Académique Documents
Professionnel Documents
Culture Documents
9
MOTOTRBO™ CAPACITY MAX
System Advisor
APRIL 2018
*MN002730A01*
© 2018 Motorola Solutions, Inc. All rights reserved MN002730A01-AD
MN002730A01-AD
Copyrights
Copyrights
The Motorola Solutions products described in this document may include copyrighted Motorola
Solutions computer programs. Laws in the United States and other countries preserve for Motorola
Solutions certain exclusive rights for copyrighted computer programs. Accordingly, any copyrighted
Motorola Solutions computer programs contained in the Motorola Solutions products described in this
document may not be copied or reproduced in any manner without the express written permission of
Motorola Solutions.
© 2018 Motorola Solutions, Inc. All Rights Reserved
No part of this document may be reproduced, transmitted, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, without the prior written
permission of Motorola Solutions, Inc.
Furthermore, the purchase of Motorola Solutions products shall not be deemed to grant either directly
or by implication, estoppel or otherwise, any license under the copyrights, patents or patent
applications of Motorola Solutions, except for the normal non-exclusive, royalty-free license to use that
arises by operation of law in the sale of a product.
Disclaimer
Please note that certain features, facilities, and capabilities described in this document may not be
applicable to or licensed for use on a specific system, or may be dependent upon the characteristics of
a specific subscriber unit or configuration of certain parameters. Please refer to your Motorola
Solutions contact for further information.
Trademarks
MOTOROLA, MOTO, MOTOROLA SOLUTIONS, and the Stylized M Logo are trademarks or
registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other
trademarks are the property of their respective owners.
The European Union's WEEE directive requires that products sold into EU countries must have
the crossed out trash bin label on the product (or the package in some cases).
As defined by the WEEE directive, this cross-out trash bin label means that customers and end-users
in EU countries should not dispose of electronic and electrical equipment or accessories in household
waste.
Customers or end-users in EU countries should contact their local equipment supplier representative or
service centre for information about the waste collection system in their country.
2
MN002730A01-AD
Contact Us
Contact Us
Motorola Solutions Support Center
The Solutions Support Center (SSC) is the primary contact for technical support included in your
organization's service agreement with Motorola Solutions.
Service agreement customers should be sure to call the SSC in all situations listed under Customer
Responsibilities in their agreement, such as:
• Before reloading software.
• To confirm troubleshooting results and analysis before taking action.
Your organization received support phone numbers and other contact information appropriate for your
geographic region and service agreement. Use that contact information for the most efficient response.
However, if needed, you can also find general support contact information on the Motorola Solutions
website, by following these steps:
• Enter motorolasolutions.com in your browser
• Ensure that your organization's country or region is displayed on the page. Clicking or tapping the
name of the region provides a way to change it.
• Select "Support" on the motorolasolutions.com page.
Comments
Send questions and comments regarding user documentation to
documentation@motorolasolutions.com.
Provide the following information when reporting a documentation error:
• The document title and part number
• The page number with the error
• A description of the error
3
MN002730A01-AD
Document History
Document History
Version Description Date
MN002730A01-AA Original release of the Capacity Max System Advisor March 2016
manual.
MN002730A01-AB Second release of the Capacity Max System Advisor November 2016
manual. This update includes the following changes:
• Support of 250 RF sites: site objects displayed in
groups in the System and Grid View
• System Advisor redundancy:
- Selection of the active or inactive System Advi-
sor instance on the launch page
- System Advisor activity states displayed in the
System, Grid, and Raw View
• New Grid View icons:
- Site wide call
- System wide call
- System all call
For the updated information, see the following sec-
tions:
• - System Advisor Main Functions on page 27
- System Advisor Redundancy on page 30
- Starting the SA Client on page 69
- Call Monitoring – Grid View on page 89
- Grid View Icons on page 91
- Call Monitoring – Raw View on page 94
MN002730A01-AC Third release of the Capacity Max System Advisor June 2017
manual. This update includes the following changes:
• Addition of the Managed Resources in System
View section.
• Addition of the Grid View Icon:
- Confirmed Group Data Call
• Addition of Alarms and Events in Appendix E.
MN002730A01-AD Fourth release of the Capacity Max System Advisor April 2018
manual. This update includes the following changes:
• Replacement of the System View screenshot
• Policies Description - Audit Trails Cleanup Policy
• Repeaters - Main Repeater Channel Role
• Related Information
4
MN002730A01-AD
Contents
Contents
Copyrights................................................................................................................... 2
Contact Us................................................................................................................... 3
Document History....................................................................................................... 4
List of Figures............................................................................................................14
List of Tables............................................................................................................. 16
List of Procedures.....................................................................................................17
About the Capacity Max System Advisor............................................................... 21
What is Covered in This Guide?.................................................................................................. 21
Helpful Background Information.................................................................................................. 21
Related Information..................................................................................................................... 21
Chapter 1: SA Description........................................................................................23
1.1 IP-Managed Devices............................................................................................................. 23
1.2 Protocols Supported by SA....................................................................................................23
1.3 Agents....................................................................................................................................24
1.4 Redundancy Management.....................................................................................................25
1.5 Synchronization..................................................................................................................... 25
1.6 Supervision............................................................................................................................ 25
1.7 North Bound Interface............................................................................................................25
1.8 System Advisor Overview......................................................................................................26
1.8.1 System Advisor Main Functions...............................................................................27
1.8.2 System Advisor Redundancy...................................................................................30
1.9 SA Client Overview................................................................................................................30
1.10 Navigation Tree................................................................................................................... 31
1.11 Fault Management Overview...............................................................................................31
1.11.1 Severity Definitions................................................................................................ 32
1.11.2 Event Category Definitions.................................................................................... 32
1.11.3 Unknown Events.................................................................................................... 33
1.11.4 Command Window.................................................................................................33
1.11.5 Alarms Window...................................................................................................... 34
1.11.6 Alarms Summary................................................................................................... 34
1.11.7 Network Events Window........................................................................................ 35
1.11.8 Network Database................................................................................................. 35
1.12 Performance Management Overview.................................................................................. 36
1.13 Discovery Overview............................................................................................................. 36
1.13.1 Devices Discovered by SA.....................................................................................37
5
MN002730A01-AD
Contents
6
MN002730A01-AD
Contents
7
MN002730A01-AD
Contents
8
MN002730A01-AD
Contents
9
MN002730A01-AD
Contents
10
MN002730A01-AD
Contents
11
MN002730A01-AD
Contents
E.5.2.2 Power.......................................................................................................223
E.5.2.3 Fan...........................................................................................................224
E.5.2.4 Temperature............................................................................................ 224
E.5.2.5 Storage.................................................................................................... 224
E.5.2.6 Port.......................................................................................................... 224
E.5.2.7 Configuration Issues................................................................................ 225
E.5.2.8 Storage Path............................................................................................225
E.5.2.9 Storage Paths.......................................................................................... 225
E.5.2.10 Virtual machine...................................................................................... 226
E.6 MNIS Alarms and Events Overview.................................................................................... 226
E.6.1 MNIS Alarms......................................................................................................... 226
E.6.2 MNIS Events..........................................................................................................226
E.7 Generic SNMP Node Alarms and Events Overview............................................................227
E.8 Generic SNMP Router Alarms and Events Overview......................................................... 227
E.8.1 Generic SNMP Router Alarms...............................................................................227
E.9 Generic SNMP Switch Alarms and Events Overview..........................................................228
E.9.1 Generic SNMP Switch Alarms...............................................................................228
E.10 HP Switch Alarms and Events Overview...........................................................................228
E.10.1 HP Switch Main Traps......................................................................................... 228
E.10.2 HP Switch Generic Events.................................................................................. 229
E.10.2.1 hpicfFaultFinderTrap..............................................................................229
E.10.2.2 hpicfSensorTrap.................................................................................... 231
E.10.2.3 hpicfSelfTestTrap...................................................................................232
E.10.2.4 hpicfBridgeLoopProtectLoopDetectedNotification................................. 232
E.10.2.5 hpicfConnectionRateFilterNotification....................................................233
E.10.2.6 hpicfIntrusionTrap.................................................................................. 233
E.10.3 HP Switch Alarms................................................................................................234
E.10.4 HP Switch Events................................................................................................ 234
E.10.5 HP Switch Trap Rules......................................................................................... 251
E.11 System Advisor Alarms and Events Overview.................................................................. 261
E.11.1 System Advisor Alarms and Events.................................................................... 261
E.11.1.1 Activity State Events.............................................................................. 261
E.11.1.2 Application............................................................................................. 262
E.11.1.3 DSR Synchronization Object................................................................. 267
E.11.1.4 Broker Server Link................................................................................. 268
E.11.1.5 CM Capacity.......................................................................................... 268
E.11.1.6 Ethernet Card........................................................................................ 269
E.11.1.7 Fan.........................................................................................................271
E.11.1.8 Hard Disk............................................................................................... 272
12
MN002730A01-AD
Contents
13
MN002730A01-AD
List of Figures
List of Figures
Figure 1: System Advisor – Navigation Tree.......................................................................................... 31
Figure 2: System Advisor – Command Window..................................................................................... 34
Figure 3: Network Events Window......................................................................................................... 35
Figure 4: System Advisor – Network Database Window........................................................................ 36
Figure 5: SA File System – CSV Files List............................................................................................. 38
Figure 6: Events Archive – SA Client Web Interface.............................................................................. 38
Figure 7: Configure System Advisor Properties Window – General Properties Tab.............................. 40
Figure 8: Change Language and Date Format Window......................................................................... 42
Figure 9: User Preferences dialog box................................................................................................... 43
Figure 10: Restart Server Warning.........................................................................................................44
Figure 11: Server Connection Lost Warning Message...........................................................................44
Figure 12: Alert Filters Window.............................................................................................................. 48
Figure 13: Add Action Window – Email Tab........................................................................................... 50
Figure 14: SMTP Configuration Dialog Box............................................................................................51
Figure 15: Event Filters Window.............................................................................................................57
Figure 16: Add Action Window – Email Tab........................................................................................... 58
Figure 17: SMTP Configuration Dialog Box............................................................................................58
Figure 18: Update Credentials Dialog Box............................................................................................. 63
Figure 19: Launch Page......................................................................................................................... 69
Figure 20: Navigation View Panel – Custom View................................................................................. 76
Figure 21: System Administration – SA Client Web Interface................................................................ 80
Figure 22: Client Details – SA Client Web Interface...............................................................................80
Figure 23: Job Status View Window.......................................................................................................81
Figure 24: Policy Details Window........................................................................................................... 85
Figure 25: System View..........................................................................................................................87
Figure 26: Call Monitoring Grid View......................................................................................................90
Figure 27: Call Monitoring – Raw View.................................................................................................. 94
Figure 28: Event Details Window......................................................................................................... 100
Figure 29: Search Dialog Box...............................................................................................................101
Figure 30: Alarms Window................................................................................................................... 102
Figure 31: Alarm Details Window......................................................................................................... 103
Figure 32: Alarm Summary View – Tabular View.................................................................................104
Figure 33: Alarm Summary View – Severity Alone Pie Chart...............................................................105
Figure 34: Alarm Summary View – Graphical View Chart....................................................................106
Figure 35: Alarm Audio Notification Dialog Box....................................................................................112
Figure 36: Alarm Assign Dialog Box.....................................................................................................113
14
MN002730A01-AD
List of Figures
15
MN002730A01-AD
List of Tables
List of Tables
Table 1: Severity Categories.................................................................................................................. 32
Table 2: Event Category.........................................................................................................................32
Table 3: Filtering Site Trunking Condition Example............................................................................... 79
Table 4: Filtering Transient Illegal Carrier Events Example................................................................... 79
Table 5: Filtering Station alarms on Chosen Sites Example.................................................................. 79
Table 6: Policies Description.................................................................................................................. 82
Table 7: Managed Resource Properties.................................................................................................96
Table 8: Data Collection Detailed Properties........................................................................................122
Table 9: Security Administration...........................................................................................................141
Table 10: System Administration..........................................................................................................141
Table 11: Runtime Administration........................................................................................................ 142
Table 12: Shutdown Web NMS Server.................................................................................................142
Table 13: Terminate Client................................................................................................................... 142
Table 14: Events...................................................................................................................................142
Table 15: Topology...............................................................................................................................142
Table 16: Policy.................................................................................................................................... 143
Table 17: User Administration.............................................................................................................. 143
Table 18: Alerts.................................................................................................................................... 144
Table 19: NBI Configuration................................................................................................................. 145
Table 20: Credentials Configuration..................................................................................................... 145
Table 21: Device Command Configuration...........................................................................................145
Table 22: Device Synchronization........................................................................................................ 145
Table 23: Abort All Discovery Jobs Configuration................................................................................ 146
Table 24: Server Logs Access Configuration....................................................................................... 146
Table 25: Event Archive Access Configuration.................................................................................... 146
Table 26: Performance Archive Access Configuration......................................................................... 146
Table 27: Logging Configuration.......................................................................................................... 146
Table 28: Launch Management Application Configuration...................................................................147
Table 29: View All Login Attempts at Startup Configuration.................................................................147
Table 30: View Associated Managed Resources................................................................................. 147
Table 31: Asset Management Information Configuration..................................................................... 147
16
MN002730A01-AD
List of Procedures
List of Procedures
Configuring System Advisor Properties .................................................................................................40
Changing System Advisor Language Preference ..................................................................................42
Changing System Advisor Date Format ................................................................................................ 42
Setting the Initial View ........................................................................................................................... 43
Enabling or Disabling the Login Info Window at the Start-Up ................................................................43
Restarting System Advisor .................................................................................................................... 44
Changing Managed Resource Display Names in Managed Resource Properties Window .................. 45
Changing Managed Resource Display Name in System View ..............................................................45
Setting Default Names for Managed Resources ................................................................................... 46
Changing Subsystem Names ................................................................................................................ 46
Adding Alarm Filters .............................................................................................................................. 48
Configuring E-mail Notifications for Alarm Filters .................................................................................. 49
Modifying Alarm Filters .......................................................................................................................... 52
Modifying Alarm Filter Notifications ....................................................................................................... 53
Loading Alarm Filter Files ......................................................................................................................53
Deleting Alarm Filters ............................................................................................................................ 54
Deleting Alarm Filter Notifications ......................................................................................................... 54
Adding Event Filters .............................................................................................................................. 55
Configuring E-mail Notifications for Event Filters .................................................................................. 56
Modifying Event Filters .......................................................................................................................... 59
Modifying Event Filter Notifications ....................................................................................................... 60
Loading Event Filter Files ...................................................................................................................... 60
Deleting Event Filters ............................................................................................................................ 60
Deleting Event Filter Notifications ..........................................................................................................61
Updating Global SNMPv3 Credentials for the MotoMaster User ...........................................................63
Updating Global SNMPv3 Inform Credentials ....................................................................................... 64
Updating the Network Element SNMPv3 Credentials ........................................................................... 64
Testing any Device SNMPv3 Configuration .......................................................................................... 65
Testing SNMPv3 Communication Between Network Elements and SA ................................................65
Changing Global Web Service Credentials for the MotoMaster User ................................................... 66
Updating Network Element Web Service Credentials ........................................................................... 66
Testing any Device Web Service Configuration .................................................................................... 66
Testing the Web Service Communication Between Network Elements and SA ................................... 66
Configuring North Bound Interface ........................................................................................................ 67
Configuring Discovery Job Credentials ................................................................................................. 67
Disabling Discovery Job Credentials ..................................................................................................... 68
17
MN002730A01-AD
List of Procedures
18
MN002730A01-AD
List of Procedures
19
MN002730A01-AD
List of Procedures
20
MN002730A01-AD
About the Capacity Max System Advisor
Related Information
Motorola Solutions offers various courses designed to assist in learning about the system. For
information, go to http://www.motorolasolutions.com/training to view the current course offerings and
technology paths.
21
MN002730A01-AD
About the Capacity Max System Advisor
22
MN002730A01-AD
SA Description
Chapter 1
SA Description
The System Advisor (SA) is an application that provides fault management, system, and call
monitoring solutions for Capacity Max Systems. The SA helps users in managing their systems by
providing centralized way of viewing the system health, detailed information about the status of the
infrastructure devices, perform simple operations on the devices remotely, and viewing call activities
and channel usage. The System Advisor manages infrastructure devices through several protocols,
including SNMPv1, SNMPv3, ICMP, and web-services.
The System Advisor consists of client and server application. The server application runs on the
Capacity Max System Server (CMSS) which is logically located at the system level (outside of RF
sites).
The client application is a Java Web Start application that can be run on a Windows-based PC that has
access to the CMSS server (radio IP network). Client application requires Oracle Java to be installed
on the PC and a web browser.
1.1
IP-Managed Devices
An IP-managed device is any device that does not support any protocol-based management interface.
When a device is manually discovered without Simple Network Management Protocol (SNMP) agent
running, it will be discovered as an IP-managed device. Therefore, these devices have limited fault
management capabilities in the SA. These devices are discovered as generic nodes and are
supervised using Internet Control Message Protocol (ICMP) requests. The SA still manages and
reports communication link status of these devices.
1.2
Protocols Supported by SA
Devices that are managed by the SA support various protocols.
23
MN002730A01-AD
Chapter 1: SA Description
SNMPv1
SNMPv1 is the original request-response protocol and framework of the Simple Network Management
Protocol. The Network Management System (NMS) issues a request, and the managed devices return
responses. Four protocol operations are used in an SNMPv1 framework:
• GET
• GETNEXT
• SET
• TRAP
SNMPv2
SNMPv2 improves upon the existing SNMPv1 and adds two new protocol operations: GETBULK and
INFORM.
SNMPv3
In comparison to SNMPv2, SNMPv3 offers greater capability to protect your resources against threats.
SNMPv3 supports authentication and encryption, and is specified in its User-Based Security Model
(USM). The View-based Access Control Model (VACM) is an SNMPv3 approach for Management
Information Base (MIB) access control.
Reliable fault information is also a part of SNMPv3. It involves utilizing INFORMs to reliably deliver fault
information to a management entity.
SNMPv3 has three security levels. The following table explains which SNMPv3 security levels require
authentication and privacy passphrases.
1.3
Agents
An agent is software that runs within each device.
An agent responds to all protocols supported by the SA and reports all the events of interest to the
management entity.
24
MN002730A01-AD
Chapter 1: SA Description
1.4
Redundancy Management
Redundancy is the backup mechanism which takes over the function of a device in case the device
fails to provide its core services, for example due to malfunction.
Redundancy management includes the capability of the network element and the management entity
to provide and report such a failover condition.
1.5
Synchronization
The SA performs synchronization automatically, by validating the health of a device with the
information stored in the fault management database.
If the SA finds a discrepancy, it generates an event or an alarm. Synchronization can also be:
• Periodic synchronization triggered by the system clock
• New device discovery
• Rediscovery of an existing device
• User-initiated synchronization
NOTICE: The synchronization process only generates an alarm when it detects that the state of
a device differs from the state currently reported by the SA.
1.6
Supervision
The SA periodically checks its ability to communicate with the devices it manages.
This operation is referred to as supervision and is used to determine the following:
• Whether communication with the device is lost
• For SNMPv3 devices that support reliable communication, whether SA is supposed to initiate
synchronization with the device
If a device does not respond to the supervision query in a timely manner, the SA generates a
Communication Loss event or alarm against the managed device.
1.7
North Bound Interface
North Bound Interface (NBI) describes an interface offered by many Network Management System
(NMS) products, such as the System Advisor (SA).
NBI allows for NMS features, functions, and data to be accessible for Operations Support System
(OSS) and Manager of Managers (MoM). The OSS can use the NBI to retrieve information from NMS.
It uses SNMP which is a standardized protocol. It is also typical for NMS to forward information
automatically to the OSS. An example of such notification is the trap forwarding function available in
most NMS products.
SA supports the capability to send up events to hosts that support data processing by applications
other than Motorola Solutions applications. An example of such a host is the Manager of Managers
(MoM). The customer-processed data is typically viewed as reports by managers who are interested to
see a summary of information from the NMS.
SA supports North Bound Interface (NBI) for sending up notifications to the registered MoMs.
Currently, there are two interfaces that are supported. NBI uses SNMPv3 and the User-Based Security
Model (USM) to provide secure communication between SA and NMS.
25
MN002730A01-AD
Chapter 1: SA Description
1.8
System Advisor Overview
System Advisor is a critical fault management application.
SA primary functions are:
• Fault management of devices (SNMP traps or informs)
• Maintaining inventory of managed devices
• Detecting and reporting loss of communication with managed devices (Supervision)
• Ensuring the status reported is current (Synchronization)
• Basic troubleshooting capability
• Ability to manage/un-manage a device or delete a subnet/device
• Device Command Operation (Repeater commands like Enable/Disable/Reset)
• Alarm generation/annotation/ownership assignment/clearing/acknowledgment
• Alarm Summary
• Capability to use a secure protocol (i.e. SNMPv3)
• User access management
• Real-time call monitoring
• Call log archives
SA presents the faults and, in general, the status of the network elements in the following views:
• System View
• Network Database
• Network Events
• Alarms
These views and their operations are explained in detail in Fault Management Operations on page 95
SA user accounts are managed within the application. You can set up system partitions and assign
management responsibility to one or more administrators. The setup and maintenance of accounts are
26
MN002730A01-AD
Chapter 1: SA Description
1.8.1
System Advisor Main Functions
The following sections describe the main functions of the System Advisor (SA).
System View
System View provides a hierarchical view of the SA Network Database and groups system level
devices under a System object and the site level devices under Site objects. The Capacity Max system
supports up to 250 RF sites. Therefore, Site objects are also arranged in groups for easy navigation.
Status is propagated upward from each device to provide an “at-a-glance” view of the system health.
You can quickly navigate to other views: Alarms, Event, or Network Database views that show the
additional information for the selected element.
27
MN002730A01-AD
Chapter 1: SA Description
In the SA, the network database view serves as an inventory of the network resources. It maintains the
properties of all the managed resources, including both physical devices (for example, Repeater) and
logical entities (for example, Site, System, Network) discovered by SA.
You can invoke operations on inventory items such as command, manage/un-manage,
synchronization, ping, trace route, and others.
Device Synchronization
Device Synchronization is defined as the basic mechanism that allows SA to determine and refresh the
information about the status of managed devices. The synchronization process performs periodic
SNMP query on each device in “managed” state. Certain users may not want to receive updates about
the state of particular devices. In such cases, the device can be moved by the user to the "un-
managed" state and synchronization process will omit such devices.
Command Operation
The SA provides command operation for repeater devices. The following commands are supported by
the SA:
Enable, Disable, Reset
Allows you to change the operational state of the repeater.
Read of Repeater Remote Diagnostic counters
Allows you to gather repeater diagnostic information and store it in log file for further analysis. If the
command is successful, the link to the folder with the logs is displayed in the status bar of the
command dialog. Repeater diagnostics data files are saved as repeater_rds.log,
repeater_rds.log.1 and others.
Reset Repeater Remote Diagnostic counters
Allows you to reset the counters to initial value.
Network Events
Network event is the basic unit of management information that represents what has happened to a
particular managed device. Events can convey general information such as discovery of a device or
specific information such as failure of a managed entity and status update of a managed entity. Events
also show the associated entity or component, textual description, and the severity of the occurrence.
Events form a repository of information for all the occurrences in the system. The SA event view
provides a way to look at all events (or a filtered subset of events) that are received (or generated) by
the SA.
You can view the details of each event, export them to .cvs file or define custom view(s) to view a
filtered subset of events. For example, view only critical events that are from a particular device type
and/or from a certain site.
Events relate to an occurrence, such as:
• Initial discovery or rediscovery of an element
• Status update of an element
• Deletion of an element
• Failure in an element
28
MN002730A01-AD
Chapter 1: SA Description
Alarms
In SA, an alarm results from an event in a managed device that met a pre-determined significant state
change that may require user attention. The SA alarm view provides a way to look at all alarms (or a
filtered subset of alarms). An audible tone can be associated with alarms, based on severity.
Alarms are raised within SA based on notifications from the network element, or by SA to report
failures associated with fault management functions. An alarm becomes active once the SA displays it
in the alarm view, but not cleared yet. Whenever the problem that caused the alarm (of a particular
managed device) to be elevated in SA is resolved, SA clears the alarm. An Alarm Clear Timer policy
can be set (by a user with Admin privileges) to cause cleared alarms to persist in the SA alarm view
anywhere from 15 minutes to 10 hours, in 15 minutes increments.
Alarms can fall into the following general categories:
• Communication alarms
• Equipment alarms
• Quality-of-service alarms
Alarms across a network are commonly related to:
• Resources that have failed
• Connectivity issues
• Devices malfunctioning
• Threat assessment reports
• SNMPv3 or Web Service credentials failure
You can assign an alarm to a user and enter any additional information in a text field. In addition, you
can view the alarm details, export the alarms to .csv file for future analysis and define custom view(s)
to view a filtered subset of alarms.
Security Administration
SA provides security administration via Role Based Access Control functionality. Briefly, this implies
that the user accounts in SA application must be created and assigned with specific roles (for example,
groups) for performing a certain set of operations. Users of the SA (dealers or administrators) assigned
into different roles allow System Advisor SA to partition different operations (for example, create new
user/role, manage/un-manage resource, invoke command to a device, perform manual discovery) and
define the permissions that each role/group for a particular application uses.
29
MN002730A01-AD
Chapter 1: SA Description
Email Notification
The Email Notification feature provides a generic notification interface, namely Simple Mail Transfer
Protocol (SMTP) that can be configured and integrated with any standard email/paging solution that a
customer may use.
The SA allows notification configuration based on destination(s) to be sent, occurrence of certain
event/failure, and alarm severity of certain device. Operators are notified via email whenever such
event/failure occurs, so that further diagnostics can be performed immediately.
1.8.2
System Advisor Redundancy
The Capacity Max system supports up to five System Advisor servers. Only two SA instances can be
active at a time.
When more that two System Advisor servers are deployed, the Trunk Controller selects two as active
and the remaining servers are inactive.
If a System Advisor that you are using becomes inactive, for example due to a failure, log on to an
active System Advisor. See Starting the SA Client on page 69.
All System Advisor servers operate independently and user customizations performed on one server
are not applied on other servers (for example, custom views or modifications in users and groups).
1.9
SA Client Overview
The SA client application provides an end-user interface for the SA Fault Manager.
The SA client is launched through a web browser which provides starting point and flexibility in
application deployment.
When used for the first time, the application is downloaded from the server onto the local machine
using Java WebStart technology. For subsequent uses, the application is launched from the local
workstation.
30
MN002730A01-AD
Chapter 1: SA Description
To meet security requirements, the SA Client application uses SSL and SSL over HTTP (HTTPS) for
client-server communication and secure web browser connection. HTTP access is not supported.
To provide seamless access to the SA client, it is recommended to install the SSL certificate for the SA
application first. The certificates are installed from the browser store.
1.10
Navigation Tree
The navigation tree on the left-hand side in the main System Advisor (SA) panel enables you to quickly
select different fault management views.
Selecting nodes in the tree opens the associated view on the right-hand side of the main panel. Nodes
may be added to the tree by creating custom views. Similarly, only the nodes associated with custom
views can be removed from the tree.
Figure 1: System Advisor – Navigation Tree
1.11
Fault Management Overview
Fault management in the SA application includes processing and presentation of events sent by a
network element in the form of a Simple Network Management Protocol (SNMP) trap or inform, or a
Simple Object Access Protocol (SOAP) message.
Failures in the network, network elements, and communication links can interrupt routine activities. In
such situations, SA reports events.
31
MN002730A01-AD
Chapter 1: SA Description
1.11.1
Severity Definitions
Alarms and events are assigned with severity levels, indicated by a severity color and an alarm or
event message. The action required depends on the severity of the alarm.
NOTICE: When a managed resource is in an unmanaged state, the status (severity) of the
resource is unknown. Only a device in an unmanaged state uses this status. The info severity
level is only used for events, never alarms.
