAM memory

The procedure of querying Flash is as follow:


Step 7 In the window as shown in Figure 4-8, choose Flash as Query Type .The Query Setting
domain will change as shown in Step 8.

Figure 4-10 Query setting domain

Step 8 Choose the Frame Number and Slot Number of the board whose memory contents you want
to query.
Step 9 Enter Start Address and No of bytes (in hexadecimal) of the memory you want to query.

4-8 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 4 Device and Memory Management

Step 10 Click Query, the information of the memory is listed as shown in Figure 4-11.

Figure 4-11 Information of Flash memory

----End

Dump Memory
This feature enables you to save the board memory contents into a file. It can be used later for
analysis and debugging in the case of occurrence of a fault in the system. This function is
particularly useful when a fault occurs in the remote office. In such a scenario the
maintenance personnel can send the dumped memory to the technical support for debugging
and analysis.
The procedure of dumping memory is as follow:
Step 1 Double-click the Memory Dump as shown in Figure 4-1, a dialog box for dumping memory
pops up as shown in Figure 4-12.

Figure 4-12 Dump memory

Step 2 Choose Module Number of memory you want to dump.


Step 3 Enter Start Address and End Address of the memory you want to dump.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 4-9


TELLIN-USAU
4 Device and Memory Management Routine Operation Manual

The value of Start Address should be smaller than End Address; otherwise, the system will prompt
"Start Address should be less than End Address".

Step 4 In Main or Back Up, choose Main or Backup according to the module status.
Step 5 In File Location and Name, set the path and name of the dump file.

The default name of the dump file is Memory Dump-YY-MM-DD-mm-ss.DAT. Y means year, M means
month, D means date, m means minute, and s means second. They are all of two digits.

Step 6 Click Query, the memory data is dumped to the dump file. At the same time, the box below
displays the content of the dumped data. When the dumping is completed, the Dump
Finished dialog box pops up.
----End

4-10 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

5 Alarm Workstation Operations

About This Chapter

Operations on the alarm workstation

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-1


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

5.1 Overview
Alarm management is a part of fault management, performing the following operations to
handle the abnormity of the device modules that are managed:
z Detection
z Isolation
z Correction
When a fault on the device side may affect the service provided for the subscriber, the device
modules generate an alarm, and the alarm management module of the BAM reports the alarm
information to the user, such as:
z Detection of transmission data errors
z Violation of a performance threshold
z Detection of faulty equipment
Based on the alarm reported from the BAM, the user can take proper actions to set right the
problem in the device. In this way, the alarm reporting provides the BAM with the ability to
monitor the device module failures in real time.
The alarm WS can be used for:
z Viewing the real-time Fault/Event alarms
z Browsing the Fault, Recovery, Event and History alarms
z Querying the alarms based on the query condition
z Deleting the history alarms
z Filtering alarm
z Shielding alarms
z Querying the additional parameters (detailed information) based on the alarm number
z Setting alarm configuration information
z Querying the statistics of alarms according to alarm box type and network management
type
z Setting and querying the screen level of the alarm box
z Setting the colours for alarms of different severity

5-2 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

5.2 Starting the Alarm Workstation


Choose Start > Programs > SAU Operation and Maintenance Center > SAU Alarm
Management System. The Operator Login dialog box pops up as shown in Figure 5-1.

Figure 5-1 Logging in to alarm workstation

Enter the Operator Name and Password. Choose the Office Name, and then click OK.

Every office in the alarm board has a corresponding alarm WS associated with it. You have to choose the
office and log in to the alarm station to view detailed alarm information in the BAM Server.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-3


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

5.3 Setting System Customization


You can customize colour settings to display alarm information as well as use the default
settings. You can also set the initial and maximum numbers of alarms to be displayed.
Step 1 Choose System > System Customization. The System Setup dialog box pops up as shown
in Figure 5-2.

Figure 5-2 System setup

Step 2 Set the colours for each type of alarm based on your needs. Set the initial and maximum
display alarm amount and the system lock time (unit: minute). Choose the Display Cleared
alarms check box to display the recovery alarms.
Step 3 Click OK to save the settings.

z Click Restore default color value to revert back to the default colour settings.
z Click Default value to revert back to the default value settings.

----End

5-4 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

5.4 Viewing Alarm


Fault Alarm
Choose Alarm Browse > Fault Alarm to pop up the Fault browse window as shown in
Figure 5-3.

