Allied Telesis™ AlliedView Network Management System (NMS) Administration Guide Release 14.2 Copyright © 2013 Allied Telesis, Inc. All rights reserved Information in this document is subject to change without notice.
Introduction to the AlliedView NMS Product Congratulations on your purchase of the Allied Telesis™ Network Management System (NMS) product. This product allows administrators to query and control all aspects of Allied Telesis products in their network. This document covers both the Service Provider Edition (SE) and Entperise Edition (EE) versions of the product. Reason for Update The following table lists updates for release 14.2. TABLE 1-1 Changes to the AlliedView NMS in Release 14.2 Feature 14.
Information is organized into the following chapters: • Chapter 1 provides an overview of the product, how the document is organized, and the changes that have occurred to both the product and this document since the last release. • Chapter 2 gives an overview of the installation process and starting up the client interfaces • Chapter 3 includes the real-time tasks available on the NMS (do not require a server restart).
• Allied Telesis™ AlliedView Network Management System (NMS) Installation Guide • Allied Telesis™ AlliedView Network Management System (NMS) User Guide Legal Notices This product contains copyright material licensed from Zoho Corporation, http://www.zoho.com. All rights to such copyright material rest with Zoho Corporation. Service and Support For information about support services for Allied Telesis, contact your Allied Telesis sales representative or visit the website at http://www.alliedtelesis.com.
Table of Contents 1 The AlliedView Network Management System (NMS) - - - - - - - - - - - - - - - - - - - 1 1.1 AlliedView NMS Editions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1 1.2 Managed Devices (Firmware Interop) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2 1.2.
3.2.5 CLI Logins Tab- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -45 3.2.6 Network Discovery Tab - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -47 3.2.7 Node Discovery Tab- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -48 3.
4.5.4 Set Scope Properties- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -92 4.5.5 Deleting Authorized Scope - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -93 4.6 Permissions Tree - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 93 4.6.
5.5.9 CFC56, CFC100, and CFC200 Card - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 211 5.5.10 FE10/FX10 Card- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 211 5.5.11 FX20 Card - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 213 5.5.
5.7.1 5.7.2 5.7.3 5.7.4 5.7.5 5.7.6 5.7.
6.3.2 Modify the Network VLAN Link Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 402 6.3.3 Configure the VLAN Interfaces (Service Ports) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 404 6.4 Extending Network VLANs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 407 6.
6.11.11 Example of an EPON/ONU Interface Policy- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 502 6.11.12 QoSPolicies for the FX20 Interface - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 507 6.12 Troubleshooting Policies and Profile Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 514 6.12.
6.20.1 6.20.2 6.20.3 6.20.
7.6.4 Configuration 3 - Static Provisioning (no DHCP) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 732 7.6.5 Configuration 4 - EPON/ONU Interface Connected with iMG646PX-ON - - - - - - - - - - - - - - - - - - - - 741 7.6.6 Configuration 5 - Voice Service Provided by SIP- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 744 7.6.
7.12.4 Custom View- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 869 7.12.5 Procedure - Initial Installation of iMG with LAN4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 872 7.12.6 Deprovision the iMG and Re-provision with the ADSL Uplink - - - - - - - - - - - - - - - - - - - - - - - - - - - 875 7.
9.4.5 Changing Severity of Default Events (i.e. Status Update Failure) - - - - - - - - - - - - - - - - - - - - - - - - - - - 924 9.4.6 Changing Severity of Port-based Alarms - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 928 9.5 Configuring Event Filters- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 929 9.5.
11.8 Trap Parser - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 963 11.8.1 Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 963 11.8.2 Procedure to Create a Parser File - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 965 11.8.
1. The AlliedView Network Management System (NMS) The NMS provides a powerful client for managing a network. It presents the network and its devices in a user-friendly way, allowing you to quickly learn how the network is configured, how to reconfigure elements and how to spot problems before they degrade network performance. To set up the NMS product, you first need to install the NMS on a server.
The AlliedView Network Management System (NMS) TABLE 1-1 Managed Devices (Firmware Interop) Enterprise Edition Feature Set (Continued) Feature Description when used in Enterprise Edition Reference Devices Supported These are the same as with the Service Provider Edition, as well as monitoring of non-ATI devices. Section 1.3 Triple Play Customer Management Triple Play provisioning of voice, video, and data services are not supported by the Enterprise Edition NMS.
The AlliedView Network Management System (NMS) TABLE 1-2 Managed Devices (Firmware Interop) Device Support for the AlliedView NMS (Continued) Family (Level of Support) Devices Latest Software Release Notes AT-AR442 AT-AR442S 2.9.2 End-of-Life (EOL) AT-AR720 2.6.x-x End-of-Life (EOL) 2.9.1-x End-of-Life (EOL) AT-AR750S 2.9.2-xx End-of-Life (EOL) AT-AR770S 2.9.2-xx End-of-Life (EOL) AT-8012M 3.3.x End-of-Life (EOL) 3.0.0.x Full range of support is 1.0.0.19 up to 3.0.0.44.
The AlliedView Network Management System (NMS) TABLE 1-2 Managed Devices (Firmware Interop) Device Support for the AlliedView NMS (Continued) Family (Level of Support) Devices AT-8200 AT-8224XL Latest Software Release Notes 2.0.x End-of-Life (EOL) 1.4.x End-of-Life (EOL) AT-8224SL AT-8216XL AT-8216FXL/SC AT-8216FXL/SMSC AT-8300 AT-8312 AT-8324 AT-8500 AT-8516FSC AT-8524M AT-8525 AT-8525 AT-8524POE AT-8550GB AT-8550SP AT-8600 AT-8624POE 2.9.
The AlliedView Network Management System (NMS) TABLE 1-2 Managed Devices (Firmware Interop) Device Support for the AlliedView NMS (Continued) Family (Level of Support) Devices Latest Software Release AT-9000 AT-9000/28 2.1.2 AT-9000/28SP AT-9000/52 Notes LLDP and LLDP-MED for this device is not supported; values cannot be retrieved through SNMP (available LLDP MIBS do not return corresponding values). Mode LED indicator is fixed in the ACT Mode. The NMS has no provision for Mode Selection.
The AlliedView Network Management System (NMS) TABLE 1-2 Managed Devices (Firmware Interop) Device Support for the AlliedView NMS (Continued) Family (Level of Support) Devices Latest Software Release x600 AT-x600-24Ts 5.4.3 (AlliedWare Plus) AT-x600-24TsXP AT-x600-24Ts-POE AT-x600-48Ts AT-x600-48TsXP AT-x610-24Ts (AlliedWare Plus) AT-x610-24Ts-PoE+ 5.4.3 AT-x610-24Ts/X AT-x610-24Ts/X-PoE+ AT-x610-48Ts AT-x610-48Ts/X AT-x610-48Ts/X-PoE+ The Stack-XG card can be swapped during operation (e.g.
The AlliedView Network Management System (NMS) TABLE 1-2 Managed Devices (Firmware Interop) Device Support for the AlliedView NMS (Continued) Family (Level of Support) Devices RG203 RG203TX-SIP/H323 Latest Software Release Notes 6.x End-of-Life (EOL) End-of-Life (EOL) RG203TX v2-SIP/H323 RG213 RG213-H323 RG213-MGCP RG213-SIP Rapier Rapier24 2.3.1-x (Full Support) Rapier48 2.7.0-x Rapier “G” RapierG6 2.7.3-09 End-of-Life (EOL) 2.9.1-20 End-of-Life (EOL) 2.7.
The AlliedView Network Management System (NMS) TABLE 1-2 Managed Devices (Firmware Interop) Device Support for the AlliedView NMS (Continued) Family (Level of Support) Devices Latest Software Release Notes iMAP 7100 6.1.12 End-of-Life (EOL) (Full Support) 7101 17.0.x 17.0.x support begins with version 17.0.1. 17.0.0 is not supported. 7102 7103 7104 7105 7112 7115 7400 7700 iMAP 9000 9400 (Full Support) 9700 iMAP releases are supported up to two releases prior to the current release.
The AlliedView Network Management System (NMS) TABLE 1-2 Managed Devices (Firmware Interop) Device Support for the AlliedView NMS (Continued) Family (Level of Support) Devices Latest Software Release GS Series CentreCOM-GS924M 1.6.6 Notes CentreCOM-GS916M CentreCOM-GS908M CentreCOM-GS924Mv2 2.1.0 CentreCOM-GS916Mv2 CentreCOM-GS908Mv2 2.4.1 CentreCOM GS908v2-4PS CentreCom 9048XL CentreCOM 9048XL 2.1.0 1.2.
The AlliedView Network Management System (NMS) TABLE 1-3 Managed Devices (Firmware Interop) Devices Supported by NMS - Network Inventory, IP Maps, Alarms (Continued) Family Devices Extreme Summit X250e X250e-24t Notes X250e-24p X250e-24x X250e-48t X250e-48p X250e-24tDC X250e-24xDC X250e-48tDC Extreme Summit X450a X450a-24t X450a-48t X450a-24tDC X450a-24xDC X450a-24x X450a-48tDC Juniper SSG-550M SSG 550M NetScreen NS-208 NS-50 NS-5XT A10 AX3200 A100-AX3200 AlliedView NMS Administration Guide
The AlliedView Network Management System (NMS) Managed Devices (Firmware Interop) 1.2.3 iMG/RG Types Supported 1.2.3.1 iMG/RG Device Support (up to 3-8-03) Table 1-4 lists a history of iMG/RG devices, and includes those that support 3-8-03. Note: This table lists all of the iMG/RGs that can be upgraded to 3-7 (using the Migration tool) and then which of those devices can be upgraded to 3-8.
The AlliedView Network Management System (NMS) TABLE 1-4 Levels of Support History of iMG/RG Releases Through 3-8-03 (Continued) Device1 Previous 3-72 3-8-01 3-8-02 3-8-03 iMG634-WB-R2 - Yes Yes Yes Yes iBG915-FX 3-6 Yes Yes Yes Yes Notes 1. Refer to 7.17 for functional groupings of iMGs/RGs. 2. The Migration Tool allows the offline migration of 2-5 im.conf to 3-7 format. 3. iMG726BD-ON has same processor and feature support with LAN and BD interfaces (no optional modules). 1.2.3.
The AlliedView Network Management System (NMS) Levels of Support For the Provision feature group, if a product supports all the features, there is All in the first row. TABLE 1-6 Product Support Features for the AlliedView NMS 1 T-1000 Rapier Family2 SB/9800 Family3 x900 Family4 5 x6006 x6107 SBx3112 SBx81125 Support Features iMAP 9000 View Chassis Y - Y Y Y8 Y Y Y Y Device Log Management Y Y Y Y Y Y Y Y Y Backup/Restore Y N Y Y Y Y Y Y Y Command Script Mgmt.
The AlliedView Network Management System (NMS) Levels of Support 7. Includes the x610-24SPs/X, x610-24Ts, x610-24Ts-PoE+, x610-24Ts/X, x610-24Ts/X-PoE+, x610-48Ts, x610-48Ts-PoE+, x610-48Ts/X, x610-48Ts/X-PoE+ 8. For x900 stacked and SBx908 stacked, the chassis view shows both ETH0 ports as green, although only one should be green (the stack member with the connected eth0 port). 9. Card Management not supported. The device has no available card/slot. 10. When the SBx3112 is running R15.
The AlliedView Network Management System (NMS) TABLE 1-7 Levels of Support Product Support Features for the AlliedView NMS (Continued) AR 7001 AR 400 AR 400s2 AT8324 AT8xxx3 AT85xx4 AT97005 AT8000S6 AT8000GS7 AT8100S8 AT90009 G6/ G2 - Card, Port Management - - - - - - - Y12 Y12 Y13 14 Y13 N - Syslog Y N N N N N N N N Y15 Y16 N - SSH Y Y Y N N Y Y Y Y Y17 Y N WebGen Service Y - - - - - - - - - - - - Link Operations - Y Y Y Y N N Y Y
The AlliedView Network Management System (NMS) Levels of Support 18. Provision/De-provision button under Port Management is disabled since Profile Management function is not yet supported. 19. To display the LAG configuration on the Physical Network Map during discovery, LLDP must be enabled. 20. No alarm is generated after a cold or warm restart. 1.3.3 Specific Market Devices Table 1-8 and Table 1-9 list the support features for the AlliedView NMS for other products.
The AlliedView Network Management System (NMS) TABLE 1-8 Levels of Support Product Support Features for the AlliedView NMS (Continued) Extreme Summit2 Extreme BD3 Netscreen 208 1 Support Features Juniper LAG - - - - VCS Monitoring - - - - Alarms/Events - - - - Performance - - - - Browse Device - - - - Rediscover Device - - - - 1. 2. 3. 4.
The AlliedView Network Management System (NMS) TABLE 1-9 Levels of Support AlliedView NMS CentreCOM Product Support (Continued) Support Features AR Series1 8000 series2 9400 Series3 MC2600 MC2700 - EPSR N Y - - Y - CES N Y - - Y - - GS Series FS Series4 9048XL Y Y Y - N N N - N N N 19 20, 21 LLDP Configuration Y Alarms/Events Y Y Y Y Y24 Y Y Y Performance Y Y Y Y Y Y Y Y Browse Device Y N Y Y - Y Y Y Rediscover Device Y Y Y Y Y Y Y
The AlliedView Network Management System (NMS) Levels of Support 1.3.4 Devices Supported by SwimView Table 1-10 lists the devices that are discoverd and viewed/modified by SwimView. Note: Contact your Allied Telesis Customer Representative for detailed information on using these devices with SwimView, since many of them fulfill specific market requirements.
2. Starting Up Refer to the AlliedView NMS Installation Guide for instructions on how to start up the AlliedView NMS server and client on Windows and Solaris platforms. 2.1 Password Configuration The NMS provides the option to configure your password once you have logged into the application client or the browser client for the first time. The Password Configuration dialog box appears by choosing the Tools -> Change Password menu item. Refer to the following figure.
Starting Up The Application Screen FIGURE 2-2 Console File Window 2.3 The Application Screen When you log in to the Application interface, the default screen that is displayed shows a map containing the map symbols that represent the discovered network devices. Refer to the following figure. You can find the common Menu Bar, Toolbar, Map Toolbar, AlliedView NMS Client Tree, Alarm Count Panel, Status Bar, and the AlliedView NMS Panel displayed in the user interface.
Starting Up Broadcasting a Message FIGURE 2-3 Initial Network Interface 2.4 Broadcasting a Message The option File -> Broadcast Message can be used to send messages to all the clients. When this option is selected, the message is sent to all the clients managed by the main AlliedView NMS Server by default. (The option chosen does not matter.) When this option is selected, a dialog that contains the following details pops up. Refer to the following figure.
Starting Up Restart / Shut Down the Server The following table lists the properties for broadcasting a message. TABLE 2-1 Properties for Broadcasting a Message Property Details for Broadcast Message Properties Message The message to be broadcast. Option Two message options. The option Send to my FE client only is not supported. The other option is Send to all clients. When this option is selected, the message is sent to all the clients that are managed by the main AlliedView NMS Back-End Server.
Starting Up Resource Management 2.6 Resource Management 2.6.1 Setting the Custom Security Policy (Required) This must be set for the server. • Find the java runtime environment (jre). It’s usually located in: :/Program Files/Java/jre* or use the Control Panel Java Plug-in tool “Advanced” tab to see the exact path of the java runtime. • Open the java.policy file in lib/security (under the jre path).
Starting Up Resource Management 2.6.3 Front-End Monitor Note: This applies to the distributed FE system available prior to 11.0. In the example above, there is the default client to BE configuration. This has the following information: • Resource Manager (in window title) - This is the server the client currently is connected to. (If the client is locally connected to the server this will be localhost.) • HostName - These are the servers currently deployed in the AlliedView NMS server configuration.
3. File Administration Many administrative tasks for the AlliedView NMS are done by adding, changing, and deleting files on the server. However, directly accessing these files should not be attempted, since a loss of AlliedView NMS functionality could result. The NMS provides GUI-based functions that make updating the AlliedView NMS files easy and less error-prone. Moreover, the server does not have to be restarted for the changes to take effect. However, a few tasks do involve restarting the server.
File Administration TABLE 3-1 Discovery Configurator (Service Provider) Task List for File Administration (Continued) Task Screen / Form Name (if Applicable) Section AlliedView NMS Backup and Restore AlliedView NMS Backup 3.4.1 AlliedView NMS Restore 3.4.4 Device Backup Limit 3.4.5 Node Limiting, Registering NMS load AlliedView NMS License Manager 3.5 Software Downloads Software Configuration (Modify Release Configuration, Create Custom Load buttons) 3.
File Administration Discovery Configurator (Service Provider) 3.1.1 Schedule Tab FIGURE 3-1 Discovery Configurator – Schedule Tab The Schedule tab allows configuring the rediscovery time, the time all managed devices in networks included for discovery in the Network Discovery tab will be rediscovered to update the NMS database with any changes, including the addition of new devices. Devices in the Node Discovery tab will not be rediscovered.
File Administration Discovery Configurator (Service Provider) 3.1.2 SNMP Tab FIGURE 3-3 Discovery Configurator – SNMP Tab Only devices that respond to SNMP can be discovered and managed by the AlliedView NMS. The NMS will perform “SNMP Ping” operations with each of the given read communities until a device responds or all communities have been tried and failed. (SNMP Pings are essentially SNMP get requests for selected system variables.
File Administration Discovery Configurator (Service Provider) Communities will be attempted in the order displayed. The order may be modified by selecting a row and then clicking on the up/down buttons. Communities may be added, modified, or deleted with the Add, Modify or Delete Buttons. The Add button will add to the list whatever is in the Read or Write text field. The Modify button will replace whatever is in the selected row with whatever has been typed in the Read or Write text field.
File Administration Discovery Configurator (Service Provider) FIGURE 3-4 Discovery Configurator – CWMP Tab To add a new credential: 1. In the ACS Username or CPE Username field, enter a valid username. 2. In the ACS Password or CPE Password field, enter the password associated with the username. 3. Click Add. To modify a credential: 1. In the ACS or CPE list, select the row of the credential you want to change. 2.
File Administration 2. Discovery Configurator (Service Provider) Click Delete. To change the order of the credentials: 1. In the ACS or CPE list, select the row of the credential you want to move. 2. Click the up ( ) or down ( )arrow below the list to change the location of the credential in the list. 3.1.
File Administration Discovery Configurator (Service Provider) FIGURE 3-5 Discovery Configurator – CLI Logins Tab Once a device has been discovered by SNMP, more detailed discovery requiring a CLI login is required to manage the device. The NMS attempts to log into each device until it either discovers an accepted login or all login attempts are rejected. The login sequence generally follows the order of the logins in the table.
File Administration Discovery Configurator (Service Provider) The Description field is a free format reminder of what each login entry represents. There are 2 login types: User and Security Officer, which are specified by the radio buttons. The “user” type uses the User Id and Password to initially log into the device. User login is all that’s required for iMAPs running without TACPLUS. If an iMAP is running with TACPLUS enabled, the NMS also needs a Security Officer passcode (to enable securityofficer).
File Administration Discovery Configurator (Service Provider) 3.1.5 Network Discovery Tab FIGURE 3-6 Discovery Configurator – Network Discovery Tab This tab specifies networks to discover (or exclude from discovery). The discovery process will attempt to discover devices at all IP addresses in the network (or exclude all such addresses if configured for exclusion). Networks can be added, modified, or deleted with the Add, Modify, and Delete buttons.
File Administration Discovery Configurator (Service Provider) The “Entire Network” radio button, when selected means to use all addresses in the network, specified by the IP Address and Net Mask fields. When “Set of Nodes” is selected instead, only the addresses from the Start IP to the End IP will be discovered.
File Administration Discovery Configurator (Service Provider) 3.1.6 Node Discovery Tab FIGURE 3-8 Discovery Configurator – Node Discovery Tab. This tab specifies specific nodes to discover (or exclude from discovery). Nodes can be added, modified, or deleted with the Add, Modify, and Delete buttons. The “Discover Node” toggle, when checked, means to discover the node. When unchecked, that node will be ignored (excluded) from discovery.
File Administration Discovery Configurator (Service Provider) FIGURE 3-9 Setting Properties for SNMPv3 The user can add networks and nodes in the Network Inventory screen as Managed Objects and this will take effect immediately. The menu choice: • Network Inventory / Edit -> Add Network • Network Inventory / Edit -> Add Node brings up the dialog to add a network or node. Refer to 3.3.
File Administration Discovery Configurator (Service Provider) 3.1.7 Other Discovery Tab FIGURE 3-10 Discovery Configurator – Other Discovery Tab This tab lists sysOIDs (SNMP system Object Identifiers) of devices to be included for discovery. Any device discovered by way of SNMP will be rejected unless its sysOID is one of these from this table. The defaults for this table are the Allied Telesis devices fully-supported by the AlliedView NMS.
File Administration Discovery Configurator (Service Provider) FIGURE 3-11 Discovery Configurator – Other Discovery Tab - Translate Display Option AlliedView NMS Administration Guide 40
File Administration Discovery Configurator (EE) 3.2 Discovery Configurator (EE) 3.2.1 Overview The Discovery Configurator has the following features: 1. The GUI allows enabling/disabling of Discovery. 2. ICMP Discovery (using Ping) can be configured, and SNMP Discovery is optional. 3. The local network can be discovered using a simple option. 4. Rediscovery can be disabled. 5. DHCP support is provided. 6. There is no sysOID filtering.