1.11.2
Event Category Definitions
Network elements detect and report to Ssytem Advisor (SA) conditions that have caused or can cause
an interruption in the operation of network elements.
Such conditions can be related to physical failures of a device, for example, fan failure. SA may also
report certain conditions that it detects within the application or on the device. In all cases, SA inspects
the reported condition and categorizes the event as one of the items in the following table.
Description Condition
Attribute Value Change An important parameter value has changed.
Event
Communication Alarm A communication/synchronization loss or regain is detected.
Equipment Alarm An equipment or link failed or a previously reported failure is cleared.
Informational Event A condition that is important, but is not a failure at this time.
NOTICE: Some informational events report conditions that
may cause a failure in the future. These events are nor-
mally reported with a severity higher than Info.
32
MN002730A01-AD
Chapter 1: SA Description
1.11.3
Unknown Events
SA could display an Unknown Event against a discovered device.
SA displays such events with the warning severity and the informational event category when
discovered devices send a notification that is not recognized by SA (SA has no rules to process and
display a received notification type).
The message of this type of event contains:
• The text Unknown Event
• The type SnmpTrap (for SNMP notifications)
• Variable bindings (varbinds) together with received values in the format <varbind>=<value>
NOTICE: SnmpTrap type and varbinds can be presented as:
• text when SA has MIBs to translate the object identifier (OID) to an exact name
• a raw OID if OIDs are from MIB and are not supported by SA
1.11.4
Command Window
You can use the command window to send commands to a selected managed resource, including
repeaters.
The command window provides the list of entities (or device manager resource types) and the
associated commands available for the selected managed resource. If multiple instances of an entity
can exist, a combo box is displayed next to the entity type. The list in the combo box contains all
possible IDs for the entity type. The entities are sorted in alphabetical order.
If the command window is invoked from the Alarms window, the entity associated with the selected
alarm is selected.
If the command window is invoked from the Network Database window, the first entity in the list is
selected.
NOTICE: If the entity has only one instance, no instance ID is displayed.
The status of a command request is displayed in the multi-line status bar at the bottom of the
command window. The managed resource typically responds to a command by changing the state of
one or more entities. These changes are reported to System Advisor (SA) and are displayed in the
Alarms window. To view these alarms, click View Alarms or select Alarms from the navigation tree.
NOTICE: Clicking View Alarms automatically filters the alarms to display only the alarms
associated with the selected managed resource.
33
MN002730A01-AD
Chapter 1: SA Description
1.11.5
Alarms Window
You open the Alarms window from the Navigation View by clicking the Alarms node under the Fault
Management node.
In the window, only active alarms of devices are displayed, that is the latest failure or an event clearing
a failure. You can open the detailed view of an alarm by double-clicking an entry in the window. The
Alarm Details window allows the you to perform the following functions:
• Assign/Unassign an alarm
• Annotate an alarm
• View the history of the selected alarm
The default sorting criterion in the Alarms window is the Date/Time column. You can sort the events by
any attribute by clicking the associated column heading. To toggle between ascending and descending
sort orders, click the column again.
1.11.6
Alarms Summary
Alarm summary is used to display the count of the total number of alarms organized by categories
and/or severities.
It is positioned just below the navigation tree in the main window. Each severity is represented in a
single cell or graph, depending on the presentation that is selected. The view is updated automatically
and the counts can be seen at all times, irrespective of the view that is currently open.
The presentation of the alarm summary can be modified by clicking the buttons at the top of the
summary panel. Three different presentations are available:
• Table view
• Bar graph view
• Pie chart view
34
MN002730A01-AD
Chapter 1: SA Description
1.11.7
Network Events Window
The Network Events window is accessible from the Navigation View by clicking the Network Events
node under the Fault Management node.
The window displays all notifications received or generated by SA. The notifications include various
properties related to events that are raised against devices. You can open the detailed view of an
event by double-clicking an entry in the window. By default, you view 50 events on a single page. You
can customize the number of events displayed on the page. The maximum number of events on a
page is 1,000.
The default sorting criterion in the Network Events window is the Date/Time column. You can sort the
events by any attribute by clicking the associated column heading. To toggle between ascending and
descending sort orders, click the column again.
Figure 3: Network Events Window
1.11.8
Network Database
Network database serves as an inventory view for the resources that are currently present in the
System Advisor (SA) database.
By default, network database displays certain critical properties associated with these resources.
Resources can be physical devices (for example a repeater site controller), networks, or logical entities
(for example a site). The contents are presented in a tabular format with each row corresponding to a
resource. The default page size of this view is 25 entries, but it can be modified to show more or fewer
entries in one page.
Network database displays a status value for each resource. This value is calculated based on the
highest severity of the alarms that are currently outstanding against the resource.
The unknown value indicates that SA does not currently manage the device.
35
MN002730A01-AD
Chapter 1: SA Description
1.12
Performance Management Overview
SA can collect and plot statistical data.
You can use the data to analyze functions and performance of your system. The data collection for
these statistics is triggered 10 minutes after the server application startup time.
1.13
Discovery Overview
Discovery is the process of adding an individual device or all the devices at a system into the System
Advisor (SA) database.
SA supports automatic triggering of discovery process for devices reported by the system. You can
also manually discover a device by providing necessary parameters, like IP address and SNMP port.
Once the devices are discovered, SA reads and stores critical parameters. It also determines the
36
MN002730A01-AD
Chapter 1: SA Description
current health (status) of the devices and their components. Then, it starts monitoring the connectivity
(supervision) to the devices.
As a result of a device discovery, additional resources are displayed in the SA Network Database
window. These resources are referred to as logical managed resources (LMR). The device itself is a
device managed resource (DMR). LMRs typically represent a set of related services or components
that a device reports on. They can be managed independently due to their physical or logical
relationship. An example of a physical relationship is a separate device connected to the device. A
logical relationship can be an active device in a redundant configuration. For a list of resources
associated with a device, see “Alarms and Events” in the System Advisor Online Help.
You initiate the discovery of a device or a site/network from the Discovery Configuration user interface.
You specify a unique identifier, for example the IP address or Hostname, and start the discovery
process. You can also set SNMPv3 and/or Web Service credentials for a discovery job.
Re-discovering a device is functionally the same as first-time discovery. However, the term is used to
describe the discovery operation performed on a device that is already in the SA database. During a
rediscovery, SA adds the resources of a device that are not present in the SA database. SA also
verifies the current resources of the device. If the verification fails, an alarm is raised against the
resource to indicate that the device does not respond to queries. To remove such alarms, you can
verify the configuration of the device and invoke rediscovery at a later time. If the resource is no longer
active in the system, you can delete it.
1.13.1
Devices Discovered by SA
For a list of devices managed by System Advisor (SA) and the alarms and events connected, see
“Alarms and Events” in the SA Online Help.
1.13.2
Post-Discovery Synchronization
Devices that are discovered successfully are automatically synchronized by the System Advisor (SA)
on a regular basis.
Synchronization is done in the background, but the status is automatically updated and displayed in the
following windows:
• Alarms
• Network Database
• System View
• Grid View
A device sends traps or informs to SA. The SA server application must continuously communicate with
the devices to ensure that status information is up-to-date. Therefore, SA also monitors its connectivity
to the device
1.14
Events Archive
In System Advisor (SA), you can view the latest 10,000 events sent to SA.
In SA, you can view the latest 10,000 events which are sent to SA. Older events are automatically
cleaned up (purged). SA periodically archives received events in two ways: in the SA file system and in
a database.
37
MN002730A01-AD
Chapter 1: SA Description
Archivization in a Database
All events that SA receives are automatically forwarded to a separate table. From that table, Fault
Manager can get information about all past events that do not exceed the number of seconds defined
in the ArchiveCleanupPolicy. Through the SA client web interface, you can display archived events or
export them to .csv files based on the provided filtering criteria.
Figure 6: Events Archive – SA Client Web Interface
38
MN002730A01-AD
Chapter 1: SA Description
39
MN002730A01-AD
Chapter 2: SA Configuration
Chapter 2
SA Configuration
Configuration procedures enable you to configure System Advisor (SA) for your specific network.
2.1
Application Configuration
The following configuration operations can be made to the SA interface:
• System Advisor properties
• Language and date format
• User preferences configuration
• Network Database configuration
• Alarm filters configuration
• Event filters configuration
2.1.1
Configuring System Advisor Properties
Follow the procedure to configure System Advisor (SA) properties.
Procedure:
1 From the menu bar, click Tools → Configure System Advisor Properties.
The Configure System Advisor Properties window appears.
Figure 7: Configure System Advisor Properties Window – General Properties Tab
2 To configure the general properties of the System Advisor, in the General Properties tab,
perform the following actions:
40
MN002730A01-AD
Chapter 2: SA Configuration
Postrequisites: Restart the server to implement the changes in configurations. For more information,
see Restarting System Advisor on page 44.
2.1.2
Language and Date Format
You can configure the language preference and date format of the System Advisor (SA).
The current language settings and date format are displayed in the Change Language and Date
Format window as shown in the following figure:
41
MN002730A01-AD
Chapter 2: SA Configuration
2.1.2.1
Changing System Advisor Language Preference
System Advisor (SA) supports seven languages, namely English (United States), German, Spanish
(Chile), French, Brazilian Portuguese, Russian, and Simplified Chinese.
Procedure:
1 Select Administration → Change Language and Date Format.
The Change Language and Date Format window appears.
2 In the Change language to: dropdown list, select the preferred language.
3 Click Update.
Postrequisites: Restart the SA server to implement the language change.
2.1.2.2
Changing System Advisor Date Format
The System Advisor supports two types of date formats.
Procedure:
1 Select Administration → Change Language and Date Format.
The Change Language and Date Format window appears.
2 In the Change date format to: dropdown list, select the preferred date format.
3 Click Update.
Postrequisites: Restart the SA server to implement the language change.
42
MN002730A01-AD
Chapter 2: SA Configuration
2.1.3
User Preferences Configuration
All users can configure the initial SA view and login information. User Preferences Configuration
2.1.3.1
Setting the Initial View
Procedure:
1 Select Administration → User Preferences.
The User Preferences dialog box appears.
Figure 9: User Preferences dialog box
2 In the Initial View on Login drop-down menu, select the view you want to see each time you
log on. The following views are available:
• Alarms
• Network Events
• Network Database
3 Click OK.
Your preference is saved. The User Preferences dialog box displays the currently saved option each
time you open it.
2.1.3.2
Enabling or Disabling the Login Info Window at the Start-Up
Procedure:
1 Select Administration → User Preferences.
The User Preferences dialog box appears.
2 From the Display login info at startup drop-down menu, do one of the following:
• Select Yes to display the window at the start-up
• Select No not to display it.
3 Click OK.
Your preference is saved.
43
MN002730A01-AD
Chapter 2: SA Configuration
2.1.4
Restarting System Advisor
Certain changes in the configuration of the System Advisor (SA) requires restart for the
implementations of changes to take effect. For example, changing language preference.
Procedure:
1 Select Administration → Restart System Advisor Server.
The Restart Server warning dialog box appears.
Figure 10: Restart Server Warning
If you choose to restart, a broadcast message appears indicating that the SA Server restarts in
60 seconds.
If you choose to cancel restart, skip the following steps.
44
MN002730A01-AD
Chapter 2: SA Configuration
2.1.5
Network Database Configuration
You can configure the network database by changing the display names of managed resources and by
changing the names of subsystems.
2.1.5.1
Changing Managed Resource Display Names in Managed Resource
Properties Window
Follow this procedure to edit managed resource display names in the Managed Resource Properties
window.
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, highlight a row, right-click it, and select Managed Resource
Properties.
The Managed Resource Properties window appears.
3 In the Display Name field, type the name of the node you want to see displayed in the Network
Database View and click Modify.
The device displays the updated name in the Managed Resource field.
2.1.5.2
Changing Managed Resource Display Name in System View
Follow this procedure to edit managed resource display names in System View.
Procedure:
1 In the Navigation View panel, click System View.
2 In System View, right-click the managed resource.
45
MN002730A01-AD
Chapter 2: SA Configuration
3 Click Rename.
4 In the Edit Value window, type the new display name for the selected managed resource.
5 Perform one of the following actions:
• To save the new display name of the managed resource, click Save.
• To exit the Edit Value window, click Cancel.
If the new display name is saved, the System View page refreshes and the new display name of the
managed resource is reflected.
2.1.5.3
Setting Default Names for Managed Resources
Procedure:
1 In the Navigation View panel, click System View.
2 In System View, right-click the managed resource.
A menu dialog appears.
2.1.5.4
Changing Subsystem Names
In SA, you can edit subsystem names so that Logical Managed Resources (LMR) and Device
Managed Resources (DMR) are segregated into appropriate groups.
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, right-click an item and select Managed Resource
Properties.
3 In the Managed Resource Properties dialog box, click the Relationship tab.
4 Type the new name in the Subsystem Name field and click Modify.
NOTICE: The length of the subsystem name cannot exceed 100 characters. If the
Subsystem Name field is left blank, SA uses the default subsystem name.
The subsystem name is changed.
46
MN002730A01-AD
Chapter 2: SA Configuration
2.1.6
Alarm Filters Configuration
When an alarm is created, the occurrence of the alarm can be associated with some actions.
SA provides alarm filters to send e-mails to an administrator on occurrence of an alarm. This action is
called a notification. By configuring alarm filters you can filter alarms based on certain match criteria.
With this tool you can also add, modify, or delete filters and filter actions.
When alarms are generated from devices in a network, you can configure SA to send notifications to
users. You can use alarm filters, also referred to as alert filters, to configure SA to automatically initiate
actions for selected alarms.
NOTICE:
The property name, when used for filtering, is case-sensitive and should be used exactly as
specified when typing in the name of the additional property criterion to filter on.
Do not use the following characters in property names:
white space
empty space
> < & $ # ^ - " ' ""
a digit at the beginning of the name
* ! @ ( + ~ { [ | \ ; , . ? / % `
SA supports only the Sending e-mails built-in filter notification. Other notification types that can
be associated with the filter are Suppressing events, Running system command, Sending
custom trap, and Running Custom Code. Even though these notifications are available on the
user interface, Sending e-mails is the only notification type recommended for use during filter
configuration on SA. Do not add/delete or modify other notification types. These notification
schemes require advanced knowledge and privileges and therefore are not recommended for
general use. Contact Motorola Solution Support Center (SSC) for information on the use of
notification schemes other than e-mail notification scheme.
47
MN002730A01-AD
Chapter 2: SA Configuration
2.1.6.1
Adding Alarm Filters
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 From the main menu, select Edit → Alarm Filters.
The Alert Filters window appears.
Figure 12: Alert Filters Window
48
MN002730A01-AD
Chapter 2: SA Configuration
• Domain
• Network
• Node
• Failure Object
7 Optional: Configure a filter by using an alarm property that is not displayed on the user interface:
a In the Match Criteria Properties dialog box, click More Properties.
b In the Property Name and Property Value fields, specify filter properties. Click OK.
The value must be the same as the one listed in the Property name for the filtering column.
To modify an existing property, in the Property Name field, enter the same value again and
in the Property Value, enter a new value. To remove a property, in the Property Name field,
enter the same value again and leave the Property Value field blank.
c Close the More Properties dialog box. In the Match Criteria Properties dialog box, click
OK.
8 In the Actions List pane, click Add Action.
9 In the Add Action window, add an action related to the notification.
A filter must have at least one notification associated with it.
10 Finish adding filters and notifications by clicking Apply. Click OK.
2.1.6.2
Configuring E-mail Notifications for Alarm Filters
You configure the e-mail notification to receive e-mails from System Advisor (SA) about incoming
alarms or events that matches your filter criteria. You configure the e-mail notification by adding
specific alarm or event properties to your criteria. Your notification settings and the certificate that you
need for secure communication are backed up during your backup process.
In property names, do not use the following characters:
white space
empty space
> < & $ # ^ - " ' ""
a digit at the beginning of the name
* ! @ ( + ~ { [ | \ ; , . ? / % `
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 From the main menu, select Edit → Alarm Filters.
49
MN002730A01-AD
Chapter 2: SA Configuration
6 In the Notification Name field, enter the name of the e-mail notification. Click Configure.
50
MN002730A01-AD
Chapter 2: SA Configuration
7 In the SMTP Configuration dialog box, enter the following account details:
a In the Account Name field, enter an SMTP account name.
b In the SMTP Server field, enter a server name.
c In the From Address field, enter a source e-mail address.
d In the To Address field, enter a target e-mail address.
e Click Add. Click OK.
8 Optional: Test the e-mail notification:
a In the Add Action window, from the SMTP Account list, select an SMTP account.
b In the Subject field, click Append Property and select the properties you want to
receive. Click Send Test Email.
In the Message field, a default message is added.
51
MN002730A01-AD
Chapter 2: SA Configuration
• Network
• Node
• Failure Object
Configuring filter properties that define what information you receive in the e-mail notifications
11 Configure a filter by using an alarm property that is not displayed on the user interface:
a In the Match Criteria Properties dialog box, click More Properties.
b In the Property Name and Property Value fields, specify filter properties. Click OK.
The value must be the same as the one listed in the Property name for the filtering column.
To modify an existing property, in the Property Name field, enter the same value again and
in the Property Value, enter a new value. To remove a property, in the Property Name field,
enter the same value again and leave the Property Value field blank.
c Close the More Properties dialog box. In the Match Criteria Properties dialog box, click
OK.
SA sends a test notification to the specified e-mail address. The test notification does not contain the
properties that you specified in the e-mail notification configuration.
2.1.6.3
Modifying Alarm Filters
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 From the main menu, select Edit → Alarm Filters.
3 In the Alert Filters window, select the alarm filter you want to modify.
4 Optional: In the Filter Name field, modify the filter name.
5 Optional: In the Match Criteria pane, modify the Managed Resource and Severity criteria.
6 Optional: Configure additional match criteria by clicking Advanced.
In the Match Criteria Properties dialog box, you can configure the following match criteria:
• Message
• Category
• Domain
• Network
• Node
• Failure Object
7 Optional: Configure a filter by using an alarm property that is not displayed on the user interface:
a In the Match Criteria Properties dialog box, click More Properties.
b In the Property Name and Property Value fields, specify filter properties. Click OK.
The value must be the same as the one listed in the Property name for the filtering column.
To modify an existing property, in the Property Name field, enter the same value again and
in the Property Value, enter a new value. To remove a property, in the Property Name field,
enter the same value again and leave the Property Value field blank.
c Close the More Properties dialog box. In the Match Criteria Properties dialog box, click
OK.
52
MN002730A01-AD
Chapter 2: SA Configuration
2.1.6.4
Alarms Filter by Managed Resource Device Category
You can filter alarms by the category of managed resource device.
The following table describes the different device categories:
2.1.6.5
Modifying Alarm Filter Notifications
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 From the main menu, select Edit → Alarm Filters.
3 In the Alert Filters window, select the alarm filter you want to modify.
2.1.6.6
Loading Alarm Filter Files
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 From the main menu, select Edit → Alarm Filters.
3 In the Alert Filters dialog box, click Load/Save.
53
MN002730A01-AD
Chapter 2: SA Configuration
4 In the Filter Details dialog box, specify the file name and click Load.
Any filters with the same match criteria are replaced with the alarm filters from your load file.
2.1.6.7
Deleting Alarm Filters
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 From the main menu, select Edit → Alarm Filters.
3 In the Alert Filter dialog box, select the alarm filter you want to delete. Click Delete Filter .
4 In the confirmation dialog box, confirm the deletion by clicking Yes.
The alarm filter disappears from the list of alarm filters.
2.1.6.8
Deleting Alarm Filter Notifications
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 From the main menu, select Edit → Alarm Filters.
3 In the Alert Filter dialog box, select the alarm filter whose notification you want to delete.
4 From the Actions List panel, select the notification you want to modify. Click Delete Action
.
5 In the confirmation dialog box, confirm the deletion by clicking Yes.
The notification disappears from the Actions List panel.
2.1.7
Event Filters Configuration
When an event is created, the occurrence of the event can be associated with some actions.
SA provides event filters to send e-mails to an administrator on occurrence of an event. This action is
called a notification. By configuring event filters you can filter events based on certain match criteria.
With this tool you can also add, modify, or delete filters and filter actions.
When events are generated from devices in a network, you can configure SA to send notifications to
users. Use event filters to configure SA to automatically initiate actions for selected events.
NOTICE:
The property name, when used for filtering, is case-sensitive and should be used exactly as
specified when typing in the name of the additional property criterion to filter on.
white space
empty space
> < & $ # ^ - " ' ""
a digit at the beginning of the name
* ! @ ( + ~ { [ | \ ; , . ? / % `
SA supports only the Sending e-mails built-in filter notification. Other notification types that can be
associated with the filter are suppressing events, running system command, sending custom trap, and
running custom code. Even though these notifications are available on the user interface, Sending e-
54
MN002730A01-AD
Chapter 2: SA Configuration
mails is the only notification type recommended during filter configuration on SA. Do not add/delete or
modify other notification types. These notification schemes require advanced knowledge and privileges
and therefore are not recommended for general use. Contact Motorola Solution Support Center (SSC)
for information on the use of notification schemes other than e-mail notification scheme.
IMPORTANT: By default, SA is configured with a filter named TopoSupress and its associated
action named suppressTopoEvent to suppress some SA internal events. When configuring the
event filter, do not modify or delete the in-built TopoSupress event filter or suppressTopoEvent
action configuration. Modifying or deleting this in-built configuration may lead to incorrect
display of device statuses.
2.1.7.1
Adding Event Filters
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 From the main menu, select Edit → Event Filters.
The Actions List pane options become active.
55
MN002730A01-AD
Chapter 2: SA Configuration
7 Optional: Configure a filter by using an alarm property that is not displayed on the user interface:
a In the Match Criteria Properties dialog box, click More Properties.
b In the Property Name and Property Value fields, specify filter properties. Click OK.
The value must be the same as the one listed in the Property name for the filtering column.
To modify an existing property, in the Property Name field, enter the same value again and
in the Property Value, enter a new value. To remove a property, in the Property Name field,
enter the same value again and leave the Property Value field blank.
c Close the More Properties dialog box. In the Match Criteria Properties dialog box, click
OK.
8 In the Actions List pane, click Add Action.
9 In the Add Action window, add an action related to the notification.
A filter must have at least one notification associated with it.
10 Finish adding filters and notifications by clicking Apply. Click OK.
2.1.7.2
Configuring E-mail Notifications for Event Filters
You configure the e-mail notification to receive e-mails from SA about incoming alarms or events that
matches your filter criteria. You configure the e-mail notification by adding specific alarm or event
properties to your criteria.
In property names, do not use the following characters:
white space
empty space
> < & $ # ^ - " ' ""
a digit at the beginning of the name
* ! @ ( + ~ { [ | \ ; , . ? / % `
Procedure:
1 In the Navigation View panel, click the Network Events node.
2 From the main menu, select Edit → Event Filters.
56
MN002730A01-AD
Chapter 2: SA Configuration
57
MN002730A01-AD
Chapter 2: SA Configuration
6 In the Notification Name field, enter the name of the e-mail notification. Click Configure.
Figure 17: SMTP Configuration Dialog Box
7 In the SMTP Configuration dialog box, enter the following account details:
a In the Account Name field, enter an SMTP account name.
b In the SMTP Server field, enter a server name.
c In the From Address field, enter a source e-mail address.
d In the To Address field, enter a target e-mail address.
e Optional: Enable obligatory authentication, select the Authentication Required check box.
Enter your user name and password.
f Click Add. Click OK.
8 Optional: Test the e-mail notification:
a In the Add Action window, from the SMTP Account list, select an SMTP account.
b In the Subject field, click Append Property and select the properties you want to
receive. Click Send Test Email.
In the Message field, a default message is added.
58
MN002730A01-AD
Chapter 2: SA Configuration
2.1.7.3
Modifying Event Filters
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 From the main menu, select Edit → Event Filters.
3 In the Event Filters window, select the alarm filter you want to modify.
4 Optional: In the Filter Name field, modify the filter name.
5 Optional: In the Match Criteria pane, modify the Managed Resource and Severity criteria.
6 Optional: Configure additional match criteria by clicking Advanced.
In the Match Criteria Properties dialog box, you can configure the following match criteria:
• Message
• Category
• Domain
• Network
• Node
• Failure Object
7 Optional: Configure a filter by using an alarm property that is not displayed on the user interface:
a In the Match Criteria Properties dialog box, click More Properties.
b In the Property Name and Property Value fields, specify filter properties. Click OK.
59
MN002730A01-AD
Chapter 2: SA Configuration
The value must be the same as the one listed in the Property name for the filtering column.
To modify an existing property, in the Property Name field, enter the same value again and
in the Property Value, enter a new value. To remove a property, in the Property Name field,
enter the same value again and leave the Property Value field blank.
c Close the More Properties dialog box. In the Match Criteria Properties dialog box, click
OK.
8 In the Event Filters window, click Apply. Click OK.
The window closes.
2.1.7.4
Modifying Event Filter Notifications
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 From the main menu, select Edit → Event Filters.
3 In the Event Filters window, select the alarm filter you want to modify.
4 In the Event Filters window, select the alarm filter you want to modify.
2.1.7.5
Loading Event Filter Files
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 From the main menu, select Edit → Event Filters.
3 In the Event Filters dialog box, click Load/Save.
4 In the Filter Details dialog box, specify the file name and click Load.
Any filters with the same match criteria are replaced with the alarm filters from your load file.
2.1.7.6
Deleting Event Filters
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 From the main menu, select Edit → Event Filters.
60
MN002730A01-AD
Chapter 2: SA Configuration
3 In the Alert Filter dialog box, select the alarm filter you want to delete. Click Delete Filter .
4 In the confirmation dialog box, confirm the deletion by clicking Yes.
The event filter disappears from the list of event filters.
2.1.7.7
Deleting Event Filter Notifications
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 From the main menu, select Edit → Event Filters.
3 In the Event Filter dialog box, select the alarm filter whose notification you want to delete.
4 From the Actions List panel, select the notification you want to modify. Click Delete Action
.
5 In the confirmation dialog box, confirm the deletion by clicking Yes.
The notification disappears from the Actions List panel.
2.2
Account Management
SA accounts are managed by administrators.
The administrators assign privileges to users and groups. In SA, there are pre-configured groups and
user accounts that cannot be deleted.
Pre-Configured Groups
By default, SA is pre-configured with groups that cannot be deleted. If you attempt to delete any of
these groups, an error message appears. The pre-configured groups are:
SuperUser
A user responsible for day-to-day monitoring and administration of the Radio System.
SecurityAdmin
A user responsible for the creation and maintenance of user accounts.
Motorola Solutions Systems Support Center (SSC)
A user responsible for the administration of the Motorola Solution Support Center (SSC) accounts
on the customer system.
61
MN002730A01-AD
Chapter 2: SA Configuration
TechnicianGroup
A user responsible for troubleshooting issues within the Radio System.
Pre-Configured Users
By default, SA is pre-configured with default user accounts that cannot be deleted. If you attempt to
delete any of the default user accounts, an error message appears. The pre-configured default user
accounts are:
root
A user account with the SuperUser role assigned.
admin
A user account with the SecurityAdmin role assigned.
sscadmin
A user account with the Motorola Solutions Systems Support Center (SSC) role assigned.
technician
A user account with the TechnicianGroup role assigned.
2.3
Inbound and Outbound Communication Credentials
Configuration
The configuration of inbound and outbound credentials includes the configuration of Simple Network
Management Protocol version 3 (SNMPv3), WebService, and North Bound Interface (NBI).
2.3.1
SNMPv3 Credentials Configuration
SA supports SNMPv3 communication to the network elements and Network Management System
(NMS).
SNMPv3 credentials that are used for:
• Outbound communication to the devices
• Inbound communication from the devices
• Communication with NMS by using North Bound Interface (NBI)
By default, SA restricts configuration of SNMPv3 credentials for those three types of communication to
the SuperUser and SecurityAdmin groups. The configuration of Motorola Solution Systems Support
Center (SSC) NBI SNMPv3 credentials (MotoNorthMotorola) is restricted to users belonging to the
Motorola Solutions Systems Support Center (SSC) group only.
