Académique Documents
Professionnel Documents
Culture Documents
Version: V4.11.20
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright 2011 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
I
4.3.4 Querying Users of a Role........................................................................ 4-13
4.4 User Management............................................................................................ 4-14
4.4.1 Description of User Management Commands .......................................... 4-14
4.4.2 Adding a User ........................................................................................ 4-15
4.4.3 Adding a User Role ................................................................................ 4-18
4.4.4 Modifying Your Password........................................................................ 4-20
4.5 Super Management .......................................................................................... 4-21
4.5.1 Description of Super Management Commands......................................... 4-21
4.5.2 Disconnecting A Login User Forcibly ....................................................... 4-22
4.5.3 Modifying the Password Policy of OAM Users .......................................... 4-23
4.5.4 Modifying Account Policy of OAM User .................................................... 4-26
4.5.5 Querying Locked Users .......................................................................... 4-28
4.5.6 Unlocking a User Manually ..................................................................... 4-29
4.6 Inner Control Management ............................................................................... 4-30
4.6.1 Description of Inner Control Management Commands .............................. 4-30
4.6.2 Modifying an Inner Control Account ......................................................... 4-31
4.6.3 Modifying the Password of an Inner Control Account ................................ 4-33
4.6.4 Modifying the Password Policy of Inner Control Accounts ......................... 4-34
II
6.3.1 Description of Version Query Commands................................................. 6-10
6.3.2 Querying the Version Package Running on a Board...................................6-11
6.3.3 Querying Details of a Version Package .................................................... 6-13
6.3.4 Querying Details of a Version Package on the OMM Server ...................... 6-13
6.3.5 Querying the Hardware Version of a Board .............................................. 6-14
6.4 Related Setting ................................................................................................ 6-16
6.4.1 Description of OMP Boot Mode Commands ............................................. 6-16
6.4.2 Setting the Boot Mode of the OMP Module .............................................. 6-16
Figures............................................................................................................. I
Tables .............................................................................................................V
Glossary .......................................................................................................VII
III
IV
Chapter 1
About This Manual
Introduction
This manual describes the daily operations done on the ZXUN uMAC-Gn/Gp SGSN OMM
system.
Intended Audience
This manual is suitable for:
l Telecommunication engineers whose job is related to the equipment
l Those who want to get knowledge about the daily operations done on the ZXUN
uMAC-Gn/Gp SGSN OMM system
Prerequisite Skill
To use this manual effectively, users should have a general understanding of wireless
telecommunications technology. Familiarity with the following is helpful:
l ZXUN uMAC-Gn/Gp SGSN system and its various components
l User interfaces on the OMM system
Chapter Summary
Chapter 1, Basic Operations Describes the basic operations on the OMM system.
Chapter 2, System Maintenance Describes the general commands and operations for system
maintenance.
Chapter 3, Security Management Describes the general commands and operations for security
management.
Chapter 4, Log Management Describes the general commands and operations for log
management.
Chapter 5, Version Management Describes the general commands and operations for Version
management.
Chapter 6, Trace Management Introduces the operations of the trace management, including the
subscriber signaling trace and fail observer.
Related Documentation
The following documentation is related to this manual:
1-1
l ZXUN uMAC Unified Mobility Access Controller Gn/Gp SGSN Command Reference I
l ZXUN uMAC Unified Mobility Access Controller Gn/Gp SGSN Command Reference
II
l ZXUN uMAC Unified Mobility Access Controller Gn/Gp SGSN Command Reference
III
l ZXUN uMAC Unified Mobility Access Controller Gn/Gp SGSN Command Reference
IV
Conventions
This manual uses the following typographical conventions:
Typeface Meaning
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
1-2
2-1
l If a parameter is displayed in black while the border of this parameter input box is
in red, it is one parameter of a parameter group. You must enter one and only one
parameter of this group.
As shown in Figure 2-2, User ID and User Name are parameters of the same group.
You must enter either User ID or User Name.
l If a parameter is displayed in black and the border of this parameter input box is also
in black, this parameter is optional.
2-2
Prerequisite
You have logged in to the OMM server as user root.
Steps
1. On the terminal window, run the following command to open the /home/ngomm
directory. Run run.sh to start the server.
[root@server ]# cd /home/ngomm
[root@server ngomm]# ./run.sh
End of Steps
Result
When the information as following appears, means the OMM server start success.
[root@server ngomm]# ./run.sh
ZXHOME CHECK OK
Start SWD OK
gngp_sgsn_1
CREATE MD5 OK
Steps
1. Input http://server IP address:http server port/gngp_sgsn_NE
ID/client/ in the address bar of the IE browser on the OMM client, and then press
the Enter key to open the Login dialog box.
2-3
Parameter Description
Ad- Server-end IP Indicates the IP address of the OMM server. Fill it according to the
dress Address practical plan.
http service 2323 (the Listen port number set while setting the http service)
port number
User Name User name used to log in to the OMM server, with a default of "admin".
Password User password used to log in to the OMM server, with a default of null.
After the OMM software is installed, the initial login user name is "admin".
2. Input User Name and Password, and then click Login, opening the Local
Maintenance Terminal window, as shown in Figure 2-3.
Name Description
Sys- Application In Application Management, you can select and activate Terminal,
tem Management Fault Management, Performance Management, and Trace
Menu Management, or you can select Close Current, Close Others, or
Close All to close the application.
Product This part displays the version information about the local maintenance
Information terminal, and provides a link to the web site of ZTE Corporation.
User Information This part displays information such as the current login user, login
time, and link status.
2-4
Name Description
But- Used to set the time when the client screen is automatically locked,
tons the initial window opened upon logging in to the client, and the text
on result style of the MML terminal.
Tool-
Used to lock the client screen manually.
bar
Used to log off the current login user from the client.
Win- Terminal. Clicking it, you can open the Terminal window.
dow-
Fault Management. Clicking it, you can open the Fault Management
swi-
window.
tch
Trace Management. Clicking it, you can open the Trace
but-
Management window.
tons
Performance Management. Clicking it, you can open the
Performance Management window.
Window tabs You can perform the following operations on each window tab:
l By clicking a different tab, you can switch to desired windows.
l By double-clicking a tab, you can close the current application.
l By clicking the small circles on the tab pages and selecting
an option from the popup menu, you can close the current
application, another application or all operations.
Note:
This manual introduces the Terminal window and Trace Management window.