File Administration Discovery Configurator (EE) Options for the Basic tab are: • Enable Discovery -The default is checked; if not checked, Discovery will not be performed. • Discover Local Network - The default is not checked; if checked, nodes from the local network (where the NMS resides) are discovered. • Rediscover Already Discovered Nodes - If checked (the default), nodes already discovered are rediscovered based on the rediscovery interval that has been set.
File Administration Discovery Configurator (EE) 3.2.3 SNMP Tabs Refer to the following figure. FIGURE 3-13 SNMP - EE Version SNMP discovery can be enabled or disabled. If disabled, the rest of this tab is grayed-out. If enabled, the NMS will use this configuration during network discovery to test IP addresses for the presence of SNMP-enabled devices.
File Administration Discovery Configurator (EE) 3.2.3.1 SNMPv2 For most devices, only read communities are used during discovery. Some devices, including iMG/RGs, require discovering write communities as well. Communities will be attempted in the order displayed. The order may be modified by selecting a row and then clicking on the up/down buttons. Communities may be added, modified, or deleted with the Add, Modify or Delete Buttons.
File Administration Discovery Configurator (EE) 3.2.5 CLI Logins Tab Refer to the following figure.
File Administration Discovery Configurator (EE) Status polling via ICMP or SNMP does not require CLI access; CLI discovery is only required when device configuration (backups, port management, VLAN management, etc.) is desired and is only applicable to fully-supported devices (refer to Section 1). Once a device has been discovered by way of SNMP, more detailed discovery requiring a CLI login is required to manage the device.
File Administration Discovery Configurator (EE) 3.2.6 Network Discovery Tab FIGURE 3-15 Network Discovery Tab - EE Version This tab specifies networks to discover (or exclude from discovery). The discovery process will attempt to discover devices at all IP addresses in the network (or exclude all such addresses if configured for exclusion). Networks can be added, modified, or deleted with the Add, Modify, and Delete buttons.
File Administration Discovery Configurator (EE) When “Set of Nodes” is selected, the DHCP option becomes available. Use this option if IP addresses are assigned dynamically. The NMS will then use MAC addresses to identify hosts rather than IP addresses or host names. If SNMP discovery is enabled, network discovery will normally use the parameters configured on the SNMP tab, but they can be overridden for specific networks and subnets by selecting the SNMP option on this tab.
File Administration Adding a Network or Node from the Network Inventory This tab specifies specific nodes to discover (or exclude from discovery). Nodes can be added, modified, or deleted with the Add, Modify, and Delete buttons. The “Discover Node” toggle, when checked, means to discover the node. When unchecked, that node will be ignored (excluded) from discovery. The “Discover Parent Network” tab means to discover all the devices in the parent network as well.
File Administration Backup and Restore FIGURE 3-18 Add Node (From Network Inventory) 3.4 Backup and Restore 3.4.1 AlliedView NMS Backup (On Demand) To make an immediate backup of the server and database files, choose from the main menu Tools -> NMS Database Backup, and the option On Demand. A dialog box appears, as shown in Figure 3-19. FIGURE 3-19 NMS Backup Confirmation Dialog Clicking OK starts the backup process window.
File Administration Backup and Restore FIGURE 3-20 Backup Process Complete Window The controlling of where the backup is written to is explained in 3.4.3. 3.4.2 AlliedView NMS Backup (Scheduled) To backup the NMS server on a schedule, choose from the main menu Tools -> NMS Database Backup, and the option Scheduled. A dialog box appears, as shown in Figure 3-21.
File Administration Backup and Restore FIGURE 3-21 AlliedView NMS Administration Guide NMS Backup Schedule 52
File Administration Backup and Restore 3.4.3 Configuring Backup Parameters for AlliedView NMS A backup of the NMS configuration can be performed on demand or on a schedule. When the files are being backed up on demand, the console window shows the path where the files are being copied. When the files are being backed up on a schedule, the Backup Destination field (seen in Figure 3-21) shows this path. The path used is controlled by the file: /conf/AT_NmsBackupFiles.
File Administration Backup and Restore FIGURE 3-23 3. Starting the AlliedView NMS Recovery Feature (Windows) Selecting the NMS exec file brings up the NMS Restore Tool. Use the Browse button to bring up the relevant backup file. In searching there is the Zip option to search through only zip type files. Refer to the following figure. FIGURE 3-24 4. Selecting Files for AlliedView Restore Press Open to bring up the NMS Restore window with the selected backup file, and then OK to start the restore.
File Administration AlliedView NMS Administration Guide Backup and Restore FIGURE 3-25 AlliedView NMS Restore - Start FIGURE 3-26 AlliedView NMS Restore - Finish 55
File Administration Backup and Restore 3.4.5 Device Backup (Per-Device Limit) Daily backups of a large network will eventually use up all the disk memory unless customers manually purge old files. One feature to address this is using file configuration as follows: The limit is configured in conf/AT_NmsBackupFiles.conf The property is ATIDEVICE_BACKUP_LIMIT Setting this to zero is equivalent to no limit. Setting this to a non-zero number is the number of device backups allowed.
File Administration AlliedView NMS License Manager 3.5 AlliedView NMS License Manager 3.5.1 Overview In release 10.0, there is a change to the license manager strategy that involves the following changes: • The license key is associated with the customer who has registered the license rather than the hardware where the key was installed.
File Administration AlliedView NMS License Manager FIGURE 3-27 License Manager Tool The license key installation user interface has three main sections: • Current License Information (Top): This section has information on the key that is already installed. It displays the license status including user information, product and all components being licensed. • License File Selection (Middle): This section allows the user to select the license file to be applied.
File Administration AlliedView NMS License Manager FIGURE 3-28 License History When the user selects the Apply button, the selected file is read and checked, installed, and then verified. If there is an error during these steps, the installation will stop. If there are no errors, the key is also stored at another location if needed later for recovery. 3.5.
File Administration AlliedView NMS License Manager cd /bin AT_LicenseInstaller.bat -help Printing help: -help Usage (all parameters are optional): AT_LicenseInstaller [options] Where options are: -help - Print this message (cannot be used with other options) -g - Run in GUI mode (default and all other options are ignored) -c - Run in console mode (other options may be added) Parameters below can only be used in console mode (-c) if needed to bypass text menu options.
File Administration AlliedView NMS License Manager FIGURE 3-29 License Expired/Invalid at Server Startup • Server runtime: Once the server has started, and if the key is found to be invalid, the server is stopped. There will be warning messages in the logs that allow the user to correct the problem before the server is stopped. 3.5.4.
File Administration AlliedView NMS License Manager 3.5.6 Migrating Existing Licenses NMS License Keys issued prior to R10.0 will no longer be valid. Therefore effective with NMS R10.0, all customers upgrading from R9.0 to R10.0 will be required to get a new license key from Allied Telesis. Upgrading a properly licensed NMS R9.0 server to R10.0 will result in the license status being placed back into Evaluation status. Allied Telesis is making every effort to contact all existing customers with new R10.
File Administration File Keys to Identify Downloadable Files 3.6 File Keys to Identify Downloadable Files 3.6.1 Overview As explained in Section 5.3.9, Software Configuration is an MDTI application that downloads OS releases onto supported devices/components. Since there are many steps and constraints involved in this operation, the MDTI application is a considerable simplification of the process, especially when downloading to multiple devices.
File Administration TABLE 3-2 Log Files for Debugging the AlliedView NMS Server Example Device Type File Keys Component Type Component Category Telesis (TN) iMAP Required File Keys - ADSL24AE NEW_ADSL24AE_LOAD - ADSL48 NEW_ADSL48A_LOAD - FX20 NEW_FX20_LOAD - CFC24a NEW_CFC24_LOAD - CFC56 NEW_CFC56_LOAD etc. etc. Rapier Types Rapier NEW_RELEASE NEW_PATCH NEW_GUI_RESOURCE NEW_HELP a. The CFC loads are for the cfc24univ load type.
File Administration Commands for the Allied Telesis Tools Submenu 3.8 Commands for the Allied Telesis Tools Submenu Table 3-3 lists the command equivalents for the Allied Telesis Tools submenu. TABLE 3-3 Commands for Allied Telesis Tools Submenu Menu Name Windows Solaris Admin Tool AT_Update.bat AT_Update.sh Discovery Configurator DiscoveryConfigrator.bat DiscoveryConfigurator.sh License Key Form AT_LicenseForm.bat AT_LicenseForm.sh Uninstall Uninstaller.exe Uninstaller.
File Administration Status Monitoring 3.9 Status Monitoring The Status Monitoring feature allows you to track the connections, processes, and overall status of the server(s) that make the AlliedView NMS, To access this feature, select Tools -> Status Monitoring from the Main Menu. The main window appears, as shown in the following figure.
File Administration Status Monitoring 3.9.
File Administration TABLE 3-4 Status Monitoring Status Monitoring Window (Continued) Status Type Field Description Network Inventory Table Columns Each row contains: - Type - type of network objects. Note: New network objects will be automatically added to the list. - Discovered - the total number of discovered objects. - Managed - the total number of managed objects. - Unmanaged - the total number of unmanaged objects. Port Inventory Tables for iMAPs.
File Administration TABLE 3-4 Status Monitoring Status Monitoring Window (Continued) Status Type Field Description Column Names - Host Name - the host name of the device that have active polling object. - Type - the type of the device. - IP Address - the IP address of the device. - Polled Data - the name of the active polling object. - Polling Interval - he time interval for periodic data collection. - Polling Type - the type of the active polling object.
File Administration TABLE 3-4 Status Monitoring Status Monitoring Window (Continued) Status Type Field Description User Connections Active User Connection Displays all active user connections to the server. Each row contains: - User Name - the name of the currently connected user. - Total - the number of connections a user has currently established to the server. Selecting a user name will display the individual threads of that user in the lower box.
File Administration TABLE 3-4 Status Monitoring Status Monitoring Window (Continued) Status Type Field Description License Keys Name Name of the License Feature. Up to four features can be listed. ID Type Depending on the feature, this can mean whether the feature is temporary or has a certain limit Create Date When the feature was installed Expiration Date When the feature expires or Not Restricted (permanent) 3.9.
File Administration Downloading Device Files 3.10 Downloading Device Files 3.10.1 Overview (Standard versus Custom Loads) Device loads that are transferred to the NMS and then loaded onto devices are in two main types: • Standard load - This is usually a set of device loads that is pre-packaged for a release and is known to be compatible with certain NMS loads. Starting in NMS release 10.
File Administration Downloading Device Files • execute AT_FwLoadImport.sh The tool can be used to load firmware into the NMS from either a CD (or file system) or an FTP server. The tool displays a list of files available for download, their timestamps, and whether or not they're already loaded into the NMS. By checking the “Get” boxes, files can be selected for download. The Get Files button will load the selected files into the NMS.
File Administration Downloading Device Files FIGURE 3-33 AlliedView NMS Administration Guide Load Import for CD/File System 74
File Administration Downloading Device Files FIGURE 3-34 AlliedView NMS Administration Guide Changing Directories for Browsing 75
File Administration Downloading Device Files FIGURE 3-35 AlliedView NMS Administration Guide Upload Status as Getting Files 76
File Administration Downloading Device Files FIGURE 3-36 AlliedView NMS Administration Guide Load Import Tool for ftp Server 77
4. Security Administration 4.1 Overview Administrators can configure security settings by accessing Security Administration. Security levels are achieved through the creation and defining of Users and Groups. Levels of access are defined in terms of what nodes can be viewed and what operations can be performed. Administration tasks are performed using the Security Administration wizard, which is invoked by clicking the Tools --> Security Administration menu item.The following figure appears.
Security Administration TABLE 4-1 Overview Task List for Security Administration - User Task Screen / Form Name (if Applicable) Section Add User User Wizard 4.2 - Associate Groups Select Groups 4.3.2 - User Profile User Profile Tab 4.3.3 - Audit Trails Audit Trails for User Tab 4.3.4 Configure User - Change Password - Assign Operations 4.3.5 Permitted Operations for User Tab - Delete Add Group 4.3.6 4.3.7 Groups Wizard 4.4 - Set Scope Scope Settings 4.4.
Security Administration Add a New User 4.2 Add a New User For adding a new user you can follow any one of the options. • Choose the File menu from the menu bar and select New under which you can select the option AddUser. • Click the Add User icon in the Toolbar • Right-click the node named Users in the left-side tree, which is a parent node. The User Administration wizard appears. FIGURE 4-2 User Administration Wizard (1) Enter the username and password for the user in the corresponding text boxes.
Security Administration Add a New User FIGURE 4-3 User Administration Wizard (2) This User Administration screen shows the user account and password expiry in number of days. By default both values will be zero indicating that the user account and password never expire. If you need to set an expiry date for user account and password, uncheck the corresponding check boxes, and then enter the expiry period in the number of days.
Security Administration Add a New User FIGURE 4-4 User Administration Wizard (3) Users can be associated with existing groups by clicking the appropriate check boxes of the groups when the checkbox Group based permissions is checked. You can also see the allocated operations for the existing groups by clicking on the right arrow for that group. Note: You can associate the new user to a new group by entering the new group name in the corresponding text box and clicking Add Group.
Security Administration User Settings 4.3 User Settings 4.3.1 Overview For performing user-level tasks, select the particular user in the left-side tree of the main Security Administration window under the parent node Users. 4.3.2 Associating Groups to User After selecting the particular user, click Setting Groups in the lower right corner of the Member Of panel to associate the user with any of the existing groups or to remove the user from the already associated group, as shown in the following figure.
Security Administration User Settings FIGURE 4-6 Setting User Profile The Security Administration tool has the provision to display the current status of the users using separate icons for different user status as shown in the left-side tree under the Users node. The various user status reflected in the User Interface (UI) are shown in the following table.
Security Administration User Settings FIGURE 4-7 User Profile Wizard After making the necessary changes click the Ok button for updating the server. 4.3.4 Viewing Audit Trails The audit trails of all the users can be viewed by selecting the View -> Audit Trails menu or clicking the Audit Trails icon. This displays the Audit Details window where the various operations performed by the users along with the status whether the operation was a success or failure are displayed. Refer to the following figure.
Security Administration User Settings FIGURE 4-8 Audit Trail Details - File You can save the audit details in a file for future reference to identify any access violation. To clear all the previous audit details, click Clear Trails. Note: Actions such as command input for a device can also be recorded by the SYSLOG application; the benefit of the Audit is that it shows commands that were invoked using the NMS as well as the user who invoked the command. 4.3.
Security Administration Adding a new group FIGURE 4-9 Permission Tree Hierarchy The operations tree is a union of the operations included or excluded of the groups and the directly assigned operations. Thus you can assign permissions to the operations that are not associated with the group for the user.
Security Administration Adding a new group Each of these actions invokes the Groups wizard, shown in the following figure, where you can enter the new group name in the text box. FIGURE 4-10 Groups Wizard (1) After entering the group name, click Next, which invokes the second screen of the Groups Wizard, as shown in the following figure.
Security Administration Adding a new group FIGURE 4-11 Groups Wizard (2) You can assign operations for the group by: • Selecting (checkmark) the check boxes to include the operations • Ticking the check box (x) to exclude operations • Leaving the check box empty so that it inherits its parent operation permission. After selecting the operations, click Finish to saving the changes permanently in the server. 4.4.1 Group and Scope Settings 4.4.1.
Security Administration Adding a new group to set a new scope, and then click Setting Scope. This invokes the Scopes Settings Wizard, which helps in adding a new scope, as shown in the following figure. FIGURE 4-12 Scope Settings To add a new scope, perform the following: • Give the property name and property value for the selected operation scope. • Click Add in the wizard. • Click Ok to save the changes and to exit. 4.4.1.3 Edit a Scope To edit a scope, select it and click Edit.
Security Administration Custom View Scope (CVS) 4.4.2 Assigning Users to Group Users can be assigned to the group by selecting the particular group from the left side of the Security Administration window under the parent node Groups and in the Members tab screen in the right, click Setting Users. This invokes the Select Users Wizard where you can see all the user names in the left-side column and the selected users for the particular group in the right-side column.
Security Administration Custom View Scope (CVS) FIGURE 4-13 Custom Scope View Following are the list of tasks that can be done for the selected Custom View Scope of a group. 4.5.2 Add Authorized Scope for a Custom View Scope Generally Custom View Scopes are added through the group and scope settings. To add authorized scope to the available Custom View Scope of the group, select the relevant Custom View Scope Name and click Add AuthorizedScope, which will invoke the Scope Settings form.
Security Administration Permissions Tree This operation is similar to the tasks discussed above in the Scope Configuration section. The below table helps you to know the wild card characters that are supported in NMS while specifying the scope criteria value. TABLE 4-3 Operators for Setting Scope Criteria Operator Description * (Asterisk) This is used to match zero or more characters.
Security Administration Permissions Tree FIGURE 4-14 Permissions Tree Configuration (Includes AT Devices) 4.6.2 Permissions Tree The Permissions Tree contains a list of operations that are provided by default in the NMS. Assigning different operations to different users is an administrative function. The different operations that can be assigned are explained in the following tables.
Security Administration Permissions Tree 4.6.2.1 Administrative Operations TABLE 4-4 Administration Operations Operation Description Services Clear Discovery This operation is used when the Discovery process has stopped. NMS Backup This Operation starts the backup process by setting BackUpInProcess variable to true and suspends all NMS Schedulers. Once the backup process is over, automatically resets the BackUpInProcess variable to false, to resume NMS Schedulers.
Security Administration Permissions Tree 4.6.2.3 Topology Topology is used to add, update, delete and filter out the core Managed Objects from the database. The various operations grouped under the topology module are listed in the table given below. All are under Modify Object. TABLE 4-6 Operations for Topology Operation Description Start and Stop Discovery This Operation is used to set the discovery status for the particular Object.
Security Administration TABLE 4-8 Permissions Tree Operations for Trap Parsers and Filters Operation Description Reload Trap Filters This Operation is used to update the changes of the filter, without restarting the Server. Get Trap Parsers This Operation is for viewing the Trap Parsers present in the server. Set Trap Parsers This Operation is for modifying the existing Trap Parser or creating a new Trap Parser. 4.6.2.
Security Administration Permissions Tree 4.6.2.8 Polling Unit Polling units mentioned here refer to PolledData objects which are the basic unit of data collection. These define what data to be collected and from which network device. PolledData can be added via Client User interface. The operations possible with PolledData objects are listed below.
Security Administration Permissions Tree can be added for the Managed object or existing PolledData can be removed using Poll Filters. Different operations possible with Poll Filters are listed in the following table. TABLE 4-13 Operations for Poll Filters Operation Description Get Poll Filters This operation permits retrieval of Poll Filters from the database and display them. If excluded will not allow you to view the Poll Filters list.
Security Administration TABLE 4-15 Remote Authorization (RADIUS / Tacacs+) on Devices Operations for AT Object Operation Operation Description Device Backup/Restore Operation Permits backup and restore operations Software Configuration Operation Permits software configuration operations Device Information Operation Permits the display of device information SNMP Agent Operation Permits SNMP Agent operations SNMP Community Operation Permits SNMP Community operations Configure VLAN Operation Pe
Security Administration Remote Authorization (RADIUS / Tacacs+) on Devices 4.7.1 RADIUS For devices that use the RADIUS, authentication is done on a per device basis that is datafilled for the device’s MO properties. Refer to the following figure. FIGURE 4-15 Filling out the MO Property Form for Remote Authentication 4.7.
Security Administration NMS RADIUS Client Support 4.8 NMS RADIUS Client Support 4.8.1 Overview Starting in NMS Release 11.0 SP5, RADIUS Authentication for NMS user logins is supported. Prior to this feature, NMS supported devices that used RADIUS/TACACS (see 4.7), but NMS user ids were not authenticated via these methods. With this feature, an open source RADIUS client is integrated into the NMS server, using a central RADIUS server on the customer’s network.
Security Administration NMS RADIUS Client Support FIGURE 5 Overview - NMS Server with RADIUS Client 4.8.2 RADIUS Configurator Tool (with Valid License) Once this feature is installed the login procedure is transparent; the client interface is the same with or without RADIUS authentication. The main change to the NMS server is the addition of the AT_ConfigureRadius tool, which can be launched as follows: 1. On Windows, double-clicking AT_ConfigureRadius.bat in the \bin directory. 2.
Security Administration NMS RADIUS Client Support FIGURE 4-1 Error Message for Invalid License The purpose of this tool is to configure the NMS server as a RADIUS client-that is, enable/disable RADIUS authentication and create a list of server contact information (address and port) and shared secrets to be used during authentication when enabled. The shared secret is an encryption key stored separately on both platforms (RADIUS server and RADIUS client) and is never transmitted over the network. 4.8.2.
Security Administration NMS RADIUS Client Support Servers can be added via the fields on the lower part of the display.
Security Administration NMS RADIUS Client Support Multiple servers can be added. Servers can be designated by IP addresses or valid host names. During login, the authentication process will try each server in the order displayed, from top to bottom, until one server accepts the authentication request or all servers have rejected it. The order can be changed with the arrow buttons. Note that: • The Add button will not allow adding a server that already exists in the table.
Security Administration NMS RADIUS Client Support Whereas only one server may be added at a time and only one may be modified at a time, multiple servers may be deleted by selecting multiple rows and clicking on the Delete button. FIGURE 8 RADIUS Configurator - Deleting Servers Changes are not saved until either the OK or Apply button is selected. Note: When activating the NMS client, set the Status to ‘On’ before selecting OK or Apply.