There are three types of SNMP credentials configuration:
• Global SNMPv3 credentials configuration
• Network element SNMPv3 credentials configuration
• Discovery session SNMPv3 credentials configuration
Network element SNMPv3 credentials can be configured after the network element/device has been
successfully discovered.
NOTICE: If credentials for the discovery job were not configured, network elements are
discovered with Global MotoMaster SNMPv3 credentials.
62
MN002730A01-AD
Chapter 2: SA Configuration
2.3.1.1
Updating Global SNMPv3 Credentials for the MotoMaster User
Update the global SNMPv3 credentials for communication by modifying the MotoMaster user
credentials. Credentials that you can update for the MotoMaster user are the following security levels:
NoAuthNoPriv
A security level with no authentication and privacy passphrases defined.
AuthNoPriv
A security level with an authentication passphrase defined but with no privacy passphrase.
AuthPriv
A security level with authentication and privacy passphrases defined.
Procedure:
1 From the main menu, select Tools → Configure Global SNMPv3 Credentials.
The
2 In the Configure Global SNMPv3 Credentials dialog box, select MotoMaster. Click Update
Credentials.
The Update Credentials dialog box appears.
Figure 18: Update Credentials Dialog Box
3 In the Update Credentials dialog box, select the security level that you want to update:
• NoAuthNoPriv
• AuthNoPriv
• AuthPriv
4 Modify a security level. Click Update.
63
MN002730A01-AD
Chapter 2: SA Configuration
NOTICE: No passphrase fields are needed with the NoAuthNoPriv security level. Fill the
Authentication Passphrase fields for the AuthNoPriv security level. Fill both the
Authentication Passphrase and the Privacy Passphrase fields for the AuthPriv
security level.
2.3.1.2
Updating Global SNMPv3 Inform Credentials
Update global SNMPv3 credentials for inbound communication by modifying the MotoInformA or
MotoInformB user credentials.
Procedure:
1 Log on to SA as admin, security admin or any user who can change credentials.
2 From the main menu, select Tools → Configure Global SNMPv3 Credentials.
The Configure Global SNMPv3 Credentials window appears, displaying the default
credentials.
2.3.1.3
Updating the Network Element SNMPv3 Credentials
You update the network element SNMPv3 credentials for outbound communication by changing the
MotoMaster credentials for a specific network element. Credentials that you can update for the
MotoMaster user are the following security levels:
NoAuthNoPriv
A security level with no authentication and privacy passphrases defined.
AuthNoPriv
A security level with an authentication passphrase defined but with no privacy passphrase.
AuthPriv
A security level with authentication and privacy passphrases defined.
Procedure:
1 In the Navigation View panel, highlight the Network Database node.
2 In the Network Database window, right-click a network element and select Update SNMPv3
Credentials.
3 In the Update SNMPv3 Credentials dialog box, select MotoMaster. Click Update Credentials.
The Update Credentials dialogue box appears.
4 In the Update Credentials dialog box, select the security level that you want to update.
5 Modify a security level. Click Update.
• For the NoAuthNoPriv security level, make no passphrase updates.
• For the AuthNoPriv security level, update the Authentication Passphrase pane.
64
MN002730A01-AD
Chapter 2: SA Configuration
• For the AuthPriv security level, update the Authentication Passphrase and Privacy
Passphrase panes.
2.3.1.4
Testing any Device SNMPv3 Configuration
Testing the SNMPv3 configuration of devices involves communication with the MotoMaster user only.
Other SNMPv3 users do not participate in this configuration test.
Procedure:
1 From the main menu, select Tools → Test Any Device SNMPv3 Configuration.
The Test Any Device SNMPv3 Configuration dialog box appears.
2 In the IP Address or Hostname field, enter the IP address of the device you want to test. Click
Start.
The status of the request appears in the status bar.
2.3.1.5
Testing SNMPv3 Communication Between Network Elements and SA
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database view, right-click a managed resource, and select Test SNMPv3
Configuration.
3 In the Test SNMPv3 Configuration dialog box, click Start.
The IP Address and Hostname field is populated automatically.
The status of the request appears in the status bar.
2.3.2
Web Service Credentials Configuration
SA supports communication with Web Service over Simple Object Access Protocol (SOAP). SA is
configured with default Web Service credentials.
Web Service credentials are used for outbound communication to the devices. Neither the SA server
nor the SA client exposes any Web Service, so no configuration for inbound traffic is necessary. By
default, SA restricts configuration of Web Service credentials to the members of the SuperUser and
SecurityAdmin groups.
By using Web Service, the following network elements can be managed through CMSS (using VMware
vSphere Web Services)
Configuring Web Service credentials can be classified into three types:
• Global Web Service credentials configuration
• Network element-specific Web Service credentials configuration
• Web Service credentials for a discovery session
NOTICE: Web Service is also used to communicate to the CMSS server for fault management.
65
MN002730A01-AD
Chapter 2: SA Configuration
2.3.2.1
Changing Global Web Service Credentials for the MotoMaster User
You can change the Web Service credentials for outbound communication, by updating the
MotoMaster user credentials.
Procedure:
1 From the main menu, select Tools → Configure Global Web Service Credentials.
2 In the Configure Global Web Service Credentials dialog box, modify the authentication
passphrase. Click Update.
2.3.2.2
Updating Network Element Web Service Credentials
You can configure the credentials of network element-specific Web Service after the successful
discovery of a network element or device.
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, right-click a network element and click Update Web Service
Credentials.
3 In the Update Web Service Credentials dialog box, modify the password. Click Update.
2.3.2.3
Testing any Device Web Service Configuration
Procedure:
1 From the main menu, select Tools → Test Any Device Web Service Configuration.
The Test Any Device Web Service Configuration dialog box appears.
2 In the IP Address or Hostname field, enter the IP address of the device you want to test. Click
Start.
The status of the request appears in the status bar.
2.3.2.4
Testing the Web Service Communication Between Network Elements and
SA
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database view, right-click a managed resource, and select Test Web Service
Configuration.
3 In the Test Web Service Configuration dialog box, click Start.
The IP Address and Hostname fields are populated automatically. The status of the request
appears in the status bar.
66
MN002730A01-AD
Chapter 2: SA Configuration
2.3.3
Configuring North Bound Interface
System Advisor (SA) supports North Bound Interface (NBI) for sending up notifications to the
registered Manager of Managers (MoM). Currently, there are two interfaces that are supported. NBI
uses SNMPv3 and the User-Based Security Model (USM) to provide secure communication between
SA and Network Management System (NMS). The customer NBI MoM interface is a licensed SA
service that is available only for users with a feature license for the NBI service. The SA supports
configuration of two NBIs.
Procedure:
1 From the main menu, select Tools → Configure North Bound Interface.
2 In the NBI Configuration dialog box, click Register NMS.
3 In the Register NMS dialog box, perform the following actions:
a In the NMS IP Address field, enter the IP address of the NMS to which you want to send the
events.
b In the Port Number field, enter the port number of the NMS to which you want to send the
events.
c From the Operational state list, select Enabled.
NMS can receive events.
d Optional: Verify the NMS IP address by clicking Send test trap.
e Click Register.
2.4
Discovery Job Credentials Configuration
With permissions to configure the MotoMaster credentials and to perform a discovery, you can
configure and disable credentials for a single discovery job.
You can configure Web Service and SNMPv3 discovery job credentials for a discovery job.
2.4.1
Configuring Discovery Job Credentials
When you initiate a discovery job with custom credentials set, the credentials are used to discover new
devices and rediscover existing devices. Existing credentials for discovered devices are overwritten
and rediscovery is performed.
If this rediscovery fails due to a credentials mismatch, additional rediscovery with the proper
credentials set may be needed.
When you start a discovery job with custom credentials, settings in the Update Credentials window
are not set back to their default values as long as the Discovery Configuration window remains open.
This allows you to start multiple discovery jobs with the same customized credentials set.
Procedure:
1 From the main menu, select Tools → Discovery.
2 In the Discovery Configuration window, click Credentials.
3 In the Update Credentials window, perform one of the following actions:
67
MN002730A01-AD
Chapter 2: SA Configuration
If… Then…
If you want to dis- perform the following actions:
cover an SNMPv3 a In the SNMPv3 tab, select the Use the following credentials
device, check box.
b From the Security Level list, select a SNMPv3 security level.
c Enter the respective passphrases. Click OK.
If the Use the following credentials check box is selected for either SNMPv3 or Web Service, in the
header of the Discovery Configuration window, a message appears informing you that the
customized credentials apply to devices discovered in earlier and recent discoveries.
2.4.2
Disabling Discovery Job Credentials
After you configure discovery job credentials, you can restore their default values.
Prerequisites: Configure discovery job credentials.
Procedure:
1 From the main menu, select Tools → Discovery..
2 In the Discovery Configuration window, click Credentials.
3 In the Update Credentials window, perform one of the following actions:
• To disable discovery credentials of an SNMPv3 device, in the SNMPv3 tab, clear the Use
the following credentials check box. Click OK.
• To disable discovery credentials of a Web Service device, in the Web Service tab, clear the
Use the following credentials. Click OK.
4 In the Discovery Configuration window, click Close.
Discovery job credentials are restored to their default values.
68
MN002730A01-AD
SA Operation
Chapter 3
SA Operation
Operation procedures help you work with SA.
3.1
Starting the SA Client
You can access the System Advisor (SA) through a web browser by establishing a connection with the
SA server and launching the SA client.
Prerequisites: System Advisor (SA) requires the latest version of Oracle Java 8 32-bit (at least
1.8.0_66). SA can be launched using Microsoft Internet Explorer (IE 11 or higher), the latest version of
Google Chrome or Mozilla Firefox web browser.
Procedure:
1 Launch the web browser, then enter: https://<IP_OF_SA_SERVER>:9090
The launch page displays a list of the available System Advisor instances and indicates their
activity states. The local instance determined by the IP address that you entered in the web
browser appears on top.
Figure 19: Launch Page
2 Click the Launch Client button for the System Advisor that you want to launch.
• If the Security Warning dialog box appears, select the I accept the risk and want to run
this application check box. Click Run.
• If you are requested to accept the SSL certificate, accept it.
The SA client console appears. A splash screen with a status bar is shown and the SA client user
interface appears.
69
MN002730A01-AD
Chapter 3: SA Operation
3.2
Work Area Overview
Follow procedures in this section to navigate through the SA application and to perform basic SA
operations.
3.2.1
Work Area Operations
This section provides information on basic SA operations.
3.2.1.1
Navigating Through Active Windows
When many windows are open in the display panel, you can easily navigate to the next or the previous
active screen.
Procedure:
Navigate to a window:
• To go back to the previous window, from the File menu, select Back.
• To go to the next window, from the File menu, select Forward.
The window appears.
3.2.1.2
Detaching a Window from the Client
You can detach a window from the display panel of the SA client and view it as a separate window.
Procedure:
In the Window menu, select Detach Current Window.
You restore the window to its default position by closing the detached window.
3.2.1.3
Arranging Windows
Procedure:
Arrange windows horizontally, vertically, or as a cascade of windows:
• To tile all open windows horizontally, from the Window menu, select Tile Windows
Horizontally.
• To tile all open windows vertically, from the Window menu, select Tile Windows Vertically.
• To display a cascade of all open windows, from the Window menu, select Cascade.
Windows are arranged according to your requirements.
3.2.2
Work Area Components
Title Bar
The title bar displays the user logged on and shows the activity state of this System Advisor (SA)
instance.
70
MN002730A01-AD
Chapter 3: SA Operation
Menu Bar
A rectangular component that is positioned at the top edge of the display area. By clicking the menu
and selecting a particular menu item, the associated function can be performed.
The menu bar differs from screen to screen, based on the functions and on your privileges as a
user. For instance, the Fault Management module has additional menu items, such as Actions and
Custom Views. However, certain menu items, such as File, Edit, Tools, Window, and Help are
common for the entire SA client.
Toolbar
A component that displays a collection of actions, commands, or control functions; useful to display
the frequently used components. It is placed below the menu bar and consists of various tools for
different nodes. A tool tip is provided for each tool, which indicates the operations performed by
them.
To hide the toolbar, perform one of the following steps:
• Click the icon with the tool tip Hide Toolbar.
• From the Window menu, select Show Toolbar.
The toolbar differs from screen to screen, based on the functions of the module. For example, the
Fault Management node provides such toolbar options as Add Custom View or Modify Custom
View. Toolbar options, such as Go Back to Previous, Go Forward to Next, and Help, are
common for the entire SA client.
Navigation View (Navigation Tree)
The tree present on the left-hand side of the SA client displays a set of hierarchical data. The
fundamental object in a tree is called a node, which represents a data item in a given hierarchical
set. The root node is the top node of the hierarchical data. Nodes inside the root nodes are called
child nodes. Nodes that contain no child nodes are called leaf nodes. When you select a particular
node, the corresponding window is displayed on the right-hand side display panel. However for Grid
View under Call Monitoring, there is also an option to open more Grid Views in a Web browser. In
the case of Raw View, clicking the Raw View node always opens the Raw View in a browser.
Alarm Summary View
An overall summary of the alarms that can be viewed. It is based on severity. The Alarm Summary
View panel is located below the Navigation View panel. When you click the count displayed in the
Alarm Summary View panel, the alarms of specific severity are displayed in the corresponding
Alarm panel. This panel is updated automatically. The counts can be seen all the time, regardless
of the functional view.
Status Bar
The status bar is displayed at the bottom of the window. It indicates the status of ongoing
processes.
Display Panel
The display panel is displayed on the right-hand side of the SA client and appears as a window
within the main window. This panel is shown when a tree node is selected. For example, if you
select Fault Management → Network Events in the navigation tree, the Events display panel is
displayed on the right-hand side.
3.2.3
Broadcasting Messages
Procedure:
1 From the main menu, select Tools → Broadcast Message.
2 In the Message field, enter the message you want to broadcast. Click Broadcast.
71
MN002730A01-AD
Chapter 3: SA Operation
3.2.4
Table View Operations
The Table view panel displays details of various application elements, for example alarms and events.
Table view is available on the right-hand side of the SA client for elements in the Fault Management,
Network Database, and Configured Collections nodes.
3.2.4.1
Table Navigation
The table views are available only in the Fault Management, Network Database, and Configured
Collections nodes.
The navigator buttons, First Page, Previous Page, Next Page, and Last Page are located at the top
of each table.
First Page
The first page of the window that displays the data retrieved from the database.
Previous Page
The previously viewed page of the window that displays the data retrieved from the database.
Next Page
The next page of the window frame that displays the data retrieved from the database.
Last Page
The last page of the window that displays the data retrieved from the database.
3.2.4.2
Setting the Page Length
For Navigation View panel elements that belong to the Fault Management and Network Database
nodes, you can set the number of table rows that are displayed. This option is available to all users and
helps you adjust the views to your needs.
Procedure:
In the Page Length drop-down menu, select the number of rows you want to display.
The table displays the desired number of rows.
3.2.4.3
Sorting Table Details
All users can sort the data in a table based on the column type. The details can be viewed either in
ascending or descending order. Arrows indicate the type of sorting order (ascending or descending).
There are two types of sorting:
Server-side sorting
Sorts all data in the SA server and is not restricted to the data available in the SA client.
72
MN002730A01-AD
Chapter 3: SA Operation
Client-side sorting
Sorts data displayed only in the SA client. For example, if there are 50 alarms in the SA server and
only 25 are displayed on the SA client, the table sorts only the 25.
Procedure:
1 Sort your table details.
• To sort the data, click the column header.
• To sort the data in reverse order, click the same header once again.
NOTICE: When you sort the column header on the client side, hold CTRL.
3.2.4.4
Rearranging and Resizing Table Columns
You can modify table columns according to your preferences. After you modify table columns, your
settings remain unchanged until the SA client is open. When you reopen the SA client, your settings
are lost.
Procedure:
• Rearrange the columns by dragging the column header and moving it to the desired place in the
table.
• Resize the column header by dragging the right edge of a column.
• Optional: Retain the same size of columns, by selecting Custom Views → Save Custom View
State.
IMPORTANT: When you save a custom view, only the column size is saved and the
rearrangement is lost. The custom view is displayed in the default order.
3.2.5
Custom View Operations
In SA, custom views are tailored views that you can create to display a subset of data that satisfies
specific criteria.
You can use custom views, for example, to monitor a specific group of managed resources; instead of
performing search on the resources multiple times, you can define a custom view for them.
You can create custom views in the Network Events, Alarms, Network Database, and Configured
Collection windows. You can create custom views only if your account is privileged to do so. For
information about your user privileges, contact your system administrator.
You can open up to six Network Events custom view windows. When you open another Network
Events custom view window, the Network Events custom view window opened as the first one
closes.
When creating or renaming custom views, note that only alphanumeric characters, spaces and
underscores are allowed.
73
MN002730A01-AD
Chapter 3: SA Operation
3.2.5.1
Adding Custom Views
You can add or create a view by specifying various criteria and providing a name for the view. The
views you create allow you, for example, to quickly monitor only the devices you need.
Procedure:
1 In the Navigation View panel, click one of the following nodes:
• Network Events
• Alarms
• Network Database
• Configured Collection
2 From the main menu, select Custom Views → Add Custom View.
3 In the Show objects with these Properties dialog box, specify the object properties you want
to use to filter the data.
IMPORTANT: Custom view names, that you can modify in the Filter View Name field,
are not case-sensitive. On the same custom view tree level, you cannot add two custom
view names whose names differ only by the size of letters. You can add such custom
view names on different custom view tree levels.
4 Optional: Specify the columns you want to view:
a In the Show objects with these Properties dialog box, click Select Props To View.
The Select Table Columns dialog box appears. The selected fields are the columns that you
see in your table view.
b In the Select Table Columns dialog box, specify the columns you want to view by selecting
or clearing check boxes next the column names. Click OK.
You can also define new columns by clicking Additional table columns.
5 In the Show objects with these Properties dialog box, click Apply Filter.
NOTICE: Within this master view, you can create more views, such as child views M1
and M2. Deleting the master view deletes its child views M1 and M2.
A new node with the custom name you have configured is created on the tree. When you click it, your
custom view is displayed on the display panel.
3.2.5.2
Modifying Custom Views
You can modify a custom view to expand or limit the amount of information it displays. Follow this
procedure to modify custom view properties, not custom view names.
Procedure:
1 In the Navigation View panel, right-click a user-defined custom view under one of the following
nodes:
• Network Events
• Alarms
• Network Database
• Configured Collection
74
MN002730A01-AD
Chapter 3: SA Operation
3 In the Show object with these Properties dialog box, modify the match criteria you want to use
to filter the data.
4 When you have modified the match criteria, click Apply Filter.
3.2.5.3
Renaming Custom Views
You can rename custom views to make them more meaningful.
NOTICE: Custom view names are not case-sensitive. You cannot add two custom view names
whose names differ only by the size of letters on the same custom view tree level. You can add
such custom view names on different custom view tree levels.
Procedure:
1 In the Navigation View panel, click a user-defined custom view under one of the following
nodes:
• Network Events
• Alarms
• Network Database
• Configured Collection
2 From the main menu, select Custom Views → Rename Custom View.
The custom view name is editable. To quit the custom view name edit field, press ESC.
3.2.5.4
Moving Custom Views
Procedure:
1 In the Navigation View panel, expand the Network Events node and click the custom view
node that you want to move.
75
MN002730A01-AD
Chapter 3: SA Operation
2 Move the node by using one of the action icons available on the toolbar:
• Move the custom view to the first position by using the Move to the Top icon .
• Move the custom view down by using the Move Down icon .
• Move the custom view to the last position by using the Move to the Bottom icon .
3.2.5.5
Saving Custom Views
You can configure filter criteria during the configuration of custom views by using the properties. If the
property is not available in the filter configuration user interface, use the mechanism provided to add
more properties to the filter criterion. The name used for the additional property should match,
including case-sensitivity, the name specified in the Property name for filtering column of the table in
Managed Resource Properties.
Procedure:
1 In the custom view, from the Custom Views menu, select Save Custom View State.
2 In the main navigation tree, right-click a custom view under the Network Events, Alarms or
Network Database node and select Custom Views → Save Custom View State.
A message appears in the status bar informing that the custom view has been saved.
76
MN002730A01-AD
Chapter 3: SA Operation
3.2.5.6
Deleting Custom Views
You can delete single custom views or parent custom views in which other custom views are nested.
When you delete a parent custom view, you also delete all the child custom views that are nested in it.
For example, you create a custom view named Master (parent) and nest in it more custom views
named M1 and M2. When you delete the Master custom view, you also delete the M1 and M2 child
custom views.
Procedure:
1 Open the custom view you want to delete.
2 In the Custom Views menu, select Remove Custom View.
A confirmation dialog box appears.
3.2.5.7
Exporting Custom Views
You can export your custom views to a .cv file and import them to another client application. Custom
views are structured hierarchically and displayed in the form of a tree. The structure of your exported
custom views depends on which custom views you select.
Procedure:
1 In the Navigation View panel, select one of the following nodes:
• Network Events
• Alarms
• Configured Collection
• Network Database
2 From the main menu, select Custom Views → Export Custom View.
3 In the Export Custom Views dialog box, select check boxes corresponding to custom views
that you want to export. Click OK.
4 In the Save Custom View(s) File dialog box, select a destination folder. Click Save.
A .cv file with custom views is saved in the selected folder. You can use the file to import the custom
views.
3.2.5.8
Importing Custom Views
You can import your custom views from a .cv file. Custom views are structured hierarchically and
displayed in the form of a tree. You can import single custom views or the whole structure of your
exported custom views.
Procedure:
1 In the Navigation View panel, select one of the following nodes:
• Network Events
• Alarms
• Network Database
77
MN002730A01-AD
Chapter 3: SA Operation
• Configured Collection
2 From the main menu, select Custom Views → Import Custom View.
3 In the Open Custom Views File dialog box, select a .cv file with custom views you want to
import. Click Open.
4 In the Import Custom Views dialog box, select check boxes corresponding to custom views
that you want to import. Click OK.
CAUTION: If a custom view of the same name as any of the ones you import exists in
the same hierarchy, name conflict information is displayed in the dialog box in red. If you
continue to import this custom view, the custom view on the client is overwritten.
Selected custom views from the .cv file are imported.
3.2.6
Filtering Quick Reference
Most of the properties listed while adding a custom view are string-based. Some of the properties can
be displayed with a drop-down list. A single value can be selected from the drop-down list. Multiple
values can be typed in by using the operators and expressions available for filtering. When you choose
all, the property is not included.
String-based property values are case-sensitive. For example, the string Router matches the exact
word with capital R only.
Expressions like Status or Severity are also treated as strings. Hence, for a filter of Alarms with critical
severity, specify crit*.
Leave unnecessary fields blank.
Depending on the total number of objects/elements, the complexity of the filter criteria, and the mode of
storage, the time taken for filtering varies. Custom views continue to be updated and navigable for
additions/deletions until the SA client is closed. You can either save your views or remove them.
3.2.6.1
Wildcard Characters for Filtering
You can use wildcard characters to define filtering expressions. Except for <between>“value1”
and “value2”, the expressions that you create by using wildcard characters should include no
spaces between the value and the wildcard characters or operators. For example, the expression abc*
&& *xyz is invalid. A valid definition for this expression is abc*&&*xyz.
* (Asterisk)
It is used to match zero or more characters. The character works only for text strings. Example:
• To view all objects whose names start with test, enter: test*
• To view all objects that end with com, enter:*com
! (Exclamation Mark)
It is used for filtering the search using the NOT operand. The character works only for text strings.
Example:
• To view all objects whose names do not start with test, enter: !test*
• To view all alarms except the ones with the warning severity, enter: !war* (or) !warning
, (comma)
It is used for specifying multiple criteria for the same property. It is the equivalent of the OR
operand. The character works only for text strings. Example: To view objects named nms-server1,
nms-server2, or nms-server3, enter: nms-server1,nms-server2,nms-server3
78
MN002730A01-AD
Chapter 3: SA Operation
3.2.6.2
Examples of Filtering with Wildcard Characters
Field Value
identifier isr_site_fault:51.6,isr_site_fault:51.11
source *:Rptr_Site&&!*X.X.X:Rptr_Site
For exact values for <X>, see your System Configuration Plan.
Field Value
identifier Transient*receiver_fault.1
entity name Channel 5,Channel 21
source *X.X.X:*Site
For exact values for <X>, see your System Configuration Plan.
Field Value
source X.X.X.*BaseRadio,X.X.X.*BaseRadio&&!X.X.X.X:*&&!
X.X.X.X:*,X.X.X.*BaseRadio
For exact values for <X>, see your System Configuration Plan.
3.3
Active Users Operations
Administrators can view the list of current active SA clients.
SA responds to the request by displaying the list of current active users who are logged on in the SA
client web interface. You access the system administration panel by selecting Administration →
System Administration from the main menu
79
MN002730A01-AD
Chapter 3: SA Operation
3.3.1
Viewing the Active SA Clients List
Procedure:
1 From the main menu, select Administration → System Administration.
2 In the Monitor/Management pane, click JVM Management.
3 In the SA JVM Management window, select the Client Details tab.
Figure 22: Client Details – SA Client Web Interface
3.4
Site Operations
The site and its associated devices can be discovered using the Site/Network discovery tab in the
Discovery Configuration user interface.
The Site ID, Agent Port and Netmask are used to determine the list of devices for which discovery is
attempted. Set up the SNMPv3 configuration to match the configuration of the devices at the Site.
80
MN002730A01-AD
Chapter 3: SA Operation
3.4.1
Deleting Sites
This procedure explains how to remove the site devices and service resources associated with a site
subnet being deleted.
Procedure:
1 In the Network Database window, right-click the Site group managed resource and select
Delete Object and Traces.
2 In the confirmation dialog box, click Yes.
If a site that is still present and active in the system is being deleted, System Advisor (SA) will
discover devices from this site again after some time.
3 In the Deletion Status dialog box, click View Job Status.
A separate job is initiated for each deletion request. The status of the request appears in the
Job Status View window.
4 In the Job Status View window, verify the deletion status.
Figure 23: Job Status View Window
NOTICE: If you delete a single network, the network name appears in the Target column
in the Job Status View window. If you delete multiple networks, Multiple nodes message
appears in the Target column.
If the job status is Success or Completed the device/node and the alarms associated with it are also
deleted. Events are not deleted, because events are part of the history and they are deleted only when
the database is reinitialized.
3.4.2
Deletion Status
Deletion job status is displayed in the Job Status View window.
In progress
The job submission recognized and is in the queue. To determine, whether the job has started
executing and to get information about the progress, view the job log.
Success
The deletion job completed successfully. All devices/nodes scheduled for deletion have been
deleted. The Additional Comments field and detailed information is available in the job log.
Completed
The deletion job completed, but not all devices/nodes scheduled for deletion have been deleted;
during the deletion process, devices/nodes were not present in the database. Detailed information
is available in the job log.
81
MN002730A01-AD
Chapter 3: SA Operation
Failure
The deletion job failed. The job terminated incorrectly, because a deletion failed for one or more
devices/nodes. Detailed information is available in the job log.
3.5
Administration Tools
This section captures information about the Policies and the View Job Status features of SA.
Policies
A set of rules predefined against an activity; for example, a policy can be written for archiving
events and viewing job status.
Viewing job status
The Job Status View provides user feedback and status of jobs initiated.
3.5.1
Policies Overview
Policies are a set of predefined rules.
Policies can be triggered as:
• Non-periodic action (policy can be scheduled for specified date and time)
• Periodic action (server application performs an action at regular intervals, defined in seconds)
SA defines and supports ten predefined policies. All predefined policies are described by custom
parameters
3.5.1.1
Policies Description
82
MN002730A01-AD
Chapter 3: SA Operation
Cleared Alarm cleanup A pre-defined policy to periodical- Clear Alarm Cleanup Delay
(AlarmCleanupPolicy) ly clean up alarms with the clear The time (in seconds) counted
severity. The cleaned alarms are from the last modification of
no longer displayed in the alarm time. As a result of the
Alarms window. modification, alarms with the
clear severity are listed in the
Alarms window. After the set
time passes, the alarms are re-
moved from the Alarms window
during the next policy execution.