Figure 5-3 Fault alarm window

If the Display Cleared alarms check box is not selected in the System Setup dialog box, recovery
alarms will not be displayed in the Fault browse window.
The title of the Fault browse window displays the total number of recovery alarms and fault alarms of
each level.

Event Alarm
Choose Alarm Browse > Event Alarm to pop up the Event browse window as shown in
Figure 5-4.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-5


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

Figure 5-4 Event alarm window

History Alarm
Choose Alarm Browse > Historical Alarm to pop up the History alarm browse window as
shown in Figure 5-5.

Figure 5-5 History alarm window

Shortcut Menu
Shortcut menu enables you to execute many operations such as:
z Stopping scrolling
z Acknowledging the alarm
z Clearing all/part of recovery alarms
When you right-click a particular alarm in the following two windows, the shortcut menu
containing related operations on the alarms is displayed as shown in Figure 5-6:

5-6 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

z Fault browse window


z History alarm browse window

Figure 5-6 Shortcut menus for Fault and History alarms

The shortcut menu for event alarms is slightly different. When you right-click on a particular
alarm in the Event browse window, the shortcut menu pops up, as shown in Figure 5-7.

Figure 5-7 Shortcut menus for Event alarms

Viewing Alarm Details


Step 1 Double-click an alarm in the window to view the detailed information in the Alarm
Explanation Details window, as shown in Figure 5-8.

Figure 5-8 The Alarm Explanation Details window

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-7


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

For the alarms indicating the destination signaling point (DSP) is not reachable, a link is faulty, or the
routing is faulty, the detailed information such as the DSP name, the link name, or the route name is
displayed; therefore, the information for locating the fault is clear. For example, as shown in Figure 5-8,
the explanation of a broadband link fault alarm is displayed, where, the Location info shows that the
corresponding link name is link-test. In this way, the detailed information is displayed to ease the alarm
locating.

Step 2 Click REMARK to add your remarks for the selected alarm.

Figure 5-9 Remarks for Fault alarms

Step 3 Type your remarks in the text box as shown in Figure 5-9 and click Save.
----End

Saving an Alarm
You can save the alarm information in a file for future reference in the following two file
formats:
z Text (.txt)
z Microsoft Excel (.xls)
The procedure of saving alarm information is as follows:
Step 1 Right-click a particular alarm to be saved to view the shortcut menu as shown in Figure 5-6.
Step 2 Choose Txt files or xls files from the Save as drop-down list box as you want to.
Step 3 The Save As dialog box pops up as shown in Figure 5-10.

5-8 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

Figure 5-10 Saving an alarm

Step 4 Choose the folder where you want to save the file and click Save.
----End

Filtering Alarm
Alarm filtering function can be used to make settings to view alarms based on specific
criteria.
Step 1 Choose Alarm Browse > Alarm Filter Browse to pop up the Alarm filter setting dialog
box, as shown in Figure 5-11.

Figure 5-11 Alarm filter setting

Step 2 Choose the alarm type and alarm level. Set the module number and the network management
type.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-9


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

Step 3 Click OK. The alarm filter browse window is displayed based on your settings.
----End

5.5 Querying Alarm


You can use this function to query the alarms of a certain category.
Step 1 Choose Alarm Query > Query to pop up the Alarm query setting dialog box as shown in
Figure 5-12.

Figure 5-12 Alarm query setting

Step 2 Set the parameter on the dialog box according to Table 5-1.

Table 5-1 Description of the parameter

Parameter Description

Alarm type Choose one from the four options: Fault, Recovery, Event and
History.
Alarm level Choose one or more alarm levels such as Critical, Major,
Minor, and Warning.
Time and date of start It specifies the time period for which the alarm information
and end will be queried. When you choose this check box, you must set
the Start and End time in the corresponding fields.
Module number Choose this check box and enter a valid value, if you want to
query the alarm information based on module number.
Alarm ID If you know the number of the alarm to be queried, choose this
check box and enter a valid value.

5-10 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

Parameter Description

Start Serial Number If you know the serial number of the alarm, choose this check
box and enter a proper value.
End Serial Number If you know the end serial number of the alarm, choose this
check box and enter a proper value.
Network management If you want to query the alarm information based on the
network management type, choose this check box and enter a
proper value.
Alarmbox alarm type If you want to specify the alarm type of the alarm box to be
queried, choose this check box and enter a proper value.

Step 3 Click OK to pop up the Alarm query result window, as shown in Figure 5-13.