For the Fault Management, and Performance Management windows, refer to the
following manuals.
l ZXUN uMAC Unified Mobility Access Controller Gn/Gp SGSN Alarm Management
Operation Guide
l ZXUN uMAC Unified Mobility Access Controller Gn/Gp SGSN Performance
Management Operation Guide
2-5
Name Description
Command This block is positioned at the upper right of the window, including:
running result l Text Result: The command running result is displayed here in text.
and help block l Table Result: The command running result is displayed here in table. You
can click the button before running a command to enable this.
l Operation Record: This part includes the command running time and
result, and man-machine command information. In addition, you can view
the details of the command running result.
l Help: With this tool, you can view the function, format, input and output
parameters of a command to obtain help in using a command properly.
By clicking these tabs, you can switch to a corresponding part.
Filter This part is positioned in the left middle of the window. Inputting keywords in
the Filter input box, you can search related commands fast.
MML input This block is positioned at the right middle of the window. You can input the
block command code and parameters here (during inputting, the system will open
a list of matching commands for your selection).
2-6
Name Description
l : This button is used to enable auto newline of the command lines. You
can input the Ctrl+Enter keys to implement this function.
l : The command execution result is displayed in table as well as in text.
l : Click this button to save the command execution result in a specified
directory.
Command tree Command tree is positioned at the bottom left of the window, including System
Maintenance, Devices Maintenance and Configuration Management.
2-7
Name Description
Command GUI This part is positioned at the right bottom of the window. Users can input the
command parameters in GUI mode.
Related information
l Inputting the keyword of a command parameter in ,
you can quickly find this parameter. If you want to find several related
parameters, you can locate them by clicking or .
l is used to distinguish the general and non-general parameters
of a command. If this option is selected, non-general parameters of
the command are displayed (in green font). Otherwise, only general
parameters are displayed.
l Parameters in red are mandatory and those in black are optional.
Note:
You should have the proper authorities before operations. For details, refer to 3
Security Management.
End of Steps
2-8
The following table provides the description for related operation commands.
3-1
Steps
1. In the left pane of the Terminal window of Local Maintenance, select System
Maintenance > Runtime Environment Monitor > Modify CPU Parameter. The
command and its parameters are displayed at the right part of the window, as shown
in Figure 3-1.
3-2
2. Enter the command parameters according to your actual situations. For parameter
description, refer to Table 3-1.
Switch Whether to enable the monitoring Select On or Off, the default value
function. is On.
CPU Usage Threshold If CPU usage exceeds the Integer from 1 to 100, with the
(%) configured threshold, an alarm default value of 80.
message arises.
Times of CPU Usage When the measurement value Integer from 1 to 10, with the
Exceeded Threshold in subsequent polling for CPU default value of 1.
usage exceeds the configured
threshold, a major alarm
message arises.
Period (s) The interval for each inspection Integer from 20 to 120, with the
and displaying CPU usage (unit: default value of 120.
second) To avoid performance degradation
caused by resource monitoring that
consumes too many resources,
the monitoring period should not
be less than 20 seconds.
Example: Set parameter CPU Usage Threshold to 2, and use the default
configuration for other parameters. Figure 3-2 shows the execution result.
3-3
End of Steps
Follow-Up Action
You can query the CPU monitoring parameters with the SHOW CPUPARA command.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Runtime
Environment Monitor > Modify Memory Parameter. The command and its
parameters are displayed at the right part of the window, as shown in Figure 3-3.
2. Enter the command parameters according to your actual situations. For parameter
descriptions, refer to Table 3-2.
Switch Whether to enable the memory Select On or Off, the default value
monitoring function. is On.
3-4
Memory Usage If memory usage exceeds the Integer from 1 to 100, with the
Threshold (%) configured threshold, an alarm default value of 80.
message arises.
Times of Memory When measurement value in Integer from 1 to 10, with the default
Usage Exceeded subsequent polling for memory value of 1.
Threshold usage exceeds the configured
threshold, a major alarm
message arises.
Period (s) The interval for each inspection Integer from 20 to 120, with the
and displaying memory usage default value of 120.
(unit: second). To avoid performance degradation
caused by resource monitoring that
consumes too many resources, the
monitoring period should not be
less than 20 seconds.
End of Steps
Follow-Up Action
You can query the memory monitoring parameters with the SHOW MEMPARA command.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Runtime
Environment Monitor > Modify HD Parameter. The command and its parameters
are displayed at the right part of the window, as shown in Figure 3-5.
3-5
2. Enter the command parameters according to your actual situations. For parameter
descriptions, refer to Table 3-3.
Period (s) The interval for each inspection Integer from 30 to 300, with the default
and displaying hard disk usage value of 300.
(unit: second) To avoid performance degradation
caused by resource monitoring that
consumes too many resources, the
monitoring period should not be less
than 30 seconds.
End of Steps
Follow-Up Action
You can query the hard disk monitoring parameters with the SHOW HDPARA command.
3-6
Steps
1. In the left pane of the Terminal window, select System Maintenance > Runtime
Environment Monitor > Modify Partition Parameter. The command and its
parameters are displayed at the right part of the window, as shown in Figure 3-7.
2. Enter the command parameters according to your actual situations. For parameter
descriptions, refer to Table 3-4.
Partition Name of a hard disk You can find the parameter to be configured
Description partition with the SHOW PARTITIONPARA command.
If the partition description you enter does not
exist, the system returns message Record
corresponding to the partition
description does not exist.
3-7
Monitor Type The following monitoring The monitoring type should be consistent with
types are provided: the monitoring threshold.
l No Monitor l If Monitor Type is set to Absolution Value
l Absolution Value Monitor(MB) or Percentage Monitor (%),
Monitor(MB) monitoring thresholds cannot all be 0.
l Percentage Monitor l If Monitor Type is set to No Monitor, the
(%) monitoring thresholds can be the values
you set so that you can use the previous
settings while enabling the switch.
l If Monitor Type is set to Percentage
Monitor (%), the valid range of each
threshold is from 0 to 100.
Critical Monitoring threshold of The range is from 0 to 999999, with the default
Threshold critical alarms value of 0.
All the monitoring thresholds can be 0
Major Threshold Monitoring threshold of
(monitoring is not required). Otherwise, the
major alarms
thresholds must meet the restriction relation:
Minor Threshold Monitoring threshold of
Critical Threshold> Major Threshold> Minor
minor alarms
Threshold>Warning Threshold.
Warning Monitoring threshold of
Threshold warning alarms
End of Steps
Follow-Up Action
You can query the parameters of hard disk partition monitoring with the SHOW PARTITI
ONPARA command.
3-8
threshold for the disk space used by the directories is set. If the space exceeds the
threshold, processing is done according to the policy you set, including sending alarms,
or removing files according to the file creation date or sizes (from lower to greater or vice
versa) until the value is lower than the threshold.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Runtime
Environment Monitor > Create Directory Parameter. The command and its
parameters are displayed at the right part of the window, as shown in Figure 3-9.