Security Administration NMS RADIUS Client Support All changes won't take effect until the server is restarted. So after changing the State to ‘On” and selecting OK or Apply, the modifications are completed and the tool displays the following message: FIGURE 9 Note: Message - RADIUS Configured, need to Restart When RADIUS is activated or deactivated, the NMS server is shut down. It must then be restarted.
Security Administration NMS RADIUS Client Support RADIUS Authentication State=DISABLED Server Auth Port Acct Port Secret ----------- --------- --------- --------10.52.18.79 1812 1814 nmssecret 10.52.18.77 1812 1814 nmssecret 10.52.18.78 1645 1646 nmssecret $ ./AT_ConfigureRadius.sh enable RADIUS Authentication State=ENABLED Server Auth Port Acct Port Secret ----------- --------- --------- --------10.52.18.79 1812 1814 nmssecret 10.52.18.77 1812 1814 nmssecret 10.52.18.
Security Administration NMS RADIUS Client Support 4.8.3 Example Configurations 4.8.3.1 Overview The following examples go through setting up of the NMS RADIUS Client Support and include inputs at both the RADIUS and NMS servers. Regardless of the platform used (FreeRadius or Cisco Secure ACS), there are four main steps. The first three are for configuring the RADIUS server: 1. Identify the Vendor Specific Attribute (VSA) that names the permission groups 2.
Security Administration NMS RADIUS Client Support 4.8.3.2 FreeRadius Example FreeRadius is a free RADIUS server and is installed on 10.52.18.79. Note: Downloads and documentation are available at http://freeradius.org/. To configure for the NMS, begin with cd to /usr/local/etc/raddb and perform the following steps: Note: For the account Keith_K, the password being defined on RADIUS is different than the password assigned when it had been created on the NMS.
Security Administration NMS RADIUS Client Support FIGURE 4-1 Configuring NMS as RADIUS Client 4.8.3.3 Cisco Secure ACS Example Cisco Secure ACS is a widely-used fee-based RADIUS and TACAC server available from http://www.cisco.com. It comes in platform-specific versions, including various Windows versions. Note: The NMS is the RADIUS client, which is known as the NAS in the RFC, and is called the AAA Client in Cisco terminology.
Security Administration 3. NMS RADIUS Client Support 1. Use CSUtil.exe -addUDV c:\ACS_Data\allied-telesis.ini to import the VSA file. 2. Use the Web interface to configure the AAA client (the NMS) and Users with the VSA: 3. Use “Interface Configuration” to enable RADIUS (Allied-Telesis) for Users. 4. Use “Network Configuration” to set authentication for the AAA client using RADIUS (Allied-Telesis) Add users and permission groups. 1.
Security Administration Note: NMS RADIUS Client Support To make these changes, the RADIUS server may need to be restarted. Refer to the appropriate documentation. However, once the RADIUS NMS client feature has been set up, the following scenarios could occur: • The customer could de-activate the RADIUS NMS client through the RADIUS Configurator tool. • The RADIUS server(s), while configured and activated, might not be available. Refer to 4.8.4.1. 4.8.4.
5. Controlling and Provisioning Network Devices 5.1 Overview You can provision a single device or a set of devices together.
Controlling and Provisioning Network Devices TABLE 5-1 Overview Task List for Provisioning Task Screen / Form Name (if Applicable) View Chassis Section 5.2 Provision Allied Telesis Device Overview of Provisioning Application 5.3.1 - Backup/Restore Device Backup/Restore in pull-down 5.3.2 - Command Script Management Command Script Mgmt in pull-down 5.3.3 - Configuration File Management Configuration File Mgmt in pull-down 5.3.4 - Device Information Device Information in pull-down 5.3.
Controlling and Provisioning Network Devices TABLE 5-1 Overview Task List for Provisioning (Continued) Task Screen / Form Name (if Applicable) Section Card Management Card Management 5.5 Create 5.5.2 GE3, GE8 5.5.3, 5.5.4 ADSL16 5.5.5 ADSL24, ADSL24AE 5.5.6 SHDSL24 5.5.7 CFC 5.5.8, 5.5.9 FE10 5.5.10 FX10 and FX20 5.5.11 POTS 5.5.12 - Card can support MGCP or SIP CES8 5.5.13 NTE8 5.5.14 ADSL24A/B 5.5.15 PAC24A, PAC24C 5.5.16 EPON2 5.5.17 VDSL24 5.5.18 ADSL48A 5.5.19 GE24POE 5.5.
Controlling and Provisioning Network Devices TABLE 5-1 Overview Task List for Provisioning (Continued) Task Screen / Form Name (if Applicable) Section Port Management (iMAP Devices) Port Management (iMAP Devices) Application 5.6.1 New Triple Play 5.6.2 New Ethernet 5.6.3 New ADSL 5.6.3 New CES8 5.6.5 New NTE8 5.6.6 New SHDSL 5.6.7 New EPON 5.6.8 New ONU 5.6.9 New VDSL24A/B 5.6.10 View Triple Play 5.6.11 View Status 5.6.12 Add Voice Line 5.6.13 View iMG/RG 5.6.14 View Ethernet 5.6.15 View ADSL 5.6.
Controlling and Provisioning Network Devices TABLE 5-1 View Chassis Task List for Provisioning (Continued) Task Screen / Form Name (if Applicable) Section Network Services HVLANs Section 6. Network VLANs Profile Management QoS Management Customer Management Enhanced Protection Switched Ring (EPSR) UPC Monitoring Query/Control Device - Alarms/Events Alarm Panel and Network Events panel 5.9.1 - Performance Configured Collection Panel 5.9.
Controlling and Provisioning Network Devices View Chassis For Rapier products, the chassis image shows in real-time the status of the links and ports. The link LEDs indicate the link state for each port. A legend on the chassis face interprets the meaning for the LED colors, such as green for an enabled 100 MHz link and amber for an enabled 10 MHz link. The port status is indicated on the chassis face by the port color. During normal operation, the port color is gray.
Controlling and Provisioning Network Devices View Chassis • Card is installed but not provisioned - The card appears grayed-out and has the label “NOT PROVISIONED” across the front as shown in the following figure. An Example NOT PROVISIONED Card in the Chassis View FIGURE 5-3 • Unknown card - When the chassis view detects a card that is not supported, it displays the board with an “Unknown Board” image. Refer to the following figure.
Controlling and Provisioning Network Devices Note: View Chassis For the AT-x610, stacking will not start until after the unit has been booted and the stack-XG card has already been inserted. If the card is removed (or is replaced), and the x610 is not rebooted, the chassis view shows a duplicate image. 5.2.2 Display of VLAN-based HVLANs (Tunneling) For the iMAP and SBx3100, an outer tag can be applied for certain ethernet-based cards, allowing an outer VLAN to be applied to several customer interfaces.
Controlling and Provisioning Network Devices Provisioning a Device 5.2.3 Notes on Chassis View Following are device-specific notes on the chassis view: • 9000 devices • Displaying port status/alarms in the Chassis View is supported. • Filler plates are included in the chassis view. • Support the FAN8 module in the 9700. This module is always displayed (even if removed for maintenance).
Controlling and Provisioning Network Devices FIGURE 5-7 Provisioning a Device Selecting a Device for Backup/Restore The selected device is included in the Selected Devices column. The following table describes the buttons that are available once an application is selected.
Controlling and Provisioning Network Devices TABLE 5-2 Provisioning a Device Buttons Common to Applications (Continued) Button Icon Meaning Description Search Brings up search dialog allowing search by column for a text string, with options for starting row and matching cases shown here: Table cells with the text are highlighted yellow. Search Next Once a text string is found, find the next table cell that has the text string.
Controlling and Provisioning Network Devices FIGURE 5-8 Provisioning a Device Selecting the Application Manager to View all Applications Many of the buttons are grayed out because an application has not been selected. At this point, the user can double-click on one of the Applications in the table (or select the application, and then click GO) and it will invoke the specific application window.
Controlling and Provisioning Network Devices Provisioning a Device Table 5-3 lists the options for the AppManager window. Click Done to close the window. TABLE 5-3 Options for the Add / Remove Devices for an Application Option Description Available Devices Available devices for the application are in black. Clear Clear all devices from the Selected Devices list. Add / Remove Sends a device from one column to another.
Controlling and Provisioning Network Devices FIGURE 5-10 Provisioning a Device Copy Device List for an Application - File The example shown in Figure 5-10 would occur if you have previously collected data for devices 172.16.33.14 and 172.16.33.15, and then right-click device 172.16.33.16 for the SNMP Community application.
Controlling and Provisioning Network Devices FIGURE 5-11 Note: Provisioning a Device Collected Data for Selected Devices for Device Backup Restore (Network Selected) If for any devices the data cannot be collected, the row is dark; the Tooltip for that row will include the reason, such as “Unable to Connect.” 5.3.2.1 Performing Backups At this point the user can perform the following: • Select multiple devices and perform a backup only. • Select one device and perform a backup or restore.
Controlling and Provisioning Network Devices FIGURE 5-12 TABLE 5-4 Provisioning a Device Initial Backup Window Backup Device Configuration Fields Field Meaning Listed Device(s) Device(s) that will have a backup created. Devices in subnet Backs up all devices for the specified subnet. The query is done when the task is executed, so that for a recurring task, new devices added since that task was created will be backed up during the next execution of the task.
Controlling and Provisioning Network Devices FIGURE 5-13 Provisioning a Device Recurring Backup Schedule Window - File In Figure 5-13, the backup has been scheduled for Sunday morning at 4 a.m. every week. Clicking Finish adds the backup to the schedule. Note: It is highly recommended that you configure your device configuration backup to run on a recurring schedule to preserve configuration changes made by the NMS.
Controlling and Provisioning Network Devices Provisioning a Device 5.3.2.2 Restore Configuration (Options Depend on Device Type) Once a device or set of devices has a backup file, it can be restored. Select a device that has a backup file and click Restore Configuration. One of the following figure appears, depending on the device to be restored. For Rapier/Switchblade devices only, the Rapier/Switchblade options are enabled, as shown below.
Controlling and Provisioning Network Devices FIGURE 5-15 Provisioning a Device Restore Configuration for iMAP Devices Only For iMAPS and Rapier/Switchblade devices, the Rapier/Switchblade filename option is enabled but checkboxes are disabled, as shown below.
Controlling and Provisioning Network Devices Provisioning a Device For iMG/RGS only, these cannot be selected with iMAPs, Rapiers, etc, and the entire lower panel is removed, as shown below. FIGURE 5-17 Restore Configuration for iMG/RG Devices There is the option to make the restored file the default configuration. If this option is chosen, the Restart Rapier checkbox is active and can be used to restart the Rapier with the restored file. The following table lists the options available.
Controlling and Provisioning Network Devices Provisioning a Device FIGURE 5-18 Note: Purge Backup Dialog The value for what appears is from the AT_NmsBackupFiles.conf configuration file. The number must be greater than 0. Refer to 3.4.5. The dialog includes a “Purge” button to activate purging and a “Cancel” button to dismiss the dialog without executing a purge. Selecting Purge brings up the confirmation dialog.
Controlling and Provisioning Network Devices FIGURE 5-19 TABLE 5-6 Provisioning a Device Command Script Mgt Window Command Script Mgmt Buttons/Fields Button/Field Description Upload Retrieves a file from the device. The user has to pick a file name from a list retrieved from the device. It can be stored either under the user's scripts path or under the user's devicespecific in the server-side file system. Refer to 5.3.3.1.
Controlling and Provisioning Network Devices FIGURE 5-20 Provisioning a Device Upload Window for Script Mgt Files 5.3.3.2 Download/Execute To download and then execute script files, select one or more devices in the Command Script Mgmt window and click Download/Execute.
Controlling and Provisioning Network Devices Provisioning a Device FIGURE 5-21 Download Window After finding the appropriate file and clicking Download, the Download Command Script window appears, which lists the devices the script will be execute on, as shown in the following figure. Note: The blank field allows the user to specify a filename to use on device in case the server-side name is too long, missing the extension, etc. The extension must be .scp.
Controlling and Provisioning Network Devices Provisioning a Device FIGURE 5-23 Command Script Execution If the network connection to the device is lost or the script fails to complete, the error Connection Lost or script not completed may appear in an Errors window and in the Command Script window, as shown in the following figure. FIGURE 5-24 Failure to Run Script Whatever script output is received up to the point of failure will be displayed in the Output Window.
Controlling and Provisioning Network Devices Provisioning a Device 5.3.3.3 Edit Files The Edit Files button brings up the unloaded multi-paged editor, from which command scripts can be written, saved and edited. The Edit window functions are described in 5.3.15. For command script files, the Editor displays the contents of a Command Line Interface (CLI) script. The script file contains one or more CLI commands. Comments are identified as a hash (#) as the first character on a line.
Controlling and Provisioning Network Devices 6. Provisioning a Device Test by telnetting to one of the selected iMAP devices and observe the login banner. 5.3.4 Configuration File Management For Rapier and iMAP devices, the configuration file is an ASCII-formatted file that contains the complete configuration of the device. When the device is rebooted, the configuration file can replace the currently active (running) configuration.
Controlling and Provisioning Network Devices FIGURE 5-26 Provisioning a Device Upload Window for Configuration Mgt Files Click Next to bring up the Schedule Panel, where the user can select Now (default), One Time (Schedule) or Recurring date/ time. Clicking on Finish begins execution immediately (Now). Note: Blank names are suitable for recurrent uploads since new names will be chosen by the system as uploads are performed.
Controlling and Provisioning Network Devices FIGURE 5-27 Provisioning a Device Download Config File Form - From Backup Directory 5.3.4.3 Edit Window This Edit window has the same functions for Configuration and Script files, and is described in 5.3.15. 5.3.4.4 Delete Window The Delete window brings up a list of configuration files for the selected device(s), from which the user may delete, and is described in 5.3.16. 5.3.
Controlling and Provisioning Network Devices FIGURE 5-29 Provisioning a Device Change Device Information Window In this window the Name, Location and Contact can be changed. When more than one device is chosen, the Change Info button is activated; clicking it also brings up the Change Device Information window, but only the Location and Contact information can be changed. 5.3.
Controlling and Provisioning Network Devices Provisioning a Device FIGURE 5-31 SNMP Agent Panel To modify the agent for one or more devices, select the rows, and then click Modify (now active). The following figure appears. FIGURE 5-32 Configure SNMP Agent Panel The following table lists the options available. TABLE 5-8 SNMP Agent Fields Option Description Agent status A checkbox to enable or disable the device(s).
Controlling and Provisioning Network Devices Provisioning a Device 5.3.7 SNMP Community An SNMP community helps to define the relationship between the AlliedView NMS and the Management Information Base (MIB) of the device, in essence defining the operations that can be performed on various objects in the device. For each device there may be multiple communities, with each community providing a set of operations.
Controlling and Provisioning Network Devices FIGURE 5-34 AlliedView NMS Administration Guide Provisioning a Device Create SNMP Community Form 147
Controlling and Provisioning Network Devices FIGURE 5-35 Provisioning a Device Modify SNMP Community Form When the Copy button is clicked, a two-page form appears. Both pages are shown in the following figures.
Controlling and Provisioning Network Devices FIGURE 5-37 Provisioning a Device Copy SNMP Community Form (Second Page) - File The following table lists the options available. TABLE 5-9 Community Configuration Fields Option Description Community Name A text box when adding (creating) a community name, a drop-down of community names when modifying a community name. When adding a community, clicking on the Add/Remove button adds the community.
Controlling and Provisioning Network Devices FIGURE 5-38 Provisioning a Device Delete Snmp Community Window The user can then select the communities for the Target Device (or Select All) and by clicking OK, delete those communities.
Controlling and Provisioning Network Devices Provisioning a Device 5.3.8 Obtaining SW Loads The user can go to the web site and get the appropriate files (xml/tar) they wish to use for their specific NMS configuration and place them in the /swdownload directory. 5.3.9 Software Configuration (Standard Loads) When the Software Configuration application is chosen and the Collect Data icon is clicked, the following figure appears. FIGURE 5-39 Software Configuration Panel 5.3.9.
Controlling and Provisioning Network Devices Provisioning a Device 5.3.9.2 Modifying Software Configuration The table shows for the selected devices all of the filetypes for the devices. When the user selects the devices and clicks Modify Release Configuration, the Modify Release Configuration form appears, as shown in the following figure. Caution: For the devices that will receive downloads, do not set their telnet idle session time-out to any value less than 6 minutes.
Controlling and Provisioning Network Devices Provisioning a Device Table 5-10 lists the options available. TABLE 5-10 Software Download Buttons/Fields Option Description Loads A pull-down menu for choosing the software release for the device. For iMAP devices, the user can select loads that assume Annex A or Annex B cards are being loaded. Delete old release files if space needed A checkbox that tells the device to delete old release files before loading the chosen release file.
Controlling and Provisioning Network Devices Provisioning a Device The Clear All button, un-selects (unchecks) all rows. The Delete Files button deletes all files from all selected (checked) bundles. If any errors occur during the deletion, an error dialog will pop up with an error message. FIGURE 5-41 Purge Load Files 5.3.9.
Controlling and Provisioning Network Devices Provisioning a Device Once you have this list of commands generated with the account, you can use the results in one of two ways: • Save the html form as a filename. This file can then be transferred to the NMS if there is no internet access from the NMS server. The WebGen Import form is then used to access this file so it can be imported. • The WebGen Import form is brought up and the results are pasted directly into the form and imported.
Controlling and Provisioning Network Devices Provisioning a Device The WebGen interface is brought up as part of the Software Configuration. In the Software Configuration panel (Figure 539), The Manage WebGen Passwords button brings up the Manage WebGen Passwords Wizard for the selected devices. The wizard has these panels, which are explained below: 1. Manage MTAC Accounts 2. Select Devices and releases for password generation 3. Passwords will be generated for the following devices 1.
Controlling and Provisioning Network Devices 7. AT-AR440S and 450S 8. AT-AR-SB/9800 (9800) for 9800 series devices 9. AT-9900s for AT-9900 series devices Provisioning a Device The current status of the MTAC indicates whether or not it can be used to generate passwords and if so, for how many passwords it can be used. Possible status values are in Table 5-11. TABLE 5-11 Possible Status Values for MTAC Accounts Status Meaning unreachable The WebGen server is currently unreachable.
Controlling and Provisioning Network Devices Note: Provisioning a Device In the case of Switchblade and 9800 series devices, either type can be used, but ATI's license fee structure allows Switchblade passwords to be generated at a discount, so the customer should be sure to use the correct Type or face unexpected fees. Any further validation of Type by the AlliedView NMS software is not possible. The Delete button will delete all selected rows.
Controlling and Provisioning Network Devices FIGURE 5-45 Provisioning a Device MTAC Wizard - Second Panel Devices and releases can be selected from the table for password generation. Although any or all rows from the table can be selected, the ones that already have passwords will be ignored during password generation. The Back button returns to the MTAC panel.
Controlling and Provisioning Network Devices Provisioning a Device The 3rd panel provides the user a chance to confirm selections before committing them, as shown in Figure 5-47. FIGURE 5-47 MTAC Window - Third Panel For each password to be generated, this panel displays the device, the release, the MTAC type, and the MTAC that will be used. There are no row operations on this panel. The Back button returns to the previous panel and can be used to change the device/release selection.
Controlling and Provisioning Network Devices FIGURE 5-49 Provisioning a Device Access Control Exception Error To give the client the necessary permission, it will be necessary to add the following permission statement to the Java security policy file on the client's host: grant { permission java.net.SocketPermission "licence.alliedtelesis.co.nz", "connect,resolve"; }; This statement grants Java applets permission to resolve the host name and open connections to the server (licence.alliedtelesis.co.nz).
Controlling and Provisioning Network Devices Provisioning a Device • Custom - Custom loads are created by users and can be added, modified, viewed, and deleted, which are the tasks that make up this feature. The Modify button allows modifying a description. Select a custom load from the table, modify the description, and then press the Modify button. (Names cannot be modified after creation) The Delete button allows deleting a load. Select a custom load from the table and press Delete.
Controlling and Provisioning Network Devices FIGURE 5-50 Provisioning a Device Custom Device Loads Form When the Details button is selected, the form is brought up, it shows the name and description of the selected load, all the types belonging to the load, and all the details for any selected type from the table. If the load is a standard load, none of the fields are modifiable. The details consist of a table of File Keys and File Names.
Controlling and Provisioning Network Devices FIGURE 5-51 Provisioning a Device Custom Device Loads Form - Standard Load If the load is a custom load, then types can be added, modified, and deleted. See Figure 5-52.
Controlling and Provisioning Network Devices FIGURE 5-52 Provisioning a Device Custom Device Loads Form - Custom Load To add a new type, begin by choosing the type from the combo box in Type Details, as shown in Figure 5-53. The file keys for the type are predefined and will appear in the File Keys column. The File Names will normally be blank, but in some cases where a file name was listed for the same key from the previous type, if any, the name will default to the previous name.
Controlling and Provisioning Network Devices Provisioning a Device If the type selected from the combo box already exists in the load, its row in the table above will be highlighted and its details will be defaulted to their existing values. Push the Add button after entering all the details and verify the new type is added to the table. If you do anything else instead of pushing the Add button, a popup dialog will ask whether or not to finish the addition for the device.