The default time value is one
hour, that is 3600 seconds. The
minimum time value is 15 mi-
nutes, that is 900 seconds. The
maximum time value is 24
hours, that is 86400 seconds.
Period
The time (in seconds) in which
the policy is executed. Period is
always 15 minutes and it starts
when the fault manager server is
enabled.
Example 1: The fault manager
server is enabled at 8.12 a.m.; the
policy execution starts. The clear
alarm cleanup delay is set to one
hour. An alarm is set to the clear
severity at 8.28 a.m. Because peri-
od is set to 15 minutes, policy is
run six times to remove all cleared
alarms. Time of the policy execu-
tion: 8.27, 8.42, 8.57, 9.12, 9.27,
9.42.
At 9.42 a.m. the alarm set to the
clear severity at 8.28 is removed
from the Alarms window.
Example 2: For the same condi-
tions as in example 1, except with
the clear alarm cleanup delay set
to 15 minutes, the alarm set to
clear severity at 8.28 a.m. is re-
moved from the Alarms window at
8.57 a.m.
83
MN002730A01-AD
Chapter 3: SA Operation
84
MN002730A01-AD
Chapter 3: SA Operation
3.5.1.2
Viewing Policy Details
IMPORTANT: Any user changes made in the predefined policy parameters shipped with SA
can seriously damage the SA application.
NOTICE: Do not delete any policies. Time intervals to trigger the predefined policies are
maintained on SA. You can update/execute the policies. Use the Policy user interface to set a
different trigger time. Unless necessary, do not change the trigger time.
Procedure:
1 In the Navigation View panel, click the Policies node.
The Policies window appears.
Figure 24: Policy Details Window
85
MN002730A01-AD
Chapter 3: SA Operation
• Stop
3 Optional: Right-click a policy to perform the following actions:
• Update
• Delete
• Execute
• Stop
In the Policy Item Details dialog box, the policy details appear
3.5.1.3
Default Policy Parameters
Name
The policy display name.
Group Name
The policy group name.
Period
Period for policy execution in seconds
Severity
Switch to enable or disable policy.
3.5.2
Viewing Job Status
You can view the statuses of the jobs initiated by the operator. All jobs listed in the Job Status View
are user-initiated. However, not all user-initiated jobs are maintained in the Job View. Jobs that are
maintained in the Job View are jobs that do not have immediate user feedback. They take longer time
to provide user feedback on the job disposition.
Procedure:
1 In the Navigation View panel, click the Job Status View node.
2 In the Job Status View window, perform the following actions:
If… Then…
If you want to access job logs, select a row and click View Log.
If you want to display job status de- double-click a row.
tails fields, The Job Status Details dialog box appears.
If you want to abort an unfinished dis- select a row and click Abort Job. For more in-
covery job, formation, see .
86
MN002730A01-AD
Chapter 3: SA Operation
3.6
System View
Accessing the System View is the fastest way to determine the status of a Capacity Max System.
Figure 25: System View
Managed Resources
The System View gives an overall view of all managed devices and their status. The following devices
report alarms directly to the System Advisor (SA) and are visible in the System View:
• System Advisors
• Capacity Max System Servers (CMSS)
• Capacity Max Bridge
• Repeaters
• Routers
• Switches
The following devices do not report the fault status to the System Advisor, but some presence and
configuration information is available:
• MNIS Data Gateways
• MNIS Voice and Radio Command (VRC) Gateways
87
MN002730A01-AD
Chapter 3: SA Operation
• Replicators
• Trunk Controllers
Other types of devices can be discovered manually, but their level of management depends on how
they are recognized by the System Advisor and what management protocols they support.
Tooltip Window
Clicking a node that represents a managed resource shows the tooltip window with details about the
resource, such as the Internet Protocol (IP) address, type, severity status, and device status. The
tooltip window also allows performing basic operations on the resource, such as renaming,
synchronizing, acknowledging alarms, and navigating to different views to analyze the managed
resource in a more detailed way.
Groups
The managed resources are grouped based on their logical location (for example, site) and type (for
example, repeaters) and shown in a hierarchy.
For easy navigation, sites are arranged in groups. Each group contains sites with IDs that belong to a
range of 30 IDs. For example, a site with ID 25 is assigned to the Sites 1 - 30 group, and a site with ID
35 is assigned to the Sites 31 - 60 group, no matter how many sites there are in the system.
You can move a site to a different group by right-clicking the site object and selecting Rename Site
Group Name from the tooltip window. Sites with the same group name are grouped together.
All group sections can be collapsed or expanded, thus allowing customization of the view to your
preference.
Alarms Severity
The severity of alarms and events reported for managed resources navigates from the bottom to the
top. The severity of the children node determines the severity of the parent node. This rule applies to
all nodes in the hierarchy tree. If a site is in a failure state, you can navigate to the failing resource.
See Severity Definitions on page 32.
Activity
Icons indicate the activity states of managed devices. stands for active/enabled, stands for
inactive/disabled. When the activity state of a device changes, System Advisor reports an event.
Repeaters
Besides common information available for all nodes, repeater nodes show additional indicators:
Main Repeater Channel Role
Control
Dedicated - Repeater hosting a dedicated Control Channel.
Shared - Repeater hosting Control Channel that can be switched to Trunking when needed.
88
MN002730A01-AD
Chapter 3: SA Operation
Trunking
Repeater hosting Trunk Channels.
Data
Repeater hosting Data Revert Channels.
Redundancy Group
If at least one repeater in the redundant group is active and functional, you can detect the repeater
through the visual representation of redundant repeaters.
Gateways
Information about gateways includes a list of connected clients, identified by the client IP, port, and
client type: Voice or Data.
3.7
Call Monitoring Operations
Call monitoring in the System Advisor (SA) provides a view of real-time call and traffic activities within
each site.
In SA, there are two views which can be used to track calls and traffic in the system, the Grid View and
Raw View.
3.7.1
Call Monitoring – Grid View
The Grid View contains lists of sites in the system with counters of active and queued calls on each
site and also the status of each activity.
Sites are displayed in groups. By default, each group contains sites with IDs that belong to a given
range of 30 IDs. For example, a site with ID = 25 belongs to the Sites 1 - 30 group, and a site with ID =
35 is assigned to the Sites 31 - 60 group, no matter how many sites there are in the system. You can
view the sites in a group by expanding the group node.
In the System View, you can move a site to a different group by modifying the group name for the site.
Such changes are reflected in the Grid View.
Each site can be clicked, and the detailed view of the site is displayed on the right. In the detailed view,
you can see control, trunk, and data revert repeaters. Each repeater provides two logical channels over
which voice, control, or data information is transmitted.
When there are calls within the system, calls are represented with icons appearing on logical channel.
Different icons represent different types of calls: group, individual, voice, system, or site-wide. Only
successful calls which have channels assigned are represented. Therefore, it is visible at first sight
how much load there is in the system. Channels that are occupied have icons inside them, and free
channels have empty space inside.
You can search a call in the Grid View by using the source or target ID.
89
MN002730A01-AD
Chapter 3: SA Operation
Site Name
This tab displays the name of the available sites.
Active Calls
Shows the number of active calls in each site.
Queued Calls
Shows the number of calls waiting.
Status
Indicates the status of each site.
The data in each tab can be sorted by clicking the tab.
The Grid View can be filtered to view only certain activities in each site. You can choose whether to
display Voice activities, Data activities, Control Channel activities, a combination of three or any one.
90
MN002730A01-AD
Chapter 3: SA Operation
Black
Indicates that there is communication failure.
When you open the Grid View for an inactive instance of System Advisor, the view is grayed out and
data related to calls is unavailable. A message appears in the bottom-right corner with a link to the
System Advisor launch page, which you can use to switch to an active SA. If the inactive SA switches
to active state, the Grid View starts normal operation automatically.
3.7.1.1
Viewing Grid Views
The Grid View allows you to monitor real-time call activities.
In the System Advisor (SA) client, you can only open one Grid View. Additionally, you can open
another Grid View window externally in the default web browser.
By opening the Grid View in the System Advisor client, you can view the context menu which includes
the following options:
• View Associated Alarms
• View Associated Events
• View Associated Managed Resources
When you open the Grid View in the web browser, the context menu is not available.
NOTICE: After a system upgrade, at first launch of the System Advisor client, refresh all Grid
View and Raw View windows opened in the web browser. By refreshing the views, you ensure
that the new software version is loaded.
Procedure:
1 In the Navigation View panel, click Call Monitoring → Grid View.
2 Perform one of the following actions
• To open the Grid View in the System Advisor client, click Grid View.
• To open the Grid View in the default web browser window, click Grid View Webpage.
3.7.1.2
Grid View Icons
The following icons on Grid View represent the control channel, the repeater channel states, and
various call activities taking place in each site.
Icon Description
Emergency call
Emergency alarm
91
MN002730A01-AD
Chapter 3: SA Operation
Call alert
Group call
92
MN002730A01-AD
Chapter 3: SA Operation
Ambient listening
93
MN002730A01-AD
Chapter 3: SA Operation
Control channel
3.7.2
Call Monitoring – Raw View
The Raw View shows raw data (also known as ATIA) which is exactly as it is received from the System
Advisor (SA).
Raw view shows information collected by the SA a few minutes before, depending on the number of
calls and loads in the system. One row in the Raw View corresponds to one piece of information
received from infrastructure: registration, transmission start, session end, or call grant. Raw data is
grouped into calls, so that relevant information can be easily found.
The Raw View contains two components. List of Calls on the left and Detailed Debug View on the right.
Figure 27: Call Monitoring – Raw View
List of calls is used to view calls in three states: ended, active, or queued. In normal system flow, when
a radio requests to make a call, this request appears as queued in calls list. When the Trunking
Controller grants the call, the call changes its state to active. Finally, when the call ends on all involved
devices, it moves to “ended” (historical) state. If the infrastructure rejects the call, it appears as ended
call with appropriate reason. Additionally, there is a column indicating when the call started (for active
or past call) or when it was added to the calls queue (for queued calls). Duration of the call or time of
call waiting in the calls queue is also displayed.
94
MN002730A01-AD
Chapter 3: SA Operation
In Raw View, you can see details of any call by clicking the call. The packet of this call is highlighted in
the detail view and irrelevant packets are hidden. You can search for information by using the given
source ID.
Traffic logs information shown on the Detailed Debug View are stored for at least one month for
debugging purposes. You can access the traffic logs from the Server Logging menu.
Activity States
Colored entries in the Raw View indicate changes of the System Advisor activity state. A red entry
informs you that the SA instance has become inactive. A green entry indicates that the SA instance
switched to an active state.
3.7.2.1
Viewing Raw Views
The Raw View allows you to monitor real-time call activities.
NOTICE: After a system upgrade, at first launch of the System Advisor client, refresh all Grid
View and Raw View windows opened in the web browser. By refreshing the views, you ensure
that the new software version is loaded.
Procedure:
In the Navigation View panel, click Call Monitoring → Raw View Webpage.
3.8
Fault Management Operations
Fault management in SA includes processing and presentation of events sent by a network element.
Failures in the network, network elements, as well as communication links can interrupt routine
activities. When a failure occurs, events and alarms are reported in SA, based on the criticality of the
occurrence.
3.8.1
Displaying Alarm Details from the Network Database Window
Procedure:
1 In the Network View panel, click the Network Database node.
2 In the Network Database window, highlight a row.
3 From the main menu, select View → Alarms.
The Alarms window appears, displaying the alarms associated with the managed resource you
selected.
3.8.2
Displaying Event Details from the Network Database Window
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, highlight a row.
3 From the main menu, select View → Events.
The Network Events window appears, displaying the events associated with the managed resource
you selected.
95
MN002730A01-AD
Chapter 3: SA Operation
3.8.3
Managed Resource Properties
The following table describes various properties of managed resources. The properties are displayed
in the Managed Resource Properties window. The Field Name column captures the name, as shown
in the Managed Resource Properties window. You can also use the table to configure Custom
Views. During the configuration of network database custom views, you can configure filter criteria for
any of the properties. If the name of the property is not available, the custom view user interface
supports defining additional properties. Use the additional property, based on the Property name for
filtering column.
1These properties are either NOT USED or INTERNAL to System Advisor. The use of these properties
as part of filter criteria for the Network Database view is NOT recommended.
96
MN002730A01-AD
Chapter 3: SA Operation
3.9
Network Events Operations
A network event is an occurrence within a defined network. It could be a discovery of an element, a
status update of an element, or an element failure. Events form a repository of information for all the
occurrences within the system.
The Network Events window provides a means of looking at all events, or a filtered subset of events
that the system receives. Consolidated lists of events are displayed in the Network Events window.
The event properties that are displayed include:
• Severity
• Managed Resource
• Message
• Entity
• Date/Time
The following properties are not automatically displayed on the Network Events window by default:
Category
Event Type
NE Timestamp
Event time reported by the device
Reporting Agent
Report agent IP address
3.9.1
Event Properties
The following table describes various properties of an event. The Field Name column captures the
name as shown on the Managed Properties window.
During the configuration of network database custom views, you can configure filter criteria on any of
the properties. If the name of the property is not available, the custom view user interface supports
defining an additional property. Use the additional property, based on the Property Name for Filtering
column.
NOTICE: The property name, when used for filtering, is case-sensitive and should be used
exactly as specified when typing in the name of the additional property criterion to filter on.
In property names, do not use the following characters:
white space
empty space
> < & $ # ^ - " ' ""
a digit at the beginning of the name
* ! @ ( + ~ { [ | \ ; , . ? / % `
97
MN002730A01-AD
Chapter 3: SA Operation
• Information Event
• Attribute Value Change Event
• Equipment Alarm
• Communication Alarm
• Processing Error Alarm
• Object Creation Event
• Object Deletion Event
• Management Event
• Security Violation
Domain Domain of the event. Not used by SA. domain
Network The associated network. Not used by SA. network
Node Name of the corresponding network element for which an node
event is being generated.
Failure Failure object which was responsible for the creation of the entity
Object (al- event. The internal name derived by SA.
so named
as Entity
in Event
Filter UI)
Severity Severity of the event. severity
Date/Time The time at which the event was generated on SA. The time time
displayed on the Date/Time field in the Network Events win-
dow.
Source The Managed Object to which the event corresponds. Gen- source
erally, it is the name of the Managed Object.
Help URL A help URL for more detailed information on causes. Not helpURL
used by SA.
Group- The group to which the event belongs. Not used by SA. groupName
Name
Owner- Not used by SA. ownerName
Name
Identifier An internal attribute that uniquely identifies a particular identifier
event. The northbound manager uses it to determine wheth-
er the event is a duplicate, without relying on the event text.
This identifier is different from the Event ID field. Example:
For a site controller power supply malfunction due to fan fail-
ure, the identifier is csc_ps_fault.7.2 where 7 is the
malfunction state number and 2 is the fan failure cause num-
ber. Similarly, for a site controller power supply malfunction
due to excessive battery temperature the identifier is
csc_ps_fault. 6.4..
Entity- User-friendly name of the Failure Object the event is associ- entityDisplayName
Name ated with.
98
MN002730A01-AD
Chapter 3: SA Operation
3.9.2
Viewing Event Details
All events detected by SA are based on the status of the recognized networks. Event details display
the property name and its value.
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 In the Network Events window, double-click an event to view its details.
The Event Object Details window appears, displaying the details pertaining to the event you selected.
99
MN002730A01-AD
Chapter 3: SA Operation
3.9.3
Exporting Events
Follow this procedure to export events to a .csv (Comma Separated Value) file and save it to the local
client PC.
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 In the Network Events window, highlight an event.
3 From the main menu, select Actions → Export Events.
4 In the Save File window, perform the following actions:
a Select the destination directory.
100
MN002730A01-AD
Chapter 3: SA Operation
3.9.4
Searching Events
The search option is useful when you are looking for a particular event in the list of events. Search
operations are performed in the database and are not restricted only to the events that you see in SA.
Procedure:
1 In the Navigation View panel, select Fault Management → Network Events.
2 From the main menu, select View → Search.
The Search dialog box appears.
Figure 29: Search Dialog Box
101
MN002730A01-AD
Chapter 3: SA Operation
3.10
Alarm Operations
SA receives an alarm when a device does not function properly.
The agent within the device sends notifications about the device to SA. A notification is uncovered as
an event or alarm, based on the information provided. SA displays alarms in a separate window.
Figure 30: Alarms Window
You can see details of a specific alarm by double-clicking an alarm. A window with alarm details
appears.
102
MN002730A01-AD
Chapter 3: SA Operation
3.10.1
Alarm Summary View Operations
From the Alarm Summary View panel, you can display alarm details in different ways.
3.10.1.1
Displaying Alarm Details from the Tabular View Chart
You can view Alarm details in a tabular view chart.
Procedure:
1 In the Alarm Summary View panel, click the Severity and Category – Tabular view .
The alarms, based on severity and category, appear in a tabular view.
103
MN002730A01-AD
Chapter 3: SA Operation
3.10.1.2
Displaying Alarm Details from the Severity Alone Pie Chart
Procedure:
104
MN002730A01-AD
Chapter 3: SA Operation
3.10.1.3
Displaying Alarm Details from the Severity and Category Chart
Procedure:
1 In the Alarm Summary View panel, click Severity and Category - Graphical view .
The alarms, based on severity and category, appear in a graphical view, indicating the number
of alarms for each severity.
105
MN002730A01-AD
Chapter 3: SA Operation
3.10.2
Alarms Window Operations
The Alarms window displays all alarms active in the network.
3.10.2.1
Viewing Alarm Details
Alarm details provide information about each of the alarm properties.
Procedure:
1 In the Navigation View panel, select Fault Management → Alarms
2 In the Alarms window, double-click an alarm row.
The Alarm details for <source> window appears, listing alarm properties.
3 Optional: Update the alarm details instantly by clicking Refresh in the Alarm details for
<source> window.
106
MN002730A01-AD
Chapter 3: SA Operation
3.10.2.2
Searching Alarms
The procedure for searching alarms is the same as the procedure for searching events.
3.10.2.3
Viewing Related Events
Procedure:
1 In the Navigation View panel, select Fault Management → Alarms
2 In the Alarms window, right-click an alarm row and select Events.
The Network Events window appears with the events related only to the selected alarm.
3.10.2.4
Viewing Alarm History and Annotations
The alarm history gives the complete information on alarm status, such as added and updated alarms.
For example, when a critical alarm is generated, in the Alarms window, an alarm status appears.
When the problem is fixed, the alarm severity changes from critical to clear. When viewing alarm
history, you can also see alarm annotations.
Procedure:
1 In the Navigation View panel, select Fault Management → Alarms
2 In the Alarms window, double-click an alarm row.
The Alarm details for <source> window appears, listing alarm properties.
3.10.2.5
Deleting Alarms
When SA displays alarms for resources that are no longer managed by SA, a privileged operator can
delete the alarms from SA. The event history is not deleted with the alarm.
Procedure:
1 In the Navigation View panel, select Fault Management → Alarms.
2 In the Alarms window, delete alarms:
• To delete one alarm, right right-click an alarm and select Delete.
• To delete multiple alarms, select the alarms you want to delete by holding CTRL and clicking
the alarms. Right-click the selection and select Delete.
3 In the confirmation window, confirm the operation by clicking OK.
This option deletes only the alarm. It does not prevent it from re-appearing when a device
reports an alarm of the same type in the form of a notification or due to synchronization with the
device.
The selected alarm or alarms are deleted and disappear from the Alarms window.
107
MN002730A01-AD
Chapter 3: SA Operation
3.10.3
Adding Annotations to Alarms
You can add an annotation to alarms. An annotation is an extra piece of information that tells you how
to deal with an alarm. Annotations can serve other functions as well. They are visible to other users.
Procedure:
1 In the Navigation View panel, select Fault Management → Alarms.
2 In the Alarms window, double-click an alarm row.
The Alarm details for <source> window appears, listing alarm properties.
3 In the Alarm details for <source> window, in the Annotations field, add information about the
alarm. Click Save.
The annotation can be 4,096 characters long or shorter.
Your annotation is added to the alarm. The annotation is visible to other users. After saving an
annotation, you can still modify it.
3.10.4
Launching the Alarms View from the Network Database View
You can view alarms for a selected device by opening the Alarms view from the Network Database
view.
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, select a managed resource and from the main menu, select
View → Alarms.
The Alarms window appears, displaying the alarm (if any) for the device you selected.
3.10.5
Exporting Alarms
Follow this procedure to export alarms to a .csv (Comma Separated Value) file.
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 In the Alarms window, highlight an alarm.
3 From the main menu, select Actions → Export Alarms.
4 In the Save File window, perform the following actions:
a Select a destination directory.
b Enter a file name followed by .csv. Click Save.
NOTICE: To print the alarms, open the saved file on the client and use the Print option in
the application you are using.
The .csv file is saved to the local client PC.
108
MN002730A01-AD
Chapter 3: SA Operation
3.10.6
Displaying Alarms Summary
Procedure:
1 In the Alarm Summary View panel, perform one of the following actions:
If… Then…
If you are using the Severity and Category – Tabular click a severity or a category.
View,
If you are using the Severity and Category – Graphical click a severity.
View or Severity alone,
The Alarms window appears, displaying the filtered alarms.
3.10.7
Alarm Properties
The following table describes various fields of an alarm. The Field Name column captures the name as
shown on the Managed Properties window. During the configuration of alarm custom views, you can
configure filter criteria on any of the properties. If the name of the property is not available, the custom
view user interface supports defining an additional property. Use the additional property, based on the
Property Name for Filtering column.
NOTICE: When used for filtering, property names are case-sensitive and should be used
exactly as specified when typing in the name of the additional property criterion to filter on.
In property names, do not use the following characters:
white space
empty space
> < & $ # ^ - " ' ""
a digit at the beginning of the name
* ! @ ( + ~ { [ | \ ; , . ? / % `
Property Name
Field Name Description
for Filtering
Severity Severity of an alarm. severity
109
MN002730A01-AD
Chapter 3: SA Operation
Property Name
Field Name Description
for Filtering
Previous se- Previous severity of an alarm, that is, the severity of the previousSeverity
verity alarm before it was updated.
Annotations Additional information about an alarm that you can add. Annotations
The length of an annotation cannot exceed 4,096 signs.
Alarm ID The unique ID of an alarm. Since every alarm on System id
Advisor (SA) is generated from a corresponding event,
this ID is the same as the ID of the corresponding event.
Managed Re- User-friendly name of a managed object to which an managedResour-
source event corresponds. It is the user-friendly name for the ceDisplayName
managed object name, defined by the Source attribute of
the event, for example St3 Rptr1.
Reporting IP address of a device (agent) sending an alarm. reportingAgent
Agent
Created The time at which an alarm was created on SA. It is the createTime
time displayed in the Date/Time field in the Alarms win-
dow.
Modified The date and time at which an alarm was last modified. modTime
Reported The date and time at which an alarm was last reported.
Owner/Assign- The name of the owner of the alarm. who
ee
Category Category of an alarm. The value can be one of the fol- category
lowing:
• Equipment Alarm
• Quality of Service Alarm
• Communication Alarm
• Processing Error Alarm
• Security Violation
110
MN002730A01-AD
Chapter 3: SA Operation
Property Name
Field Name Description
for Filtering
cessive battery temperature the identifier is
csc_ps_fault.6.4.
Is unverifiable Indicates if the alarm is able to be verified.
Managed Re- The category in which the managed resource is in.
source Device
Category
Alarm Priority Indicated the priority of the alarm. alertPriority
3.10.8
Audio Notifications for Alarms
Audio notification for an alarm associates an audio file with a severity. When an alarm with that severity
is raised, you can hear the associated audio notification. You can also mute audio notifications,
configure the playback time of the audio file, and set the system to play the whole file.
There are six severity levels that can be associated with an audio file. If it is not necessary to audibly
distinguish severities, you can configure the same audio file for all severities.
3.10.8.1
Assigning Audio Notifications to Alarms
Assigning an audio notification to an alarm associates an audio file with a severity. When an alarm with
that severity is raised, you hear the associated audio notification. You can also mute audio
notifications, configure the playback time of the audio file, and set the system to play the whole file.
There are six severity levels that can be associated with an audio file. If it is not necessary to audibly
distinguish severities, you can configure the same audio file for all severities.
Prerequisites: Ensure that the Alarms window that is open is not filtered to exclude the alarm to which
you want to assign an audio notification.
Procedure:
1 In the Navigation View panel, select Fault Management → Alarms.
2 From the main menu, select Actions → Alarms Notifier.
The Alarm Audio Notification dialog box appears.
111
MN002730A01-AD
Chapter 3: SA Operation
3 In the Alarm Audio Notification dialog box, make sure the Enable Audio Notification check
box is selected.
The options in the Audio File Details field are enabled.
3.10.9
Launching the Alarms View from Custom Alarm Panel
Procedure:
1 In the Navigation View panel, expand the Alarms node.
The Alarms node expands and a list of custom views appears.
2 From the list of custom views, select a previously created custom view.
112
MN002730A01-AD
Chapter 3: SA Operation
3.10.10
Alarms Ownership
You can take on the responsibility of owning an alarm and assigning it to an assignee who takes the
alarm forward.
The alarm ownership operation can be invoked from:
• The Alarm details window
• The main menu Actions → Assign/UnAssign
After an alarm is assigned, the System Advisor (SA) stores the data of the user assigned to an alarm
and a timestamp in audit trails.
Batch Assignments
If you select a list of alarms and invoke the Assign/UnAssign operation, all the selected alarms are
assigned the same owner and assignee.
3.10.10.1
Assigning Ownership to Alarms from the Alarms Details Window
Procedure:
1 In the Navigation View panel, select Fault Management → Alarms.
2 In the Alarms window, double-click an alarm row.
The Alarm details for <source> window appears, listing alarm properties.
3.10.10.2
Assigning or Unassigning Ownership to Alarms from the Main Menu
Procedure:
1 In the Custom Alarm window, highlight an alarm.
2 From the main menu, select Actions → Assign/Unassign.
113
MN002730A01-AD
Chapter 3: SA Operation
3.11
Device Management Operations
SA uses the discovery process to find devices that are managed in a system.
Whenever a managed resource is discovered (or rediscovered) successfully, SA designates the
management state of that resource as MANAGED.
There are two types of managed resources: device managed resources and logical managed
resources. Logical managed resources are non-physical managed resources, for example, a site.
Device managed resources are physical managed resources, for example, a base radio or a site
controller.
Once a device is marked as MANAGED, SA starts periodic supervision and synchronization. SA also
starts displaying events sent by this device. It raises active alarms against a specific entity within this
device whenever any displayed event requires user attention.
If you have administrative privileges, you can unmanage a managed resource in SA. Once a device is
in an unmanaged state, SA:
• Does not supervise the device.
• Does not synchronize the device.
• Does not diagnose the device.
• Does not perform rediscovery.
• Does not allow any user to view any new events or alarms of any entity from this device.
3.11.1
Managing Resources
Device management provides administrators or Motorola Solutions Systems Support Center (SSC)
administrators with the ability to start managing a previously unmanaged device. Managing an
unmanaged device automatically invokes device rediscovery.
There are two types of resources:
• Device Managed Resources (DMR)
• Logical Managed Resources (LMR)
The only two management states of both DMRs and LMRs are MANAGED and UNMANAGED.
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, search for the Device Managed Resource (DMR) you need.
The DMR severity should be Unknown.
3 Right-click the selected DMR and select Manage.
DMR and its Logical Managed Resources (LMRs) become managed. SA starts state synchronization
and traps processing for that device.
3.11.2
Unmanaging Resources
Device unmanagement gives the privileged operator, that is the administrators or Motorola Solutions
Systems Support Center (SSC) administrators, the ability to remove a non-critical device managed
resource from the system.