2. Enter the command parameters according to your actual situations. For parameter
descriptions, refer to Table 3-5.
3-9
Period (hr) The time interval The range is from 1 to 99999, with the default value
after which the of 1.
directory capacity To avoid performance degradation caused by resource
is detected and monitoring that consumes too many resources, the
displayed monitoring period should not be less than 1 hour.
Critical Monitoring The range is from 0 to 999999, with the default value
Threshold (MB) threshold of critical of 0.
alarms All the monitoring thresholds can be 0 (monitoring is
not required). Otherwise, the thresholds must meet
Major Threshold Monitoring
the restriction relation, Critical Threshold >Major
(MB) threshold of major
Threshold> Minor Threshold >Warning Threshold.
alarms
Warning Monitoring
Threshold (MB) threshold of warning
alarms
3-10
End of Steps
Follow-Up Action
You can perform the following operations.
Operation Command
Export- Modify Parameter SET FMCLEARPARA Sets the method and time point of
ing or of Exporting or clearing the alarm data.
Clearing Clearing FM Data
FM Data
Show Parameter SHOW FMCLEARPARA Queries the parameters related to
of Exporting or exporting and clearing of the alarm
Clearing FM Data data.
3-11
Backup Modify PM SET PMCLEANPAR Sets the method and time point of
or Clear- Data Cleaning clearing the performance data.
ing Per- Parameter
for-
Show PM SHOW PMCLEANPAR Queries the parameters related
mance
Data Cleaning to exporting and clearing of the
Data
Parameter performance data.
Backup Modify Log SET LOGCLEAR PARAM Sets the method and time point of
or Data Cleaning clearing the log data.
Clearing Parameter
Log
Show Log SHOW LOGCLEAR Queries the parameters related to the
Data
Data Cleaning PARAM output and cleanup of the log data.
Parameter
Steps
1. In the left pane of the Terminal window, select System Maintenance > Exporting or
Clearing FM Data > Modify Parameter of Clearing FM Data. The command and its
parameters are displayed at the right part of the window, as shown in Figure 3-11.
2. Enter the command parameters according to your actual situations. For parameter
description, refer to Table 3-7.
3-12
Saving Days of Original Duration in which the Integer from 1 to 90, with a default of 30.
Data alarm data is stored in
the database
Clean Time of Every Day Time point in every day 05 clocks, selected from the drop-down
when the alarm data is menu, with a default of 00:00.
exported and cleared
from the database
Saving Days of Exported The number of days Integer from 1 to 90, with a default of 4.
Files when the exported files
are stored
End of Steps
Follow-Up Action
You can query the alarm data clearing parameters with the SHOW FMCLEARPARA
command.
3-13
Steps
1. In the left pane of the Terminal window, select System Maintenance > BackUp or
Clearing Performance Data > Modify PM Data Cleaning Parameter. The command
and its parameters are displayed at the right part of the window, as shown in Figure
3-13.
2. Enter the command parameters according to your actual situations. For parameter
description, refer to Table 3-8.
Saving Days of Original Duration in which the Integer from 1 to 15, with a default
Data performance data is stored of 7.
in the database
Saving Days of Hourly Time of saving hourly Integer from 1 to 30, with a default
Summed Data summary tables of 14.
Saving Days of Daily Time of saving daily Integer from 1 to 90, with a default
Summed Data summary tables of 30.
Clean Time of Each Day Time point in every day 0-5 clocks, selected from the
when the performance data drop-down menu, with a default of
is exported and cleared from 02:00.
the database
If Export Cleaned Data Whether to export and clear Select Yes or No.
the performance data from If you select No, parameters Clean
the database Time of Each Day and Saving Days
of Exported Files are invalid.
Saving Days of Exported The number of days when Integer from 1 to 90, with a default
Files the exported files are stored of 30.
3-14
Example: Modify the performance data clearing parameters with the following
requirements.
l Saving Days of Original Data: 5
l Saving Days of Hourly Summed Data: 10
l Saving Days of Daily Summed Data: 20
l Other parameters: adopt default
Figure 3-14 shows the execution result.
End of Steps
Follow-Up Action
You can query the performance data clearing parameters with the SHOW PMCLEANPA
RA command.
Steps
1. In the left pane of the Terminal window, select System Maintenance > BackUp or
Clearing Log Data > Modify Log Data Cleaning Parameter configuration area is
displayed as shown in Figure 3-15.
2. Enter the command parameters according to your actual situations. For parameter
description, refer to Table 3-9.
3-15
Table 3-9 Description for Parameters of the SET LOGCLEAR PARAM Command
Saving Days of Days of saving the operation The range is from 1 to 90, with a
Command Log logs in the database default of 60.
Saving Days of Days of saving the security logs The range is from 1 to 90, with a
Security Log in the database default of 60.
Saving Days of Days of saving the system logs The range is from 1 to 90, with a
System Log in the database default of 60.
Max Saving Records The Max Records for which log The range is from 12 to 100, with a
(ten thousand) can be saved. default of 12.
Clean Time of Each Time point in every day when 0-5 clocks, selected from the
Day the logs are exported and drop-down menu, with a default of
cleared from the database 02:00.
If Export Clean Data Whether to export and clear the Select Yes or No.
logs from the database If you select No, parameters Clean
Time of Each Day and Saving Days
of Exported Files are invalid.
Saving Days of Export Days of saving the files in which Integer from 1 to 90, with a default
Files the exported logs are stored of 4.
End of Steps
Follow-Up Action
You can query the log clearing parameters with the SHOW LOGCLEAR PARAM
command.
3-16
Auto backup includes creating, deleting, modifying and querying automatic backup
strategies. The following table provides the description for related operation commands.
Modify Automatic SET AUTO STRATEGY Adjusts an automatic backup strategy, including
Backup Strategy execution time, output location and strategy name.
Delete Automatic DEL AUTO STRATEGY Deletes a specified automatic backup strategy and
Backup Strategy cancels the backup task executed at a specified
time.
Note:
Steps
1. In the left pane of the Terminal window, select System Maintenance > Automatic
Backup > Create Automatic Backup Strategy. The command and its parameters
are displayed at the right part of the window, as shown in Figure 3-17.
3-17
2. Enter the command parameters according to your actual situations. For parameter
description, refer to Table 3-10.
Table 3-10 Description for Parameters of the ADD AUTO STRATEGY Command
Automatic Backup The automatic strategy name A string containing 1 to 255 characters.
Task Name set in the system
Output Type The Type that the backup file Select Output to Server Disk or
is saved. Output to FTP Server.
Output Path The path through which the If the file is output to the server disk, the
backup file is saved directory is the absolute directory of the
server disk.