Controlling and Provisioning Network Devices Provisioning a Device The file name can be typed, pasted (with ctl-v), or selected with a file chooser. The file chooser will list all the files loaded in the device's category directory (either swdownload/Rapier or swdownload/MAP). See Figure 5-54. In some cases, one or more file names will be optional for a load. When unneeded for iMAP devices, the field should be left blank. For Rapier devices, the field should be set to NONE.
Controlling and Provisioning Network Devices Provisioning a Device 5.3.11 Using Custom Loads to Reduce Unneeded Card Types Standard loads are defined to load software for all card types a device may support at a given release level. In most cases, this will be more software than necessary since most devices will not contain all possible card types. Download times and memory usage will be greater than necessary. To streamline software configuration, create a Custom Load containing only the necessary files.
Controlling and Provisioning Network Devices Provisioning a Device p AlliedView NMS Administration Guide 169
Controlling and Provisioning Network Devices FIGURE 5-57 Provisioning a Device Custom Load Containing Only Necessary Files 5.3.12 SysLog Management The SysLog Management application allows you to manage logs from the managed devices in the AlliedView NMS. When the SysLog Management application is chosen and the Collect Data icon is clicked, the following figure appears. FIGURE 5-58 SysLog Management Panel From this panel, you can delete selected rows by pressing the Delete button.
Controlling and Provisioning Network Devices Provisioning a Device For information on configuring the AlliedView NMS system logs, refer to 9.6. 5.3.13 LLDP Protocol and Associated Features (LAG/VCS Monitoring) The LLDP protocol feature on devices is a way to advertise data that is useful for discovering information about a network link port.
Controlling and Provisioning Network Devices FIGURE 5-61 Provisioning a Device LLDP MultiDevice Wizard for Multiple iMAP Devices - First Panel Note the Re initialization Delay attribute has Mixed rather than a numeric value. This means there are different values of the devices. Inputting a New Value (such as 2) will change the value to 2 for all the selected devices. The second panel brings up a panel that controls the options for the multiple devices.
Controlling and Provisioning Network Devices FIGURE 5-62 Provisioning a Device LLDP MultiDevice Wizard for Multiple iMAP Devices - Second Panel The pull-downs are as follows: • LLDP Mode - The options are TX, RX, BOTH or OFF. Note that to activate LLDP so that the links are drawn on the physical map, this must be set to BOTH. The specific attributes for the ports can then be set. • LLDP Notification - This can be set to ON or OFF.
Controlling and Provisioning Network Devices Provisioning a Device • Add to All - make all options apply to all ports if the option is not applied to any or some ports • Delete from All - delete all options from all ports if the option is applied to any or some ports. • Other options • Add to All - make the one option apply to all ports. This would take priority over the ALL Row. • Delete from All - make the one option be deleted for all ports. This would take priority over the ALL Row.
Controlling and Provisioning Network Devices FIGURE 5-64 Provisioning a Device LLDP MultiDevice Wizard for Single Device Options - Second Panel To configure the many possible options, the following concepts are used: • ALL Ports row - This row controls multiple actions as follows: • Mode - Selecting this cell brings up a pull-down of Modes, and selecting one means selecting the Mode for all ports on the device, including OFF, which disables LLDP for all ports.
Controlling and Provisioning Network Devices Provisioning a Device 5.3.13.3 LAG and VCS Support The Physical Network Map shows the discovered devices and the physical connections (links) between them. The physical link icon between devices appears if the both devices support LLDP, and the NMS actively supports the LLDP functionality of the device. Note: The physical links can also be manually created using the Link Operation function. Refer to 6.2.4.
Controlling and Provisioning Network Devices Provisioning a Device FIGURE 5-67 • Show LAG Links option - Right click on the LAG links icon and select Show LAG Links to bring up the LAG/VCS screen. Refer to the following figure.
Controlling and Provisioning Network Devices FIGURE 5-69 Provisioning a Device LAG/VCS Map Screen The LAG ID can be as follows: • - Port is not down and LAG channel is up • Not Configured - Port is not configured for LAG but the neighboring port is • - (AlliedWare devices) - Port is not associated with any LAG Channel • Chassis View - In the Chassis View for a device, ports that are members of a LAG are labeled “LA”.
Controlling and Provisioning Network Devices Provisioning a Device 5.3.14 MPEG Test The MPEG Test feature allows the user to setup, monitor, and view the results of MPEG tests run on the iMG/RGs in a network. With the feature the user can set up a “Network Test” across multiple iMG/RGs in a network. Once set up, the AlliedView NMS runs an MPEG test on the selected iMG/RGs using the mpeg testing functionality included with the iMG/RGs devices.
Controlling and Provisioning Network Devices FIGURE 5-72 Provisioning a Device Create MPEG Test Form Fields to datafill are: • Test Name - This should be descriptive, and becomes the Name of the test in the Task List Details window. • Channel List - The multicast IP address(es) for the channel(s) to be tested. If multiple channels are entered, each channel will be tested sequentially. (If multiple iMG/RGs were selected, all iMG/RGs will be tested simultaneously.) Example values would be 225.1.1.
Controlling and Provisioning Network Devices FIGURE 5-73 Provisioning a Device Create MPEG Test - Recurring Schedule For the recurring schedule, the user can choose: • • • • Now - Click Finish to start the test immediately. Hold - This sets no time; the test is activated through the View Tasks window.
Controlling and Provisioning Network Devices FIGURE 5-74 Provisioning a Device Viewing Test Results for MPEG Test To review specific test results, double-click on a row in the table or right click on a row and select View Test Result MPEG Test Results Details panel, as shown in the following figure.
Controlling and Provisioning Network Devices Provisioning a Device The “Combine Device Data” Radio button combines all the data from each iMG/RG into a single row entry, as shown below.
Controlling and Provisioning Network Devices Provisioning a Device The “Combine Channel Data” Radio button combines all the data from each multicast into a single row entry, as shown below.
Controlling and Provisioning Network Devices Provisioning a Device To delete the test results, select one or more tests form the Test Results panel, right click, and select Delete Test Result. (Note that View Test Result is grayed out.) Refer to the following figure. FIGURE 5-78 Deleting MPEG Test Results To modify the schedule/recurrence of a test, select Tools -> View Tasks, and select the Task Name (the Name entered for the test) form the View Tasks table.
Controlling and Provisioning Network Devices Provisioning a Device 5.3.15 Using the Edit Functions The Edit window has the same functions for both the Command Script Management and Configuration File Management functions, and so the explanation for how the window works can apply to both types of files. In the Command Script application, the Edit window brings up the unloaded multi-paged editor. The editor has Open and Save as buttons that work with the server file system.
Controlling and Provisioning Network Devices FIGURE 5-81 Provisioning a Device File Pull-down for Edit of Scripts Selecting the File -> Open menu item brings up a listing of the latest files from the server file system for the devices highlighted on the Command Script Mgmt panel when the editor was launched. Files can be viewed as a simple list or with details (Size, Type, when Modified). Template files can also be created and included. Refer to Figure 5-82 and Figure 5-83.
Controlling and Provisioning Network Devices FIGURE 5-83 Provisioning a Device Files Available for Edit from Server File System (Details View) Once a file is opened and edited, it can be saved on the Server File System. Files can be saved as templates for future script writing. Refer to Figure 5-84. Note: Since files are being saved to the server (rather than a device), unrestricted filenames and extensions are allowed.
Controlling and Provisioning Network Devices FIGURE 5-84 Provisioning a Device Saving Files after Editing 5.3.15.2 Edit Menu The Edit menu has conventional options (CUt, Copy, Paste, Delete, Select All). Right-clicking in the text area will bring up these options as well. Refer to Figure 5-85.
Controlling and Provisioning Network Devices FIGURE 5-85 Provisioning a Device Edit Menu Options for Text Files 5.3.15.3 Search Menu The Search menu provides for searching within the current window. Conventional Find and Replace options are provided. Refer to the following figures.
Controlling and Provisioning Network Devices Provisioning a Device FIGURE 5-86 AlliedView NMS Administration Guide Search Find Option 191
Controlling and Provisioning Network Devices Provisioning a Device FIGURE 5-87 Search Replace Option 5.3.15.4 Window Menu The Window menu provides changing between open files. Each time a file is entered, the cursor, text selections, and scroll bar are in the same state they were in when that file was left. The Window menus changes dynamically as files are opened, created, and closed. FIGURE 5-88 Window Menu for File Editor 5.3.
Controlling and Provisioning Network Devices Provisioning a Device With no devices selected, the Delete button brings up a file chooser that provides navigation among all the user's directories and lets the user delete one or more files from the same directory. Select one or more files to delete: When the files for deletion for a device are listed, the user can select the details icon and see the file properties, as shown in the following figure.
Controlling and Provisioning Network Devices Provisioning a Device With one or more devices selected, a Multi-File Delete wizard pops up instead of the file chooser. For a single device, this wizard lists all the files in the user's device directory and provides no way to navigate to other directories. It provides a quicker way to delete one or more files for a single device. Refer to the following figure.
Controlling and Provisioning Network Devices Note: Provisioning a Device Files in the user's scripts directory are not associated directly to a device and can therefore only be deleted with the file chooser version of this dialog (brought up with no devices selected). 5.3.17 SNMPv3 USM Configuration This SNMPv3 uses the User-Based Security Model (USM) and is specified in RFC2574. The USM has the concept of multiple users where each user provides secret keys for authentication and privacy.
Controlling and Provisioning Network Devices FIGURE 5-93 AlliedView NMS Administration Guide Provisioning a Device SNMPv3 USM Configuration Panel 196
Controlling and Provisioning Network Devices Configure VLAN (Chassis View) 5.4 Configure VLAN (Chassis View) To configure a VLAN for a single device, right-click the device, and then select Provision > Configure VLAN. The VLAN chassis configuration screen opens and fills in the present VLAN configuration. The Chassis view and VLAN Configuration view are combined, but the VLAN-related information will change depending on the VLAN interface chosen.
Controlling and Provisioning Network Devices FIGURE 5-95 Configure VLAN (Chassis View) VLAN Configuration Screen (iMAP Device) The following table gives an overview of the fields, graphics, and buttons available. TABLE 5-12 VLAN Configuration Options Screen Item Description Create If creating a VLAN on the device, select this button first. You will see a Create New VLAN form. Fill in the Name and ID, and then click OK, and the VLAN is added to the Vlan Interfaces pull-down.
Controlling and Provisioning Network Devices TABLE 5-12 Configure VLAN (Chassis View) VLAN Configuration Options Screen Item Description Link Ports These are the ports that are used for connection to another device and are used as part of one or more Network VLANs including the current VLAN. On the display, these will be identified with the capital letter L. A Link Port cannot be changed from the VLAN Configuration screen.
Controlling and Provisioning Network Devices TABLE 5-12 Configure VLAN (Chassis View) VLAN Configuration Options Screen Item Description Reset Cancels the changes that were made using the graphic. The graphic reverts to the original port assignments. Apply Makes and confirms the port assignment changes. If any errors occur, (such as a conflict with another user making port changes), there is an error message and the history window is displayed.
Controlling and Provisioning Network Devices Card Management 5.5 Card Management This application for the iMAP 9000 and SBx3100 devices allows you to view, in a table format, the configuration of the device and then provision/configure its cards. This table is updated real time as changes occur to the cards. Note: Controlling the card configuration involves understanding how provisioning data works in the iMAP devices, so an overview of provisioning data is given after the description of the application.
Controlling and Provisioning Network Devices Card Management FIGURE 5-97 Card Management Window for iMAP 9400 FIGURE 5-98 Card Management Window for iMAP 9700 AlliedView NMS Administration Guide 202
Controlling and Provisioning Network Devices TABLE 5-13 Card Management Card Management Application Window Field/Button Description Device Name The Name given to the device in the Managed Objects property table Slot The slot in the iMAP device that contains the card. Card Type For allowed card types refer to the iMAP Component Specification. Status Three parts: ADMIN STATE-OPERATIONAL STATE-Status. Only the ADMIN STATE can be controlled by the user. Refer to 5.5.23.
Controlling and Provisioning Network Devices FIGURE 5-99 Card Management Create Card Window for ADSL Card FIGURE 5-100 AlliedView NMS Administration Guide Create Card Window for GE8 Card 204
Controlling and Provisioning Network Devices FIGURE 5-101 Card Management Create Card Window for SHDSL24 Card FIGURE 5-102 TABLE 5-14 Create Card Window for CES8 Card Create Card Details Field/Button Description Device The device name and the slot number for the card. Type The type of card that can be provisioned in the selected slot. Profile The profile used to provision the card.
Controlling and Provisioning Network Devices TABLE 5-14 Card Management Create Card Details Field/Button Description Preferred Load For cards that have software loads, this is the software that will load when the card restarts. In normal operation this should be the same as the running load. For the GE1 card this field does not appear. Refer to 5.5.23. Create Creates the card in the provisioning data.
Controlling and Provisioning Network Devices TABLE 5-15 Card Management GE3 Card Details Field/Button Description Profile The template for provisioning data. The default is AutoProv. If the blank pull-down is chosen, there is no profile (manually provisioned). Modify Activated when the Profile is changed. Disable Disables the card. Active only when the Admin State is UP. Enable Enables the card. Active only when the Admin State is DOWN. Restart Reboots the card.
Controlling and Provisioning Network Devices TABLE 5-16 Card Management ADSL Card Details Field/Button Description Device The device name and the slot number for the card (5-11 for the iMAP MAP n400, 0-7, 14-21 for the iMAP MAP n700 in duplex mode. Admin. State If UP, the ADSL is capable of providing service. If DOWN, can Run Diags. Oper. State The ADSL is providing service. This state is not controllable but depends on the Admin. State. Status The current state of the card.
Controlling and Provisioning Network Devices Card Management Table 5-17 lists the fields/buttons available for the CFC24 details and highlights what is unique for the duplex CFC24. Note: For a description of what occurs during a Swap Activity of CFC24s and the conditions that would prevent this from occurring, refer to the iMAP Series User Guide.
Controlling and Provisioning Network Devices FIGURE 5-106 TABLE 5-17 Card Management CFC24 Card Details (Duplex) CFC24 Card Details Field/Button Description Device The device name and the slot number for the card (2,4 for the iMAP n400, 8-9, 12-13 for the iMAP n700 in duplex mode. Admin. State If UP, the CFC24 is capable of providing service. In Duplex mode both CFCs should be UP. If DOWN, can Schedule Diags. Oper. State The CFC24 is providing service.
Controlling and Provisioning Network Devices TABLE 5-17 Card Management CFC24 Card Details (Continued) Field/Button Description Diags Schedule Whether the Schedule Diags. button has been used to schedule diagnostics on the active (simplex) or inactive (duplex) CFC24 card. Modify Activated when the Profile, Preferred Load, or Temporary Load is changed. Disable Disables the card. Active only when the Admin State is UP. In duplex, this cannot be done to the Active CFC24 card.
Controlling and Provisioning Network Devices FIGURE 5-107 TABLE 5-18 Card Management FE10/FX10 Card Details FE10/FX10 Card Details Field/Button Description Device The device name and the slot number for the card. Admin. State If UP, the FE10 is capable of providing service. If DOWN, can Run Diags. Oper. State The FE10 is providing service. This state is not controllable but depends on the Admin. State. Status The current state of the card.
Controlling and Provisioning Network Devices TABLE 5-18 Card Management FE10/FX10 Card Details Field/Button Description Running Load The software that is currently on the FLASH of the card. Modify Activated when the Profile is changed. Disable Disables the card. Active only when the Admin State is UP. Enable Enables the card. Active only when the Admin State is DOWN. Restart Reboots the card. For the FE10, there is no software load. Run Diags Runs diagnostics.
Controlling and Provisioning Network Devices Card Management FIGURE 5-108 FIGURE 5-109 AlliedView NMS Administration Guide Create POTS 24 Card Form Card Management - POTS24 - General Tab 214
Controlling and Provisioning Network Devices Card Management 5.5.12.1 POTS24 Card - General Tab TABLE 5-19 POTS24 Card Details - General Tab Field/Button Description Device The device name and the slot number for the card. Admin. State If UP, the POTS24 is capable of providing service. If DOWN, can Run Diags. Oper. State The POTS24 is providing service. This state is not controllable but depends on the Admin. State. Status The current state of the card.
Controlling and Provisioning Network Devices TABLE 5-20 Card Management POTS24 Card Details - Protocols Tab for IP/RTP Field/Button Description RTP DSCP Settings The DSCP (Differentiated Services Code Point, RFC 2474) value for RTP packets transmitted from the POTS24 card. The default value is 46. VLAN P bits (0..7) The 802.1p priority bit setting for RTP packets transmitted from the POTS24 card. The default value is 6. Modify Activated when a value has been changed.
Controlling and Provisioning Network Devices Card Management 5.5.12.3 POTS24 Card - Protocols - MGCP Tab FIGURE 5-110 TABLE 5-21 POTS24 Card - Protocols/MGCP Tab POTS24 Card Details - Protocols Tab for MGCP Field/Button Description Profile The profile that has been applied to the card Call Agent (or None) The IP address of the network call agent that the card will communicate with.
Controlling and Provisioning Network Devices TABLE 5-21 Card Management POTS24 Card Details - Protocols Tab for MGCP (Continued) Field/Button Description Max. Retransmit Delay (100..4000 ms) Also known as RTO-MAX in RFC 3435, this is the maximum amount of time to wait for an acknowledgement from the call agent before retransmitting a packet. The default value is 4000 milliseconds.
Controlling and Provisioning Network Devices TABLE 5-22 Card Management POTS24 SIP Attributes - (Defaults are in Bold) POTS24 Card Attribute Description Profile The Profile that has been applied to the card Transport The Transport type of the outgoing messages. When set to UDP Accept TCP, the IP Phone will accept incoming TCP messages. (TCP) TCP Port The TCP port on which the Stack listens.
Controlling and Provisioning Network Devices Card Management POTS24 SIP Attributes - (Defaults are in Bold) (Continued) TABLE 5-22 POTS24 Card Attribute Description Call Forwarding Busy Sub-tab After CFW Busy has been activated, incoming calls are forwarded only if the endpoint is busy, i.e., all lines are active.
Controlling and Provisioning Network Devices TABLE 5-24 Card Management POTS24 Card Details - Statistics Tab for SIP Field/Button Description SIP Statistics Statistics supported for the SIP application running on the POTS24 card are defined in the ATN SNMP Enterprise MIB. Invites Received / Retransmitted: The total number of invite messages received and retransmitted. Non-Invites Received / Retransmitted: The total number of non-invite messages sent and retransmitted.
Controlling and Provisioning Network Devices Card Management FIGURE 5-112 CES8 Card Details All the fields for the General tab are the same as for other cards except for the following: • Port Type - This can be DS1 (the default) or E1. Note that the card must be disabled before the Port Type can be changed. • Timing Ref. - The timing reference is where the card will get its clocking reference from.
Controlling and Provisioning Network Devices FIGURE 5-113 Card Management CES8 Card Details- Protocols Tab The Protocols tab is used to fill in the interface attributes of the DS1 card. The only required fields are the VLAN, IP Address, and Subnet mask values, and these must have valid entries or a Set Card Failed window appears. Note: An IP Interface is required before any DS1/E1 ports can be provisioned for CES. For details on these fields, refer to the iMAP User Guide.
Controlling and Provisioning Network Devices Card Management 5.5.15 ADSL24A, ADSL24B, and ADSL24E Card The ADSL24A can be deployed for Annex-A and Annex-B. The ADSL24AE card is available in iMAP release 14.0. Refer to the iMAP Component Specification for details on the card, and the Allied Telesis Feature Guide for details on provisioning. Otherwise the provisioning GUIs are similar. 5.5.
Controlling and Provisioning Network Devices Card Management 5.5.21 GE24POE The GE24POE card is unique to the SBx3112, and can be loaded in any slot in the SBx3112 chassis except for the CFC200 slots. Refer to 5.5.24. 5.5.22 Controlling Card Software (Download and Restart) The Card Details window includes a Download button that brings up the Download software window. This window displays the current files (and their size) on the FLASH of the card, the available space, and the available loads.
Controlling and Provisioning Network Devices TABLE 5-25 Card Management Download Software Window Fields/Buttons Field/Button Description Available Loads This panel lists the loads available and their size. Selecting a load activates the Download button to allow a file to be downloaded. Once a file is downloaded, the user returns to the Card Details window and presses the Restart button to reboot the card and make the downloaded file the current load.
Controlling and Provisioning Network Devices Card Management In Automatic Provisioning Mode, when hardware is discovered in a slot where there is no prior provisioning, the cards and ports are automatically provisioned.
Controlling and Provisioning Network Devices FIGURE 5-116 Note: Card Management Power Over Ethernet Management Form - Cards The Shelf Threshold for the shelf can only be set from Power Over Ethernet Management Form. By selecting one/multiple cards and selecting Show Ports Data, the user can display all of the port -specific information for the card(s) that are selected. This will show the customer the way in which power is distributed among the ports. Refer to the following figure.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) All have a general tab and allow for Enable, Disable, Restart, and Run Diags. Note that since these cards provide a highbandwidth interface usually involving connections to upstream devices, care should be taken before disabling this cardtype. 5.5.
Controlling and Provisioning Network Devices FIGURE 5-118 TABLE 5-26 Port Management (iMAP Devices) Port Management Form (here for iMAP 9700) Port Management Application Window Field/Button Description Device Name The Name given to the device in the Managed Objects property table Port The slot.