Figure 5-13 Alarm query result

A maximum of 1,000 alarms can be queried at a time.


The valid value for Module number is in the range from 1 through 252.
The valid value for Alarm number is in the range from 1 through 5,000.
Start date and time should be less than or equal to End date and time.

----End

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-11


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

5.6 Managing Alarm


Clearing History Alarm
You can clear the history alarms within a certain period of time when they are no longer
needed. This deletes the alarms from the database and prevents excessive usage of the hard
disk by the alarms.
The procedure is as follows:
Step 1 Choose Alarm Management > Delete Alarm to pop up the Clear History Alarms dialog
box, as shown in Figure 5-14.

Figure 5-14 Clearing history alarm

Step 2 Choose the Start date and End date, and then click OK to delete the alarms in the period.

The End date is a mandatory while Start date is optional.


If you do not set the Start date, all the alarms of the last week prior to the End date will be cleared.

----End

Shielding Alarms
When there are many alarms from the BAM and the alarms of some modules or some types
are not important, you can shield them. The procedure is as follows:
Step 1 Choose Alarm Management > Alarm Mask to pop up the Mask of Alarm dialog box, as
shown in Figure 5-15.

5-12 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

Figure 5-15 Mask of Alarm

Step 2 To add an alarm mask, enter the shielding condition and then click Add. If the Alarm mask
query window exists, it will update the newly added alarm mask condition and add it to the
list.
Step 3 To unmask the alarms that are already masked, enter the unmask condition and click Delete.
If the Alarm mask query window exists, it will update the newly added alarm mask
condition and the selected alarm mask conditions will be deleted from the list.
Step 4 To query the alarm masked, enter the query condition and then click Query. The Alarm
mask query window is displayed as shown in Figure 5-16.

Figure 5-16 Alarm mask query window

The purpose of alarm masking (or shielding) is different from that of alarm filtering. The purpose of
alarm masking is to send the mask command to the BAM directly so as to stop it from sending the
masked alarms to the alarm console. But the purpose of alarm filtering is only to filter some alarms to
prevent them from being displayed on the alarm window.

----End

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-13


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

Querying Alarm Parameter


This feature enables to query the detailed setting of various kinds of alarm parameters,
including:
z Matched alarm number
z Alarm name
z Sending to BAM flag
z Sending to alarm box flag
z Sending to NM flag
z Alarm level
z NM alarm level
z NM alarm category
z Alarm category of alarm box
The procedure is as follows:
Step 1 Choose Alarm Management > Alarm Configuration Query to pop up the Query Alarm
Parameter dialog box, as shown in Figure 5-17.

Figure 5-17 Querying alarm parameter

Step 2 To query the alarm information of a specific alarm number, choose Alarm ID check box and
enter the alarm number.
Step 3 Click OK to pop up the query results as shown in Figure 5-18.

5-14 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

Figure 5-18 Alarm configuration query result

----End

Controlling an Alarm Box


The alarm box control operations can be used to control the Alarm box, a hardware device
used to display the alarm information.
The procedure is as follows:
Step 1 Choose Alarm Management > Alarmbox Control to pop up the Alarmbox Control
dialog box, as shown in Figure 5-19.

Figure 5-19 Alarm box control

Step 2 Enter the module number and choose one option in the Function operation according to
Table 5-2.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-15


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

Table 5-2 Description of the options

Options Description

Reset alarmbox Reset the alarm box. Its function is equivalent to manually
pressing Reset on the alarm box panel.
Stop alarm tone Stop the alarm tone produced by the buzzer of the alarm
box.
Darken alarmbox status light Turn off the alarm indicator on the alarm box. When you
choose this option you must also set Alarm type and
Position of darkening light.

Step 3 Click OK to save the settings.

The valid value for Module number is: BAM, 1~128.


If no module number is specified, the alarm box on the BAM will be controlled.

----End

Querying Alarm Statistics


The alarm statistics can be queried based on various conditions. This can be used to make
statistics of the number of alarms of a certain type in a specified module.
The procedure is as follows:
Step 1 Choose Alarm Management > Alarm Statistics to pop up the Query Alarm Statistics
dialog box, as shown in Figure 5-20.

5-16 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

Figure 5-20 Querying alarm statistics

Step 2 Choose the Alarm type and the Alarm level.