There are two types of resources:
114
MN002730A01-AD
Chapter 3: SA Operation
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database view, search for the Device Managed Resource (DMR) you need.
Every DMR has a defined IP address.
3 Right-click the selected DMR and click UnManage
DMR and its Logical Managed Resources (LMRs) become unmanaged. Their severity changes to
Unknown. SA stops state synchronization and traps processing for that device.
3.11.3
Deleting Network Elements
An operator accesses System Advisor (SA) to request the deletion of a network element or a logical
managed resource. The user assigned to the SuperUser or Motorola Solutions Systems Support
Center (SSC) group has the rights to permanently remove a managed resource from SA.
Administrators or Motorola Solutions Systems Support Center (SSC) administrators are allowed to
request the deletion of both network element and Logical Managed Resources (LMR).
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database view, right-click a manager resource row and select Delete Object
and Traces.
3 In the confirmation dialog box, click Yes.
4 In the Deletion Status dialog box, click View Job Status.
A separate job is initiated for each deletion request. The status of the request appears in the Job
Status View window.
115
MN002730A01-AD
Chapter 3: SA Operation
NOTICE: If you delete a single network, the network name appears in the Target column
in the Job Status View window. If you delete multiple networks, Multiple nodes message
appears in the Target columns.
If the job status is Success or Completed, the network element or node and the alarms
associated with it are also deleted. Events are not deleted, as events are part of the history and
they are deleted only when the database is reinitialized.
6 If the Warning Discovery in progress dialog box appears, to the view active jobs that are
related to the object being deleted, click Open Job View.
NOTICE: Once a network element is deleted, you cannot restore its alarms.
Postrequisites: If the deleted device is discovered by the system intermediary, the device is created
and managed again. If you do not want to see the status of this device, un-manage the device.
3.11.4
Device Commands
To fault-manage devices and their entities, you can issue commands from SA to a device or a specific
entity of the device.
SA supports, for example, enable, disable, and restart commands. After you issue a command,
command status is displayed on the status bar and SA receives alarms about the device state change.
3.11.4.1
Issuing Commands from the Alarms Window
Procedure:
1 In the Navigation View tree, select the Alarms node.
2 In the Alarms window, select the alarm for which you want to issue a command.
3 In the main menu, select Actions → Issue Command.
4 In the Command dialog box, perform the following actions:
a Select an entity for which you want to issue a command.
b Optional: If a list with entity instances is available, select an entity instance.
c In the Available Commands pane, select a command.
d Click Apply.
When you issue a command for entities that do not support diagnostics, a warning message
appears.
On the multi-line status bar, the system displays one of the following command statuses:
Execution time
Indicates that the command is being processed: Sending command.
Successful command
Indicates that the command status is successful.
Failed command
Indicates that the command status is unsuccessful. A message displays the status as failed and the
reasons of failure.
116
MN002730A01-AD
Chapter 3: SA Operation
3.11.4.2
Issuing Commands from the Network Database Window
Procedure:
1 In the Navigation View tree, select the Network Database node.
2 In the Network Database window, select the alarm for which you want to issue a command.
3 In the main menu, select Managed-Resource → Issue Command.
4 In the Command dialog box, perform the following actions:
a Select an entity for which you want to issue a command.
b Optional: If a list with entity instances is available, select an entity instance.
c In the Available Commands pane, select a command.
d Click Apply.
When you issue a command for entities that do not support diagnostics, a warning message
appears.
On the multi-line status bar, the system displays one of the following command statuses:
Execution time
Indicates that the command is being processed: Sending command.
Successful command
Indicates that the command status is successful.
Failed command
Indicates that the command status is unsuccessful. A message displays the status as failed and the
reasons of failure.
3.12
Synchronization Operations
In a large network, the network administrators would store all the details of the device in a centralized
database.
Hence, whenever a device gets configured, update the latest configuration changes in the database.
This synchronization allows data integrity by keeping the latest device details intact. Periodic
synchronization on a device, initiates the network element to send all previously unacknowledged
state/cause redundant messages. A user-initiated synchronization or synchronization after discovery
initiates the network element to send all current state/cause redundant messages. You can see the
synchronization state of a device under the Others tab in the Managed Resource Properties of the
device.
3.12.1
Synchronizing Managed Resources
Synchronization is the process in which the status of a device is periodically checked. There can be
situations in which you may not want to wait for the minimum period to view the synchronization
results. Therefore, you can initiate a synchronization request for the device with the manager. The
request interrupts the normal synchronization process and checks the status of a particular device.
Procedure:
1 In the Navigation View panel, click the Network Database node.
117
MN002730A01-AD
Chapter 3: SA Operation
3.13
Discovery Operations
Discovery is the process of adding network elements to the Network Database. Discovered network
elements are fault-managed by System Advisor (SA) and generate events and alarms. There are two
ways of discovering network elements.
3.13.1
Discovering Network Elements
Discovering a single network element, that is one network element at a time, is sometimes referred to
as node discovery. Node discovery operations initiated for a single network element have priority over
the subnet discovery option. Thanks to this priority, operators can discover single network elements
before the subnet discovery is completed.
Procedure:
1 From the main menu, select Tools → Discovery.
The Discovery Configuration window appears.
118
MN002730A01-AD
Chapter 3: SA Operation
3.13.2
Aborting Discovery Jobs
Procedure:
1 In the Navigation View panel, expand the Job Status View node.
2 Select a row with the discovery job you want to abort.
If the selected job type is Discovery and its status is In Progress, the abort job option becomes
active.
119
MN002730A01-AD
Chapter 3: SA Operation
3.13.3
Discovery Status
The status of a discovery job is displayed in the Job Status View window. Status messages include:
In progress
The job submission has been recognized and is in the queue. To determine if the job has started
executing and to get information on the progress, view the job log.
Aborting
An authorized user has chosen to abort an unfinished discovery job. Discovery of devices awaiting
in the queue is being aborted. Discovery of devices for which discovery process was initiated
continues without any interruption. Job log contains details about status of each device (represent
by IP address).
Success
The discovery job has completed successfully. One or more devices may still have not been found
due to communication failures. This information is shown in the Additional Information field and
detailed information is available in the job log.
Completed
The discovery job is complete but no devices defined for the discovery were available. Detailed
information is available in the job log.
Failure
The discovery job has failed. The job has terminated abnormally. The job log provides additional
details and it is necessary for the user to re-submit the job at a later time.
Aborted
An authorized user has aborted the discovery job. At least one device discovery was aborted. The
Additional Information field contains detailed information about the number of discovered, failed,
unreachable, and aborted devices.
After the job is complete, select the job and click View Log. Check the discovery logs for details on IP
addresses that were discovered and IP addresses that are not reachable. Confirm that IP addresses
that are not reachable are indeed not configured in the network. Check the network plan or, by
executing an Internet Control Message Protocol (ICMP), ping on the unreachable IP addresses.
When you choose to abort a discovery job, the status is initially set to Aborting.
• If SA aborts the job, status is set to Aborted.
• If SA initiated discovery of some devices in the selected job, the status is set to Failure or Success.
View the log for more details.
Summary information about the number of discovered, failed, unreachable and aborted jobs can be
found in the Additional Comments column.
120
MN002730A01-AD
Chapter 3: SA Operation
3.14
Performance Management Operations
Performance management includes all procedures necessary to monitor and collect information on
devices fault managed by SA.
NOTICE: To avoid loss of functionality, only Motorola Solution Support Center (SSC) personnel
should edit values.
3.14.1
Viewing Configured Collections for a Device
The Configured Collection panel displays the list of statistics configured for a data collection. Based
on the defined statistics, System Advisor (SA) collects the data from a device.
Procedure:
1 From the Navigation View panel, select Performance → Configured Collection.
The Configured Collection window appears on the right-hand side of the panel, showing all the
configured statistics for the selected device. The Hosts column lists all the devices on the
network that are configured for data collection.
2 To view the list of statistics for a host, select the host from the Host column in the left panel.
The statistics for the selected host are displayed in the right-hand column.
3.14.2
Statistic Properties
Name
A unique name (string) to identify the statistic.
ID
A unique number generated automatically and associated with each statistic.
DNS Name
Host name (device name).
OID
A unique identification number of the device interface.
Community
The community used when sending the SNMP request for collecting the statistic.
Period
The interval at which data is collected for the statistic. For example, the value 300 indicates that
data is collected every 300 seconds.
Active
Specifies whether data collection for the selected device is active or not. The possible values are
true or false. If it is false, data collection is not performed for that device.
Multiple
Specifies the type used to poll columnar value of the tables.
User Name
One of the credentials required for querying SNMPv3 devices.
121
MN002730A01-AD
Chapter 3: SA Operation
SNMP
Simple Network Management Protocol (SNMP) version of the device.
Context Name
One of the credentials required for querying SNMPv3 devices.
3.14.3
Data Collection Detailed Properties
Object Details
Description
Field
Name Specifies the name of the statistic.
For example, if the statistic name is specified as interface_in_octets, then
only devices with that statistic are displayed in the custom view.
Specify multiple statistic names as comma-separated values. For example, in-
terface_in_octets, interface_out_octets.
ID Specifies the ID of a statistic.
DNS Name Specifies the host (node).
Example: If the dnsName is specified as test-machine, then all statistics per-
taining to test-machine are displayed.
oid Specifies the object identifier as reported by the SNMP agent.
period Specifies the polling interval.
Example: If the period is specified as 2, then the statistics that have been sched-
uled for data collection every 2 seconds are displayed.
active Specifies whether a data collection for a selected device is active or not. Possi-
ble values are true or false. If the value is false, data collection is not available
for the device.
save Specifies whether data collection for the selected device is saved or not.
SNMP Version Specifies the SNMP agent version, such as v1, v2, v3 data is collected from.
User Name User name of the user.
Context Name Specifies the name for the custom view you are creating or modifying. If no value
is specified in this field, default values such as Configured Collection0,
Configured Collection1, or Configured Collection2 are created.
agent Specifies the agent name.
For example, if the agent name is specified as Node1agent, then only statistics
from the data that is collected from that agent is displayed.
port Specifies the port number from which the agent is listening for data collection re-
quests.
NOTICE: The default SNMP agent port is 161.
Last Counter Value The time at which the data collection was scheduled for in the previous cy-
cle.Specifies a numeric value. Those statistics (counter type OIDs only) whose
last collected value equals the value specified are displayed.
122
MN002730A01-AD
Chapter 3: SA Operation
Object Details
Description
Field
lastTime Value The time at which the data collection was scheduled for in the previous cycle.
timeVal The time at which the data collection is scheduled for in the subsequent cycle.
Is Multiple Polled Specifies the type used to poll the column value of the tables.
Data
True: Displays only those statistics which are of type MultiplePolledData.
False: Displays statistics other than MultiplePolledData.
All: Displays all statistics, irrespective of their type (node, interface, multiple).
threshold Specifies whether to display data, based on the thresholds set.
All: Displays all statistics, with and without thresholds.
True: Displays only those statistics which have thresholds associated.
False: Displays only those statistics which do not have thresholds associated.
Policy Name The default PollingObject name.
Save Absolutes A check box to enable or disable the save function.
Log File Specifies a log filename (string), based on the statistics you want to display.
Parent Object Specifies the name of the managed object whose statistics you view.
Threshold List Specifies the name of the thresholds in comma-separated format.
Current Save Count Specifies the current save count (numeric value).
Failure Count Specifies the failure count as a numeric value.
Example: If the failure count is set as 2, all statistics whose failure count is set as
2 are displayed.
protocol Specifies the name of a protocol.
Example:SNMP, TL1.
Poller Name Specifies the name of a poller.
Save Poll Count Specifies the save poll count (numeric value). All statistics with the specified
save poll count are displayed.
groupName Specifies the group.
Failure Threshold Specifies the save failure threshold value (numeric value). All statistics with the
specified failure threshold value are displayed.
Save On Threshold Possible values are true or false. A true value indicates that the collected da-
ta is saved only when it exceeds the threshold.
NOTICE: The default value is false.
timeAvg Possible values are true or false. Calculated for Counter type OIDs. The col-
lected data is an incremental value. At one point, it reaches the final value and
resets to zero. As this reset happens soon and often, it is preferred that a delta
value is derived from two consecutive polls.
NOTICE: The default value is false.
123
MN002730A01-AD
Chapter 3: SA Operation
3.14.4
Statistics Operations
SA allows you to add, remove, and modify a statistic.
However, you can add a statistic only if you are a member of Motorola Solution Support Center (SSC)
personnel.
IMPORTANT: Do not edit any fields in the Statistic Properties user interface. You can only
perform the following actions:
• Enable or disable collection (the Active field of the Statistics Properties Table)
• Modify the collection interval (the Period field of the Statistics Properties Table)
3.14.4.1
Adding Statistics
Procedure:
1 In the main navigation tree, select Performance → Configured Collection.
The Configured Collection window appears on the right-hand side of the panel, displaying all
configured devices.
b In the Property Name and Value fields, specify the property name and its value respectively.
5 Optional: In the Polled Data Additional Properties dialog box, add a property by clicking More.
6 Optional: In the Polled Data Additional Properties dialog box, remove rows of properties by
clicking Fewer.
7 Optional: In the Polled Data Additional Properties dialog box, remove a property by selecting
the property and clicking Remove.
8 Finish adding a new statistic by clicking OK.
In the Configured Collections panel, the statistic added for the device is displayed.
3.14.4.2
Modifying Statistics
Procedure:
1 From the main navigation tree, select Performance → Configured Collection.
The Configured Collection window appears on the right-hand side of the panel, displaying all
configured devices.
124
MN002730A01-AD
Chapter 3: SA Operation
2 Select the statistic that you want to modify and select Edit → Modify Statistic.
The Object Details dialog box appears.
3.14.4.3
Removing Statistics
If you want to stop the data collection for a statistic temporarily, do not delete the statistic. Instead, you
can disable (uncheck) the Active property of the statistic, temporarily stopping data collection for the
device. You can check the Active property to enable data collection in the future.
Procedure:
1 From the Navigation View panel, select Performance → Configured Collection.
2 In the Configured Collection window, select the statistic that you want to delete.
3 From the main menu, select Edit → Remove Statistic.
4 In the confirmation dialog box, click Yes.
User properties associated with the statistics are deleted.
3.14.5
Enabling Collections
You can enable the data collection for a particular statistic during runtime.
Procedure:
1 From the main navigation tree, select Performance → Configured Collection.
The Configured Collection window appears on the right-hand side of the panel, displaying all
configured devices.
2 In the Hosts column, select the host that you want to enable.
3 Double-click the row a statistic that you want to enable.
The Object Details window appears.
3.14.6
Disabling Collections
You can disable the data collection for a particular statistic during runtime.
Procedure:
1 From the main navigation tree, select Performance → Configured Collection.
The Configured Collection window appears on the right-hand side of the panel, displaying all
configured devices.
2 From the Hosts column, select the host that you want to disable.
125
MN002730A01-AD
Chapter 3: SA Operation
3.14.7
Searching Configured Collections
You can search a configured collection and view the statistics of individual devices. You can search
configured collections by any of the statistics parameters.
Procedure:
1 From the main navigation tree, select Configured Collection.
2 From the menu bar, select View → Search.
The Search window appears.
3 Select a parameter.
Step example: You can select Name, ID, DNS Name, and others.
NOTICE: You can also specify if the selected parameter starts with the name or ends
with the name, and others.
4 Click Search.
The Configured Collection lists the statistics that match your search.
3.14.8
Plotting Collected Statistics
Follow this procedure to view a graph for the collected data within a certain date range. You can view
the collected data (statistics) by using graphs and tables. They help to analyze the statistics gathered
over a long period.
Procedure:
1 From the Navigation View panel, select Performance → Configured Collection.
2 In the Configured Collection window, in the Host column, click the host for which you want to
plot collected statistics.
The hosts are displayed on the right-hand side.
3 Right-click the row for which you want to plot collected statistics and from the main menu, select
Show Collected Statistic.
4 In the Collected Graph Viewer window, change the chart type by clicking a chart icon of your
choice.
You can also view the collected data in the form of a table by selecting Table.
126
MN002730A01-AD
Chapter 3: SA Operation
NOTICE: By default, the line chart graph type is displayed. You can change the chart
type to any of the following types:
• Line chart
• Bar chart
• Area chart
• Scatter chart
• X-Y chart
• Table
5 In the Date Range Settings area, select a date range. Click Plot Chart.
• To view the graph for the last 24 hours, select the Last 24hrs option button.
• To view the graph for today, select the Today option button.
• To view the graph for data collected over the last seven days, select the Last one week
option button.
• To view a graph for a specific period, select the Custom option button and specify the dates
in the From and To fields.
The custom date range can be displayed for the period of 30 days or less. If you set a custom
date range that is longer than 30 days, no statistics are displayed.
6 Save your plotted graph locally to a .png file by clicking Save.
The graph appears along with a legend. The legend lists object identifiers (OIDs) that are unique
identification numbers of the interface of a managed resource.
3.14.9
Plotting Current Statistics
Plotting current statistics (performance data) helps to view the updated data. In the collected statistics,
only the past data is displayed and it is not updated. The current statistics are instantly collected from
the device and plotted in graphs. On request, System Advisor (SA) queries the devices and collects the
data. You can view the current data (statistics) by using graphs or tables.
Procedure:
1 From the Navigation View panel, select Performance → Configured Collection.
2 In the Configured Collection window, in the Host column, click the host for which you want to
plot current statistics.
The hosts are displayed on the right-hand side.
3 Right-click the row for which you want to plot current statistics and from the main menu, select
Show Current Statistic.
4 Optional: In the CurrentGraphViewer window, change the chart type by clicking a chart icon of
your choice.
You can also view the current data in the form of a table by selecting Table.
127
MN002730A01-AD
Chapter 3: SA Operation
NOTICE: By default, the line chart graph type is displayed. You can change the chart
type to any of the following types:
• Line chart
• Bar chart
• Area chart
• Scatter chart
• X-Y chart
• Table
5 Optional: Define how often data is gathered for the statistics by setting the Polling interval
value.
You can set the Polling interval value to 10 seconds or higher.
Step example: Set the Polling interval value to 30 seconds to gather data for a managed
resource statistics every 30 seconds.
6 Optional: Stop the process of gathering data for statistics by clicking Stop Poller. To start the
process again, click Start Poller.
Current statistics are collected all the time. With the Stop Poller and Start Poller options, you
can stop the process of gathering statistics and gather statistics from a specific period.
7 Optional: Clear your plotted graph by clicking Clear Graph.
Current statistics are collected all the time. With the Clear Graph option, you can clear the
gathered data and start gathering statistics from a specific period.
8 Optional: Save your plotted graph locally to a .png file by clicking Save.
The graph appears along with a legend. The legend lists object identifiers (OIDs) that are unique
identification numbers of the interface of a managed resource.
3.14.10
Zooming in on Plotted Graphs
SAllows you to zoom in on a graph for a better view. You can zoom in on one axis or on both axes of
the graph, that is the Domain Axis and Range Axis.
Procedure:
Right-click the graph and select Zoom In:
• To zoom in on both axes, select Both Axes.
• To zoom in on the domain axis, select Domain Axes.
• To zoom in on the range axis, select Range Axes.
The axis or axes are zoomed in according to your requirements.
3.14.11
Zooming out on Plotted Graphs
SA allows you to zoom out on a graph for a better view. You can zoom out on one axis or on both axes
of the graph, that is the Domain Axis and Range Axis.
Procedure:
Right-click the graph and select Zoom Out:
• To zoom out on both axes, select Both Axes.
128
MN002730A01-AD
Chapter 3: SA Operation
3.14.12
Viewing Performance Status of Managed Resources
You can view the performance status of a managed resource.
The following periods of time are available:
• Today
• Last 7 days
• Last 30 days
• Custom
Procedure:
1 From the main menu, select Administration → System Administration.
2 In the Module Details section, click Performance Status.
3 In the Node Name field, type the details of the device and click View Status.
4 Optional: View the performance status of a device for a period of time:
a In the Period field, select Custom.
The Start Date and End Date text boxes are enabled.
b In the Start Date and End Date text boxes, select the dates and click View Status.
The Performance Status Report screen with the following details appears:
• Statistic name
• Data collection status
• Last collection time
• Next collection time
3.15
Network Database Operations
Network Database serves as an inventory of network resources.
maintains the properties of all the managed resources, including network, physical devices and logical
entities. These managed resources and their properties are listed in a tabular format in the Network
Database View. Each row in the list corresponds to a managed resource.
3.15.1
Viewing Managed Resource Properties
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, double-click a managed object.
The Managed Object Properties window appears, displaying the properties of the network you
selected
129
MN002730A01-AD
Chapter 3: SA Operation
3.15.2
Determining Reliable Communication Capability of a Managed
Resource
Some devices managed by SA are capable of Reliable Communication. This means that they are able
to communicate with SA sending informs by using a separate SNMP user, that is MotoInform. Devices
incapable of Reliable Communication use MotoMaster and communicate by sending traps. All users
can verify if managed resources are capable of Reliable Communication.
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, double-click a managed resource.
3 In the Managed Resource Properties, perform the following actions:
a Select the Others tab.
b In the Other Properties area, search for the reliableCommCapable property.
If the property value is true, the managed resource is capable of reliable communication.
3.15.3
Exporting Network Inventory Data
Procedure:
1 In the Navigation View panel, click the Network Database node, or any custom network
database node.
2 Select Actions → Export Topology Data.
The Export Topology Data window appears.
3.16
Associated Managed Resources Operations
To get a better idea of a fault that affects one or multiple devices or their particular components, you
can filter the Network Database view to display only the associated objects, based on the selected
alarms in the Alarms view or managed objects in the Network Database.
When the list of managed resources is narrowed down only to the associated objects, fault tracking
becomes easier.
The following rules define which elements are associated:
• All elements inside a subnet are related to a network element but not the other way round. For
example, when you view associated managed resources for a network element, all devices that are
located in the same network are displayed. However, when you view associated managed
resources for a device, the network is not displayed.
• Generic Nodes, which represent IP managed devices, are associated only to a network they belong
to.
• Device Managed Resources (DMR) are associated to Sites and Network they belong to.
• Logical Managed Resources (LMR) are related to DMRs that they belong to. When you view
associated managed resources for an LMR, the DMR that the LMR belongs to is displayed. When
you view associated managed resources for DMR, all LMRs that belong to this DMR are displayed.
130
MN002730A01-AD
Chapter 3: SA Operation
• Once a related element is displayed, all associated elements are also displayed.
3.16.1
Viewing Associated Managed Resources from the Alarms Window
Procedure:
1 In the Navigation View panel, click the Alarms node.
2 From the Alarms window, select one or multiple alarms.
NOTICE: If no alarms are available in the Alarms window, open the Network Database
window to see managed resources.
3 Right-click the selection and click Associated Managed Resources.
NOTICE: To sort items by column, hold CTRL and click the column name.
A temporary Network Database custom view containing the associated managed resources appears.
3.16.2
Viewing Associated Managed Resources from the Network
Database Window
Procedure:
1 In the Navigation View panel, click the Network Database node.
2 In the Network Database window, select one or multiple elements.
3 Right-click the selection and select View Associated Managed Resources.
NOTICE: To sort items by column, hold CTRL and click the column name.
In the Network Database window, a temporary custom view containing the associated managed
resources appears.
3.17
Unknown Devices
An unknown device is a device whose device type is unrecognizable, or a device that does not have a
Simple Network Management Protocol (SNMP) agent running.
These devices are discovered as generic nodes.
3.18
Security Management Operations
Security is the assurance of legitimate use, maintenance of confidentiality, data integrity, and ability to
audit the Network Management operations.
It involves identifying the assets, threats, and vulnerabilities of the system. As a result, you can take
protective measures against unintended use of the system. The Security Administration module
enables you to manage security information. Different users can perform different security operations,
depending on their permissions.
This section helps the administrator to create new users, or new groups of users, enabling the
administrator to control the different security levels. New users, or new groups of users are allowed to
see only selected information.
131
MN002730A01-AD
Chapter 3: SA Operation
After logging on, all the operations available to you are based on your group. Therefore, user
administration is a prime function of the administrators.
The following functions can be managed under Security Management:
• Providing group-based authorization where users can be assigned to groups that have configured
levels of authorization, and that provide specific authorizations to them.
• Providing fine-grained access control for specific groups, views, and operations.
• Limiting the access for some users to specific subsets of objects or instances (for example, user
access can be limited to a specific device).
• User activity log, called Audit Trails, containing:
- Operations invoked by the user.
- The name of the user who invoked the operation.
- Data and time of invocation.
- Target device/object on which the operation was invoked.
- The status of the operation.
- The category of invoked operation.
3.18.1
Audit Trails Operations
Audit trails enable you to view the operations performed in SA.
The audit trail identifies all operations that have been performed, displaying also:
• The time
• Whether the audit was successful
• The category
• The audited object
Clear the trails after they have been reviewed.
You can perform the following operations:
• View the audit trail details of all the users or a single user.
• Sort the details by user, operation, time, status, category, and audited object, by clicking the
appropriate column heading.
• Search for audit details, based on the properties.
• Clear the audit trails when you no longer want to manage them.
3.18.1.1
Viewing Audit Trails for All Users
You can view various operations performed by the users, along with the status of whether the
operation was a success or failure. You can view the operation categories such as Fault, Topo,
Provisioning, Configuration, or DEFAULT. For operations that involve adding objects, such as the Add
Node operation, you can also view object details.
Procedure:
1 From the main menu, select Administration → Security Administration.
2 In the Security Administration window, from the main menu select View → Audit Trails.
3 Optional: In the Audit Screen window, sort audit trails:
132
MN002730A01-AD
Chapter 3: SA Operation
3.18.1.2
Viewing Audit Trails on the SA Client Web Interface
Procedure:
1 From the main menu, select Administration → System Administration.
The SA client web interface appears.
3.18.1.3
Viewing Audit Trails for Single Users
You can view various operations performed by the users, along with the status of whether the
operation was a success or failure. You can view the operation categories such as Fault, Topo,
Provisioning, Configuration, or DEFAULT. For operations that involve adding objects, such as the Add
Node operation, you can also view object details.
Procedure:
1 From the main menu, select Administration → Security Administration.
2 In the Security Administration window, expand the Users node, right-click a user and select
Audit Trails.
3 Optional: In the Audit Screen window, sort audit trails:
• To sort all audit trails, click a column header.
• To sort only the audit trails that are currently displayed, click a column header while holding
CTRL.
4 Optional: Clear an audit trail by selecting an audit entry and clicking Clear Audit.
• To select a single audit trail, click it.
• To select contiguous audit trails, hold SHIFT and click audit trails.
• To select non-contiguous audit trails, hold CTRL and click audit trails.
• To view new records, click Refresh.
3.18.1.4
Searching Audit Trails
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, perform one of the following actions:
133
MN002730A01-AD
Chapter 3: SA Operation
• To search audit trails for all users, from the main menu, select View → Audit Trails.
• To search audit trails for a specific user, expand the Users node, right-click a user and select
Audit Trails.
3 In the Auth Audit window, select Edit → Search.
4 In the Search dialog box, perform the following actions:
a Select the property on which the search has to be performed.
b Select the condition from the combo box.
c Specify the value in the text box.
d Click Search.
NOTICE:
After viewing the audit details, you can view all the details again on the same page by
clicking Show All.
To search the Audit Trails more precisely, click More. It allows you to define additional
criteria. To remove additional criteria, click Fewer.
3.18.1.5
Exporting Audit Trails
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, perform one of the following actions:
• To export audit trails for all users, from the main menu, select View → Audit Trails.
• To export audit trails for a specific user, expand the Users node, right-click a user and select
Audit Trails.
3 In the Auth Audit screen, click Export.
4 In the Export Data to Server dialog box, perform the following actions:
a Define the type of exported data by choosing the appropriate radio button.
b Enter the file name. Click Export.
5 Define the type of exported data by choosing the appropriate radio button.
6 Enter the file name. Click Export.
The file is exported on the server side.