Controlling and Provisioning Network Devices TABLE 5-26 Port Management Application Window (Continued) Field/Button Description Description An ID that can be given to uniquely identify the port. In most cases, the subscriber’s telephone number is used. For rules on DS1/E1 customer IDs, refer to 6.16.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.2 Provision New Customer/Port (Triple Play Form) - with Preferences Selecting a non-provisioned port that is not an xDSL/CES8/NTE8/EPON port and then clicking Provision New Customer/ Port invokes the Provision New Triple Play Customer form, as shown in Figure 5-119. This form includes the most important attributes for the port to ensure quality subscriber service. Table 5-27 lists these attributes.
Controlling and Provisioning Network Devices TABLE 5-27 Port Management (iMAP Devices) Provision Port for Triple Play Customer Form Panel Field/Button Description Video/Data Configuration Access Device A drop-down list of all the iMAP Devices that have ports that can support some (or all) aspects of triple play Slot Port Once the Access Device is chosen, the available ports are on that device are listed in the drop-down list.
Controlling and Provisioning Network Devices TABLE 5-27 Port Management (iMAP Devices) Provision Port for Triple Play Customer Form Panel Field/Button Description Bottom of Form Provision The ability of the port to provide service. The Administrative State must be up and then the system determines if the port can provide service. Close Cancels the provisioning of the port.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.2.2 Guided Input As shown in Figure 5-119, fields that require datafill are highlighted to help the user fill out the applicable fields. The highlighted fields work as follows: • Fields that require datafill are highlighted. • When more than one field is highlighted, at least one of these fields require datafill. • After one field is filled in, any fields that still require input are highlighted.
Controlling and Provisioning Network Devices FIGURE 5-120 Port Management (iMAP Devices) Triple Play for ADSL Bonded Ports The display of these fields is controlled by new Preference entries, Bonded ADSL Ports, and Additional POTS Port when Bonded. Selecting a Blank profile entry enables the Bonded Port field, but makes it not required. Selecting a blank bonded port removes any extra POTS line fields that are visible. Refer to the following figure.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.3 Provision New Customer Port for Ethernet For an ethernet port, a form allows the user to provision a Customer ID and apply a profile so that the port can be placed in service. Refer to the following figure. FIGURE 5-122 Provision New Ether-Like Port 5.6.4 Provision New Customer/Port for ADSL Selecting a non-provisioned ADSL port brings up the Triple Play Form that already includes the Access Device and selected port.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.5 Provision New Customer/Port for CES8 (DS1/E1 Form) Selecting a non-provisioned port that is a DS1/E1 port and then clicking Provision New Customer/Port invokes the Provision New DS1/E1 Customer form, as shown in Figure 5-123. This form includes the most important attributes for the port to ensure quality subscriber service. Table 5-28 lists these attributes.
Controlling and Provisioning Network Devices TABLE 5-28 Port Management (iMAP Devices) Provision Port for DS1/E1Form Panel Field/Button Description Port Configuration Device A drop-down of all the devices that have CES8 cards configured as DS1 ports (or, if the port is an E1, all the devices that have CES8 cards configured as E1 ports). Ports A drop-down of the ports (card.slot) in the selected device that are DS1 or E1, depending on the port type being configured.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.6 Provision New Customer/Port for NTE8 (DS1/E1 Form) Selecting a non-provisioned port that is a DS1/E1 port and then clicking Provision New Customer/Port invokes the Provision New NTE-DS1 Port form, as shown in Figure 5-123. This form includes the most important attributes for the port to ensure quality subscriber service. Table 5-29 lists these attributes.
Controlling and Provisioning Network Devices TABLE 5-29 Port Management (iMAP Devices) Provision Port for NTE8-DS1/E1Form Panel Field/Button Description Slot.Port A drop-down of the ports (card.slot) in the selected device that are DS1 or E1, depending on the port type being configured. Port Profile The available profiles for the port type (DS1 or E1) appear in the drop-down list. When the port is provisioned, it will inherit the attributes of that profile.
Controlling and Provisioning Network Devices TABLE 5-29 Port Management (iMAP Devices) Provision Port for NTE8-DS1/E1Form Panel Bottom of Form Field/Button Description Port Profile The available profiles for the port type (DS1 or E1) appear in the drop-down list. When the port is provisioned, it will inherit the attributes of that profile. MLPPP Instance The MLPPP instance that the peer DS1/E1 port is associated with. Timing Reference Where the port will get its clocking reference from.
Controlling and Provisioning Network Devices Note: Port Management (iMAP Devices) For complete information about the EPON2 card, ONU, QoS policies being associated with VLANs, etc. refer to the iMAP Software Reference Manual. The numbering for the EPON ports is the standard slot.port. The following figure shows the Port Management Form for a device and how the EPON ports are shown. The EPON2 port is 5.0.
Controlling and Provisioning Network Devices FIGURE 5-127 Trying to Provision an EPON with Configured ONUs FIGURE 5-128 AlliedView NMS Administration Guide Port Management (iMAP Devices) Provision New EPON Port 244
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.9 Provision New Customer / Port for ONU The ONU is part of the configuration that includes the EPON2 card (for passive optical network) and the Optical Networking Unit (ONU). Note: For complete information about the EPON2 card, ONU, QoS policies being associated with VLANs, etc. refer to the iMAP User Guide.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) The user can then select Provision New Customer Port to bring up the Triple Play form, as shown in the following figure. FIGURE 5-130 Triple Play Form for an ONU Customer Port Note the following attributes of the Triple Play Form when provisioning an ONU: • The Slot.Port has three digits for the ONU. • The MAC address that has been assigned to the ONU is displayed.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) FIGURE 5-131 Provision VDSL Port Note the following on filling out the Triple-Play form for VDSL: • The pull-down for the iMG/RG General configuration is left blank. • The Voice Configuration panel is left blank.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.11 Overview of Triple Play Service Management Form Once a port is configured for video, data, or voice, the Triple Play Service Management Form is used to view or modify the port’s attributes. Depending on the type of port configured and the services configured on that port, this management form displays the various attributes in a hierarchical multi-tab format.
Controlling and Provisioning Network Devices FIGURE 5-132 Port Management (iMAP Devices) Example Status Form (POTS24 and Derived Voice using GenBand) AlliedView NMS Administration Guide 249
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.13 Add Derived Voice Line for GenBand (on Status Tab Form) When the GenBand configuration is being used, the administrator can add a voice line immediately on the Status form by clicking the Add Derived Voice Line button.
Controlling and Provisioning Network Devices FIGURE 5-134 Port Management (iMAP Devices) Add Voice Line Form (more than one MGC Device Configured) Note: This form is only used when the GenBand is providing the derived voice. Note: The NMS does not support GenBand provisioning with TR-008. 5.6.14 iMG/RG Tab This form lists all the major attributes of the iMG/RG and its services, and includes the attributes that were filled out as part of the iMG/RG Profiles.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.14.4 IP Routes Tab This form shows the IP Route assignments that were data filled in the associated RG General Profile (IP Routes tab). The user selects a route in the New IP Routes Panel, selects or deselects the Enable tic box, and then selects the different attributes from the pull-downs. Note: The user should not change individual fields since they would no longer match those of the associated General Profile. 5.6.14.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.15 Ether-like Config. Tab (Upstream and Downstream) Following are the types of ether-like ports that can be provisioined. • • • • • • • • • • See “Ether-Like Port (General Tab)” on page 253. See “Ether-Like Port (General Tab) - iMG/RG” on page 255. See “Ether-Like Port (Port Statistics Tab)” on page 255. See “Ether-Like Port (Port Thresholds Tab)” on page 256. See “Ether-Like Port (Device Data Collection Tab)” on page 257.
Controlling and Provisioning Network Devices TABLE 5-30 Port Management (iMAP Devices) Ether-like Port Management for iMAP Devices - General Tab - Upstream Field/Button Description Admin. State/Status: The Administrative State can be controlled and determines the Operational State. Refer to 5.5.23. Oper. State/Link State: The ability of the port to provide service. The Administrative State must be up and then the system determines if the port can provide service.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.15.2 Ether-Like Port (General Tab) - iMG/RG When the Ethernet port interfaces with an iMG/RG, there are additional fields that appear. Refer to the following figure. FIGURE 5-136 Ether like Port Management Window - iMG/RG Many of the values for the RG-specific fields are controlled by the Profile being used. These are explained in 7.4.
Controlling and Provisioning Network Devices FIGURE 5-137 TABLE 5-31 Port Management (iMAP Devices) Ether like Port Management Window - Port Statistics Tab Provision Port Form for Port Management - Port Statistics Tab Field/Button Description RMON Statistics: Lists the standard RMON statistics. For an explanation, refer to the iMAP User Guide. Interface Statistics: Lists the standard faults for an ethernet port.
Controlling and Provisioning Network Devices FIGURE 5-138 TABLE 5-32 Port Management (iMAP Devices) Ether like Port Management Window - Port Thresholds Tab Provision Port Form for Port Management - Port Thresholds Tab Field/Button Description Name One of the RMON statistics Interval Interval in number of seconds, from 2 to 3600 (one hour) Rising Threshold The number at which an alarm/log is raised when the number is exceeded.
Controlling and Provisioning Network Devices FIGURE 5-139 TABLE 5-33 Port Management (iMAP Devices) Ether like Port Management Window - Device Data Collection Tab Provision Port Form for Port Management - Device Data Collection Tab Field/Button Description Interval The period of time in seconds statistics will be gathered for a bucket, from 2 to 3600 (one hour) Buckets Requested The number of buckets that will be filled before the first bucket is overwritten, from 1 to 2700.
Controlling and Provisioning Network Devices FIGURE 5-140 TABLE 5-34 Port Management (iMAP Devices) Ether like Port Management Window - Stats Graph Tab Provision Port Form for Port Management - Stats Graph Tab Field/Button Description Hidden Statistics: Statistics not added to the resulting graph View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it to the graph/ Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clickin
Controlling and Provisioning Network Devices TABLE 5-34 Port Management (iMAP Devices) Provision Port Form for Port Management - Stats Graph Tab Field/Button Description Command History Views the CLI commands and responses for the operations performed in the Port Management application. This is the same for all tabs. Close Closes the View Details application (the window as well as the tab). This is the same for all tabs. 5.6.15.
Controlling and Provisioning Network Devices TABLE 5-35 Port Management (iMAP Devices) Provision Port Form for Port Management - IP Filters Tab Field/Button Description Add Classifier Bring up the Add Classifier to Port Form. The data filled classifiers are listed, and the user can chose one of these and can define the precedence.
Controlling and Provisioning Network Devices FIGURE 5-143 Port Management (iMAP Devices) ADSL Configuration Form - Status Tab For a data-only port using ADSL (no POTS or Derived Voice configuration), only the Video/Data Port panel has status information on the state of the port. Included is Alerts Panel that lists the current associated alarms. If the ADSL port is part of a Bond configuration, the Port details tab is expanded to show the Bond status, as well as status of all the ADSL ports.
Controlling and Provisioning Network Devices FIGURE 5-144 Port Management (iMAP Devices) ADSL Status - Bonded Port 5.6.16.2 ADSL Configuration Tab - Overview The ADSL Configuration tab has the following associated forms, each with its own tab: • • • • • • • • • General VCs/VLANs Video DHCP FDB PMON Thresholds RMON Thresholds Device Data Coll. IP Filters These are shown in the following figures. Following each figure is a table that describes the panels/fields of the form.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.16.3 ADSL Configuration Tab - General FIGURE 5-145 TABLE 5-36 ADSL Configuration Form - General Tab ADSL Configuration Form, General Tab Field/Button Description Admin. State The Administrative State can be controlled and determines the Operational State. Refer to 5.5.23. Oper. State/Link State The ability of the port to provide service.
Controlling and Provisioning Network Devices TABLE 5-36 Port Management (iMAP Devices) ADSL Configuration Form, General Tab (Continued) Field/Button Description Connection State The connection state, such as Idle or Showtime Actual Line Std. The line standard that was actually chosen. Actual Databoost Whether the DATABOOST feature has been implemented Actual Line Type The line type that was actually chosen.
Controlling and Provisioning Network Devices TABLE 5-36 Port Management (iMAP Devices) ADSL Configuration Form, General Tab (Continued) Field/Button Description Power Mgmt Reentry Delay The amount of time that must elapse before re-entering the Low Power state after a transition to the Full On state.
Controlling and Provisioning Network Devices FIGURE 5-146 Port Management (iMAP Devices) ADSL General Tab with ATM Bond Attributes Each ADSL port has it's own general tab and rates tab. The values for the Profile name and Customer ID are from the Triple_play provisioning form (refer to TBS). Some fields that appear on a regular ADSL port's general tab are moved to the ATMBOND tab since they are tied to the Bond rather than the port.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) Refer to the following figu FIGURE 5-147 FIGURE 5-148 ADSL General Tab with ATM Bond - Single Port Attributes ADSL General Tab with ATM Bond - Single Port Rate Attributes AlliedView NMS Administration Guide 268
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.16.4 ADSL Configuration Tab - VCs/VLANs The ability to correlate the port to Virtual Channels (VCs) and then the VC to one or more VLANs is configured through this tab. Note: The ADSL16 and ADSL8S cards allow up to four VCs to be configured per port, while the ADSL24 card allows only one VC per port. The ADSL24A/B card supports 4 VCs. Figure 5-154 shows the ADSL statistics once they have been enabled.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.16.5 ADSL Video Tab Refer to 5.6.29. 5.6.16.6 ADSL Configuration Tab - DHCP Tab Refer to 5.6.27. 5.6.16.7 ADSL Configuration Tab - FDB Tab Refer to 5.6.28. 5.6.16.8 ADSL Configuration Tab - PMON Thresholds Tab Selecting the PMON Thresholds tab brings up a form (Figure 5-150) that allows thresholds to be set for the ATU-C and ATU-R statistics.
Controlling and Provisioning Network Devices FIGURE 5-151 Port Management (iMAP Devices) ADSL Bonding - PMON Thresholds 5.6.16.9 ADSL Configuration Tab - Device Data Collection Tab The Device Data Collection form is a way to configure buckets that will collect statistics and the interval at which they are filled.
Controlling and Provisioning Network Devices FIGURE 5-152 Port Management (iMAP Devices) ADSL Configuration Form - Device Data Coll. Tab The Add History brings up a form that allows the user to enter the number of buckets to be configured and at what interval (in seconds). 5.6.16.10 ADSL Configuration Tab - IP Filters Incoming data to the ADSL ports (the ingress ports) can be filtered by IP address or a range of IP addresses.
Controlling and Provisioning Network Devices FIGURE 5-153 AlliedView NMS Administration Guide Port Management (iMAP Devices) ADSL Configuration Form - IP Filters Tab 273
Controlling and Provisioning Network Devices TABLE 5-38 Port Management (iMAP Devices) IP Filters Form Field/Button Description Port IP Filters Rank - Also called precedence, it is the rank a precedence a classifier has in a port. The highest rank is 1, and then in descending order. IP Filtering should have a precedence of 51-69. Classifier Name - This is the name given to the grouping of IP addresses or range of addresses.
Controlling and Provisioning Network Devices FIGURE 5-154 Port Management (iMAP Devices) ADSL Statistics Form - PMON Stats Tab The ATU-C and ATU-R statistics have the following measurements: • • • • • Valid Intervals Invalid Intervals Previous Day Monitored Seconds Current 15 min. Time Elapsed Current 1 Day Time Elapsed The table for each statistic type gives the count for the periods.
Controlling and Provisioning Network Devices FIGURE 5-155 Port Management (iMAP Devices) PMON Stats - ADSL Bonding 5.6.16.13 ADSL Statistics Tab - RMON Stats RMON Statistics deal with packet flows and highlight errors as well as overflows of packets. The QOS Statistics are counters for each priority queue that allow the user to see the ratio of sent versus dropped packets. These are cumulative and so produce no management logs. These counters can be reset to 0 by selecting Reset QOS Statistics.
Controlling and Provisioning Network Devices FIGURE 5-156 TABLE 5-39 Port Management (iMAP Devices) ADSL Statistics Form - RMON Stats Tab View Details Form, RMON Stats Tab Field/Button Description Interface Statistics Counts of input and output octets as well as errored input and output packets. RMON Statistics RMON error statistics QOS Statistics Shows the number of packets sent and dropped for each queue.
Controlling and Provisioning Network Devices TABLE 5-39 Port Management (iMAP Devices) View Details Form, RMON Stats Tab (Continued) Field/Button Description Reset RMON Statistics Resets the RMON statistics to 0. Reset QOS Statistics Resets the QOS statistics to 0. 5.6.16.14 ADSL Statistics Tab - Graph Stats Once the statistics have been enabled, they can be graphed both in real-time and for statistics that have been collected.
Controlling and Provisioning Network Devices TABLE 5-40 Port Management (iMAP Devices) ADSL Statistics Form - Graph Stats Tab (Continued) Field/Button Description New Interval This is used when changing the polling interval. When a new one is entered, the Reset Polling Interval Button is enabled, to allow the interval to be changed.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.17.1 SHDSL Port (Status Tab) This tab is essentially the same as the ADSL Status tab, with the Video/Data Port, Voice, and Alerts panels. Since SHDSL is a high-speed data application, only the Voice/Data Port panel has information. 5.6.17.
Controlling and Provisioning Network Devices FIGURE 5-160 TABLE 5-41 Port Management (iMAP Devices) SHDSL Configuration Tab - General - Bonded SHDSL Configuration Tab - General Field/Button Description WireMode Whether the port is 2-wire (Normal) or 4-wire (Bonded) Admin. State/Status The Administrative State can be controlled and determines the Operational State. Refer to 5.5.23. For a bonded pair, the Admin State determines the Oper. State of both wire pairs. Oper.
Controlling and Provisioning Network Devices TABLE 5-41 Port Management (iMAP Devices) SHDSL Configuration Tab - General Field/Button Description Actual Connect Rate The data rate that was actually attained. Actual Receiver Gain Receiver Gain in db. Actual SNR (STU-C, STU-R) The signal-noise ratios that were actually attained. Actual Attenuation (STU-C, STU-R) The attenutation that was actually attained.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.17.6 SHDSL Configuration Tab - DHCP Tab Refer to 5.6.27. 5.6.17.7 SHDSL Configuration Tab - FDB Tab Refer to 5.6.28. 5.6.17.8 SHDSL Configuration Tab - PMON Thresholds This form shows (any) threshold values for the STU-C/R statistics. Note: The thresholds are set for both the STU-C and STU-R at the same time and cannot be set separately. 5.6.17.
Controlling and Provisioning Network Devices FIGURE 5-161 AlliedView NMS Administration Guide Port Management (iMAP Devices) POTS24 Configuration Tab - Status 284
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.18.3 POTS24 Voice Configuration Tab - POTS Each port on the POTS24 provides an analog interface to a physical customer loop. Configurable attributes for each line interface specify the capabilities of the line that affect analog waveform transmission and packetization of the analog waveform. Differences between the SIP versus MGCP protocol parameters are noted in the table below.
Controlling and Provisioning Network Devices TABLE 5-42 Port Management (iMAP Devices) POTS24 Voice Configuration Tab - POTS Field/Button Description Status: The status of the port that follows form the Administrative State and Operational State. For meanings, refer to the iMAP User Guide, Section 4.
Controlling and Provisioning Network Devices TABLE 5-42 Port Management (iMAP Devices) POTS24 Voice Configuration Tab - POTS Field/Button Description Modem Jitter Buffer Delay Used with jitter buffering, this is the amount of time that the first packet is delayed. Note: The default in release 8.0 was changed from 30ms to 10ms Packet Loss Concealment: Specifies whether Packet Loss Concealment is enabled.
Controlling and Provisioning Network Devices FIGURE 5-163 TABLE 5-43 Port Management (iMAP Devices) POTS24 Statistics Tab - Graphs Stats POTS24 Statistics Tab - Graphs Stats Field/Button Description Hidden Statistics: Statistics not added to the resulting graph View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it to the graph/ Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clicking this button deletes it from the gr
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.18.6 POTS24 Diagnostics Tab - POTS This form allows the user to run a set of diagnostics on the port interface. Refer to the following figure and table. In iMAP release 12.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) A panel across the top on the Diagnostics tab shows port state information that applies to both Test Tone and Diagnostics functionality. FIGURE 5-164 POTS24 Diagnostics Tab - Port Status New rows have been added to the Diagnostics Results table to display the Capacitance test results and details/values.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) A new panel has been added specifically for handling Test Tone information FIGURE 5-166 POTS24 Diagnostics Tab - Test Tone Information The button Modify Test Tone is used when modifying the Test Tone information. Note that when turing the Test Tone status to On and making changes to the Time-out, there is a warning about service. Refer to the following figure.
Controlling and Provisioning Network Devices TABLE 5-44 Port Management (iMAP Devices) POTS24 Diagnostics Tab - POTS Field/Button Description Diagnostic Results Refer to the iMAP User Guide for an explanation of these test functions. Diagnostic: Result For each test, there is a Result field that says PASS or FAIL and a Details field that gives the specific test result. Modify Test Tone For making changes to Test Tone settings. When changing state to ON, there is a service warning.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.19.1 DS1/E1 Port Tab FIGURE 5-169 TABLE 5-45 CES DS1 Port Tab (For E1, Label and Type are E1) CES DS1 Port Management - DS1 Port Tab Field/Button Description Device: / Port: Non-editable, this is the port (or ports) that are being displayed. Admin. State/Status: Administrative State of the port. This depends on the state of the associated card. Oper. State/Link Status Operational State of the port.