If the file is output to the FTP server, the
directory is the FTP server directory of
the URI format.
Maximum Number The number of the remained Enter it according to your actual
of Backup Files backup files. Redundant files situations. The default value is 30.
are circularly deleted.
3-18
Backup Filename Name of the backup file You do not need to add the file extension
name to the backup file name, because
the system automatically adds the file
extension name.
Start Time The server system time when Set the date and time in the popup
the backup task is executed dialog box.
System Object Sets One or more system object You can find the parameters to be
sets to be backed up configured with the SHOW SYS SET
command.
Set the system object set ID in the
System Object Sets dialog box.
Time Type The period in which the auto Select Daily, Weekly or Monthly.
backup strategy is executed
Week Day All days of a week If Time Type is set to Weekly, you need
set this parameter.
3-19
End of Steps
Follow-Up Action
You can perform the operations on an automatic backup strategy, refer to Table 3-11.
Operation Command
3-20
4-1
l Users
A user is the operation & maintenance personnel of the NE management. admin is
the system default user and the system administrator.
l Roles
A role is used to define the user management authority. Its essence is to define a
group of user management authorities by defining operations and resources. A role
is the basis to establish a user, and a user not assigned with a role is not allowed to
log in to the system. Therefore, establishing and assigning roles is the basis of the
security management.
When assigning roles for newly-established users, refer to Table 4-1 for the four
pre-defined role authority assignment schemes. You can adjust the role authorities
as per the actual situation.
Role Authority
Operator Having the data configuration, system maintenance, and data query
authorities.
Note:
With the SHOW CMDSET MEMBER command, you can view the specific commands
in a command set. For example, you run command: SHOW CMDSET MEMBER:ID
=1 or SHOW CMDSET MEMBER:NAME=Command set for operation management permi
ssions to view the commands contained in the command set for operation management
permissions.
l Command sets
A command set is the set of multiple commands. Using a command set, you can
conveniently assign authorities for a user. Assigning a role to a command set equals
to assign this role to all commands in this command set. Therefore, the command set
makes it easier to manage and assign role authorities.
l Commands
4-2
Operation flow
The security management operation flow is as shown in Figure 4-2.
3. Adding a role
4-3
It is to authorize a command set for a non-system role, and make the role have certain
operation authorities.
5. Adding a user
It is to add a customized user.
6. Adding a user role
It is to authorize a role for a non-system user, and make the user have the authorities
of this role.
Show Cmdset SHOW CMDSET Queries the command sets that this
user can query, including the name
and ID of each command set.
Add Cmdset Member ADD CMDSET MEMBER Adds one or more command members
in a customized command set.
Delete Cmdset Member DEL CMDSET MEMBER Deletes one or more command
members from a customized
command set.
Show Role By Cmdset SHOW CMDSET ROLE Queries the role of a command set.
Show Command SHOW CMD Queries the commands that this user
can query.
4-4
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > CmdSet Management > Add Cmdset. The command and its
parameter are displayed in the right part of the window, as shown in Figure 4-3.
2. Enter Cmdset Name, which cannot be identical with the name used by an existing
command set, and then click . Figure 4-4 shows the execution result.
End of Steps
Follow-Up Action
You can perform the following operations on a command set.
Operation Command
4-5
Prerequisite
The command set is added.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > CmdSet Management > Add Cmdset Member. The command and
its parameters are displayed in the right part of the window, as shown in Figure 4-5.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-3.
Table 4-3 Description for Parameters of the ADD CMDSET MEMBER Command
Command Set The internal ID of a Integer type: Enter either one of the
ID command set, which is 14294967295 two parameters. You can
automatically allocated query the parameters to
by the system when this be set with the SHOW
command set is added. CMDSET command.
4-6
Example: Add command 1413003 in command set TEST. Figure 4-6 shows the
execution result.
End of Steps
Follow-Up Action
You can perform the following operations on the command set members.
Operation Command
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > CmdSet Management > Show Role By Cmdset. The command
and its parameters are displayed at the right part of the window, as shown in Figure
4-7.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-5.
4-7
Table 4-5 Description for Parameters of the SHOW CMDSET ROLE Command
Command Set The internal ID of a Integer type: You can find the parameters to
ID command set, which 14294967295 be configured with the SHOW
is automatically CMDSET command.
generated by the You can either leave these two
system when this parameters blank, or type Cmdset
command set is ID or Cmdset Name.
added.
End of Steps
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > CmdSet Management > Show Command. The command and its
parameters are displayed at the right part of the window, as shown in Figure 4-9.
4-8
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-6.
Show Role SHOW ROLE Queries the roles that this user can query.
4-9
Add Role Cmdset ADD ROLE CMDSET Assign one or more command sets to a
non-system role.
Delete Role Cmdset DEL ROLE CMDSET Deletes one or more command sets of a
non-system role.
Show Role Cmdset SHOW ROLE CMDSET Queries the command sets of one or more
roles.
Show User by Role SHOW ROLE USER Queries the users of a role.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Role Management > Add Role. The command and its parameters
are displayed at the right part of the window, as shown in Figure 4-10.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-7.
Role Name Name of the customized role. Enter a role name different from
any existing name for easy
recognition. You can specify a
maximum of 50 characters.
4-10
Role Description User-defined role description Enter the information about the
information. role so that users can get familiar
with the role. You can specify a
maximum of 128 characters.
Example: Add and validate role TEST. Figure 4-11 shows the execution result.
End of Steps
Follow-Up Action
You can perform the following operations on a new role.
Operation Command
4-11
Prerequisite
l The role is added.
l One or more command sets are added.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Role Management > Add Role Cmdset. The command and its
parameters are displayed at the right part of the window, as shown in Figure 4-12.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-9.
Table 4-9 Description for Parameters of the ADD ROLE CMDSET Command
Command Set ID List Command set ID You can add several operation
command sets to a customized role.
If these command sets have been
assigned, you cannot repeat the
operation.
You can find the parameters to be
configured with the SHOW CMDSET
command.
Example: Assign command set 5 to role TEST. Figure 4-13 shows the execution result.
4-12
End of Steps
Follow-Up Action
You can perform the operations on a new role command set, refer to Table 4-10.
Operation Command
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Role Management > Show User by Role. The command and its
parameters are displayed at the right part of the window, as shown in Figure 4-14.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-11.
4-13
Table 4-11 Description for Parameters of the SHOW ROLE USER Command
Role ID Internal ID of a role, Integer type: You can either leave these
automatically generated 12147483647 two parameters blank, or
by the system when the type Role ID or Role Name.
role is added. You can find the parameters
to be configured with the
Role Name of a role Character string type:
SHOW ROLE command.