3.18.2
Groups Operations
SA enables you to organize different types of users into groups.
You can classify them by a set of common operations, or provide specific permissions to various
groups. This practice saves time when changing permissions for all users in a specific group. It also
makes it easier to add a new user to an existing group.
A group is a logical collection of users grouped to access common information or perform similar tasks.
Any administration done for the group is reflected in the individual members (or users) of the group.
134
MN002730A01-AD
Chapter 3: SA Operation
3.18.2.1
Adding Groups
You can add new groups to assign to it permissions that are different from those of an existing group.
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, from the File menu, select New → Add Group.
The Groups Adminstration window appears.
Figure 39: Group Adminstration Window
3 In the Enter a group name (*) field, enter the name of the group. Click Next.
4 From the Operations Tree Root list, select the permissions you want to allow or disallow for all
users in this group. Click Finish.
135
MN002730A01-AD
Chapter 3: SA Operation
3.18.2.2
Assigning Users to Groups
By assigning users to groups, you can limit access to specific subsets of SA. The groups provide
specific permissions and levels of permissions. For example, user access can be limited to specific
types of devices. The users assigned to the group are displayed in the Members tab.
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, perform the following actions:
a Expand the Groups node and click the group to which you want to assign users.
b Click the Members tab displayed on the right-hand side.
c Click Setting Users.
3 In the Select Users dialog box, assign one user or many users to a group:
• To assign one user to a group, click the user in All Users and click the Add icon .
• To assign many users to a group, select multiple users by using SHIFT or CTRL.
4 Click OK.
The new group member appears in the Members tab.
136
MN002730A01-AD
Chapter 3: SA Operation
3.18.2.3
Unassigning Users from Groups
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, perform the following actions:
a Expand the Groups node and click the group to which you want to assign users.
b Click the Members tab displayed on the right-hand side.
c Click Setting Users.
3 In the Select Users dialog box, in the Selected Users area, click the user you want to unassign
3.18.2.4
Deleting Groups
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, expand the Group node, right-click a group you want
to delete and click Delete.
3 Confirm the deletion by clicking Yes.
The group is removed from the database.
3.18.3
Users Management
A user is an individual who logs on to SA.
The user account is configured to perform only a specific set of functions. Before anyone has access to
the SA client, add them as a user to the SA server application database. After a user is created, they
can be given specific permissions, added to groups, and given specific permissions belonging to the
group.
3.18.3.1
Users Operations
You can add a user at any time.
By default, the new user has login permissions only. You provide access to various modules by making
the user a member of pre-configured groups, or by directly assigning permissions to the user.
You can add a new user from the:
• Application Client
• Command Line
137
MN002730A01-AD
Chapter 3: SA Operation
3.18.3.1.1
Adding Users from the SA Client
Procedure:
1 From the main menu, select Administration → Security Administration
If… Then…
If you want the user account to perform the following actions:
expire after a specific period, a Clear the Account never expires check box.
b In the This user account expires in field, enter a
number of days.
If you do not want the user ac- leave the Account never expires check box selected.
count to expire,
5 Optional: Assign the user with an existing group:
a Select the Group-based permissions check box.
b In the Assign groups for the user panel, select the check boxes corresponding to the
groups to which you want to assign the user.
NOTICE: Click the arrow in the panel to display a pop-up window with the permissions
for the group. Based on the permissions, you can assign groups to the user.
6 Create a group to which you want to associate the user:
a In the Enter the new group name field, enter a group name.
b Click Add Group.
The Assign Permissions dialog box appears.
138
MN002730A01-AD
Chapter 3: SA Operation
3.18.3.2
Changing the User Profile
You can change the profile of a user according to your requirements. For example, you can change a
profile to modify the account expiration date or remove the temporary account lock caused by entering
an invalid password several times in a row.
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, expand the Users node and click the user whose
profile you want to change.
The Security Administration tabs are displayed on the right-hand side.
4 To enable or disable the user, clear the No change in status check box and from the drop-
down menu, select enable or disable as appropriate.
5 Change the account and user expiration date as appropriate and click OK.
The Security Administration window displays the Groups and Users nodes on the left-hand side.
Various types of icons displayed under the Users node provide immediate information about the status
of a specific user.
3.18.3.3
Unlocking the User Account
You can unlock a user account that is temporarily locked for one hour due to entering an invalid
password three times in a row.
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, expand the Users node and click the user whose
account you want to unlock.
The icon represents users with a locked account on the Security tree.
The Security Administration tabs are displayed on the right-hand side.
4 To unlock the user account, clear the Account locked check box. Click OK.
The account locked check box is active only when a user account is locked.
The Security Administration window displays the Groups and Users nodes on the left-hand side.
Various types of icons displayed under the Users node provide immediate information about the status
of a specific user.
139
MN002730A01-AD
Chapter 3: SA Operation
3.18.3.4
Assigning Groups to Users
You can assign the users that you created to existing groups.
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, expand the Users node and click the user whose
profile you want to change.
The Security Administration tabs are displayed on the right-hand side.
3.18.3.5
Changing the User Password when in the Security Administrator Group
A user with the security administrator role or belonging to the security administrator group can change
the passwords for any user at any time.
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, expand the Users node and click the user whose
password you want to change.
The user details appear on the right-hand side.
3.18.3.6
Deleting Users
Delete a user when you no longer want the user to have access to the SA.
Procedure:
1 From the main menu, select Administration → Security Administration.
2 In the Security Administration window, expand the Users node, right-click a user you want to
delete, and click Delete.
140
MN002730A01-AD
Chapter 3: SA Operation
3.18.4
Operations Management
The operations tree contains a list of operations (also referred to as permissions) that are provided by
default in SA.
The operations are logically arranged in a tree structure with parent and child operations. You can add
new operations when they are needed and delete obsolete operations.
3.18.4.1
Default Operations
The operations tree contains a list of operations that are provided by default in SA. Assigning different
operations to different users is an administrative function.
Administrative Operation
Administrative Operation Services provide information on the operation and the description of
administrative services.
Operations Description
Group Operations Add Group Disabling this operation pre-
vents the user from adding a
group.
Remove Group Disabling this operation pre-
vents the user from removing
a group.
Set Permission Disabling this operation pre-
vents the user from setting
permissions or operations to
groups.
Operations Description
System Administration Disabling the System Administration op-
eration prevents the user from accessing
the System Administration page in both
the SA client and SA client web inter-
face..
141
MN002730A01-AD
Chapter 3: SA Operation
Operations Description
Runtime Administration Disabling the Runtime Administration operation prevents the user
from managing JVM in the SA client web interface.
Operations Description
Shutdown Web NMS Serv- Shutdown Web NMS Server is an operation used internally only by
er the root user. Disabling this operation for the root user may cause
problems with disabling the Server.
Operations Description
Terminate Client Disabling the Terminate Client operation prevents the user from
shutting down connected Clients using System Administration.
Events
Operations Description
Event Filters Get Event Filters Disabling this operation pre-
vents the user from viewing
the existing event filters in SA.
Set Event Filters Disabling this operation pre-
vents the user from modifying
or adding an event filter.
Export Events Disabling this operation prevents the user from exporting the list
of events.
Save Events To File Disabling this operation prevents the user from saving event fil-
ters to a file.
Topology
Operations Description
Modify Object Disabling this operation prevents the user from alter-
ing Managed Resource properties.
Manage and Unmanage Objects Disabling this operation prevents the user from man-
aging or unmanaging an object or a network element.
142
MN002730A01-AD
Chapter 3: SA Operation
Operations Description
Discovery Configuration Disabling this operation prevents the user from con-
figuring the discovery process
Export Topology Data Disabling this operation prevents the user from ex-
porting the topology data
Modify Managed Resource Properties Disabling this operation prevents user from modifying
managed resource properties
Delete Object Disabling this operation prevents the user from delet-
ing an object or a network element.
Refresh Node Disabling this operation prevents the user from re-
freshing a node.
Policy
Operation Description
Add Policy Disabling this operation prevents the user from add-
ing a policy.
Delete Policy Disabling this operation prevents the user from delet-
ing an existing policy.
Update Policy Disabling this operation prevents the user from updat-
ing an existing policy.
Execute Policy Disabling this operation prevents the user from exe-
cuting an existing policy.
Stop Policy Disabling this operation prevents the user from stop-
ping an existing policy.
User Administration
Operation Description
User Configuration Disabling this operation prevents the user from modi-
fying user configuration in the SA client web interface.
Add Users Disabling this operation prevents the user from add-
ing new users.
Assign User to Group Disabling this operation prevents the user from as-
signing a user to a group.
Remove Users Disabling this operation prevents the user from re-
moving a user.
Remove User from Group Disabling this operation prevents the user from re-
moving a user from a group.
143
MN002730A01-AD
Chapter 3: SA Operation
Operation Description
Change Password Disabling this operation prevents the user from
changing the password of a user.
Get List of Users Disabling this operation prevents the user from view-
ing the list of users added. Applicable only to the SA
client web interface (the link to access the list is disa-
bled).
Set User Permission Disabling this operation prevents the user from setting
operations or permissions for existing users.
Set User Profile Disabling this operation prevents the user from setting
profiles for existing users.
Clear Audit Trails Disabling this operation prevents the user from clear-
ing audit trails in the SA client.
Change Self Password Disabling this operation prevents the user from
changing the password.
Alerts
Operations Description
Export Alarms Disabling this operation prevents user from exporting the list of
alerts.
Alert Filters Get Alert Filters Disabling this operation pre-
vents the user from viewing
existing alert filters.
Set Alert Filters Disabling this operation pre-
vents the user from setting
new alert filters.
Alert User Operations Set Alert Annotation Disabling this operation pre-
vents the user from annotating
an alarm.
Get Alert Details Disabling this operation pre-
vents the user from viewing
the details of an alarm.
Get Alert History Disabling this operation pre-
vents the user from viewing
the history of an alarm.
Alert Pickup Disabling this operation pre-
vents the user from picking up
an alarm.
Delete Alerts Disabling this operation pre-
vents the user from deleting
an alarm.
144
MN002730A01-AD
Chapter 3: SA Operation
Operations Description
Save Alerts To File Disabling this operation pre-
vents the user from saving
alarm filters to a file.
Clear Alerts Disabling this operation pre-
vents the user from clearing
an alarm.
NBI Configuration
Operation Description
NMS Configuration Disabling this operation prevents the user from configuring North
Bound Interface (NBI).
Credentials Configuration
Operation Description
Update Credentials Config- Disabling this operation prevents the user from modifying credentials
uration configuration.
Test Credentials Configu- Disabling this operation prevents the user from testing the creden-
ration tials configuration.
Device Command
Operation Description
Device Command Disabling this operation prevents the user from issuing commands to
the device.
Device Synchronization
Operation Description
Device Synchronization Disabling this operation prevents the user from performing force syn-
chronization on the device.
145
MN002730A01-AD
Chapter 3: SA Operation
Operation Description
Abort All Discovery Jobs Disabling this operation prevents the user from aborting a discovery
job started by a different user. Users can always abort discovery
jobs which they initiated themselves.
Operation Description
Server Logs Access Disabling this operation prevents the user from accessing the server
logs by using a web browser. The access is available from Tools →
Server Logs.
Operation Description
Event Archive Access Disabling this operation prevents the user from accessing the event
archives by using a web browser. The access is available from Ad-
ministration → Security Administration
Operation Description
Performance Archive Ac- Disabling this operation prevents the user from accessing the per-
cess formance archives by using a web browser. The access is available
from Logging → Performance Archive.
Configure Logging
Operation Description
Configure Logging Disabling this operation prevents the user from configuring the log
information.
146
MN002730A01-AD
Chapter 3: SA Operation
Operation Description
Launch Management Ap- Disabling this operation prevents the user from accessing the man-
plication agement application.
Operation Description
View All Login Attempts at Disabling this operation prevents the user from being able to view
Startup login attempts for other users at startup of the application. You can
view all login attempts by clicking Details in the Last Login Infor-
mation dialog box that opens after starting the SA client.
Operation Description
View Associated Managed Disabling this operation prevents the user from viewing associated
Resources managed resources by using context menu in SA.
Operation Description
Asset Management Infor- Disabling this operation prevents the user from accessing asset
mation management information for devices that support this operation.
3.18.4.2
Operations Assignment
You can assign operations (include or exclude privileges) for a group or for a particular user.
Assigning operations for a group automatically sets the same privileges for the users in that group.
147
MN002730A01-AD
Chapter 3: SA Operation
3.18.4.2.1
Assigning Operations to Users
Procedure:
1 From the main menu, select Administration → Security Administration
2 In the Security Administration window, expand the Users node and click the user to which you
want to assign operations.
3 Click the Permitted Operations for User tab displayed on the right-hand side.
All operations allowed or not allowed for that user are displayed in the Permissions For User
list.
148
MN002730A01-AD
SA Maintenance
Chapter 4
SA Maintenance
Maintenance procedures help you back up and secure data on the System Advisor (SA) application.
4.1
System Advisor Backup and Restore
The System Advisor (SA) critical information is backed up by the ESU server and by the SA logging
feature.
149
MN002730A01-AD
Chapter 4: SA Maintenance
4.1.1
Logging On to the ESU Client
The Enhanced Software Update (ESU) client is a web-based application that you can use to back up
and restore the System Advisor configuration and database.
Prerequisites:
From the system administrator, obtain the following information:
• Internet Protocol (IP) address of the ESU server
• Credentials of the operations user with privileges to use the ESU backup and restore functionality
Procedure:
1 In the web browser address field, enter: https://<ESU_SERVER_IP>/ui
where <ESU_SERVER_IP> is the Internet Protocol (IP) address of the ESU server.
2 On the login page, enter the operations user credentials.
4.1.2
Backing Up the System Advisor Data on Demand
The Enhanced Software Update (ESU) client allows you to back up the System Advisor (SA) data on
demand.
The SA data backups can take place without disabling the SA server.
Procedure:
1 In the ESU client, click the Backup link on the menu on the left side of the application.
2 Click the Run button from the listed applications for the specific one that requires backup.
Status of the operation changes to Started On <<TIME,DATE>>. Once the backup is created,
the status changes to Completed On <<TIME,DATE>>.
3 Optional: To see the details of the backup operation, click the Show link.
4.1.3
Scheduling the System Advisor Data Backup
The Enhanced Software Update (ESU) client allows you to schedule backups of the System Advisor
data.
The SA data backups can take place without disabling the SA server.
Procedure:
1 In the ESU client, click the Scheduled Backup link on the menu, on the left side of the
application.
2 Click New to create a new scheduled backup.
3 The page with parameters for the new scheduled backup is displayed.
150
MN002730A01-AD
Chapter 4: SA Maintenance
4.1.4
Restoring the System Advisor Data
By using the Enhanced Software Update (ESU) client, you can restore the backed-up System Advisor
(SA) data.
NOTICE: The ESU disables the SA server before the restore, and automatically enables the
server after the restore.
Procedure:
1 In the ESU client, click the Restore link on the menu, on the left side of the application.
2 From the Backup Name drop-down menu, select the backup file.
3 If the displayed file name is correct, from the listed applications, click Run for the file that has to
be restored.
4 The Status of the operation changes to Started On <<TIME,DATE>>.
5 Once the restoration is complete, the status changes to Completed On <<TIME,DATE>>.
6 Optional: To see details of backup operation., click the Show link.
Postrequisites: Verify if the restored SNMPv3 credentials are up to date. If the SNMPv3 credentials
are old, you must synchronize them. For more information, see SNMPv3 Synchronization on page 151.
4.1.5
Uploading a Backup to ESU
If you want to restore a System Advisor backup that is not currently stored on the Enhanced Software
Update (ESU) server, you can upload the backup file to the ESU and use it in a restore operation. After
uploading the file, you can navigate to the Restore page and use it in a restore operation.
Procedure:
1 In the ESU client, from the menu on the left side of the window, select Upload Files.
2 Select the backup file and click Upload.
The backup file is added to the list of available backups.
4.1.6
SNMPv3 Synchronization
The administrator must synchronize the SNMPv3 credentials after a system restore.
Synchronization is required if the archive used for restoration is older than the last date/time the
SNMPv3 credentials were modified. If the SNMPv3 configuration is not updated after the restore, SA
can be unable to communicate with one or more devices. Verify SNMPv3 credentials for the following
interfaces:
MotoMaster
The SNMPv3 user who uses all communications from SA to the devices.
MotoInformA or MotoInformB
The SNMPv3 user who uses all notifications (SNMP INFORM message) sent from devices to SA.
151
MN002730A01-AD
Chapter 4: SA Maintenance
4.2
Retrieving System Advisor Archives and Logs
System Advisor server, events, performance, and call monitoring logs are accessible from the SA
webpage as archive files. You can download the logs manually from the SA webpage to a selected
backup location.
SA does not provide the option to schedule automatic backups of the logs. However, your organization
can implement its own automation solutions.
Prerequisites:
Verify that an SA session is active. If no SA sessions are active, you cannot access the logs.
From your system administrator, obtain user credentials with appropriate privileges to access the
server, events, performance, or call monitoring logs.
Procedure:
1 Log on to the SA client with an account that has permissions to view the server, events,
performance, or call monitoring logs.
You can change accounts by using the Security Administration menu.
2 Select the type of logs that you want to view:
• To view the server logs, from the main menu, select Logging → Server Logs.
• To view the events logs, from the main menu, select Logging → Events Archive.
• To view the performance logs, from the main menu, select Logging → Performance
Archive.
• To view the call monitoring logs, from the main menu, select Logging → Call Monitoring
Archive.
In a browser window, a list of available log files is displayed. Server logs are organized in
folders.
4.3
Trap Overload Overview
In SA, the term trap is used to refer to informs and Web Service notifications. Traps are notifications
sent to SA by resources that SA manages. SA processes all traps it receives. In SA, processing means
converting traps into alarms and events and presenting them in this form in the SA client. SA can
process a finite number of traps at a time. When the number of traps that SA receives exceeds the
152
MN002730A01-AD
Chapter 4: SA Maintenance
capacity of SA to process them, trap overload occurs, and the excessive traps are queued in the trap
buffer for processing according to their priority.
153
MN002730A01-AD
Chapter 4: SA Maintenance
• Traps generated by managed resources whose synchronization takes long are cleared from the
trap buffer as the last ones
After SA automatically clears the trap buffer, you are informed about it in a message. In the message,
SA asks you to recognize the fact that the automatic cleanup was performed by clicking OK. The
message also contains information about the number of automatic cleanups performed since your last
cleanup recognition, and about the date of the last cleanup.
This process explains how SA behaves when the trap buffer reaches the critical state.
1 SA initiates the process of removing a percentage of traps queued in the trap buffer.
2 SA identifies the percentage of traps of the lowest priority for removal.
3 SA removes all identified traps and schedules synchronization of the managed resources whose
traps are removed.
4 Managed resources are synchronized and communicate with SA. The amount of time
synchronization takes depends among others on the amount of trap traffic that SA receives, the
number of managed resources scheduled for synchronization. As a result of the synchronization,
SA receives up-to-date information from the managed resources.
5 Details about all traps that SA removes form the trap buffer are collected in the purgeEvents.log
file.
Trap Statistics
Trap statistics are displayed in the SA client web interface. You can open the SA client web interface
by clicking the overload buffer state bar in the lower right corner of the main SA window. Trap statistics
are displayed in the form of charts and tables. The charts provide you with a visual representation of
the trap buffer consumption and trap rate. The tables provide you with details about the trap buffer
consumption and trap rate, and with trap management options.
154
MN002730A01-AD
Chapter 4: SA Maintenance
4.3.1
Cleaning the Trap Buffer Manually
When the number of traps that SA receives exceeds the capacity of SA to process them, SA queues
the traps in the trap buffer for processing. From the SA client web interface, you can manually clear the
trap buffer, for example, of managed resources that send multiple traps to SA. By manually clearing
the trap buffer, you save the trap buffer space.
Procedure:
1 In the lower right corner of the main SA window, click the overload buffer state bar.
2 In the SA client web interface, go to the Trap Buffer Consumption Details or Trap Rate
Details table and clear traps:
NOTICE: The traps you remove from the trap buffer are not permanently deleted. The
traps are stored in the purgeEvents.log file.
• To clear all traps from the buffer, select the Clear Trap Buffer & Sync check box in the table
heading. Click Apply.
• To clear selected traps from the buffer, in the Clear Trap Buffer & Sync column, select
check boxes for the traps you want to clear. Click Apply.
The traps are deleted from the trap buffer. The deleted traps are collected in the
purgeEvents.log file.
3 Optional: Access the purgeEvents.log file from the SA client by selecting Logging → Server
Logs from the main menu.
SA schedules synchronization with managed resources whose traps you manually removed from the
trap buffer. As a result, SA receives up-to-date information from the managed resources.
4.3.2
Configuring Automatic Cleanup of the Trap Buffer
When the number of traps that SA receives exceeds the capacity of SA to process them, the excessive
traps are queued in the trap buffer for processing. When the overload buffer state changes to critical,
by default SA clears 20% of traps queued in the buffer. You can modify the percentage of traps that SA
automatically clears when the overload buffer state changes to the critical state.
Procedure:
1 In the lower right corner of the main SA window, click the overload buffer state bar.
2 In the SA client web interface, go to the Automatic Trap Buffer Cleanup area.
3 In the Automatically clear field, enter the percentage of traps buffer that SA clears
automatically when the trap buffer reaches the critical state. Click Submit.
When the trap buffer reaches the critical state, SA automatically removes from the trap buffer the
percent of traps you set. SA schedules synchronization with managed resources whose traps it
automatically removed from the trap buffer. As a result, SA receives up-to-date information from the
managed resources. Based on the configured cleanup percentage, the overload buffer state changes
to major, minor, or clear.
155
MN002730A01-AD
Chapter 4: SA Maintenance
4.3.3
Managing and Unmanaging Managed Resources From the Trap
Buffer
When the number of traps that SA receives exceeds the capacity of SA to process them, the excessive
traps are queued in the trap buffer for processing. From the SA client web interface, you can manage
and unmanage managed resources listed in the trap buffer that send many traps to SA.
Procedure:
1 In the lower right corner of the main SA window, click the overload buffer state bar.
2 In the SA client web interface, go to the Trap Buffer Consumption Details or Trap Rate
Details table and manage or unmanage managed resources:
• To unmanage all managed resources, clear the Manage/Unmanage check box in the table
heading. Click Apply.
• To unmanage selected managed resources, in the Clear Trap Buffer & Sync column, clear
check boxes for the managed resources you want to unmanage. Click Apply.
• To manage all managed resources, select the Manage/Unmanage check box in the table
heading. Click Apply.
• To manage selected managed resources, in the Clear Trap Buffer & Sync column, select
check boxes for the managed resources you want to manage. Click Apply.
SA does not receive traps form the unmanaged resources and still receives traps from the managed
resources.
4.4
Viewing Archived Events in SA
You can access the events archive files when a SA session is active. If no SA sessions are active, you
cannot access the events archive files. Only users with appropriate privileges can access event
archives.
Procedure:
1 Log on to the SA client with an account that has permissions to view event archives.
You can change accounts by selecting Administration → Security Administration from the
main menu.
2 From the main menu, select Logging → Event Archive.
3 In the online administration panel, select the Events Archive tab.
156
MN002730A01-AD
Chapter 4: SA Maintenance
4 In the Events Archive tab, specify the match criteria by which you want to filter the data. Click
Apply Filters to View Archived Events.
A list of archived events is displayed.
5 Optional: View specific event columns by selecting or clearing appropriate Show Columns
check boxes.
6 Optional: View event details by double-clicking an event.
7 Click Generate CSV.
A .csv file with filtered events is sent to the browser. You can open or save the file. The file
contains all event properties.
157
MN002730A01-AD
Chapter 5: SA Troubleshooting
Chapter 5
SA Troubleshooting
Fault management and troubleshooting information related to SA helps you react quickly in case you
observe any issues.
5.1
Client Server Connection is Lost
SA displays a message when it detects that the connection to the server is lost. The application is
terminated when you click OK. To resolve this issue, restart the SA application.
5.2
Login Errors
A login error occurs as a result of using an incorrect user ID and password. To resolve this issue, the
end user can log on to the application only by specifying an active user ID and an appropriate
authentication password.
5.3
Configuring Server Logging
If you want to access Server Logs, see Retrieving System Advisor Archives and Logs on page 152.
Only Motorola Solution Support Center (SSC) personnel can update or modify settings for the server
log. There are multiple log levels within the server. They are:
• ALL
• DEBUG
• INFO
• WARN
• ERROR
• FATAL
• OFF
A log level can be assigned to a particular application module. For example, if the log level DEBUG is
assigned to DISCOVERY, all logs related to DISCOVERY with a level greater or equal DEBUG are
logged. The relationship between levels is as follows:
• ALL < DEBUG < INFO < WARN < ERROR < FATAL < OFF
where ALL means most of the information will be logged and OFF means none of the logging
information will be published.
Procedure:
1 From the Logging menu, select Server Logging Configuration.
The Server Log Configuration dialog box appears.
2 For a given application module, select an appropriate logging level from the drop-down list.
158
MN002730A01-AD
Chapter 5: SA Troubleshooting
NOTICE:
The drop-down list appears when you click a cell in the Level column of the table.
Some loggers may have a special meaning and are not manageable through the user
interface. In such cases they remain grayed-out.
3 Click Submit.
The log level change made to one or more modules of the application is updated on the server.
The result of the operation appears at the bottom of the window.
5.4
Configuring Client Logging
Client log files can be created only by the Motorola Solution Support Center (SSC) personnel. Make
sure that it is possible to create them.
Procedure:
1 From the Logging menu, select Client Logging Configuration.
The Client Log Configuration dialog box appears.
The Log File Name and Log Location fields are enabled.
5 Click Submit.
NOTICE: The status of the operation is displayed at the bottom of the window.
159
MN002730A01-AD
Chapter 5: SA Troubleshooting
5.5
Command Operation Succeeds but Device Reports a Failure
SA displays a message indicating that the command operation succeeded, but an alarm indicating a
hardware failure or similar is reported against the device.
This situation may occur if the hardware or service against which the command was sent is physically
not present or has not been configured. In most cases, it may be necessary to update the configuration
of the device to remove the component that is not present. Once the configuration is updated, it may
also be necessary to invoke the synchronization operation on the impacted device.
NOTICE: The Network Management Servers do not report hardware components. The Generic
Application Server reports hardware components in the form of transient notifications.
5.6
Hardware Troubleshooting with SA
The following devices report hardware problems to System Advisor (SA):
• Repeaters
• System Advisors
• Switches
• Routers
• CMSS servers
To determine the status of these devices, check the severity in the Network Database view or System
View. To view details about the status of the device, check the alarms and events views for these
resources.
The following devices do not report the fault status to SA, but the information of the presence and
configuration of these devices can be found in SA:
• Trunk Controllers
• Voice Gateways
• Data Gateways
SA provides a list of connected clients identified by the client IP, port and client type (Voice or Data).
You can view the connected clients either in the System View or the Managed Resource Properties
window.
5.6.1
Hardware Troubleshooting in Network Database
Procedure:
1 In the Network Database window, select the relevant Generic Application Server and clickView
→ Events.
NOTICE: Hardware events are reported with a Warning severity.
2 To see which applications are affected by the hardware event reported by the Generic
Application Server, open the “Network Database”.
160
MN002730A01-AD
Chapter 5: SA Troubleshooting
5.7
Sluggish Performance Monitoring
The SA client application may take a few seconds to become active after it is left running overnight.
The same can occur after a few hours of inactivity. This behavior is normal, but if it shows signs of
sluggishness, such as being slow to refresh or clicks taking unusually long to respond, it may indicate
that application is overloaded.
Determine how many sessions are active on the SA client. Make sure that no more than ten sessions
are active. If the number of open sessions exceeds ten, close enough sessions to drop to ten or below.
5.8
Performance Management Troubleshooting
If your graph displays any of the following messages, see the appropriate information in this section.