Controlling and Provisioning Network Devices TABLE 5-45 Port Management (iMAP Devices) CES DS1 Port Management - DS1 Port Tab Field/Button Description Line Build Out: The line build out, either in db (long-haul) or feet (short-haul) Framing Always Unframed, since that is the only type of CES currently supported. Direction Whether the DS1 interfaces a customer or the network.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) FIGURE 5-170 TABLE 5-46 CES PSPAN Tab CES DS1 Port Management - PSPAN Tab Field/Button Description PSPAN ID: This ID is the format vlan:subinterface:pspanid. Note that the subinterface and pspanid are provided by the AlliedView NMS as part of CES provisioning. Admin. State/Status: Administrative State of the PSPAN. This depends on the state of the associated port. Oper. State/Link Status Operational State of the PSPAN.
Controlling and Provisioning Network Devices TABLE 5-46 Port Management (iMAP Devices) CES DS1 Port Management - PSPAN Tab Field/Button Description Peer IP Address: The IP address for the other end of the connection. \ Note: By filling in the peer values, the user is explicitly defining the connection; filling in the attributes for the port may define the port but does not actually set up the path through the network. UDP Port: The UDP port for this end of the connection.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) • Enable Statistics - Activates all the statistics • Disable Statistics - Deactivates all the statistics • Reset Statistics - Sets all the statistics to 0 5.6.19.
Controlling and Provisioning Network Devices TABLE 5-47 Port Management (iMAP Devices) CES DS1 Port Management - Stats Graph Tab Field/Button Description Delete Stat. List After choosing one of the names from the Saved Statistic list, the user clicks on this button to delete this name. Display The attribute that controls the display: - Absolute Values - Rate Per Second - Million Per Second Polling Interval: The Current Polling Interval in seconds New Interval: Sets a new interval for polling.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.19.6 DS1 Port Management - Port Log Tab This form lists the PORT logs associated with the port(s) and can therefore provide a history of provisioning as well as any errors or problems. Refer to the following figure. FIGURE 5-174 CES DS1 Port Management - Port Log Tab 5.6.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.20.1 DS1/E1 Port Tab FIGURE 5-175 TABLE 5-48 NTE DS1 Port Management Form - DS1/E1 Tab NTE DS1 Port Management - DS1 Port Tab Field/Button Description Device: / Port: Non-editable, this is the port (or ports) that are being displayed. Admin. State/Status: Administrative State of the port. This depends on the state of the associated card. Oper. State/Link Status Operational State of the port.
Controlling and Provisioning Network Devices TABLE 5-48 Port Management (iMAP Devices) NTE DS1 Port Management - DS1 Port Tab Field/Button Description Loop Back Status The DS1/E1 port is considered operationally DOWN when a loopback is configured, because no “thru service” can be provided.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.20.2 PPP Tab FIGURE 5-176 NTE DS1 Port Management Form - PPP Tab (Linked Connection) For information on the parameters, refer to the iMAP User Guide. 5.6.20.3 Eth Interface Tab This form has two sub-tabs, General and IpFilters.
Controlling and Provisioning Network Devices FIGURE 5-177 Port Management (iMAP Devices) NTE DS1 Port Management Form - Eth Interface Tab (General) For information on the parameters, refer to the iMAP User Guide.
Controlling and Provisioning Network Devices FIGURE 5-178 TABLE 5-49 Port Management (iMAP Devices) NTE DS1 Port Management Form - Eth Interface Tab (IpFIlters) NTE DS1 Port Management - Eth Interface - IP Filters Tab Field/Button Description Allowed Addresses Other Classifiers Port IP Filter Counters For the Eth interface the traffic management counters: - Match - Number of packets that match any of the criteria - Filter - Number of packets dropped because they do not match any of the criteria - P
Controlling and Provisioning Network Devices FIGURE 5-179 Port Management (iMAP Devices) NTE DS1 Port Management Form - PMON Statistics Tab • Enable Statistics - Activates all the statistics • Disable Statistics - Deactivates all the statistics • Reset Statistics - Sets all the statistics to 0 AlliedView NMS Administration Guide 305
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.20.
Controlling and Provisioning Network Devices TABLE 5-50 Port Management (iMAP Devices) NTE DS1 Port Management - Stats Graph Tab Field/Button Description Display The attribute that controls the display: - Absolute Values - Rate Per Second - Million Per Second Polling Interval: The Current Polling Interval in seconds New Interval: Sets a new interval for polling. This is set with the Reset Polling Interval button.
Controlling and Provisioning Network Devices FIGURE 5-181 Port Management (iMAP Devices) NTE DS1 Port Management Form - Stats Graph Tab 5.6.20.7 DS1 Port Management - Port Log Tab This form lists the PORT logs associated with the port(s) and can therefore provide a history of provisioning as well as any errors or problems. Refer to the following figure.
Controlling and Provisioning Network Devices FIGURE 5-182 Port Management (iMAP Devices) NTE DS1 Port Management - Port Log Tab 5.6.21 SHDSL Bonding (Card Level to Port Level) In prior releases the SHDLS WireMode was set in the Card Management application, as shown in 5.5.7. This support will remain for iMAP systems running earlier software version. However, when both of these conditions are true: • iMAP systems are running release 7.
Controlling and Provisioning Network Devices FIGURE 5-183 AlliedView NMS Administration Guide Port Management (iMAP Devices) SHDSL Configuration - General Tab with Bonded Option 310
Controlling and Provisioning Network Devices FIGURE 5-184 Port Management (iMAP Devices) Triple Play Form for SHDSL with Bonding Option Using the Triple Play form, individual even numbered ports can be bonded to the next higher odd port. Therefore, when the user selects an even numbered port, the “Bond To:” selector is enabled. Either the next port, or a blank entry, can be selected. Provisioning will set the wire mode appropriately.
Controlling and Provisioning Network Devices FIGURE 5-185 TABLE 5-51 Port Management (iMAP Devices) EPON Port Management - Tabbed Form EPON Port Management - General Tab Field/Button Description Admin. State/Status Whether the EPON2 can go into service and therefore pass traffic Oper. State/Link State When the Admin State is up, whether the link is passing traffic Availability Status Dependency, meaning the state of the upstream component determines this component’s status.
Controlling and Provisioning Network Devices TABLE 5-51 Port Management (iMAP Devices) EPON Port Management - General Tab Field/Button Description BRUUM Policy This policy is for the same VID as the downstream-only video stream, but it applies to all upstream traffic from that ONU, and known/learned unicast downstream traffic to that ONU. The ONU/VLAN association and corresponding SLA must be provisioned if unicast or broadcast traffic is required for operation (e.g.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) The user can see the VLAN id and QoS Policy as highlighted in the figure. The default QoS policy is named “NONE” and can be associated with one or more VLANs. The user has the option of selecting one of the VLANs as the untagged VLAN, and so the selection uses a radio button. Note: Refer to 6.11.11 for details on policies for the EPON/ONU. Note: Refer to Section 7 for complete information on provisioning the iMG/RG.
Controlling and Provisioning Network Devices FIGURE 5-187 TABLE 5-52 Port Management (iMAP Devices) VDSL Configuration - General Tab VDSL Configuration Form, General Tab Field/Button Description Admin. State/Status The Administrative State can be controlled and determines the Operational State. Refer to 5.5.23. Oper. State/Link State The ability of the port to provide service. The Administrative State must be up and then the system determines if the port can provide service.
Controlling and Provisioning Network Devices TABLE 5-52 Port Management (iMAP Devices) VDSL Configuration Form, General Tab (Continued) Field/Button Description Status The status of the port that follows form the Administrative State and Operational State. For meanings, refer to the iMAP User Guide, Section 4.
Controlling and Provisioning Network Devices TABLE 5-52 Port Management (iMAP Devices) VDSL Configuration Form, General Tab (Continued) Field/Button Description RFI Bands Specifies the radio frequency interference bands to filter from the VDSL link. To avoid interference it is necessary to introduce power control (notching) in one or more of these bands. Transport Protocol Used to specify the type of transport used when operating in VDSL mode.
Controlling and Provisioning Network Devices TABLE 5-53 Port Management (iMAP Devices) VDSL Configuration Form, Rate Settings Tab (Continued) Field/Button Description Actual Upstream/ Downstream PSD The actual transmit upstream PSD setting. Actual Upstream/ Downstream INP The actual impulse noise protection value for upstream Max. Upstream Rate Specifies the maximum upstream bit rate to attain for a VDSL port. The valid range for this parameter is from 32Kb to 14848.
Controlling and Provisioning Network Devices TABLE 5-53 Port Management (iMAP Devices) VDSL Configuration Form, Rate Settings Tab (Continued) Field/Button Description Disable Enabled if the port is in an Administrative State of UP, disables the port and so brings the Administrative State to DOWN. The Operational State will also change to DOWN. Alarms Invokes the Alarm table of the Fault Management Object. 5.6.24.2 VDSL Configuration - VCs/VLANs Tab This screen is determined by the mode of the port.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) The ATU-C and ATU-R statistics have the following measurements: • • • • • Valid Intervals Invalid Intervals Previous Day Monitored Seconds Current 15 min. Time Elapsed Current 1 Day Time Elapsed The table for each statistic type gives the count for the periods. The Fault Statistics are counters, which are part of the ATN Enterprise MIB, that help to monitor the ADSL port by incrementing continuously until reset.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) The QOS Statistics are counters for each priority queue that allow the user to see the ratio of sent versus dropped packets. These are cumulative and so produce no management logs. These counters can be reset to 0 by selecting Reset QOS Statistics. Refer to the iMAP User Guide for details about these counters. 5.6.25.
Controlling and Provisioning Network Devices TABLE 5-54 Port Management (iMAP Devices) Stats Graph Tab Field/Button Description Display The attribute that controls the display: - Absolute Values - Rate Per Second - Million Per Second Polling Interval: Current Polling Interval in seconds New Interval: Sets a new interval for polling. This is set with the Reset Polling Interval button.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) FIGURE 5-191 TABLE 5-55 Video Tab Video Tab Field/Button Description System-wide Information These are the IGMP attributes that have been set for the device. Card Information The attributes for the ADSL/VDSL card, such as the Multicast Group Limit for iMAP devices. The Multicast Group Limit display is not present for SBx3100 devices running software release 17.x.x or higher. Port IGMP Statistics The good vs.
Controlling and Provisioning Network Devices TABLE 5-55 Port Management (iMAP Devices) Video Tab (Continued) Field/Button Description Learned STB Multicast Info VID - The multicast VLAN MAC - The STB MAC Addresses that were learned and are in the FDB IP - The IP addresses being used for the multicast traffic Note: These three attributes are placed in a table to allow the user to see the association between a VLAN ID, MAC address, and its associated IP addresses.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.30 ATM Bonding For ATM Bonding, the Service Management Form allows the user to add and remove ports. Note: To create the ATM Bonding Group, the user should create an ATM Bonding Profile, and then use that Profile as part of provisioning with the Triple Play form. Refer to 5.6.2.3. The result should be an ATM Bonding Group that contains all of its members. 5.6.30.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.30.2 Bonding Group - Viewing and Changing the Bonding Configuration The General subtab for ATM Bonded ports gives information on both the ATM Bond and the ADSL members. Refer to the following figure. FIGURE 5-193 ATMBOND Tab From this tab it is possible to enable and disable the ATM Bonding group, as well as add and remove ports to the bond.
Controlling and Provisioning Network Devices FIGURE 5-194 Port Management (iMAP Devices) Selecting a Port to add to Bonding Group • Enable - If the group is disabled, the Enable button is available. Enable drives the ports to an Operational Status of UP, and then sets the ATM Bonding Group to UP. At this point Port Management will show the root port as Type ATMBOND and the secondary port will no longer be in the port list.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 3. In the Port Management table, select the now freed secondary port and select View/Modify Details. 4. In the ADSL tab, select Disable. At this point, the port is released from the Group and is added back to the Port Management table, retaining all of its previous settings.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.30.5 Destroying the ATM Bonding Group To destroy the ATM Bonding Group, go to the primary port in the Port Management table. Select De-provision Customer Port, then choose Select All and De-provision. The Root port goes to Down and can now be provisioned for other applications. Refer to the following figure.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.30.6 PMON Thresholds AtmBond statistics are on a new tab. PMONs can be set for the for each ADSL line. RMONs are tied to the Bond interface. PMON statistics can be collected for each Interface FIGURE 5-198 ATMBOND Statistics 5.6.30.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) FIGURE 5-199 ATMBOND Diags 5.6.30.8 Network Inventory - Customer Ports For ATMBOND ports a Managed Object is created to represent the ATMBOND. Its port number is preceded by ‘atmbond:”, and it has the same number as its primary port. Its type is “ATMBOND”. The primary ADSL ports type is changed to “ATMBOND-PRI” and each secondary ADSL port to “ATMBOND-SEC”. All Managed Objects will share the same CustomerID and IfIndex.
Controlling and Provisioning Network Devices Port Management (iMAP Devices) 5.6.31 STP Tab For each port configuration tab, there is an STP tab or sub-tab that shows the current STP attributes. Refer to the iMAP User Guide for details.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7 Port Management (non-iMAP Devices) As Table 1-6 shows, port management is also provided for the Rapier and Switchblade devices (these include the 8700 and 9800 series). Note: For complete information on Rapier and Switchblade devices, go to http://www.alliedtelesis.co.nz/documentation/ 5.7.
Controlling and Provisioning Network Devices FIGURE 5-202 Port Management (non-iMAP Devices) Ether like Port Management (Rapier Device) - Port Statistics Tab This form lists the standard RMON statistics.
Controlling and Provisioning Network Devices TABLE 5-57 Port Management (non-iMAP Devices) Provision Port Form for Port Management (Rapier Device) - Stats Graph Tab Field/Button Description Hidden Statistics: Statistics not added to the resulting graph View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it to the graph/ Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clicking this button deletes it from the graph/ Displ
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7.2 GenBand Reports 5.7.2.1 CPE Reports This table is accessed by right clicking on the GenBand icon and choosing Display CPE Report. This brings up the following figure. FIGURE 5-205 GenBand CPE Report This table provides the values for the GenBand connection to the CPE and includes: • CPE Name - When provisioned by the NMS, includes the IP address of the associated iMAP and port.
Controlling and Provisioning Network Devices FIGURE 5-206 AlliedView NMS Administration Guide Port Management (non-iMAP Devices) GenBand Line Report 337
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7.3 Dual End Line Testing (DELT) 5.7.3.1 Overview of DELT DELT provides information about the quality of the link between the ADSL card and the modem by collecting upstream and downstream values for attainable rate, line attenuation, signal attenuation, signal-to-noise margin, power spectrum density, and aggregate transmitted power.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) FIGURE 5-207 DELT Testing Tab 5.7.3.3 Initiate a DELT Diagnostic Clicking the Diagnose Interface button will initiate a DELT. A confirmation dialog box appears indicating that service may be disrupted, if confirmed the ATI activity dialog appears until the test starts. While running, all the buttons are disabled except for View Exported Test.
Controlling and Provisioning Network Devices FIGURE 5-208 Port Management (non-iMAP Devices) Graph of DELT Parameter Results 5.7.3.6 Export DELT Results to a File Clicking the Export Test Results button displays an export dialog similar to the one used for exporting other data from the NMS. Data is stored on the NMS server. If the File Chooser button is clicked, you can navigate to a directory on the server and select an existing file or create a new one.
Controlling and Provisioning Network Devices FIGURE 5-209 Port Management (non-iMAP Devices) Exporting DELT Results to a File 5.7.3.7 Export DELT Results to Web Page As with other export operations, the data can optionally be exported to an HTML page and viewed with a browser. The page can then be saved using the browser.
Controlling and Provisioning Network Devices FIGURE 5-210 Port Management (non-iMAP Devices) Exporting DELT Results to a Web Page 5.7.3.8 Viewing Exported DELT Results DELT results exported to a file can be viewed from using the View Exported Test button on the Port Details ADSL diagnostics tab. First a file chooser is displayed to select the file containing the test results.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) After a file is selected the test result viewer is displayed. The viewer window also has a View Exported Test button so that additional tests can be displayed and compared. A maximum of eight (8) tests can viewed simultaneously from a single client, in addition to the port details window. Refer to the following figure. FIGURE 5-212 View Graph Results 5.7.3.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) • H(f) Imaginary - The imaginary component of the characteristic function. • H(f) Real - The real component of the characteristic function. • H(f) Amplitude - The amplitude of the characteristic function. This is computed from the real and imaginary components. Amp = sqrt( r*r + i*i) where r is the real component and i the imaginary component. • H(f) Phase - The phase of the characteristic function.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) FIGURE 5-213 Running the SELT Test Select OK, and the test will begin. As it goes through testing, the state will change, until the test is complete and with a status of Success. Refer to the following figure. FIGURE 5-214 SELT Test Complete Once the test is complete, the user can view the results on a browser or save the test results for later analysis.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7.6 Support of CWMP with TR-069 Devices Caution: Caution: Due to inter operability problems, do NOT use the TR-069 CPE WAN Management Protocol (CWMP) to manage Comtrend 5631 CPE. Otherwise, service may be interrupted. Instead, use the Comtrend web GUI for configuration and management. Contact your ATI representative for details. 5.7.6.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7.6.2 Basic Functions The following functions are provided: • Provisioning of the Comtrend device using the NMS Video and internet services can be provisioned using the NMS Triple-Play GUIs, using TR-069. Existing Profiles can be used with the Comtrend CPE as with other iMG/RGs. • Backup and Restore The Comtrend configuration files can be backed up and restored as with other CPE devices.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) • The upstream port cannot be determined, and so provisioning is done using the CPE MAC address. This is similar to provisioning an iMG without an iMAP. Refer to 7.11. • An Auto-Configuration Server (ACS) URL must be configured in the CPE for using TR-069 for communicating with the ACS (the NMS).
Controlling and Provisioning Network Devices FIGURE 5-218 Port Management (non-iMAP Devices) Comtrend Boot Configurator The fields in this form are as follows: • Mgmt. VLAN - The VLAN used for sending and receiving configuration information and downloads to the CPE. • Trap Host - The IP address of the Auto Configuration Server (ACS) - the NMS. • ACS URL - An ACS URL is required to be configured in CPE for using TR-069 for communication with the ACS server (NMS).
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) Run the Comtrend Boot Configurator at the NMS server. Check the Save Only checkbox before clicking OK. Then copy the configuration file to a PC connected to a LAN port on the Comtrend. Use the web GUI on the Comtrend to update settings with the configuration file. • Method 2 Install and run the NMS server software on a PC connected to a LAN port on the Comtrend.
Controlling and Provisioning Network Devices 6. In the Settings File Name field, enter or browse to the configuration file copied in step 4. Click Update Settings. The Comtrend reboots (Figure 5-220). The Comtrend is now ready to be deployed FIGURE 5-220 Note: 7. Port Management (non-iMAP Devices) Updating Comtrend with Configuration File The following steps are optional. After the Comtrend has rebooted, to verify settings, select Device Info > WAN.
Controlling and Provisioning Network Devices FIGURE 5-222 AlliedView NMS Administration Guide Port Management (non-iMAP Devices) Comtrend TR-069 client - Configuration 353
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7.6.8 Staging - Method 2 • Prerequisites: • The Comtrend is set to factory defaults. • A local PC (desktop/laptop, etc.) has been loaded with the NMS release 11.0 SP5 software. • The local PC is connected to a LAN port on the Comtrend device. The PC obtains an IP address automatically from the Comtrend. The specific steps are as follows: 1.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7.6.9 Example Procedure - Provisioning At an NMS client on the network, the Comtrend is provisioned as follows: 1. Bring up the Triple Play form for Bonded ports, as explained in 5.6.2.3. Refer to Figure 5-224. 2. For the Comtrend device, you must enter a Description (Customer ID) of 15 characters or less.
Controlling and Provisioning Network Devices FIGURE 5-225 4. Port Management (non-iMAP Devices) Comtrend Device in iMG/RGs table Go to the Nodes table and find the upstream iMAP device for the Comtrend. Right-click on the node, then click Discover Attached iMG/RGs. The Comtrend device now has the upstream port filled in at the iMG/RG table, and provisioning is complete. 5.7.6.10 Managed Object Properties Right-click on the Comtrend row in the iMG/RG table.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) FIGURE 5-227 Comtrend Device Parameters (1) FIGURE 5-228 Comtrend Device Parameters (2) Several parameters are collected during discovery and by calling operations to retrieve basic device information and these few are required to manage the CPE using (CWMP) TR-069.
Controlling and Provisioning Network Devices Port Management (non-iMAP Devices) 5.7.6.11 CWMP Browser Also available in NMS release 11.0 SP5 is a CWMP browser that allows the user to view and change the parameters on a TR069 compliant device. The tool is accessed by selecting Tools -> CWMP Browser (directly above SNMP MIB Browser). The TR069 Operations Form appears. In the Device pull-down are available TR-069 devices available for the NMS, which in release 11.0 SP5 are the Comtrend devices. 5.7.