Step 3 If you want to query alarm statistics based on module number, choose the Use Module
Number check box and enter the module number.
Step 4 If you want to make statistics of the alarms within a particular time period, choose the Date
and Time of Start and End check box and set the Start and End time.
Step 5 Click OK to run the query. The query result is displayed as shown in Figure 5-21.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-17


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

Figure 5-21 Alarm statistics query result

----End

Setting Alarm Screen Level


After setting the alarm screen level, the BAM Server will stop sending any alarms below the
specified severity level to the alarm box. For example, if the alarm screen level is set to
Major, then the BAM Server will block Minor and Warning alarms from the device to the
alarm box.
The procedure is as follows:
Step 1 Choose Alarm Management > Alarm Box Screen Level > Set to pop up the Alarm Box
Screen Level dialog box, as shown in Figure 5-22.

5-18 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

Figure 5-22 Setting alarm screen level

Step 2 Set the Alarm level and click Apply to set the alarm screen level.
----End

Getting Alarm Screen Level


This is used to view the current alarm screen level that is already set.
The procedure is as follows:
Choose Alarm Management > Alarm Box Screen Level > Get to pop up the Alarm
Information dialog box, as shown in Figure 5-23.

Figure 5-23 Getting alarm screen level

Deleting Alarm
You can forcibly delete a fault alarm from the GUI through the operation.
The procedure is as follows:
Step 1 On the alarm window, right-click an alarm to be deleted to pop up a shortcut menu, as shown
in Figure 5-24.

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-19


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

Figure 5-24 Deleting alarm

Step 2 Choose Recover Alarm to delete the alarm.

The Delete Alarm option will only be available if at least one fault alarm is selected.
You can delete one or multiple fault alarms. If, however, you choose some recovery alarms as well as
some fault alarms, recovery alarms will not be deleted from the BAM Server.
The colour of the deleted alarms will be changed on the GUI, if you have set a different colour for
deletion of alarm. The alarm type will be changed from Fault to Cleared. If you want to delete this, click
Clear Part of Cleared Alarm on the shortcut menu or click Refresh to refresh the alarm information.
The change of the colour reflects in all windows that have this alarm.

----End

Acknowledging Alarm
You can acknowledge an alarm from the GUI through this operation.
The procedure is as follows:
Step 1 On the alarm window right-click on an alarm to be deleted to pop up a shortcut menu, as
shown in Figure 5-24.
Step 2 Choose Acknowledge Alarm.
----End

Clearing Recovery Alarm


z Clearing all recovery alarms
On the alarm window right-click on an alarm to be deleted to pop up a shortcut menu, as
shown in Figure 5-24. Choose Clear All Cleared Alarms.

5-20 Huawei Technologies Proprietary Issue 04 (2006-11-10)


TELLIN-USAU
Routine Operation Manual 5 Alarm Workstation Operations

This option will only be available if there is at least one recovery alarm.
z Clearing selected recovery alarm
On the alarm window right-click on an alarm to be deleted to pop up a shortcut menu, as
shown in Figure 5-24. Choose Clear Part of Cleared Alarms.

This option will only be available if there is at least one recovery alarm.
You can also choose some recovery alarms and some fault alarms. In that case, fault alarms will not be
deleted from the alarm station.

5.7 Printing Options


As the alarm information is very critical, it is quite often necessary to print the alarm
information. Various printing options are provided to facilitate fast and convenient printing.

Real-time Print Filter Setting


You can set the real-time filtering criteria for printing the alarm information. You can specify
the types and levels of alarms to be printed.
The procedure is as follows:
Step 1 Choose System > Real Time Print Filter Setting to pop up the Real time print filter
setting dialog box as shown in Figure 5-25.

Figure 5-25 Real-time print filter setting

Step 2 Choose the required Alarm type, Alarm level and Network management type and enter the
Module number.
Step 3 Click OK to save the settings.
----End

Issue 04 (2006-11-10) Huawei Technologies Proprietary 5-21


TELLIN-USAU
5 Alarm Workstation Operations Routine Operation Manual

Real-time Printing
You can print the alarm information in real time according to the set filter conditions. Just
choose System > Real Time Print.

The real-time alarm report is not printed immediately. It will be printed only when there is sufficient
number of alarms filling a single page.
If you want to print the real-time alarm immediately, choose System > Flush Printer after the real-time
alarm has been generated.

Flush Printer
To print the alarms in the buffer, you must choose System > Flush Printer.

If the buffer is empty, an empty page will be printed.


The contents of the buffer will be printed till the print buffer is empty.

5-22 Huawei Technologies Proprietary Issue 04 (2006-11-10)