No data available
Reason: By default, automatic data collection starts 10 minutes after the SA server application is
started and the device is discovered. Also, data collection for a newly added statistic starts only after
10 minutes. The message No data available means that the data is not collected and there is a
delay in the collection process.
NOTICE: For Counter type OIDs, the initial data collected is not stored. When data is collected
for the second time, the difference between the two values is calculated and stored. Therefore,
depending on the polling interval set, the data is collected again. An additional delay in plotting
of data in a graph is possible in the case of Counter type OIDs.
5.9
Removing Alarms for Deleted Entities
When a managed resource is removed from the Radio System, SA can still report alarms against the
resource. Follow this process, if the removal of the resource or entity is permanent or if you want to
remove the alarms.
Procedure:
1 Ensure that the configuration of the device is modified to remove the deleted entity from that
device using the applicable software (CSS, UNC Device Server, and others). This changes the
device settings to reflect the current configuration.
2 In SA, go to the Network Database view and locate the managed resource (device).
3 Synchronize the device status with SA. SA performs a full synchronization on the device with the
deleted entity.
NOTICE: After the synchronization is complete, events from the deleted entity remain,
but are only visible in the Network Events view. Alarms for the deleted entity are also
removed.
161
MN002730A01-AD
Chapter 5: SA Troubleshooting
Example:
Postrequisites:
5.10
SNMPv3 Communication for MotoMaster Tests
SA provides a method of testing the current configuration of SNMPv3 connection for a specified IP
address. It provides a status of the connection as well as the reason for failure, if any.
5.10.1
Testing the Outbound Communication from SA to any Device
Procedure:
1 From the main menu select Tools → Test any Device SNMPv3 Configuration.
The Test Any Device SNMPv3 Configuration window appears.
5.10.2
Testing the Outbound Communication from SA to a Discovered
Device
Procedure:
1 From the Network Database window, right-click the managed resource, and select Test
SNMPv3 Configuration.
The Test SNMPv3 Configuration window appears. The IP Address or Hostname field is
automatically populated with the device IP address or hostname.
2 Click Start.
The SNMPv3 credentials set for the device will be used. For information about how to configure
them, see Updating the Network Element SNMPv3 Credentials on page 64.
IMPORTANT: A mechanism for testing ICMP communication with a specific device, to
determine if it is alive (responds to ping) is also available. If the device does not respond
to ping, it will not respond to SNMP communication attempts either.
The status of the request is updated in the status bar.
162
MN002730A01-AD
Chapter 5: SA Troubleshooting
5.10.3
SNMPv3 Inbound Communication Tests
To test inbound SNMPv3 communication for devices capable of reliable communication, invoke
synchronization.
If Synchronization succeeds and no CommFailure alarm for it is generated, then the inbound
communication is configured properly. Testing inbound communication for devices incapable of
Reliable Communication requires sending a trap from the device to SA.
NOTICE: For detailed procedure on how to send traps from a device consult the specific device
manual.
5.10.4
SNMP Communication Alarms and Events
The connection between devices and System Advisor (SA) is constantly monitored by the Supervision
procedure. If any change in the connection state occurs, it is reported in form of an alarm for
communication entity stating the nature of change as well as the reason for it. Additional events or
alarms may be generated depending on the situation.
CommFailure Alarm on SA
SA displays a communication failure alarm message for one or more managed resources with the
CommFailure severity (see Severity Definitions on page 32). This alarm indicates that SA has lost its
ability to communicate with the device. For IP managed devices, it can occur if the device ceases to
respond to ICMP queries. For devices communicating via SNMPv3, it can occur under any one of the
following conditions:
• Loss of connectivity
• Unstable or noisy link
• SNMPv3 configuration mismatch
• SNMP interface errors
• Device out-of-synchronization with SA (this situation may be related to many conditions)
• Failed Manager Registration on the device
• Device out-of-synchronization with SA (this situation may be related to many conditions)
NOTICE: For event details, see the “Alarms and Events” chapter in the System Advisor Online
Help.
163
MN002730A01-AD
Chapter 5: SA Troubleshooting
164
MN002730A01-AD
Basic Configuration
Appendix A
Basic Configuration
Basic configuration steps include:
• Creating an alarm/event or editing an existing one.
• Creating an E-mail Action or editing/choosing an existing one.
• Optionally testing configuration.
• Saving new configuration.
165
MN002730A01-AD
Appendix B: Configuration Input
Appendix B
Configuration Input
Basic Parameters
• Server address
• E-mail address of the recipient
• E-mail address of the sender
• Message subject
• Message content
To successfully send e-mail messages, valid server address and e-mail address of the recipient are
required.
NOTICE: The mail server must be configured to properly handle the e-mail received. Store the
e-mail in the mailbox if it is locally managed or relay the e-mail to the correct server if the
mailbox is on a different server.
If the user chooses to respond to the e-mail received from SA, the e-mail address of the sender is
used.
NOTICE: SA provides SMTP client functionality only. It is not capable of receiving e-mail. This
field is intended to identify the source of the e-mail notification (for example,
SA@z001SA01.zone1) or redirect the reply to a valid address (for example,
support@motorola.com).
The message subject and content contain details on an event or alarm that has occurred in the system.
The content of these fields can be populated with the content of a particular event or alarm and/or
custom text.
166
MN002730A01-AD
Test E-mail Content
Appendix C
167
MN002730A01-AD
Appendix D: Mail Server Compatibility
Appendix D
168
MN002730A01-AD
Appendix E: Alarms and events
Appendix E
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
NMAAgentRed Info Redundancy attribute of the managed Redundancy attribute of the managed Attribute-Val- Agent Re-
resource has changed to: resource has changed to: ue-Change dundancy
Event
NMAObjRed Info Redundancy attribute of the entity has Redundancy attribute of the entity has Attribute-Val- -
changed (Possible RedObjState values changed (Possible RedObjState values ue-Change
are 1 = NOT PARTICIPATING, 2 = AC- are 1 = NOT PARTICIPATING, 2 = AC- Event
TIVE, 3 = STANDBY and 4 = TRANSI- TIVE, 3 = STANDBY and 4 = TRANSI-
TIONING) TIONING)
UnknownEventSource Warning Event received from an Unknown IPAd- Event received from an Unknown IPAd- Informational -
dress. dress. Event
UnknownManagedRe- Warning Cannot determine the impacted Man- Cannot determine the impacted Man- Informational -
source aged Resource for the event. aged Resource for the event. Event
UnknownManagedOb- Warning Failure event received with an unknown Failure event received with an unknown Informational -
ject entity. entity. Event
UnknownManagedRe- Warning A Correlation Event could not be gener- A Correlation Event could not be gener- Informational -
sourceForCorrelation ated properly.; UEM cannot determine ated properly. Event
the Managed Resource impacted by the
event.
169
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
IncorrectManagedRe- Warning A Correlation Event could not be gener- A Correlation Event could not be gener- Informational -
sourceForCorrelation ated properly.; Incorrect Managed Re- ated properly. Event
source impacted by the event.
SNMPCredential- Info SNMP Credentials have been updated SNMP Credentials have been updated Informational -
Change for for Event
SNMPv3Authentica- Warning Unable to process SNMPv3 INFORM Unable to process SNMPv3 INFORM Security Viola- -
tionFailure request from ; Reason: Authentication/ request from; Reason: Authentication/ tion
Decryption Error. Decryption Error.
DiscDeviceSuccess Info Discovered Device Managed Resource Discovered Device Managed Resource Object-Crea- Discovery
tion Event
DiscDeviceClear Clear Discovering Device Managed Resource Discovering Device Managed Resource Communica- Discovery
- tion Alarm
DiscGenericNode Info Discovered IP Managed Node; Reason: Discovered IP Managed Node; Reason: Object-Crea- Discovery
Device only responded to ICMP queries Device only responded to ICMP queries tion Event
during device discovery. during device discovery.
DiscGenericScada- Info Discovered IP Managed Node; Reason: Discovered IP Managed Node; Reason: Object-Crea- Discovery
Node Missing or invalid RTU configuration. Missing or invalid RTU configuration. tion Event
DiscFailNoManParam Warning Unable to fully discover device; Reason: Unable to fully discover device; Reason: Management Discovery
SNMP request(s) timed out or returned SNMP request(s) timed out or returned Event
the following error the following error
DiscInventoryGeneric- Info Discovered Inventory Generic Node; Discovered Inventory Generic Node; Object-Crea- Discovery
Node Reason: Device protocol is configured to Reason: Device protocol is configured tion Event
TYPE protocol, but only responded to to TYPE protocol, but only responded to
ICMP. ICMP.
DiscInventoryUnreach- Info Discovered Inventory Generic Node; Discovered Inventory Generic Node; Object-Crea- Discovery
ableNode Reason: Device did not respond to Reason: Device did not respond to tion Event
ICMP, but its configuration can be read. ICMP, but its configuration can be read.
DiscFailNoReqParam Critical Discovery failed for the Managed Re- Discovery failed for the Managed Re- Object-Crea- Discovery
source - ; Reason: SNMP request re- source; Reason: SNMP request re- tion Event
turned error during reading turned error during reading
DiscFailAuthEncFail Warning Unable to fully discover device; Reason: Unable to fully discover device; Reason: Security Viola- Discovery
SNMPv3 credential failure. Please verify SNMPv3 credential failure. Please veri- tion
170
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
that the correct SNMPv3 credentials are fy that the correct SNMPv3 credentials
configured. are configured.
DiscFailUnknownSoid Warning Unable to fully discover device; Reason: Unable to fully discover device; Reason: Informational Discovery
The sysObjectID returned by the device The sysObjectID returned by the device Event
is not recognized is not recognized
DiscFailNoDataIvSup- Info Device discovered using default data in- Device discovered using default data in- Informational Discovery
port terface terface Event
DiscCrossDiscDevice Minor Re-discovering device; Reason: Device Re-discovering device; Reason: Device Informational Discovery
responded with different type. New type responded with different type. New type Event
DiscFailDowngrade- Minor Failed to re-discover device; Reason: Failed to re-discover device; Reason: Informational Discovery
Device SNMP query failure(s) during device dis- SNMP query failure(s) during device Event
covery (device responded to ping). discovery (device responded to ping).
NonSnmpDiscFail- Minor Failed to re-discover device; Reason: Failed to re-discover device; Reason: Informational Discovery
DowngradeDevice Device responded only to ping. Device responded only to ping. Event
DiscUpgradeDevice Info Re-discovering IP Managed Node; Rea- Re-discovering IP Managed Node; Rea- Informational Discovery
son: Previously discovered IP Managed son: Previously discovered IP Managed Event
Node is now responding with proper Node is now responding with proper
SNMP messaging. SNMP messaging.
DiscSysIpMismatch Warning Device network interface found but not Device network interface found but not Informational Discovery
managed; Reason: IP is not the man- managed; Reason: IP is not the man- Event
agement interface for the device. Sys- agement interface for the device. Sys-
tem IP tem IP
DiscFailDevUnMan- Warning Failed to re-discover device; Reason: Failed to re-discover device; Reason: Informational Discovery
aged Device is currently unmanaged. Device is currently unmanaged. Event
DiscNeedReDisc Critical Device requires rediscovery; Reason: Device requires rediscovery; Reason: Communica- Discovery
Device discovery did not successfully Device discovery did not successfully tion Alarm
complete due to a device communica- complete due to a device communica-
tion or credential problem. tion or credential problem.
NonSnmpDiscNee- Critical Device requires rediscovery; Reason: Device requires rediscovery; Reason: Communica- Discovery
dReDisc Device discovery did not successfully Device discovery did not successfully tion Alarm
complete due to a device communica- complete due to a device communica-
tion problem. tion problem.
171
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
DiscNeedReDiscNoR- Critical Device requires rediscovery; Reason: Device requires rediscovery; Reason: Communica- Discovery
esp Device no longer reporting on the follow- Device no longer reporting on the fol- tion Alarm
ing previously discovered Managed Re- lowing previously discovered Managed
sources Resources
DiscDeviceReDisc- Clear Rediscovering Managed Resource Rediscovering Managed Resource Communica- Discovery
Clear tion Alarm
DiscLMrSuccess Info Discovered Managed Resource Discovered Managed Resource Object-Crea- Discovery
tion Event
SysIPCheckSkipped Info Skipping SysIp check due to CEN dis- Skipping SysIp check due to CEN dis- Informational Discovery
covery for: covery for: Event
DiscLMrFailSnmpErr Minor Unable to discover Managed Resource; Unable to discover Managed Resource; Informational Discovery
Reason: SNMP request for managed re- Reason: SNMP request for managed Event
source returned the following error resource returned the following error
DiscLMrReDiscSuc- Info Rediscovered Managed Resource Rediscovered Managed Resource Object-Crea- Discovery
cess tion Event
DiscLMrReDiscAttrCh- Info Following Attribute Values have Following Attribute Values have Attribute-Val- Discovery
ange changed. changed. ue-Change
Event
DiscFailNoSiteId Warning Unable to discover ID value for; Reason: Unable to discover ID value for; Rea- Informational Discovery
SNMP request for the ID returned the son: SNMP request for the ID returned Event
following error the following error
DiscFailNoInstanceId Major Unable to discover instance identifier for Unable to discover instance identifier for Communica- Discovery
device; Reason: SNMP request for in- device; Reason: SNMP request for in- tion Alarm
stance ID returned the following error stance ID returned the following error
DiscUnknownPtpRFU- Info Device reports that RFU type is ; RFU Device reports that RFU type is; RFU Informational Discovery
Type type will be set to UNKNOWN. type will be set to UNKNOWN. Event
DeleteMrSuccess Info Deleted Managed Resource; Reason: Deleted Managed Resource; Reason: Object-Dele- User Dele-
User requested. User requested. tion Event tion
DeleteMrFail Major Failed Deletion of; Reason: Could not Failed Deletion of; Reason: Could not Management User Dele-
remove the alarms and/or Managed Re- remove the alarms and/or Managed Re- Event tion
source from the data store. source from the data store.
172
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
DeleteMrWarning Major Skipped cascade deletion of Managed Skipped cascade deletion of Managed Management User Dele-
Resource; Reason: Device not Active Resource; Reason: Device not Active Event tion
agent. agent.
MmrDeRegFail Warning Failed to de-register from device ; - Rea- Failed to de-register from device; - Rea- Informational Manage-
son: De-registration request generated son: De-registration request generated Event ment
an error an error
MmrDeRegSuccess Info Manager successfully de-registered Manager successfully de-registered Informational Manage-
from the device from the device Event ment
ChangeMrDispName- Warning Failed display name change; Reason: Failed display name change; Reason: Management Manage-
Fail New display name improperly formatted New display name improperly formatted Event ment
DnsLookupFailure Major Dns could not resolve the following host Dns could not resolve the following host Management Manage-
name / IP address; Reason: Dns service name / IP address; Reason: Dns serv- Event ment
was unavailable or host name / IP ad- ice was unavailable or host name / IP
dress entry could not be found. address entry could not be found.
DiscFailProtocolMis- Major Unable to rediscover device; Reason: Unable to rediscover device; Reason: Management Discovery
match Device responding with different SNMP Device responding with different SNMP Event
protocol version. protocol version.
CommLossTimeout Comm- Fault Manager lost communication to Fault Manager lost communication to Communica- Communi-
Failure the device.; Reason: Timeout on device the device.; Reason: Timeout on device tion Alarm cation
response. response.
CommV3CredFailure Comm- Fault Manager lost communication to Fault Manager lost communication to Communica- Communi-
Failure the device.; Reason: SNMPv3 credential the device.; Reason: SNMPv3 creden- tion Alarm cation
failure. tial failure.
CommV3ProtocolError Comm- Fault Manager lost communication to Fault Manager lost communication to Communica- Communi-
Failure the device.; Reason: SNMP V3 Protocol the device.; Reason: SNMP V3 Protocol tion Alarm cation
Error. Error.
CommUp Clear The Fault Manager has detected that The Fault Manager has detected that Communica- Communi-
the communication to this device is up.; the communication to this device is up.; tion Alarm cation
Reason: The device is responding to re- Reason: The device is responding to re-
quests. quests.
EntityStatusClear Clear Entity has been removed: Entity has been removed: - -
AlarmStatusClear Clear Alarm has been cleared. Previous mes- Alarm has been cleared. Previous mes- - -
sage: sage:
173
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
UserRequestedAlarm- Clear Alarm has been cleared by {0}. Previous Alarm has been cleared by {0}. Previ- - -
StatusClear message: {1} ous message: {1}
EntityDeleted Info Entity has been removed: Entity has been removed: Object-Dele- -
tion Event
OutOfSyncStatus Comm- Fault information for this device may be Fault information for this device may be Communica- Synchroni-
Failure out of date.; Reason: there may be out of date.; Reason: there may be tion Alarm zation
missing event information, a loss of missing event information, a loss of
communication, or a failure to synchron- communication, or a failure to synchron-
ize with the device. ize with the device.
SynchronizedStatus Clear Fault manager has synchronized fault Fault manager has synchronized fault Communica- Synchroni-
information with this device. information with this device. tion Alarm zation
SyncCapable Clear Fault manager is capable of synchroniz- Fault manager is capable of synchroniz- Communica- Synchroni-
ing fault information with this device. ing fault information with this device. tion Alarm zation
SyncIncapable Comm- Fault information for this device may be Fault information for this device may be Communica- Synchroni-
Failure out of date.; Reason: there may be out of date.; Reason: there may be tion Alarm zation
missing event information, a loss of missing event information, a loss of
communication, or a failure to synchron- communication, or a failure to synchron-
ize with the device. ize with the device.
NMASyncComplete Clear Fault Manager received Synchronization Fault Manager received Synchroniza- Communica- Synchroni-
Complete notification from the device. tion Complete notification from the de- tion Alarm zation
vice.
DiscUnManRqst Info Managed Resource Unmanaged; Rea- Managed Resource Unmanaged; Rea- Management Manage-
son: User requested son: User requested Event ment
DiscUnManRqstFail Warning Failed to Unmanage Managed Re- Failed to Unmanage Managed Re- Management Manage-
source; Reason: Proxy-ing Device for source; Reason: Proxy-ing Device for Event ment
Managed Resource is not ACTIVE. Managed Resource is not ACTIVE.
DiscManRqst Info Managed Resource is now Managed; Managed Resource is now Managed; Management Manage-
Reason: User requested Reason: User requested Event ment
DiscUnManClearAll Clear Failure cleared by user un-management Failure cleared by user un-management - Manage-
request. request. ment
PortDeletedClear Clear Port status is clear. Reason: Port is no Port status is clear. Reason: Port is no - Manage-
longer reported. longer reported. ment
174
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
FrmwrkInitSuccess Info Fault Management services started suc- Fault Management services started suc- Informational UEM Ap-
cessfully. cessfully. Event plication
ArchivePurgeWriteEr- Major The fault manager has failed to write The fault manager has failed to write Informational UEM Ap-
ror events to the event archive file.; Rea- events to the event archive file.; Rea- Event plication
son: I/O Error son: I/O Error
ArchivePurgeDeleteEr- Major The fault manager has failed to purge The fault manager has failed to purge Informational UEM Ap-
ror events.; Reason: I/O Error events.; Reason: I/O Error Event plication
ArchivePurgeReadEr- Major The fault manager has failed to read The fault manager has failed to read Informational UEM Ap-
ror events to be archived.; Reason: I/O Er- events to be archived.; Reason: I/O Er- Event plication
ror ror
DisplayNameChange Info Following Attribute Values have Following Attribute Values have Attribute-Val- Manage-
changed. changed. ue-Change ment
Event
SubsystemName- Info Following Attribute Values have Following Attribute Values have Management Manage-
Change changed. changed. Event ment
PMArchSizeSoftThre- Warning The Fault Manager statistics archive has The Fault Manager statistics archive Informational Perform-
sholdCrossed grown larger than 750 MB. If it reaches has grown larger than 750 MB. If it Event ance
1 GB, statistical data will be trimmed. reaches 1 GB, statistical data will be
trimmed.
PMArchSizeHardThre- Warning The Fault Manager statistics archive has The Fault Manager statistics archive Informational Perform-
sholdCrossed grown larger than 1 GB. The Fault Man- has grown larger than 1 GB. The Fault Event ance
ager will now trim the archive to below Manager will now trim the archive to be-
750 MB. low 750 MB.
DiscFailUnknownDIV Warning Unable to fully discover device; Reason: Unable to fully discover device; Reason: Informational Discovery
The interface version returned by the The interface version returned by the Event
device is not a supported value device is not a supported value
DiscReDiscoverDiffer- Info Device re-discovered with a different in- Device re-discovered with a different in- Management Discovery
entDIV terface version. Old value was: terface version. Old value was: Event
DiscDeleteDiscovery- Info Device will be deleted and re-discovered Device will be deleted and re-discov- Management Discovery
DifferentDIV with a new interface version. Old value ered with a new interface version. Old Event
was: value was:
175
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
DiscDetectLegacyDe- Info Device discovered using default inter- Device discovered using default inter- Management Discovery
vice face version.; Device does not support face version.; Device does not support Event
interface version query. interface version query.
DiscDetectCompatible- Warning Device discovered by using a default in- Device discovered by using a default in- Management Discovery
Device terface version.; Reason: device discov- terface version.; Reason: device discov- Event
ered with the last supported version of ered with the last supported version of
the device interface: the device interface:
DiscDataIvGetFailure Warning Unable to fully discover device; Reason: Unable to fully discover device; Reason: Informational Discovery
Retrieval of device interface version Retrieval of device interface version Event
failed. failed.
UnknownEvent Warning Unknown Event Unknown Event Informational -
Event
DiscNoRedAgntGrp- Warning Fallback redundant group name (based Fallback redundant group name (based Management Discovery
NameParam on first two octets of an IP address) will on first two octets of an IP address) will Event
be calculated for the device; Reason: be calculated for the device; Reason:
Retrieval of mandatory redundant group Retrieval of mandatory redundant group
name parameter failed. name parameter failed.
DiscNoPTPRe- Critical Discovery failed for the device; Reason: Discovery failed for the device; Reason: Object-Crea- Discovery
dAgntGrpNameParam Retrieval of mandatory REDUNDANT Retrieval of mandatory REDUNDANT tion Event
GROUP NAME parameter failed. GROUP NAME parameter failed.
DiscInvalidAttrValue Major Discovery failed due to invalid value of Discovery failed due to invalid value of Informational Discovery
configuration parameter ; Possible val- configuration parameter; Possible val- Event
ues are: ues are:
ManualSynchroniza- Comm- Fault information for this device may be Fault information for this device may be Communica- Synchroni-
tionRequired Failure out of date. Manually synchronize the out of date. Manually synchronize the tion Alarm zation
device; Reason: Internal error. device; Reason: Internal error.
ManagerRegistration- Clear Manager registration on the device was Manager registration on the device was Communica- Manage-
Successful successful. successful. tion Alarm ment
ManagerRegistration- Critical Manager registration on the device Manager registration on the device Communica- Manage-
Failed failed. The device may not be able to failed. The device may not be able to tion Alarm ment
send notifications to the manager. send notifications to the manager.
ManagerRegistration- Warning Manager registration not found on the Manager registration not found on the Communica- Manage-
FailedForIlom device. Perform manual manager regis- device. Perform manual manager regis- tion Alarm ment
tration on the device. tration on the device.
176
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
DeleteAlarm Warning Alarm deleted. severity of deleted alarm Alarm deleted. Severity of deleted alarm Alarm-Deletion Alarm User
was %s. Creation time: %s, last modifi- was %s. Creation time: %s, last modifi- Event Deletion
cation time: %s.; Deletion requested by cation time: %s.; Deletion requested by
%s user. %s user.
VmwareCommProto- Comm- Fault Manager lost communication to Fault Manager lost communication to Communica- Communi-
colError Failure the device.; Reason: Web Service Pro- the device.; Reason: Web Service Pro- tion Alarm cation
tocol Error. tocol Error.
VmwareCommCred- Comm- Fault Manager lost communication to Fault Manager lost communication to Communica- Communi-
Failure Failure the device.; Reason: WebService Cre- the device.; Reason: WebService Cre- tion Alarm cation
dential failure. dential failure.
WebServiceCreden- Info Web Service Credentials have been up- Web Service Credentials have been up- Informational -
tialChange dated dated Event
EventsArchSizeThre- Clear The disk space used by the events ar- The disk space used by the events ar- Informational UEM Ap-
sholdCrossed chive exceeds %s. When the events ar- chive exceeds %s. When the events ar- Event plication
chive reaches its disk space limit, UEM chive reaches its disk space limit, SA
automatically deletes the oldest events. automatically deletes the oldest events.
OverloadModeClear Clear The UEM is displaying fault traffic in real The SA is displaying fault traffic in real Quality-of- Processing
time. ; Exit overload mode. time.; Exit overload mode. Service Alarm
OverloadModeMinor Minor The UEM is not displaying fault traffic in The SA is not displaying fault traffic in Quality-of- Processing
real time. ; Enter overload mode. real time.; Enter overload mode. Service Alarm
OverloadModeMajor Major The UEM buffer is reaching a critical The SA buffer is reaching a critical lev- Quality-of- Processing
level. ; {0}% buffer consumption. el.; {0}% buffer consumption. Service Alarm
OverloadModeCritical Critical The UEM buffer has reached a critical The SA buffer has reached a critical lev- Quality-of- Processing
level. ; {0}% buffer consumption. el.; {0}% buffer consumption. Service Alarm
OverloadPurgedBuffer Warning Fault Management dropped buffer with Fault Management dropped buffer with Informational Processing
notifications from device(s). ; Reason: notifications from device(s).; Reason: Event
Not enough resources to process in- Not enough resources to process in-
coming notifications. coming notifications.
StateApiRejectedE- Warning Fault Management dropped state for {0} Fault Management dropped state for {0} Informational Processing
vent managed resource. ; Reason: Not managed resource. Reason: Not Event
enough resources to process state noti- enough resources to process state noti-
fications. fications.
177
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
OverloadSchedule- Warning After the trap buffer reached the critical After the trap buffer reached the critical Informational Processing
Synchronization state, it was cleared of traps received state, it was cleared of traps received Event
from the {0} managed resource. The from the {0} managed resource. The
trap buffer state change took place on trap buffer state change took place on
{1}.; Synchronization of the {0} managed {1}.; Synchronization of the {0} man-
resource is already scheduled by UEM. aged resource is already scheduled by
SA.
OverloadSynchroniza- Warning After the trap buffer reached the critical After the trap buffer reached the critical Informational Processing
tionIsAlreadySched- state, it was cleared of traps received state, it was cleared of traps received Event
uled from the {0} managed resource. The from the {0} managed resource. The
trap buffer state change took place on trap buffer state change took place on
{1}.; Synchronization of the {0} managed {1}.; Synchronization of the {0} man-
resource is already scheduled. This syn- aged resource is already scheduled.
chronization is scheduled by UEM or by This synchronization is scheduled by
application users. SA or by application users.
NotificationProcessing- Major The fault manager has failed to process The fault manager has failed to process Informational Processing
TimeoutError a notification from the {0} device re- a notification from the {0} device re- Event
ceived on {1}.; Reason: Processing ceived on {1}.; Reason: Processing
Timeout Timeout
NotificationProcessin- Major The fault manager has failed to process The fault manager has failed to process Informational Processing
gInterruptedError a notification from the {0} device re- a notification from the {0} device re- Event
ceived on {1}.; Reason: Processing In- ceived on {1}.; Reason: Processing In-
terrupted terrupted
LmrDiscoveryFailed Critical Unable to fully discover device; Reason: Unable to fully discover device; Reason: Informational Discovery
At least one Logical Managed Resource At least one Logical Managed Resource Event
cannot be discovered. cannot be discovered.