Controlling and Provisioning Network Devices Scheduling and Controlling Provisioning Tasks 5.8 Scheduling and Controlling Provisioning Tasks 5.8.1 One Time When a task is to be performed one time only, the user will see the One Time Schedule type form that as the options of having the AlliedView NMS perform the task. Refer to the following figure. FIGURE 5-230 One-time Task Form The user can select: • Now - The task begins as soon as the AlliedView NMS is able to perform it.
Controlling and Provisioning Network Devices Scheduling and Controlling Provisioning Tasks In this form, the user can double-click on the specific task and get details of the status of the task. (This is especially useful if the task as failed, as seen in the figure.) The user also has the following options for the specific task(s) that are chosen: • • • • Download - Download the file onto the device. (Software Download only).
Controlling and Provisioning Network Devices Scheduling and Controlling Provisioning Tasks 5.8.3 View Tasks Form Once a task has been performed or placed in a schedule, it is added to the main task table, the View Tasks Form, which allows the user to query or immediately activate a task, as well as to abort a task that is in progress. The Task Table is accessed by selecting Tools -> View Tasks from the main menu. The following figure appears.
Controlling and Provisioning Network Devices FIGURE 5-234 Other Device Control Tasks Cleanup Button for View Tasks Window The user selects the Cleanup button, and then selects a date. After pressing Select, the user sees the Task Window select all of the tasks that meet that criteria. The user can then select Remove, and all of the tasks prior to that date are removed. 5.9 Other Device Control Tasks 5.9.
Controlling and Provisioning Network Devices Other Device Control Tasks 5.9.3 File Comparison (Text Files) The Configuration File Comparison feature compares and displays two text files side-by-side with their differences highlighted. Text files can be selected for comparison from the Configuration File Management, Command Script Management, and Device Backup/Restore applications. Any two text files from any two devices can be compared.
Controlling and Provisioning Network Devices TABLE 5-59 Other Device Control Tasks Scenarios for Text File Comparison Task Application Steps View Latest Changes Config File Mgmt 1. User navigates to Config File Mgmt. 2. User right-clicks on a single row. 3. User selects the Compare Files button. 4. The latest differing config files for the device are displayed side-by-side with their differences highlighted. 5. The names, dates, and sizes of the files compared are also displayed. 1.
Controlling and Provisioning Network Devices Other Device Control Tasks 5.9.3.1 Viewing Latest Config File Changes from MAP Device Following is an example of the first scenario to show the screens and responses for viewing the latest changes. For configuration comparison on a device, right click on the device and select View Config Changes. Refer to the following figure.
Controlling and Provisioning Network Devices Other Device Control Tasks This will display the latest two text backup files from the selected device, side-by-side, with their differences highlighted. See the following figure. Differences are indicated by highlighting text. Plain text shows lines that are the same in both files. Red text shows lines on the left which are not on the right while blue shows lines on the right which are not on the left. Missing lines are padded with blanks.
Controlling and Provisioning Network Devices FIGURE 5-237 Other Device Control Tasks Only One Backup file - No Comparison Possible If there are no backup files, and the display will be empty and a notice will pop up indicating no backup files exist for the device. See the following figure.
Controlling and Provisioning Network Devices FIGURE 5-238 Other Device Control Tasks No Files Available for Comparison At the top of the display are the file names, their dates, and their sizes. These are updated whenever the files are compared, so they always indicate exactly which files are being compared. When the user enters other files into the file-selection boxes at the bottom of the display (explained below), they will not take effect until the Diff button is pushed.
Controlling and Provisioning Network Devices Other Device Control Tasks FIGURE 5-239 Compare Files Panel • If a row is selected from the Device Backup/Restore application, the dialog will be pre-filled with the 2 most recent different backup files, if any-as if the device were selected from a map or the network inventory. Note that the backup files are read-only, since these must not be edited in case they are needed.
Controlling and Provisioning Network Devices Other Device Control Tasks • File not found • Rejection of binary file - This application has made a best effort to recognize and then reject binary files which are not valid for text file comparison. • Device Backup/Restore stores iMAP configurations as binary databases - These files are not valid for text file comparison. Config File Mgmt, however, can upload text config files for iMAP devices starting at release 3.
Controlling and Provisioning Network Devices Other Device Control Tasks 5.9.4 Discover Attached iMG/RGs For a detailed explanation of how DHCP is set up so that iMG/RGs can be discovered and configured, refer to Section 7. On initial discovery of the iMG/RG (out of the box or provisioned to a different Access Island), the bootstrap VLAN is used. Subsequent discoveries are performed using the RGMgmt VLAN. This option will (re)discover all the iMGs/RGs attached to the iMAP device that use the RGMgmt VLAN.
Controlling and Provisioning Network Devices Other Device Control Tasks 5.9.6 Telnet / SSH to a Device To access a device using telnet or SSH, there are the following options. 5.9.6.1 Access a Telnet or SSH-enabled Device Use Tools -> Open Telnet or Tools-> Open SSH to connect to any device that is telnet- or SSH-enabled and is accessible. Refer to the following figure that is used for SSH-enabled devices. FIGURE 5-241 Accessing a Device for SSH Note: For SSH, the user-specified Time-out is ignored.
Controlling and Provisioning Network Devices Other Device Control Tasks 5.9.7 Browse Device (Rapier Device Only) To access the Web-enabled on-device management GUI, right-click the device and choose Browse Device. The Browse Device feature is not currently supported for iMAP devices. If an iMAP device is chosen, the following example window appears. 5.9.8 Rediscovery Device (When Required) This option picks up any changes made to the selected device.
Controlling and Provisioning Network Devices Manage CLI Users 5.10 Manage CLI Users Note: This option is available only to users in the Admin group. This option is used to specify common CLI login-passwords for a set of devices. This data is then used during the discovery process to log in on each device and save the username/password pair on a per-device basis. Note: This function is part of the Discovery Panel. 5.11 Customer Cutover 5.11.
Controlling and Provisioning Network Devices Customer Cutover • Cutover only applies to ports of the same interface type, such as ADSL to ADSL, since otherwise source port parameter settings would not map to destination port parameter settings. • To ensure parameter compatibility, cutover is restricted to destination ports on devices running the same or higher version of software as the source device, and for ADSL and VDSL, the same annex (A, B, or C).
Controlling and Provisioning Network Devices TABLE 5-60 Customer Cutover Provisioning Guidelines/Restrictions for the Customer Cutover Feature Interface Type Card Type Notesa VDSL VDSL24A Annex of destination card must match annex of source card XE VDSL24B Annex of destination card must match annex of source card XE1 Not Supported XE1S Not Supported XE4 Not Supported XE6 Not Supported XE6SFP Not Supported a.
Controlling and Provisioning Network Devices Customer Cutover 5.11.4 Procedure Example - Transfer to different cardtype In this example, the user wishes to transfer the 24 ports of an ADSL24 card to an ADSL48A card. (This example would be fairly typical, since many system upgrades involve installing ADSL48A cards and transferring over existing ports.) 5.11.4.
Controlling and Provisioning Network Devices FIGURE 5-243 Customer Cutover Selecting Source Ports The user then selects the now active Cut-Over Customer Button, and the Customer CutOver panel appears, as shown in the following figure. Note that the initial destination device is the same as the source device.
Controlling and Provisioning Network Devices Customer Cutover FIGURE 5-244 Initial Customer Cut Over Screen The user now selects a different device in the Destination Device pull-down. Once selected, the NMS searches the destination device and then lists all the available destination ports, as shown in the following figure.
Controlling and Provisioning Network Devices Customer Cutover In most cases, the destination has a one-to-one mapping between ports on the card. However, the user is free to select various destination ports, as shown in the following figure. Note: Although the destination ports are valid since they are the same type, the NMS will produce an error message if the user tries to transfer an Annexed port to a non-Annexed port.
Controlling and Provisioning Network Devices Customer Cutover 5.11.4.2 Physically disconnect/reconnect the ADSL cables The user now disconnects the ADSL cable(s) and connects them to the ADSL 48 card. Note: To connect the ADSL cables to another card, the user may need to change the cabling facilities. Also note that the cable type is probably the same, but if the user were going from an ADSL16 card to an ADSL24/48 card, the connections would have to be changed and a different cable type used.
Controlling and Provisioning Network Devices FIGURE 5-248 Customer Cutover Original Ports Ready to be Re-Provisioned The procedure is now complete, with the iMG/RGs up on the destination ports and passing traffic, and the original ports deprovisioned. 5.11.5 Procedure Example - Transfer of iMG to different Port This type of procedure is more complex since when the iMG is moved to a different port, the NMS database will be updated with the new location (upstream port).
Controlling and Provisioning Network Devices Customer Cutover In this example, six iMGs are being transferred from FX10 ports to FX20 ports. Also, the source and target ports are on the same device, but the target ports could be on a different device. Caution: If performing cut-over to a different device, the VLAN network must be pre-configured to maintain IP connectivity after the cables are moved over to the new ports. (Refer to Section 7 on how Access Islands are configured to guarantee this.
Controlling and Provisioning Network Devices Customer Cutover The user first brings up the Port Management Form for the source device and highlights the appropriate source ports, which must be provisioned ports with a Customer ID, as shown in the following figure. FIGURE 5-249 Selecting Source Ports for iMG/RG Cutover The user then clicks on the Cut-Over Customer button. The Customer Cut-Over Panel appears, with the Source Device, Ports, Types, and Customer IDs filled in.
Controlling and Provisioning Network Devices FIGURE 5-250 Customer Cutover Data filling Destination Ports to be Provisioned The user selects the appropriate ports and then clicks on Provision Destination. The Task Details panel appears, and this shows the status of each port as the attributes are copied over. (Each port goes through the status sequence Validated Working... - Provisioned.) Refer to the following figure.
Controlling and Provisioning Network Devices FIGURE 5-252 Customer Cutover All Port Attributes Copied over to Target Ports 5.11.5.2 Physically disconnect/reconnect the iMGs to the new Ports The user now disconnects the optic fiber from the FX10 port and connects it to the FX20 port. Note: To connect the FX10 cable to the FX20 port, the user may need to change the cabling facilities.
Controlling and Provisioning Network Devices FIGURE 5-253 Note: Customer Cutover Selecting iMG/RGs and Updating DHCP Client The Update DHCP Client process will fail if the iMG/RG is not powered up and VLAN IP connectivity is lost. Refer to the Note in 5.11.5.1. FIGURE 5-254 DHCP Recovery Complete 5.11.5.4 Copy over the iMG attributes Returning to the Task Details Form, the user selects the appropriate ports and selects Complete.
Controlling and Provisioning Network Devices FIGURE 5-255 Customer Cutover Completing the iMG/RG Provisioning or Cutover When the provisioning is complete, the iMG/RG table shows the new upstream ports. (The task is deleted automatically once cut-over status for all customers has completed successfully). Refer to the following figure. FIGURE 5-256 iMG/RG Table when Provisioning is Complete 5.11.5.
Controlling and Provisioning Network Devices FIGURE 5-257 Customer Cutover Original Ports Ready to be Re-Provisioned The procedure is now complete, with the iMG/RG up on the destination ports and passing traffic, and the original ports deprovisioned.
6. Configuring Network Services 6.1 Overview As a network management product, the AlliedView NMS can allow network-based services to be configured. Table 6-1 lists the network services that are configured in AlliedView NMS release 14.0. TABLE 6-1 Network Services in AlliedView NMS Release 12.0 Network Service Description Notes / Section Overview of Network Services Refer to 6.1 Topology Maps and Inventory tables 6.
Configuring Network Services TABLE 6-1 Overview Network Services in AlliedView NMS Release 12.0 Network Service Description Notes / Section Software Upgrade support for EPSR and EPSR+ During upgrade of iMAP devices, nodes are updated in proper order to keep the EPSR ring in-service. If other nodes need to be added to upgrade sequence, GUIs appear. If EPSR had not been configured correctly, a GUI with an error message appears. Refer to 6.20.
Configuring Network Services Topology Maps and Inventory Tables 6.1.5 NTE8 Service The NTE8 card is used to allow DS1/E1 facilities to connect (backhaul) the ethernet network, with both ends of the DS1/E1 connections being on iMAP 9000 devices. Refer to the iMAP User Guide for a complete description of the NTE8 configuration. Note: Refer to 5.5.14 and 5.6.20 for an overview of the NTE8 card and DS1/E1 port attributes.
Configuring Network Services Topology Maps and Inventory Tables FIGURE 6-1 Network Objects used for Network VLANs 6.2.2 VLAN Network Map (Layer 3) By containing symbols for routers and the layer 2 subnetworks, this map shows all VLAN networks and their Layer-3 (IP) connectivity. On this map, an IP-based Network VLAN will include its router connections. An island-based Network VLAN will still appear as a layer 2 subnetwork symbol, but it will have no router connections. Refer to Figure 6-2.
Configuring Network Services Topology Maps and Inventory Tables FIGURE 6-2 VLAN Network Map Double-clicking any of the Network VLAN symbols or selecting one of the VLAN network nodes in the VLAN Network tree will open up the VLAN Network Map (layer 2), a map of the individual Network VLAN. 6.2.3 VLAN Sub Maps (Layer 2) Each VLAN network symbol on the layer 3 topology map has its associated layer 2 topology map.
Configuring Network Services Topology Maps and Inventory Tables FIGURE 6-3 Note: IVLAN Map (Layer 2) The connectivity on the layer 2 VLAN subnetwork map is derived from the physical link connectivity that is configured and viewed in the Physical Network map. If physical links have been created on the Physical Networks map, the Network VLANs will appear here. This also allows Network VLANs to be configured even if the physical connections do not exist. Refer to 6.2.4.
Configuring Network Services Topology Maps and Inventory Tables FIGURE 6-4 Physical Network Map The ability to add, delete, and view physical links is useful in the following scenarios: • Viewing existing Network VLANs - As the physical connections are created and configured, if there is an existing Network VLAN that uses that physical connection, its submap will automatically be configured and added to the VLAN Network nodes.
Configuring Network Services Topology Maps and Inventory Tables • Network VLAN Manager - Shows all Network VLANs in a hierarchy To create a physical link, select Network Service -> Link Operations from the pull-down menu or right click anywhere on the map area. The Layer 2 Links form appears, as shown in Figure 6-5. This form displays the links associated with the Nodes and/or Links that are currently selected. If no links are selected, it displays all Links in the NMS database.
Configuring Network Services Topology Maps and Inventory Tables FIGURE 6-6 Add Links Form for a Physical Connection From this form, enter the name that will be given to the link. Use the Select Device to select which devices will be the end points of the link. Once the devices are selected, the available ports are shown in the pull-down menu for the Port. When the Apply button is clicked, the new link is automatically added to the Layer 2 Links table.
Configuring Network Services Topology Maps and Inventory Tables FIGURE 6-7 TABLE 6-2 Network Inventory for VLAN Interfaces VLAN Interfaces Inventory Table Column Description VLAN Interface Name The name of the VLAN interface on the device, which can be specified when creating a Network VLAN using the GUI wizard. Refer to 6.3.1. ID The VLAN interface ID (device name and VLAN ID). Type The type of interface. Always VlanInterface in this inventory table.
Configuring Network Services Topology Maps and Inventory Tables • Managed Object Properties - The base properties of the interface, including the IP address and netmask if it is part of a VLAN. • Delete Object and Traces - This will delete the VLAN IF and all its sub-elements, so there is a confirmation window. • Manage/UnManage - The interface will (or will no longer) be polled by the AlliedView NMS. The color of the row icon turns to gray.
Configuring Network Services Creating Network VLANs When the Physical Links table is the active panel, the Link menu pull-down appears and the following options are available: • Managed Object Properties - The base properties of the physical link. • Alarms/Events - This will invoke the Fault Management tables for Alarms and Events on the selected link. • Manage/UnManage - The link may be set to unmanaged to indicate that it is not a real link, but rather a modelled link.
Configuring Network Services Creating Network VLANs FIGURE 6-9 TABLE 6-4 Create VLAN Net Form - Initial VLAN Information Create VLAN Net Form Column Description Working Nodes Nodes that are to be included in the Network VLAN. Nodes not in the original working nodes can be included in a VLAN by following an existing or newly created link to a new node. This is not recommended, though, as the auto-selected VLAN ID and VLAN Name may clash with entries already on these new nodes.
Configuring Network Services Creating Network VLANs FIGURE 6-10 Create VLAN Net Form - Modify Links Any links that were selected from the Physical Map when the Wizard was started are displayed in the Vlan Path Links table on this form. The available physical links from each device are listed in the Add Links subform. Selecting the desired link from the Add Links list and then clicking Add Links (now active) will place the selected link as one of the VLAN Path links, as shown in Figure 6-11.
Configuring Network Services Creating Network VLANs FIGURE 6-11 Adding Vlan Path Links - File There is also the option to create a physical link by clicking Create New Link, and a new physical connection between two devices and their ports can be created. This uses the same form as shown in 6.2.4. 6.3.3 Configure the VLAN Interfaces (Service Ports) The next step is to configure the VLAN interfaces by adding any service ports to the Network VLAN.
Configuring Network Services Creating Network VLANs FIGURE 6-12 Configure VLAN Interface Form - File If this is an IP-based VLAN, you can enter the IP address in the cell in the IpAddress column, and the network mask in the cell in the Mask column. This must be extended to a specific address within the subnet. For the port row, click the IpAddress cell and enter the IP address, and then click the Mask cell and enter the network mask.
Configuring Network Services Creating Network VLANs FIGURE 6-13 Edit Ports Form Clicking on the ports and then clicking Close adds these to the Service Ports cell that was chosen. Multiple ports may be selected pressing the Shift or Ctrl key while clicking. The same port must not be selected in both the Tagged Ports and Untagged Ports lists. This error will be detected when the Close button is clicked. The form will not close until the error is corrected.
Configuring Network Services FIGURE 6-14 Extending Network VLANs Test Network VLAN Form (with error and option to ignore) 6.4 Extending Network VLANs Once a Network VLAN is created, the general procedure for extending it is as follows: 1. Open the Network VLAN submap associated with the VLAN. This can be done by right-clicking the desired VLAN on the main Network VLAN map and selecting Open Submap from the pop-up menu. 2.
Configuring Network Services Extending Network VLANs FIGURE 6-15 Extending a Network VLAN The Extend Network VLAN form that appears when you select Extend Vlan from the pop-up menu is shown in Figure 6-16. FIGURE 6-16 Extend Network VLAN Form (Physical Link) This form shows Network VLAN Name, the VLAN ID (VID), and the available links from the device selected. (At this point a new physical link can be created between this device and the device that will include the Network VLAN. Refer to 6.2.4.
Configuring Network Services Extending Network VLANs Select one of the available physical links to activate the Next button. The form that shows the available VLAN IFs on this physical link is displayed, as shown in Figure 6-17. FIGURE 6-17 Extend Network VLAN Form (VLAN Interface) - File Select one of the VLAN Interfaces. (At this point a new VLAN Interface can be created on the device.) Select one of the available VLAN Interfaces to activate the Next button.
Configuring Network Services Trimming or Splitting Network VLANs The IP address and network mask can be entered in cells IP Address and Network Mask respectively by clicking the cell and entering the value. Note: When you click the IP Address cell, the cell will be filled with the subnet address, and when you click the Network Mask cell (or any other cell), the cell will be filled with the network mask for the subnet.
Configuring Network Services Network VLAN Manager (Excluding EPSR) FIGURE 6-20 Delete Network VLANs Form Select one of the VLAN IDs, and then click Delete VLAN. A form showing all the associated VLAN Interfaces that will also be deleted will appear. If this is what you wish to do, click Finish. The Task Details window then will appear. Note: VLAN Interfaces with VID of 1, the default VLAN, will not be deleted. 6.7 Network VLAN Manager (Excluding EPSR) 6.7.
Configuring Network Services Network VLAN Manager (Excluding EPSR) 6.7.3 Using the Network VLAN Hierarchy Viewing the Network VLAN Manager/Analyzer is done from the Physical Network map. From the Network Service menu, select VLAN -> Network VLAN Manager. The Network VLAN Manager/Analyzer form appears, as shown in the following figure. The View Networked VLANs view is selected. FIGURE 6-21 Network VLAN Manager/Analyzer Panel (Network VLAN Hierarchy) All available Network VLANs are shown in a hierarchy.
Configuring Network Services TABLE 6-5 Network VLAN Manager (Excluding EPSR) Network VLAN Functions on the Network VLAN Manager Type of VLAN Function Description LINKPORT View Link Port Brings up the Port Management Form. View Neighbor Link Port... Brings up the port management form for the next port in the VLAN hierarchy in the left panel. Delete Logical Link Brings up the Delete Virtual Link form, which deletes the VLAN path between two devices (not the physical link). Delete Assoc.
Configuring Network Services Network VLAN Manager (Excluding EPSR) Right clicking on the Network VLAN, VIF Device, or LINKPORT Node node allows the administrator to perform various tasks, listed in the following table TABLE 6-6 Device VLAN Functions on the Network VLAN Manager Type of VLAN Function Description VLAN Interface (VIF) Device View VLAN Interface... Brings up chassis view for the VLAN Interface chosen Note: Extend VLAN... Extends the chosen VLAN. Refer to 6.4 Resync Device...
Configuring Network Services Network VLAN Manager (Excluding EPSR) FIGURE 6-23 Example Physical Link Spreadsheet To view the spreadsheet, open the file with Excel. Note: The Excel file cannot be viewed on the Solaris platform. To ensure that all files in the state directory are available, select Reload Profiles. To actually import the spreadsheet, select Import/Export. As the links are loaded, progress messages will appear, as shown in Figure 6-24.