Name 150 characters
End of Steps
Add User ADD USER Adds a user whose name is not identical with any
existing user names.
4-14
Show User SHOW USER Queries the information about users, including
user ID, user name, validity, mobile phone number,
E-mail address, date of operation limitation,
maximum login users, whether to restrict password
validity, and period of password validity.
Copy User COPY USER Quickly creates a user by copying an existing one.
Add User Role ADD USER ROLE Assigns roles to a non-system user to make this
user have the corresponding operation permissions
of those roles.
Delete User Role DEL USER ROLE Removes role permissions from a non-system user.
Show User Role SHOW USER ROLE Queries the roles of one or more users.
Modify Self Password SET PASSWORD Modifies the password of this user. Any user can
modify his own password.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > User Management > Add User. The command and its parameters
are displayed in the right of the window, as shown in Figure 4-16.
4-15
2. Set the parameters in accordance with actual situations. For parameter descriptions,
refer to Table 4-12.
User Name Name of the new user. A user name is allowed to include English
letters (case sensitive), digits, and some special
characters ( ~ ! @ % & () - + ). The name cannot
be identical with the name of another existing
user.
Range: 1 to 30 characters
Valid User (Yes or The users status. If No is selected, users cannot log in to the OMM
No) system with this user name.
Mobile The users phone Enter users phone number to distinguish among
number. different users and accessibility.
Email The users Email. Enter users Email to distinguish among different
users and accessibility.
4-16
Password Validity Validity of the password. If Restrict Password Validity is set to Yes, enter
(Day) the number of days after which the password
expires.
User Password Password of the user for The password must match the password policy
logging in to the system. of the current system (the password policy is
available in Supper Management).
Range: 1 to 20 characters
Restrict Operable Sets whether to restrict l If No is selected, the user has no time
Date the time of user restriction in operability.
operability by date. l If Yes is selected, Operable Begin Date
and Operable End Date are required. The
user can log in to the OMM server only
within this period.
Operable Begin Beginning date of the If Restrict Operable Date is set to Yes, these
Date operation permission. two parameters are required.
Restrict Operable Sets whether to restrict l If No is selected, the user can operate the
Time the time of user OMM server at any time in a day.
operability by hour. l If Yes is selected, Operable Begin Time
and Operable End Time are required. The
user can log in to the OMM server only
within this period.
Operable Begin Beginning time of the If Restrict Operable Time is set to Yes, these
Time operation permission. two parameters are required.
4-17
Restrict Operable Sets whether to restrict l If No is selected, the user can operate the
Day of Week the time of user OMM server in any day of a week.
operability by workday. l If Yes is selected, Operable Day of Week
is required. The user can log in to the OMM
server only in permitted workdays.
Operable Day of Workdays on which the If Restrict Operable Day of Week is set to Yes,
Week user can operate the this parameter is required.
OMM server.
End of Steps
Follow-Up Action
The following operations on a new user can be performed.
Operation Command
Prerequisite
l The user is added.
l The role is added.
4-18
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > User Management > Add User Role. The command and its
parameters are displayed at the right part of the window, as shown in Figure 4-18.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-14.
Table 4-14 Description for Parameters of the ADD USER ROLE Command
User ID Internal ID of a Integer type: Enter either one of the two parameters.
user, automatically 065535 You can find the parameters to be
generated by the configured with the SHOW USER
system when the command.
user is added.
Example: Assign role 5 to user TEST. Figure 4-19 shows the execution result.
4-19
End of Steps
Follow-Up Action
You can perform the following operations on a new user role.
Operation Command
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > User Management > Modify Self Password. The command and
its parameters are displayed at the right part of the window, as shown in Figure 4-20.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-16.
4-20
Old Password The old password you want to You must type the correct old password.
modify Leaving this parameter blank means that
the old password is empty.
Character string type: 0128 characters
New New password of the user Leaving this parameter blank means that
Password the new password is empty.
Character string type: 020 characters
Confirm Retype the new password. Leaving this parameter blank means that
Password the confirm password is empty.
Character string type: 020 characters
Remove Session of RMV USERLINK Forces a login user to exit the current system to
Login User ensure system security.
Set All UsersStatus SET ALLUSERSTATUS Modifies the status of all users to be valid or
invalid. Implement this operation in special
cases with extreme caution.
Set All SET ALLUSERPASSWD Modifies the password of all users. Implement
UsersPassword this operation in special cases with extreme
caution.
Modify Password SET PASSWORDTACTIC Sets the password policy of the authority
Policy of OAM User system, including the minimal password length
and whether to enable the password complexity
policy.
Show Password SHOW PASSWORDTACT Queries the current password policy of the
Policy of OAM User IC authority system.
4-21
Modify Account SET USERTACTIC Sets the account policy of the authority system,
Policy of OAM User including locking-user policy and automatic
unlock time.
Show Account SHOW USERTACTIC Queries the account policy of the authority
Policy of OAM User system.
Show Locked User SHOW LOCKEDUSER Queries the locked OMM user accounts in the
system as required.
Unlock User UNLOCK USER Unlocks the locked OMM user accounts as
required.
Modify Log-Switch SET LOGSWITCHSTATU Set the switch status of a security log.
Status S
Show Log-Switch SHOW LOGSWITCHSTA Show the switch status of a security log.
Status TUS
Note:
A superuser cannot be disconnected compulsorily.
Prerequisite
You have logged in to the OMM system as system administrator "admin".
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Super Management > Remove Session of Login User. The
command and its parameters are displayed at the right part of the window, as shown
in Figure 4-21.
4-22
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-17.
Login Time Time when this login user Time format: YYYY-MM-DD HH:MM:SS
logged in to the OMM
system.
Type Type of the terminal through Terminal types are OMM Cient, TELNET
which this user logs in to the Client, NDF Client and SSHient.
OMM system.
End of Steps
4-23
Prerequisite
You have logged in to the OMM system as system administrator "admin".
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Super Management > Modify Password Policy of OAM User. The
command and its parameters are displayed at the right part of the window, as shown
in Figure 4-23.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-18.
Minimum Length of Minimal length of a password Integer from 0 to 20, with a default
Password of 0. It is recommended to change
it to 6.
4-24
l A password cannot be
identical with the user
name or the user name
twice repeated.
l A password cannot be
the reverse of the user
name.
Reminding Days Before Warns a user before N days Integer from 0 to 90.
Password Expired ago when the password is
overdue.
Day of Latest Password It is not allowed to use the Integer from 0 to 180.
Cannot Be Reused password that was used
within the latest N days.
Example: The password policy is modifies to: the minimal password length as 6,
enable the password complexity policy , no need to prompt password expiration, no
need to modify expired password. Figure 4-24 shows the execution result.