NoNbiLicense Info Feature NBI is disabled.; License for this Feature NBI is disabled.; License for Informational UEM Ap-
feature is inactive. Feature inactive for this feature is inactive. Feature inactive Event plication
for
NoCorrelationEngine- Info Feature Correlation Engine is disabled.; Feature Correlation Engine is disabled.; Informational UEM Ap-
License License for this feature is inactive. License for this feature is inactive. Event plication
NoMailLicense Info Feature Email is disabled.; License for Feature Email is disabled.; License for Informational UEM Ap-
this feature is inactive. this feature is inactive. Event plication
ToolkitTrapRuleNot- Warning Trap rule for trap {0} could not be Trap rule for trap {0} could not be Informational -
Found found. ; Reason: the trap was received found.; Reason: the trap was received Event
178
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
with varbind values that do not match with varbind values that do not match
the rules in the DDP. the rules in the DDP.
ToolkitTrapNotifica- Major Unable to process trap {0} for the Toolkit Unable to process trap {0} for the Tool- Informational -
tionProcessingError device. kit device. Event
ToolkitInvalidTrapDa- Warning Received trap {0} contains data not Received trap {0} contains data not Informational -
taFormat compliant with the agent definition. ; compliant with the agent definition.; Event
Reason: One or more varbinds do not Reason: One or more varbinds do not
match the type expected in DDP. match the type expected in DDP.
ToolkitPollingRuleNot- Warning Polling rule could not be found. ; Rea- Polling rule could not be found.; Rea- Informational -
Found son: Synchronization response was re- son: Synchronization response was re- Event
ceived with varbind values that do not ceived with varbind values that do not
match the rules in the DDP. match the rules in the DDP.
ToolkitPollingNotifica- Major Unable to process Toolkit synchroniza- Unable to process Toolkit synchroniza- Informational -
tionProcessingError tion response. tion response. Event
ToolkitInvalidPolling- Warning Received synchronization response Received synchronization response Informational -
DataFormat contains data not compliant with the contains data not compliant with the Event
agent definition. ; Reason: One or more agent definition.; Reason: One or more
varbinds do not match the type expect- varbinds do not match the type expect-
ed in DDP. ed in DDP.
DiscWarnToolkitGe- Warning Unable to get additional property: {0} Unable to get additional property: {0} Informational -
tAdditionalPropertyEr- Event
ror
ToolkitInvalidAdditio- Warning Additional Property {0} has data not ac- Additional Property {0} has data not ac- Informational -
nalPropertyDataFor- cording to agent definition. ; Reason: cording to agent definition.; Reason: Event
mat One or more varbinds have different One or more varbinds have different
type than expected in DDP package. type than expected in DDP package.
ToolkitLicenseViolation Major License Violation. Reason: System con- License Violation. Reason: System con- Equipment UEM Ap-
figuration is greater than licensed limit. figuration is greater than licensed limit. Alarm plication
ToolkitLicenseCompli- Clear License Compliant. Reason: System License Compliant. Reason: System Equipment UEM Ap-
ant configuration is within licensed limits. configuration is within licensed limits. Alarm plication
GmrReclassifyToTsub Warning Group managed resource was assigned Group managed resource was assigned Informational UEM Ap-
to Trunking Subsystem.; Newly discov- to Trunking Subsystem. Event plication
ered device has Trunking Subsystem
configuration.
179
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Catego- Manager
ry Entity
GmrChangeTsubRe- Warning Group managed resource type was Group managed resource type was Informational UEM Ap-
mote changed from {0} to {1}.; Newly discov- changed from {0} to {1}. Event plication
ered device has different Trunking Sub-
system configuration.
PeriodicalToolkitSigna- Major Fault Manager detected that the signa- Fault Manager detected that the signa- Informational UEM Ap-
tureViolation ture in the DDP is corrupted. The follow- ture in the DDP is corrupted. The follow- Event plication
ing devices will be downgraded: {0} ing devices will be downgraded: {0}
ToolkitSignatureViola- Minor The signed DDP: {0} is corrupted. The The signed DDP: {0} is corrupted. The Object-Crea- Discovery
tion device will be discovered as Generi- device will be discovered as Generi- tion Event
cNode. Contact Motorola Solutions to cNode. Contact Motorola Solutions to
repair the DDP. repair the DDP.
E.2
MIB-2 Events
SA can receive MIB-2 generic SNMP traps from any SNMP-managed device and will display them as Events in the Network Events view.
180
MN002730A01-AD
Appendix E: Alarms and events
E.3
General RFC Events
SA can receive events defined below in general RFC mibs. These events can be sent by different types of devices.
181
MN002730A01-AD
Appendix E: Alarms and events
182
MN002730A01-AD
Appendix E: Alarms and events
183
MN002730A01-AD
Appendix E: Alarms and events
184
MN002730A01-AD
Appendix E: Alarms and events
185
MN002730A01-AD
Appendix E: Alarms and events
186
MN002730A01-AD
Appendix E: Alarms and events
E.4
CM Bridge Alarms and Events Overview
Events and alarms are reported for the CM Bridge as follows:
E.4.1
CM Bridge Alarms
Alarms are reported for the CM Bridge as follows:
187
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
NcmSynchronizedSta- CommFailure Device {0} is not reported by Device {0} is not reported by Communication NCM Synchronized Status
tus the system. the system. Alarm
XrtConnStatus Major XRT connection status. XRT connection has failed. Equipment XRT Connection Status
Alarm
VrcConnStatus Major VRC connection status. VRC connection has failed. Equipment VRC Connection Status
Alarm
PnConnStatus Major PN connection status. PN connection has failed. Equipment PN Connection Status
Alarm
XrtAuthFailure Major XRT authentication failure. XRT authentication failure. Equipment XRT Auth Failure
Alarm
CmbLicenseNotFound Major CMB license not found. CM Bridge license not found. Equipment CMB License Not Found
Alarm
BridgedTalkPathsZero Major Bridged talk paths set to Bridged talk paths set to Equipment Bridged Talk Paths Zero
zero. zero. Alarm
TalkPathsExceeded Major Number of allowed active Number of allowed active Equipment Talk Paths Exceeded
talk paths exceeded. talkpaths exceeded. Alarm
LcpPnConnStatus Major LCP PN connection status. LCP PN connection has Equipment LCP PN Connection Status
failed. Alarm
LcpVrcInstanceConn- Major LCP VRC instance connec- LCP VRC instance connec- Equipment LCP VRC Instance Con-
Status tion status. tion has failed. Alarm nection Status
E.4.2
CM Bridge Events
Events are reported for the CM Bridge as follows:
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
PropertyChanged Info Property {0} changed from {1} to Property {0} changed from {1} to Informational Event Property Changed
{2}. {2}.
DeviceStatus.Inactive.Dis- Info Current device status: Inactive Current Device Status: Inactive Informational Event Device Status
abled (Disabled). (Disabled).
DeviceStatus.Active.Ena- Info Current device status: Active (En- Current device status: Active (En- Informational Event Device Status
bled abled). abled).
188
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.Alarm (Alarm). (Alarm).
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.Locked (Locked). (Locked).
DeviceStatus.Un- Info Current device status: Unknown Current device status: Unknown Informational Event Device Status
known.NotReported (Not Reported). (Not Reported).
DeviceStatus.Unknown Info Current device status: Unknown. Current device status: Unknown. Informational Event Device Status
E.5
CMSS Alarms and Events Overview
Events and alarms are reported for the CMSS as follows:
E.5.1
CMSS Generic Events
The following table shows information on all generic CMSS events that are reported to SA.
189
MN002730A01-AD
Appendix E: Alarms and events
190
MN002730A01-AD
Appendix E: Alarms and events
191
MN002730A01-AD
Appendix E: Alarms and events
192
MN002730A01-AD
Appendix E: Alarms and events
193
MN002730A01-AD
Appendix E: Alarms and events
194
MN002730A01-AD
Appendix E: Alarms and events
195
MN002730A01-AD
Appendix E: Alarms and events
196
MN002730A01-AD
Appendix E: Alarms and events
197
MN002730A01-AD
Appendix E: Alarms and events
198
MN002730A01-AD
Appendix E: Alarms and events
199
MN002730A01-AD
Appendix E: Alarms and events
200
MN002730A01-AD
Appendix E: Alarms and events
201
MN002730A01-AD
Appendix E: Alarms and events
202
MN002730A01-AD
Appendix E: Alarms and events
203
MN002730A01-AD
Appendix E: Alarms and events
204
MN002730A01-AD
Appendix E: Alarms and events
205
MN002730A01-AD
Appendix E: Alarms and events
206
MN002730A01-AD
Appendix E: Alarms and events
207
MN002730A01-AD
Appendix E: Alarms and events
208
MN002730A01-AD
Appendix E: Alarms and events
209
MN002730A01-AD
Appendix E: Alarms and events
210
MN002730A01-AD
Appendix E: Alarms and events
211
MN002730A01-AD
Appendix E: Alarms and events
212
MN002730A01-AD
Appendix E: Alarms and events
213
MN002730A01-AD
Appendix E: Alarms and events
214
MN002730A01-AD
Appendix E: Alarms and events
215
MN002730A01-AD
Appendix E: Alarms and events
216
MN002730A01-AD
Appendix E: Alarms and events
217
MN002730A01-AD
Appendix E: Alarms and events
218
MN002730A01-AD
Appendix E: Alarms and events
219
MN002730A01-AD
Appendix E: Alarms and events
220
MN002730A01-AD
Appendix E: Alarms and events
221
MN002730A01-AD
Appendix E: Alarms and events
222
MN002730A01-AD
Appendix E: Alarms and events
E.5.2
CMSS Alarms and Events
The following entities are covered:
E.5.2.1
Processors
The following table provides information on all possible events generated against the CMSS, with the managed object name of Processors
E.5.2.2
Power
The following table provides information on all possible events generated against the CMSS, with the managed object name of Power
223
MN002730A01-AD
Appendix E: Alarms and events
E.5.2.3
Fan
The following table provides information on all possible events generated against the CMSS, with the managed object name of Fan
E.5.2.4
Temperature
The following table provides information on all possible events generated against the CMSS, with the managed object name of Temperature
E.5.2.5
Storage
The following table provides information on all possible events generated against the CMSS, with the managed object name of Storage
E.5.2.6
Port
The following table provides information on all possible events generated against the CMSS, with the managed object name of Port
224
MN002730A01-AD
Appendix E: Alarms and events
E.5.2.7
Configuration Issues
The following table provides information on all possible events generated against the CMSS, with the managed object name of Configuration
Issues
E.5.2.8
Storage Path
The following table provides information on all possible events generated against the CMSS, with the managed object name of Storage Path
E.5.2.9
Storage Paths
The following table provides information on all possible events generated against the CMSS, with the managed object name of Storage Paths
225
MN002730A01-AD
Appendix E: Alarms and events
E.5.2.10
Virtual machine
The following table provides information on all possible events generated against the VMware vCenter Server, with the managed object name of
Virtual Machine
E.6
MNIS Alarms and Events Overview
Events and alarms are reported for the MNIS as follows:
E.6.1
MNIS Alarms
Alarms are reported for the MNIS as follows:
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
NcmSynchronizedSta- CommFailure Device {0} is not reported by Device {0} is not reported by Communication NCM Synchronized Sta-
tus the system. the system. Alarm tus
E.6.2
MNIS Events
Events are reported for the MNIS as follows:
226
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
PropertyChanged Info Property {0} changed from {1} to Property {0} changed from {1} to Informational Event Property Changed
{2}. {2}.
MnisClientConnected Info Data/Voice client connected. Data/Voice client connected. Informational Event Mnis Client Connect-
ed
MnisClientDisconnected Info Data/Voice client disconnected. Data/Voice client disconnected. Informational Event Mnis Client Discon-
nected
DeviceStatus.Inac- Info Current device status: Inactive Current Device Status: Inactive Informational Event Device Status
tive.Disabled (Disabled). (Disabled).
DeviceStatus.Active.Ena- Info Current device status: Active Current device status: Active Informational Event Device Status
bled (Enabled). (Enabled).
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.Alarm (Alarm). (Alarm).
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.Locked (Locked). (Locked).
DeviceStatus.Un- Info Current device status: Unknown Current device status: Unknown Informational Event Device Status
known.NotReported (Not Reported). (Not Reported).
DeviceStatus.Unknown Info Current device status: Unknown. Current device status: Unknown. Informational Event Device Status
E.7
Generic SNMP Node Alarms and Events Overview
No entities are defined for Generic SNMP Node.
E.8
Generic SNMP Router Alarms and Events Overview
Events and alarms are reported for the Generic SNMP Router as follows:
E.8.1
Generic SNMP Router Alarms
There are two SNMP traps that are reported to SA as alarms, rather than events. See Generic SNMP Router Alarms table for more information.
227
MN002730A01-AD
Appendix E: Alarms and events
E.9
Generic SNMP Switch Alarms and Events Overview
Events and alarms are reported for the Generic SNMP Switch as follows:
E.9.1
Generic SNMP Switch Alarms
There are two LAN switch SNMP traps that are reported to SA as alarms, rather than events. See Generic SNMP Switch Alarms table for more
information.
E.10
HP Switch Alarms and Events Overview
This section documents the events sent from all HP hardware, received in HP OpenView, and displayed in the Unified Event Manager alarms
window.
E.10.1
HP Switch Main Traps
Use HP Switch Main Traps to determine the HP switch model that is generating event messages.
NOTICE: The actual event messages (noted by <event message> in the table below) are found in HP Switch.
228
MN002730A01-AD
Appendix E: Alarms and events
E.10.2
HP Switch Generic Events
This section documents the events sent from the HP Switch hardware, received in HP OpenView, and displayed in the Unified Event Manager
alarms window.
E.10.2.1
hpicfFaultFinderTrap
The HP Switch generic event messages appear in the following format, with "Unknown Event" always appearing at the beginning of the message:
Unknown Event - <hpicfFaultFinderTrap> <varbindFirst = varbind value> ... <varbindLast = varbind value>
See hpicfFaultFinderTrap Alarm table for more information on the hpicfFaultFinderTrap event with the associated OID: hpicfFaultFinderTrap
1.3.6.1.4.1.11.2.14.12.1.0.5
229
MN002730A01-AD
Appendix E: Alarms and events
hpicfFaultFinderTrap Variables table contains additional information on all variables that the hpicfFaultFinderTrap could display in the event
message:
230
MN002730A01-AD
Appendix E: Alarms and events
E.10.2.2
hpicfSensorTrap
The HP Switch generic event messages appear in the following format, with "Unknown Event" always appearing at the beginning of the message:
Unknown Event - <hpicfSensorTrap> <varbindFirst = varbind value> ... <varbindLast = varbind value>
See hpicfSensorTrap Alarm table for more information on the hpicfSensorTrap event with the associated OID: hpicfSensorTrap
1.3.6.1.4.1.11.2.14.12.1.0.3
231
MN002730A01-AD
Appendix E: Alarms and events
E.10.2.3
hpicfSelfTestTrap
The HP Switch generic event messages appear in the following format, with "Unknown Event" always appearing at the beginning of the message:
Unknown Event - <hpicfSelfTestTrap> <varbindFirst = varbind value> ... <varbindLast = varbind value>
See hpicfSelfTestTrap Alarm table for more information on the hpicfSelfTestTrap event with the associated OID: hpicfSelfTestTrap
1.3.6.1.4.1.11.2.14.12.1.0.4
Variables: helpHPSwitchSelfTestTrap.section.p.2
E.10.2.4
hpicfBridgeLoopProtectLoopDetectedNotification
The HP Switch generic event messages appear in the following format, with "Unknown Event" always appearing at the beginning of the message:
Unknown Event - <hpicfBridgeLoopProtectLoopDetectedNotification> <varbindFirst = varbind value> ... <varbindLast = varbind value>
See hpicfBridgeLoopProtectLoopDetectedNotification Alarm table for more information on the hpicfBridgeLoopProtectLoopDetectedNotification
event with the associated OID: hpicfBridgeLoopProtectLoopDetectedNotification 1.3.6.1.4.1.11.2.14.11.5.1.12.1.5.0.1
232
MN002730A01-AD
Appendix E: Alarms and events
E.10.2.5
hpicfConnectionRateFilterNotification
The HP Switch generic event messages appear in the following format, with "Unknown Event" always appearing at the beginning of the message:
Unknown Event - <hpicfConnectionRateFilterNotification> <varbindFirst = varbind value> ... <varbindLast = varbind value>
See hpicfConnectionRateFilterNotification Alarm table for more information on the hpicfConnectionRateFilterNotification event with the associated
OID: hpicfConnectionRateFilterNotification 1.3.6.1.4.1.11.2.14.11.5.1.24.0.1
E.10.2.6
hpicfIntrusionTrap
The HP Switch generic event messages appear in the following format, with "Unknown Event" always appearing at the beginning of the message:
233
MN002730A01-AD
Appendix E: Alarms and events
Unknown Event - <hpicfIntrusionTrap> <varbindFirst = varbind value> ... <varbindLast = varbind value>
See hpicfIntrusionTrap Alarm table for more information on the hpicfIntrusionTrap event with the associated OID: hpicfIntrusionTrap
1.3.6.1.4.1.11.2.14.12.4.0.1
E.10.3
HP Switch Alarms
There are two LAN switch SNMP traps that are reported to SA as alarms, rather than events. See HP Switch Alarms table for more information.
E.10.4
HP Switch Events
Use HP Switch Events for detailed information on events and alarms generated by the HP Switch. The event message is deciphered as follows:
• The first letter (I, C, M, or W) is the severity of the event:
- I: Info
- C: Clear
234
MN002730A01-AD
Appendix E: Alarms and events
- M: Major
- W: Warning
• <date time> is the date and time that the event was generated.
• <system name> is the system from which the event was generated. For instance, "chassis:" means that the chassis reported an event to SA.
• The message following the colon (:) is the event text that the LAN switch reports to the SA. Use the event message and the Additional Notes
column in the table to determine what actions to take for the event.
NOTICE: Event messages in the table are applicable to all HP Switch models.
235
MN002730A01-AD
Appendix E: Alarms and events
236
MN002730A01-AD
Appendix E: Alarms and events
237
MN002730A01-AD
Appendix E: Alarms and events
238
MN002730A01-AD
Appendix E: Alarms and events
239
MN002730A01-AD
Appendix E: Alarms and events
240
MN002730A01-AD
Appendix E: Alarms and events
241
MN002730A01-AD
Appendix E: Alarms and events
242
MN002730A01-AD
Appendix E: Alarms and events
243
MN002730A01-AD
Appendix E: Alarms and events
244
MN002730A01-AD
Appendix E: Alarms and events
245
MN002730A01-AD
Appendix E: Alarms and events
246
MN002730A01-AD
Appendix E: Alarms and events
247
MN002730A01-AD
Appendix E: Alarms and events
248
MN002730A01-AD
Appendix E: Alarms and events
249
MN002730A01-AD
Appendix E: Alarms and events
250
MN002730A01-AD
Appendix E: Alarms and events
E.10.5
HP Switch Trap Rules
Use HP Switch Events for detailed information on HP Switch trap rules.
NOTICE: Event messages in the table are applicable to all HP Switch models.
251
MN002730A01-AD
Appendix E: Alarms and events
252
MN002730A01-AD
Appendix E: Alarms and events
253
MN002730A01-AD
Appendix E: Alarms and events
254
MN002730A01-AD
Appendix E: Alarms and events
255
MN002730A01-AD
Appendix E: Alarms and events
256
MN002730A01-AD
Appendix E: Alarms and events
257
MN002730A01-AD
Appendix E: Alarms and events
258
MN002730A01-AD
Appendix E: Alarms and events
259
MN002730A01-AD
Appendix E: Alarms and events
260
MN002730A01-AD
Appendix E: Alarms and events
E.11
System Advisor Alarms and Events Overview
Events and alarms are reported for the System Advisor and System Advisor subsystems as follows:
E.11.1
System Advisor Alarms and Events
The following entities are covered:
E.11.1.1
Activity State Events
Events are reported for the SA Activity State as follows:
261
MN002730A01-AD
Appendix E: Alarms and events
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
DeviceStatus * Current device status: Inactive (Dis- System Advisor is inactive. Informational Event Device Status
abled)
DeviceStatus * Current device status: Active (Ena- System Advisor is active. Informational Event Device Status
bled)
DeviceStatus * Current device status: Inactive (Not Local System Advisor is inactive, because it is Informational Event Device Status
Reported) not reported by the system.
DeviceStatus * Current device status: Unknown Activity state of System Advisor is unknown, Informational Event Device Status
(Not Reported) because it is not reported by the system.
E.11.1.2
Application
The following table provides information on all possible events generated against the Application, with the managed object name of
COMMON_APPLICATION_FAULT.
262
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
263
MN002730A01-AD
Appendix E: Alarms and events
264
MN002730A01-AD
Appendix E: Alarms and events
265
MN002730A01-AD
Appendix E: Alarms and events
266
MN002730A01-AD
Appendix E: Alarms and events
E.11.1.3
DSR Synchronization Object
The following table provides information on all possible events generated against the DSR Synchronization Object, with the managed object name
of DSR_SYNCH_OBJ_FAULT.
267
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
E.11.1.4
Broker Server Link
The following table provides information on all possible events generated against the Broker Server Link, with the managed object name of
BROKER_SERVER_LINK.
Additional information, if any reported by the device, may be presented at the end of the message.
E.11.1.5
CM Capacity
The following table provides information on all possible events generated against the CM Capacity, with the managed object name of
CM_CAPACITY_FAULT.
268
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
E.11.1.6
Ethernet Card
The following table provides information on all possible events generated against the Ethernet Card, with the managed object name of
SERVER_FRU_ETHERNET_CARD_FAULT.
269
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
270
MN002730A01-AD
Appendix E: Alarms and events
E.11.1.7
Fan
The following table provides information on all possible events generated against the Fan, with the managed object name of
SERVER_FRU_FAN_FAULT.
Additional information, if any reported by the device, may be presented at the end of the message.
271
MN002730A01-AD
Appendix E: Alarms and events
E.11.1.8
Hard Disk
The following table provides information on all possible events generated against the Hard Disk, with the managed object name of
SERVER_FRU_HARDDISK_FAULT.
272
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
E.11.1.9
Power Supply
The following table provides information on all possible events generated against the Power Supply, with the managed object name of
SERVER_FRU_POWER_SUPPLY_FAULT.
273
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
This entity can have multiple instances in following format:Power Supply<entity instance id>, for example:Power Supply1.
E.11.2
Application Service Alarms and Events
The following entities are covered:
E.11.2.1
Application Service
The following table provides information on all possible events generated against the Application Service, with the managed object name of
APPLICATION_SERVICE_FAULT.
274
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
E.11.2.2
Database Service
The following table provides information on all possible events generated against the Database Service, with the managed object name of
DATABASE_SERVICE_FAULT.
Additional information, if any reported by the device, may be presented at the end of the message.
E.11.2.3
JVM Service
The following table provides information on all possible events generated against the JVM Service, with the managed object name of
JVM_SERVICE_FAULT.
275
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
This entity can have multiple instances in following format:JVM Service<entity instance id>, for example:JVM Service1.
E.11.2.4
Processing Queue
The following table provides information on all possible events generated against the Processing Queue, with the managed object name of
PROCESSING_QUEUE_FAULT.
Additional information, if any reported by the device, may be presented at the end of the message.
This entity can have multiple instances in following format:Processing Queue<entity instance id>, for example:Processing Queue1.
E.11.2.5
NCM Service
The following table provides information on all possible events generated against the NCM Service, with the managed object name of
NCM_SERVICE_FAULT.
276
MN002730A01-AD
Appendix E: Alarms and events
Additional information, if any reported by the device, may be presented at the end of the message.
E.11.2.6
Call Monitoring Service
The following table provides information on all possible events generated against the Call Monitoring Service, with the managed object name of
CM_SERVICE_FAULT.
Additional information, if any reported by the device, may be presented at the end of the message.
E.11.2.7
Config Service
The following table provides information on all possible events generated against the Config Service, with the managed object name of
CONFIG_SERVICE_FAULT.
Additional information, if any reported by the device, may be presented at the end of the message.
E.12
Repeater Alarms and Events Overview
Events and alarms are reported for the Repeater as follows:
277
MN002730A01-AD
Appendix E: Alarms and events
E.12.1
Repeater Alarms
Alarms are reported for the Repeater as follows:
278
MN002730A01-AD
Appendix E: Alarms and events
279
MN002730A01-AD
Appendix E: Alarms and events
280
MN002730A01-AD
Appendix E: Alarms and events
281
MN002730A01-AD
Appendix E: Alarms and events
282
MN002730A01-AD
Appendix E: Alarms and events
283
MN002730A01-AD
Appendix E: Alarms and events
284
MN002730A01-AD
Appendix E: Alarms and events
E.12.2
Repeater Events
Events are reported for the Repeater as follows:
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
PropertyChanged Info Property {0} changed from {1} to Property {0} changed from {1} to Informational Event Property Changed
{2}. {2}.
RolesUpdated Info {0} active roles: {1}. Repeater active roles: {1}. Informational Event Roles Updated
NoRoles Info No active roles for {0}. No active roles for {0}. Informational Event Roles Updated
DeviceStatus.Inactive.Disa- Info Current device status: Inactive Current Device Status: Inactive Informational Event Device Status
bled (Disabled). (Disabled).
DeviceStatus.Active.Ena- Info Current device status: Active Current device status: Active (En- Informational Event Device Status
bled (Enabled). abled).
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.Alarm (Alarm). (Alarm).
DeviceStatus.Inactive.NA Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
(NA). (NA).
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.Locked (Locked). (Locked).
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.RPMode (RP Mode). (RP Mode).
DeviceStatus.Unknown.No- Info Current device status: Unknown Current device status: Unknown Informational Event Device Status
tReported (Not Reported). (Not Reported).
DeviceStatus.Unknown Info Current device status: Unknown. Current device status: Unknown. Informational Event Device Status
285
MN002730A01-AD
Appendix E: Alarms and events
E.13
Replicator Alarms and Events Overview
Events and alarms are reported for the Replicator as follows:
E.13.1
Replicator Alarms
Alarms are reported for the Replicator as follows:
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
NcmSynchronizedSta- CommFailure Device {0} is not reported by Device {0} is not reported by Communication NCM Synchronized Sta-
tus the system. the system. Alarm tus
E.13.2
Replicator Events
Events are reported for the Replicator as follows:
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
PropertyChanged Info Property {0} changed from {1} to {2}. Property {0} changed from {1} to {2}. Informational Event Property Changed
E.14
Trunk Controller Alarms and Events Overview
Events and alarms are reported for the Trunk Controller as follows:
E.14.1
Trunk Controller Alarms
Alarms are reported for the Trunk Controller as follows:
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
NcmSynchronizedSta- CommFailure Device {0} is not reported by Device {0} is not reported by Communication NCM Synchronized Sta-
tus the system. the system. Alarm tus
286
MN002730A01-AD
Appendix E: Alarms and events
E.14.2
Trunk Controller Events
Events are reported for the Trunk Controller as follows:
Event Name Severity Event/Alarm Message Event/Alarm Description Event Category Manager Entity
PropertyChanged Info Property {0} changed from {1} to Property {0} changed from {1} to Informational Event Property Changed
{2}. {2}.
RolesUpdated Info {0} active roles: {1}. Repeater active roles: {1}. Informational Event Roles Updated
NoRoles Info No active roles for {0}. No active roles for {0}. Informational Event Roles Updated
DeviceStatus.Inactive.Dis- Info Current device status: Inactive Current Device Status: Inactive Informational Event Device Status
abled (Disabled). (Disabled).
DeviceStatus.Active.Ena- Info Current device status: Active (En- Current device status: Active (En- Informational Event Device Status
bled abled). abled).
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.Alarm (Alarm). (Alarm).
DeviceStatus.Inac- Info Current device status: Inactive Current device status: Inactive Informational Event Device Status
tive.Locked (Locked). (Locked).
DeviceStatus.Un- Info Current device status: Unknown Current device status: Unknown Informational Event Device Status
known.NotReported (Not Reported). (Not Reported).
DeviceStatus.Unknown Info Current device status: Unknown. Current device status: Unknown. Informational Event Device Status
287