4-25
End of Steps
Follow-Up Action
You can query the password policy with the SHOW PASSWORDTACTIC command.
Prerequisite
You have logged in to the OMM system as system administrator "admin".
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Super Management > Modify Account Policy of OAM User. The
command and its parameters are displayed at the right part of the window, as shown
in Figure 4-25.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-19.
4-26
Lock User by IP Whether to lock an You need to set this parameter when
account according to the the lock status is Policy-Lock or
IP address of the login Lock-Forever. Including:
client of the account. l Yes: Lock an account according to
the IP address of the login client that
this account.
l No: Lock an account not according
to the IP address of the login client
that this account.
Maximum Times of The maximum number You need to set this parameter when
Incorrect Password of times that a user can the lock status is Policy-Lock or
Input enter a wrong password. Lock-Forever.
The account is locked if
the number exceeds the
preset value.
Auto Unlock Time (hr) The time when the system You need to set this parameter when
automatically unlocks a the lock status is Policy-Lock or
user Lock-Forever. The range is from 1 to 72.
Lock Check Period (d) Period of lock status Integer from 1 to 999.
detection
4-27
End of Steps
Follow-Up Action
You can query the account policy with the SHOW USERTACTIC command.
Prerequisite
You have logged in to the OMM system as system administrator "admin".
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Super Management > Show Locked User. The command and its
parameters are displayed at the right part of the window, as shown in Figure 4-27.
4-28
2. Enter the name of the locked user (If you leave text box User Name blank, you query
all locked users). Click to query the information about the locked users.
Example: Query locked user TEST. Figure 4-28 shows the execution result.
End of Steps
Follow-Up Action
The system administrator (admin) can manually unlock a user with the UNLOCK USER
command.
Prerequisite
You have logged in to the OMM system as system administrator "admin".
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Super Management > Unlocked User. The command and its
parameters are displayed at the right part of the window, as shown in Figure 4-29.
4-29
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-20.
User Name Name of the user you want to You can find the parameters to be configured
unlock with the SHOW LOCKEDUSER command.
End of Steps
4-30
Modify Inner Control SET ACCOUNTINFO Modifies the basic information about an
Account inner-control account of the specified type,
including account description and valid days
of the password.
Show Password SHOW PASSWDTACTIC Queries the settings of the password policy
Policy of Inner- of the inner-control accounts.
Control Account
Prerequisite
l You have logged in to the OMM system as system administrator "admin".
l You have opened the Terminal window.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Inner Control Management > Modify Inner Control Account. The
command and its parameters are displayed at the right part of the window, as shown
in Figure 4-31.
4-31
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-21.
Account Type Type of the inner-control Including Data File Account, File
account Transfer Account,.OMP Transfer
Account and OMP TELNET Account.
Account Name Name of the inner-control Enter the name of an existing inner-control
account you want to modify account in the system, which is case
insensitive (You can query the account
with the SHOW ACCOUNTINFO
command).
Account Description Description of the Enter the new description of this account.
inner-control account You can specify a maximum of 128
characters.
Password Validity (d) Validity days of the Enter new validity duration of the
inner-control account. inner-control password. The range is
from 1 to 90.
Example: Modify account 1_FTP, a data file account, where the description information
is "FTP" and the duration of the password validity is "60 days". Figure 4-32 shows the
execution result.
End of Steps
4-32
Follow-Up Action
You can query the name, description and duration of password validity of an inner-control
account with the SHOW ACCOUNTINFO command.
Note:
After initial installation, the password of an inner-control account is identical with the name
of this account and case sensitive.
Prerequisite
You have logged in to the OMM system as system administrator "admin".
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Inner Control Management > Modify Password of Inner Control
Account. The command and its parameters are displayed at the right part of the
window, as shown in Figure 4-33.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-22.
Account Type of the inner-control Including Data File Account, File Transfer
Type account Account,.OMP Transfer Account and OMP
TELNET Account.
4-33
Old Old password of this You cannot run this command successfully unless
Password inner-control account you type the correct old password.
Character string type: 1128 characters
New New password of this The new password of the inner-control account
Password inner-control account must be consistent with the password policy of the
inner-control accounts.
Character string type: 1128 characters
Confirm Confirm password of this It must be consistent with the new password.
Password inner-control account Character string type: 1128 characters
Prerequisite
You have logged in to the OMM system as system administrator "admin".
Steps
1. In the left pane of the Terminal window, select System Maintenance > Security
Management > Inner Control Management > Modify Password Policy Of Inner
Control Account. The command and its parameters are displayed at the right part of
the window, as shown in Figure 4-34.
4-34
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 4-23.
Min Length of The minimum length of a Integer from 1 to 32. The minimal
Password password length of a password must be not
greater than the maximum length of
the password.
Max Length of The maximum length of a Integer from 1 to 32. The maximum
Password password length of a password must be not
less than the minimal length of the
password.
4-35
Reminding Days Specifies the number of days You need to set this parameter when
Before Password you are prompted to change Send Alarm or Not When Password
Expired the password before the Expired is set to Yes.
password expires. Integer from 0 to 90. If this parameter
is set to 0, you are prompted when a
password expires.
Figure 4-35 Result of Modifying the Password Policy of Inner Control Accounts
End of Steps
Follow-Up Action
You can query the password policy of the inner-control accounts with the SHOW PASSW
DTACTIC command.
4-36
Concepts
Logs are classified into operation logs, security logs and system logs.
l Operation logs
Records user operation information, including operation log ID, user name, operation
function, operation level, operation module, IP address, operation details, operation
result, operation failure cause, start time, end time, and command code.
l Security logs
Records the user login log information, including security log ID, user name, IP
address, security operation, date, access mode, and operation details.
l System logs
Records the completion status of timed tasks on the server, including System log ID,
level, function name, log name, detail, start time and end time.
5-1
Show Operation Log SHOW CMDLOG Queries the logs related to user operations according to
the conditions you specify.
Show Security Log SHOW SCRTLO Queries the logs related to user login, logout and security
G events according to the conditions you specify.
Show System Log SHOW SYSLOG Queries the logs related to execution of the timed tasks of
the system according to the conditions you specify.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Log
Management > Show Operation Log. The command and its parameters are
displayed at the right part of the window, as shown in Figure 5-1.
2. Enter the command parameters according to your actual situations. For parameter
description, refer to Table 5-1.
User Name Name of the user to be Character string type: 1128 characters
queried
Level Level of an operation Select a level from N/A, Very Important, Important,
Notice, and Normal.
5-2
IP Address IP address of the Enter the IP address of the OMM client you want
maintenance terminal to query.
of the user
Result Result of the operation & Select a result from N/A, Success, and Failure.
maintenance performed
by the user
If N/A is selected, this
means to query both
successful and failed
logs.
Mode Mode that the user Select a mode from N/A, OMM Client, TELNET
maintenance terminal Client, EMS Client, NDF Client and SSH Client.
accesses the NE
management server
If N/A is selected, this
means to selected all
access modes
Start Time Begin time of the queried Date type: Year-Month-Date Hour:Minute:Second
operation log time period.
Operation logs before
the Begin Time are not
queried.
If Begin Time is not set,
all operation logs before
the End time are queried.
5-3
End Time End time of the queried Date type: Year-Month-Date Hour:Minute:Second
operation log time period.
Operation logs after the
End time are not queried.
If the End Time is not set,
all operation logs after the
Begin Time are queried.
End of Steps
Steps
1. In the left pane of the Terminal window, click System Maintenance > Log
Management > Show Security Log. The command and its parameters are displayed
at the right part of the window, as shown in Figure 5-3.
5-4
2. Enter the command parameters according to your actual situations. For parameter
description, refer to Table 5-2.
User Name Name of the user to be Character string type: 1128 characters
queried
IP Address IP address of the Enter the IP address of the OMM client you want
maintenance terminal to query.
of the user
Mode Mode that the user Select a mode from N/A, OMM Client, TELNET
maintenance terminal Client, EMS Client, NDF Client and SSH Client.
accesses the NE
management server
If N/A is selected, this
means to select all access
modes.
Start Time Begin time of the queried Date type: Year-Month-Date Hour:Minute:Second
security log time period
Security logs before the
Begin Time are not
queried.
If the Begin Time is not
set, all security logs before
the End Time are queried.
5-5
End Time End time of the queried Date type: Year-Month-Date Hour:Minute:Second
security log time period
Security logs after the End
Time are not queried.
If the End Time is not set,
all security logs after the
Begin Time are queried.
End of Steps
Steps
1. In the left pane of the Terminal window, select System Maintenance > Log
Management > Show System Log. The command and its parameters are displayed
at the right part of the window, as shown in Figure 5-5.
5-6
2. Enter the command parameters according to your actual situations. For parameter
description, refer to Table 5-3.
Level System log level Select a level from Emergency, Alert, Error,
Warning, Notice and Information.
Function name Function name of system Character string type: 0200 characters
operation
Log name Name of the system log Character string type: 0500 characters
Detail Details of the user operation Character string type: 02000 characters
Start Time Begin time of the queried Date type: Year-Month-Date Hour:Minute:Sec-
system log time period ond
System logs before the
Begin Time are not queried
If the Begin Time is not set,
all system logs before the
End Time are queried
End Time End time of the queried Date type: Year-Month-Date Hour:Minute:Sec-
system log time period ond
System logs after the End
Time are not queried
If the End Time is not set,
all system logs after the
Begin Time are queried.
For example, if you query all system logs, the execution result is as shown in Figure
5-6.
5-7
End of Steps
5-8
Concepts
l Loading: adding the service version package to a board from the configured FTP path.
l Activation: adding the service version package to the activated file table.
l Validation: The board runs the files in the activated file table upon restart, and the
version becomes effective.
l Appointed loading and default loading: With appointed loading, you can specify
the name of the service version package and the address of the board loading this
package. With default loading, the OMP module loads package omp.pkg, the default
service version package. The difference between them is: With appointed loading,
you can flexibly specify the version package name and board address, facilitating
future expansion and application, while default loading is designed for the current
installation mode and is easy to use.
6-1
Load Version LOAD PKG This command integrates adding, distribution and
Package default activation operations. With this command,
you implement the function of default loading.
Enable Package ENABLE PKG This command enables the default version package
of modules/units.
Enable Assigned ENABLE APTPKG This command enables the appointed version
Package package of modules/units.
Default Activate ACT PKG This command activates the default version
Package package of the OMP module.
Deactivate Package DEACT DFTPKG This command deactivates the default version
package of the OMP module.
Deactivate Assigned DEACT APTDPKG This command deactivates the appointed version
Package package of the OMP module.
Delete Package on DEL PKG This command deletes the version package on
OMP the OMP module (from both the hard disk and
the database table). It can only delete a version
package at a time, and this version package must
be inactivated status.
Delete Package on DEL OMMPKG This command deletes the version package of the
OMM Server current office from the fixed directory on the OMM
server.
Delete Useless DEL USELESSPKG This command deletes the version package on
Package on OMP OMP which is useless.
Default Dispatch DISPATCH PKG This command set the version package of the OMP
Package module be default dispatch.
6-2
Note:
You should copy the version files to be loaded to the directory /home/ngomm/gngp_sgs
n_office ID/cnvmverfile of the NE management server.
Prerequisite
l You have copied the version files to the corresponding version directory of the server.
l The OMP version is loaded, and the boards run properly. For loading the OMP ver-
sion, refer to the ZXUN uMAC Unified Mobility Access Controller Gn/Gp SGSN Data
Configuration Guide.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Maintenance > Load Version Package. The command and
its parameters are displayed at the right part of the window, as shown in Figure 6-1.
2. Click Operation of load to open the dialog box as shown in Figure 6-2.
6-3
l Add to omp: Upload the version package (including versions of other boards) to
the OMP.
l dispatch to pp: The OMP actively dispatches the versions to different boards.
l active: Activate the loaded versions.
3. Select the operations you want to implement. If you want to select them all, click Select
All. Click Enter to return to the Terminal window.
4. Click , a Confirm alert box appears.
5. Click Yes. The system starts loading the default version package.
End of Steps
Prerequisite
The version package is activated.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Maintenance > Enable Package. The command and its
parameters are displayed at the right part of the window.
6-4
Prerequisite
The version package is activated.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Maintenance > Enable Assigned Package. The command
and its parameters are displayed at the right part of the window, as shown in Figure
6-3.
2. Set Location.
a. Click Location to open the dialog box as shown in Figure 6-4.
6-5
b. Enter Rack, Shelf, Slot and CPU. For parameter description, refer to Table 6-1.
c. Click Add to add the location information to the right part of this dialog box.
Note:
If you want to add several pieces of location information, repeat steps b to c. You
can edit the location information by clicking the Modify button or the Delete button.
End of Steps
6-6
Prerequisite
The version package is loaded.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Maintenance > Default Activate Package. The command
and its parameters are displayed at the right part of the window, as shown in Figure
6-5.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 6-2.
Package ID Serial number of the version You can find the parameters to be
package to be activated configured with the SHOW ADDPKG
command.
Package Name The name of the version
package to be activated
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Maintenance > Deactive Package. The command and its
parameters are displayed at the right part of the window, as shown in Figure 6-6.
6-7
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 6-3.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Maintenance > Deactive Assigned Package. The
command and its parameters are displayed at the right part of the window, as shown
in Figure 6-7.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 6-4.
6-8
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Maintenance > Delete Package on OMP. The command
and its parameters are displayed at the right part of the window, as shown Figure 6-8.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 6-5.
6-9
End of Steps
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Maintenance > Delete Package on OMM Server. The
command and its parameters are displayed at the right part of the window, as shown
Figure 6-9.
2. Enter package name (You can find the version package you want to delete with the
SHOW OMMPKG command).
3. Click to delete the version package on the OMM server.
End of Steps
6-10
Show Running Package SHOW RUNPKG Queries the information of the version that
a board is running.
Show Added Package to SHOW ADDPKG Queries all version packages loaded to
OMP the foreground.
Show Default Package SHOW DFTPKG Queries the default active version
packages listed in the general
version-package table.
Show Assigned Package SHOW APTDPKG Queries the records of the assigned
version package.
Show Package Info SHOW OMPPKGINFO Queries details of the version packages
added on the OMP module.
Show Package on OMM SHOW OMMPKG Queries the version packages stored in
Server directory /home/ngomm/mme_office
ID/cnvmverfile on the OMM server.
Show detail info of SHOW OMMPKGINFO Queries details of the files in a version
package on OMM server package on the OMM server.
Show Board Hardware SHOW HWVER Queries details of the board hardware
Version version.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Query > Show Running Package. The command and its
parameters are displayed at the right part of the window, as shown Figure 6-10.
6-11
c. Click Add to add the location information to the right part of this dialog box.
Note:
If you want to add several pieces of location information, repeat Steps b to c. You
can edit the location information by clicking the Modify button or the Delete button.
3. Click to query the information of the currently running version of the module.
End of Steps
6-12
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Query > Show Package Info. The command and its
parameters are displayed at the right part of the window, as shown in Figure 6-12.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 6-7.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Query > Show detail info package on OMM server. The
command and its parameters are displayed at the right part of the window, as shown
in Figure 6-13.
6-13
2. Enter Package Name (You can query the package name with the SHOW OMMPKG
command).
End of Steps
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Version Query > Show Board Hardware Version. The command
and its parameters are displayed at the right part of the window, as shown in Figure
6-14.
6-14
c. Click Add to add the location information to the right part of this dialog box.
Note:
End of Steps
6-15
Set OMP Boot Mode SET BOOTMODE Sets the mode of loading version files when
the OMP module starts.
Show OMP Boot SHOW BOOTMODE Queries the mode of loading version files
Mode when the OMP module starts.
Steps
1. In the left pane of the Terminal window, select System Maintenance > Version
Management > Related Setting > Set OMP Boot Mode. The command and its
parameters are displayed at the right part of the window, as shown in Figure 6-16.
2. Enter the parameters according to your actual situations. For parameter description,
refer to Table 6-9.
6-16
Master or Sets whether the OMP Two options are available, Master Board and Slave
Slave module is an active Board. In most cases, select Master Board.
module or a standby
module.
Boot mode Sets the mode of Two options are available: Boot from local and
loading a version when Boot from DHCP server.
the OMP module starts. l If the OMP module has a local version package
available for startup, select Boot from local.
l If the OMP module is powered on for the first
time, you must select Boot from DHCP server
to forcibly acquire the version package from the
OMM server.
Follow-Up Action
You can view the boot mode of the OMP module with the SHOW BOOTMODE command.
6-17
6-18
Steps
1. On Local Maintenance Terminal, click on the lower left corner; or click System
Menu and then click Trace Management in Application Management, to go to the
Trace Manager window.
2. Click Subscriber Signaling Trace from the navigation tree on the left pane of the
Trace Manager window, and the dialog box as shown in Figure 7-1 appears.
7-1
Parameter Description
Trace Mode Signaling trace modes: Random User, Single User, and All Users.
Num Type When the signaling trace mode is Random User or All Users, the Num
Type does not need to set. When the signaling trace mode is Single
User, set the Num Type as IMSI or MSISDN.
User Num When tracing a specific subscriber, you must set the subscriber number.
Parameter Description
Never Use The trace signaling data are not saved as files.
7-2
Parameter Description
Autosave Selecting Auto-preservation, you can set Real-time Display, Record Number,
Time Interval, and Save to Local Server or Save to FTP Server.
Unselecting Real-time Display, the trace signaling data are not displayed on the
client, and are automatically saved as files.
Auto-preservation and Timing Function should not be set simultaneously.
Timing Sets the time for the client to perform the signaling trace.
Function Auto-preservation and Timing Function should not be set simultaneously.
Follow-Up Action
l Viewing the detail code
Select a signaling whose detail code is to be viewed in signaling trace result tab, and
click on the tool bar to view the detail code.
l Viewing the primitive code
Select a signaling whose primitive code is to be viewed in signaling trace result tab,
and click on the tool bar to view the primitive code .
Steps
1. On Local Maintenance Terminal, click on the lower left corner; or click System
Menu and then click Trace Management in Application Management, to go to the
Trace Manager window.
2. Click the Fail Observer under the FAIL from the navigation tree on the left pane of the
Trace Management window, and the Trace Condition Settings dialog box appears
as shown in Figure 7-3.
7-3
Parame- Description
ter
Sub- Subscriber ID includes: Subscriber Type, Number Type, and User Num
scriber ID When the Subscriber Type selects All Users, the parameters Number Type
and User Num need not be configured.
When the Subscriber Type selects Single User, you should set the parameters
Number Type and User Num, and click Add.
White List Selecting Set WhiteList means to filter the Cause and Ext fail cause, and only
Setting those within the selected range will be reported to the trace management.
Select Set WhiteList to activate the Cause tab.
3. Select Set WhiteList, and click the Cause sub-tab in the General tab, and the dialog
box as shown in Figure 7-4 appears.
7-4
Parameter Description
Please select fail Consistent with the Trace Process in Options in the sub-tab General in the dialog box
processes Trace Condition Settings (Fail Observer).
Ext fail cause Sets the assistant reason why the process fails.
4. Click the Advance tab to set the parameters. Parameters are described in .
5. Click Start to start creating the fail observer task.
End of Steps
7-5
7-6
I
ZXUN uMAC Gn/Gp SGSN General Operation Guide
II
Figures
III
Figures
V
ZXUN uMAC Gn/Gp SGSN General Operation Guide
VI
Glossary
B/S
- Browser/Server
DHCP
- Dynamic Host Configuration Protocol
IP
- Internet Protocol
NMC
- Network Management Center
OMM
- Operation & Maintenance Module
OMP
- Operation Main Processor
VII