Configuring Network Services Network VLAN Manager (Excluding EPSR) FIGURE 6-24 Error Messages When Importing Physical Links Figure 6-24 shows an example of error messages, when the spreadsheet contains links that already physically exist. 6.7.6 Exporting Physical Link Configurations The physical link configuration can be exported to an Excel file as well. If the user provides a file name that ends with .
Configuring Network Services Network VLAN Manager (Excluding EPSR) FIGURE 6-25 Exporting Link Configuration Data to an Excel File If the user selects an existing profile or specifies the name of an existing profile, the data will be imported from the specified Excel file and not re-exported. Any existing links included in the file will be skipped. 6.7.
Configuring Network Services Network VLAN Manager (Excluding EPSR) FIGURE 6-26 Note: Sample VLAN Outage Monitoring Timeline For protection schemes, such as EPSR, when there is a break in the network VLAN topology due to link failure, an alternate path allows traffic to continue to run. As a result, these will not be recorded as outages and therefore will not appear for that networked VLAN. For more detail on EPSR, refer to 6.13.
Configuring Network Services Example of Creating Network VLANs FIGURE 6-28 Network Vlan Outage Details Window 6.7.7.2 Resetting Monitor Time To reset the monitor time (i.e. set the monitor start time to the current monitor time), select a VLAN from the list, and then click Reset Monitor. 6.7.7.3 Refreshing all Network VLANs To refresh all of the VLANs in the list, click Refresh All. 6.7.7.
Configuring Network Services Example of Creating Network VLANs FIGURE 6-29 Sample Island-Based VLAN Networks Figure 6-30 shows the three devices on the physical network map. Note that the Rapier 48i already has a physical link to another device.
Configuring Network Services Example of Creating Network VLANs FIGURE 6-30 Three Devices Included in the Island-Based VLAN To create the physical links, select and Shift-select to include all three devices, and then right-click to select Network Service > Link Operation.The Layer 2 Links form appears. Select Add Link, and then select the link name, device number, and port number to configure the example. Figure 6-31 shows Link_#20 being configured.
Configuring Network Services Example of Creating Network VLANs FIGURE 6-31 Creating a Physical Link Once the two physical links (Link_#20 and Link_#21) are created in the AlliedView NMS, the Network VLANs that will use the links (Training and Sales) can be created. Still on the Physical Network map, Select and shift-select the three devices, and then right-click Network Services -> VLAN -> Create VLAN. The Create VLAN form will appear. Fill in the fields for the Training VLAN, as shown in Figure 6-32.
Configuring Network Services Example of Creating Network VLANs FIGURE 6-32 Sample Values for the Training Network VLAN Click Next, and the Modify Links form appears. Check the checkbox for Link_#20 and Link_#21 from 172.16.33.2. Do not select Link#5, since that is not part of this Network VLAN. Figure 6-33 shows Link_#21 about to be added.
Configuring Network Services Example of Creating Network VLANs FIGURE 6-33 Adding Link_#20 and Link_21 to the Network VLAN After adding the relevant physical links, click Next. The Configure Vlan Interfaces form appears, and shows the VLAN interfaces over the physical links.
Configuring Network Services Example of Creating Network VLANs the devices that have service ports. In the example the service ports would be 11.0 Untagged for 172.16.33.11 and 0.6 Untagged for 172.16.33.18. Click Next, and the Test Network VLAN form appears. This will test the connectivity between all three devices.Click Finish and the Task Details form will show the tests and if they are successful, as shown in Figure 6-35.
Configuring Network Services Example of Creating Network VLANs FIGURE 6-36 Adding a Physical link to Extend a Network VLAN Now that the physical link is created, go to the Training VLAN in the VLAN Network map, Right-click on the device in the Network VLAN that has the new link (172.16.33.18) and select Extend VLAN. The Extend Network VLAN form appears, which includes the new physical link, as shown in Figure 6-37. Note that you could create the new physical link here is desired.
Configuring Network Services Example of Creating Network VLANs Select the link and click Next.The Select/Create VLAN Interface form appears. Since the Training VLAN is not yet created on the .13 device, click Create VIF. The Create New VLAN form appears, with the Training VLAN with the VLAN ID of 30 already filled in. Click OK and the VLAN Interface will be added, as shown in Figure 6-38. FIGURE 6-38 Creating the VLAN IF on the extended Network VLAN Device Select the row and click Next.
Configuring Network Services FIGURE 6-39 Example Configurations for HVLAN, Translations Updating the VLAN IF on the Extended Network VLAN Device 6.9 Example Configurations for HVLAN, Translations 6.9.1 Overview Note: The Port-based HVLAN and translation feature are not compatible on the same port. Once a port is configured with the HVLAN option, it cannot use the translation feature, and vice-versa. This applies to the cards that support both of these features (GE3, XE1, GE8). 6.9.
Configuring Network Services Example Configurations for HVLAN, Translations FIGURE 6-40 Example HVLAN Configuration This example assumes the physical links (Link-10-20 and Link-0_0-2) have already been created, as explained in 6.2.4. On the Physical Network map, Select and shift-select the three devices, and then right-click Network Services -> VLAN -> Create VLAN. The Create VLAN form will appear (Initial VLAN Information). Fill in the fields for the VID502, as shown in Figure 6-41.
Configuring Network Services Example Configurations for HVLAN, Translations FIGURE 6-41 Create VLAN for HVLAN Configuration Clicking on Next brings up the Modify Links Form, where the user selects a device from the Available Links Form pull-down, and then adds the appropriate link, as shown in Figure 6-42.
Configuring Network Services FIGURE 6-42 Example Configurations for HVLAN, Translations Selecting Links and Adding to the HVLAN Configuration Clinking Next brings up the Configure VLAN Interfaces Form, as shown in Figure 6-43. For the iMAP 9000 devices, the type must be changed to HVLAN, which the figure illustrates. At this point the user can click on the Service Ports column and select which ports will included.
Configuring Network Services FIGURE 6-43 Example Configurations for HVLAN, Translations Configure Vlan Interfaces Form (iMAP 9000 Devices are Type HVLAN) Now that the Vlan Interfaces are configured, it can be tested. Clicking on Next brings up the Test Network Vlan form, (Figure 6-44), and then clicking on Finish runs the test and provides the results, as shown in Figure 6-45. If a test does not succeed, an error window appears with a message as to why the test failed.
Configuring Network Services Example Configurations for HVLAN, Translations FIGURE 6-44 FIGURE 6-45 Test Network VLAN Form (Finish to run Test) Testing Results for the HVLAN Configuration Extending this HVLAN configuration usually involves adding another iMAP 9000 device with service ports that support multiple VLANs on its untagged ports. The steps are similar to the steps in 6.8.
Configuring Network Services Example Configurations for HVLAN, Translations Clicking on Next would bring up the Select/Create Vlan Interface Form, and the user would select the Create VIF button. The VlanID (502) would be given the type HVLAN. After pressing OK, the form would have the new HVLAN502 added to the list. The user would then select this Vlan and select Next. The Vlan Operations Form appears with the CREATE operation for the HVLAN502.
Configuring Network Services Example Configurations for HVLAN, Translations 6.9.3 VLAN Translations Configuration 6.9.3.1 Setting up VLAN Translations To set up VLAN translations, the basic sequence is: 1. Create the VLAN that will become the translated VLAN that will go through the network. 2. Associate this translated VLAN with the appropriate interfaces, both on the customer side (where the translation will take place), and the network side (as the translated VLAN goes through the network). 3.
Configuring Network Services Profile Management • GE3, XE1, GE8 (network interfaces) Refer below for FE10/FX10/FX20. • ADSL24A/B, SHDSL24, ADSL24SA, ADSL24AE, NTE8, VDSL24A/B, ADSL48A/B (customer interfaces) • The following cards do not support VLAN translation: • CES8 • The Port-based HVLAN and translation feature are not compatible on the same port. Once a port is configured with the HVLAN option, it cannot use the translation feature, and vice-versa.
Configuring Network Services Profile Management 6.10.1 Profile Configuration Parameters - Devices and Scoping 6.10.1.1 Devices There are many different types of devices and ports in the network and each type has a different set of parameters associated with it.
Configuring Network Services Profile Management Note: For profiles for EPON interfaces and their QoS policies, refer to 6.11.11. Note that the iMAP_EPON device class in QOS policies/actions is an 'exclusive' device class; a policy or flow cannot be used with any other device-class once assigned to the iMAP_EPON device class. Note: For the ADSL port profile the user can specify for a service VLAN the VC (0-3) as well as the VPI, VCI, and framing. Note: The ADSL-Bond profile is used to support the G.
Configuring Network Services TABLE 6-7 Profile Management Comparison of Ethernet Port Parameters for Profile Management Parameter Rapier Device Relearn x Intrusive Action x Multicast limit x Master/Slave mode x Ingress limit (I Series only) Switchblade / 9800 Device x Egress limit (I Series only) x Acceptable traffic (VLAN or ALL) x x Input Filtering (On or OFF) x Multicast MODE (A, B, or C) x iMAP Device (9x00) FC Length x Jumbo x Flow Control x x x QOS Policy x x x
Configuring Network Services Profile Management Every device in the network has a name that uniquely identifies that device. (Usually it is the IP address, but it can be a DNS name.) When a profile is configured, the Profile Scoping field can have a value that identifies a subset of devices, usually be using the wildcard (*) that is part of the name. For example, if Profile Scoping has the value 192.168.100.*, it includes all IP address under the 192.168.100.xxx network.
Configuring Network Services Profile Management 6.10.2 Creating a Profile The profile feature allows the user to create, device, card, port, and iMG/RG profiles, as well as removing an association with a profile. There are two ways to access this menu: • At the Physical Network Node, right click away from the device icons and select, for example, Profile -> (or one of the other profile types). • At the Network Service Data Node, click on the Profiles leaf.
Configuring Network Services Profile Management FIGURE 6-48 Create Profile for Ethernet Port - Product Type Tab Each product type has a tool tip that includes the specific products that belong to that group. Refer to the following figure. FIGURE 6-49 Tooltip for Product Type Tab 6.10.2.3 Etherlike Profile for GE24POE includes POE To configure the GE24POE port on the SBx3112, the POE tab is included with the Etherlike Profile, as shown in the following figure.
Configuring Network Services Profile Management FIGURE 6-50 Etherlike Profile for POE The three values to be filled in are: • Power Over Ethernet State - Whether to enable or disable the feature • Priority - Ports with lower priority will stop being powered when the system cannot allocate enough power to all ports. • Power Shutoff Limit - Power will be cut off if it exceeds the set threshold For detailed information on the parameters, refer to the SBx3112 Product Guide. 6.10.2.
Configuring Network Services Profile Management 6.10.3 Viewing and Modifying Profiles Once the profiles are created, they can be viewed by selecting the Profile node under the Network Data Services object, as shown in the following figure. FIGURE 6-51 Viewing the List of Profiles (includes POTS24 Card Profiles) The profiles can be viewed like other attributes, so they can be sorted, scrolled, and have a search function.
Configuring Network Services Profile Management 6.10.5 Deploying a Profile To deploy a profile means to apply the configuration values assigned in a Profile to a set of objects (devices or ports) in the network. Note: The set of objects on which to apply the Profile must be of the same type as the Profile.
Configuring Network Services Profile Management FIGURE 6-52 AlliedView NMS Administration Guide Deploy on Port Profile Form 446
Configuring Network Services Profile Management FIGURE 6-53 AlliedView NMS Administration Guide Deploy on Device Profile Form 447
Configuring Network Services Profile Management FIGURE 6-54 Deploy an iMG/RGDeploy iMG/RG Profile 6.10.6 Redeploying a Profile There are times when a user needs to re-synchronize the parameters stored in the Profile on the NMS with the configuration of the actual devices or ports in the network. This could be needed after a change is made to the Profile, or when the user wants to reset any temporary changes made to individual ports in the network back to the Profile configuration.
Configuring Network Services Profile Management FIGURE 6-55 Deploy Port Profile Form - Scheduling 6.10.8 Deploying Changes to a Profile When a Profile is modified on the NMS, any device or port in the network using that profile will no longer be consistent with the Profile on the NMS. When modifying a Profile on the NMS, the NMS will allow the user to have the NMS automatically push the changes in the profile to the objects (devices or ports) in the network to which the profile had been applied.
Configuring Network Services Note: 1. Profile Management The table used to display the Port Profile usage will be that same table that indicates the Customer ID associated with each port. This panel is named “Configured Ports”. Select the “Ports” panel under the Network Inventory Object. 2. The Ports panel will contain a table that lists the configured ports in the network.
Configuring Network Services Profile Management FIGURE 6-56 ADSL Details - NMS and Interface Profile Whenever a profile is deployed by the NMS to the port, the Interface Profile Name will be set to the port Profile name. Note that there is no other way to change the Interface Profile Name via the NMS. If for whatever reason the names do not match, for example someone changes the external profile name on the device using the CLI, the port profile name (upper right) will be marked with an asterisk.
Configuring Network Services Profile Management FIGURE 6-58 AlliedView NMS Administration Guide NMS and External Profile Name Match 452
Configuring Network Services Profile Management 6.10.12 ADSL G.Bond Creation and use of Profiles In release 11.0, there is support for G.bond (ITU G.998) for ADSL interfaces. Note: Refer to the Allied Telesis iMAP User Guide for detailed information on provisioning G.Bond, feature operation, and alarms/ performance monitoring. To provision this, there is the profile called ADSLBOND, and it contains references to two regular ADSL profiles, referred to as the Primary and Secondary profiles.
Configuring Network Services Profile Management 6.10.13 Multiple VC Support on ADSL Port As part of configuring the iMG/RG, there is the option of datafilled multiple VCs for the ADSL connection. This is explained in 7.5.9. 6.10.14 Multiple VC Support on SHDSL Port In NMS release 11.0 SP4, the SHDSL Profile allows the user to configure up to four VCs. 6.10.15 Multiple VC Support on VDSL Port 6.10.15.
Configuring Network Services Profile Management FIGURE 6-60 VDSL Profile - VCs in ATM Mode When the Transport Protocol is set to PTM the user will receive a warning, as shown in the following figure.
Configuring Network Services Profile Management FIGURE 6-61 Setting the Transport Protocol to PTM (VDSL Port) After clicking OK, the administrator can go to the VC/VLAN tab and see that there are no VCs, as shown in the following figure.
Configuring Network Services Profile Management FIGURE 6-62 VC/VLAN Tab when VDSL in PTM Mode The Modify VDSL Profile VC/VLAN tab has two tables, one for the current settings in the profile, and one for putting in changes. This has the same behavior as the Create VDSL Profile, in that the Transport protocol settings alter these tables. Refer to the following figures.
Configuring Network Services Profile Management FIGURE 6-64 Modify Profile after Mode set to PTM 6.10.15.3 Triple Play Service Management Form The Triple Play Service Management form, VDSL Configuration tab also reflects the multiple-VC provisioning, as shown in the following figures.
Configuring Network Services Profile Management FIGURE 6-66 FIGURE 6-67 Message if Change Mode to PTM VCs/VLAN tab when in PTM Mode Changes to the View/Modify tabs are done on a per tab basis. As an example, if someone makes changes to the General tab and then makes changes to the VCs/VLANs tab, pressing the “Modify” button will only pick up the current tabs changes. Because of this, an administrator can change the Transport to “ATM” (from “PTM”) and then make changes to the VCs/ VLANs table.
Configuring Network Services FIGURE 6-68 Profile Management Message to Save Protocol Change before changing VC Configuration AlliedView NMS Administration Guide 460
Configuring Network Services Profile Management 6.10.16 DS3 SFP Support To provide DS3 support, in iMAP release 12.0 the 9000 iMAP devices (except the 9100) add support for a DS3 SFP. (This is currently the MiRICi-T3, which integrates a complete DS3 interface and a Gigabit Ethernet interworking function into the form factor of a standard SFP optics device.) Note: For complete information on the DS3 SFP feature, refer to the iMAP User Guide.
Configuring Network Services Profile Management FIGURE 6-70 AlliedView NMS Administration Guide Warning when no Egress Rate Limiter is Set 462
Configuring Network Services Profile Management FIGURE 6-71 Warning When Egress Rate Limiter is Set To provision the DS3 SFP, select an unused Ethernet port (GE or GE8) and select Provision New Customer/Port. The only fields that need to be filled in are the Customer ID and Port Profile, as shown in the following figure.
Configuring Network Services Profile Management • Up if an SFP has been inserted and both interfaces are operationally up. Note: For traffic to flow, both the DS3 and GE interfaces must be operationally up, and any condition that causes one to go operationally down (such as an alarm or being administratively disabled) will cause the other to go operationally down with a failing condition and alarm. Once the port is provisioned, you can review the in the Service Management Details for the port.
Configuring Network Services Profile Management FIGURE 6-74 AlliedView NMS Administration Guide DS3-SFP tab 465
Configuring Network Services Profile Management 6.10.17 Changes for the Enterprise Edition The EE version has most of the features of the Service Provider Edition, except for the following: 6.10.17.1 Customer Management is Removed In the Tools menu the option Customer Management is removed.
Configuring Network Services Profile Management 6.10.17.2 Cannot Provision / Deprovision Customer Port from Inventory View The right-click menu in the ports table does not include the Provision and Deprovision Customer/Port. Refer to the following figure.
Configuring Network Services Profile Management 6.10.17.3 Cannot Provision / Deprovision iMG / RG (or run MPEG Test) When right-clicking on the iMG/RG in the NMS inventory table, the options to provision or deprovision an iMG/RG, as well as run an MPEG test on the iMG/RG, are not available. Refer to the following figure.
Configuring Network Services Profile Management 6.10.17.4 Cannot Provision / Deprovision Customer Port in Port Management Window In the Port Management window, the buttons for provisioning / de provisioning a customer port are removed, with only the button Port available. Refer to the following figure.
Configuring Network Services Profile Management 6.10.17.5 No CPE Services Profiles Menu Option For the menu item Network Services - Profile, the CPE Services Profile menu item will not be available, since creating new iMG/RG profiles will not be allowed. Refer to the following figure.
Configuring Network Services Quality of Service (QoS) Network Management 6.11 Quality of Service (QoS) Network Management 6.11.1 Overview Configuring QoS capabilities on the various iMAP device types is fairly detailed and complex. Since the same QoS configuration is often applied across multiple devices, it is convenient for the network manager to define QoS Policies (configuration information) in the NMS and then separately deploy the policies to a specific set of devices and their ports.
Configuring Network Services Quality of Service (QoS) Network Management • QoS Policy Flow - A QoS Flow refers to a sub-stream of packets on a port that satisfies a set of classification conditions. For example, a stream of packets classified by the condition that their destination TCP port is 80 (i.e., TCPDPORT=80) is considered a QoS Flow. • QoS Priority Action - A QoS Priority Action is to take a QoS Policy Flow and to prioritize it according to the 802.
Configuring Network Services TABLE 6-10 Quality of Service (QoS) Network Management Traffic Management Summary Table - DSL- and TDM-based Cards (Continued) SHDSL24 ADSL 24 ADSL 24AE ADSL 24A/B b VDSL 24A/B NTE8c DROP X X X X X X FORWARD X X X X X X COUNT X X X X X X SETVPRIORITY X X X X X X SETIPTOS X X X X X X SETIPDSCP X X X X X X MOVEPRIOTOTOS X X X X MOVETOSTOPRIO X X X X Classifier Match Fields a Classifier Actions ARP Filtering X X X X
Configuring Network Services Quality of Service (QoS) Network Management j. Classifier capacity is an approximation. The features enabled on a port or interface, such as such as IGMP, DHCPRELAY, VLAN (for per-VLAN UFO and HVLAN), EPSR, INTERFACE (TAGALL option for HVLAN), ACCESSLIST, and CLASSIFIER, classifiers on surrounding ports, content of the user classifiers, and many other factors influence the number of classifiers available on a given port or interface.
Configuring Network Services TABLE 6-11 Quality of Service (QoS) Network Management Traffic Management Summary Table - Ethernet-based Cards (Continued) - iMAP and SBx3112 Classifier Match Fields Egress Port Rate Limit Increments FE10/ FX10 FX20 GE2 GE3 XE1 GE4/ GE2RJ GE8 1 Mbps 64 Kbps 8 Mbps 1 Mbps 1 Mbps 8 Mbps 1 Mbps EPON2a (c) GE24POE XE4 8 Kbps 8 Kbps 4 8 4 8 8 4 8 (d) (d) 128 128 1024 128 128 Number of Ingress Traffic Meters 63 256 127 2048 1024 Number of Ingress T
Configuring Network Services Quality of Service (QoS) Network Management the specified classifier. When the condition(s) preventing the classifier’s installation is corrected (such as, HVLAN is removed from the port) the classifier will be automatically installed and its status will be updated at the user’s CLI session. • FE2, GE2, FE10, FX10, ADSL24, GE3 - Supports ETHFORMATs of 802.3 and EthII. Note that each of these formats consumes twice as many hardware resources as ETHFORMAT=802.3tagged, 802.
Configuring Network Services Quality of Service (QoS) Network Management 6.11.2 QoS Flows To create a QoS flow, a set of classifier conditions that is device-specific is defined and given a name. Within this set, multiple parameters can be defined, which create an “AND” condition. To add logical OR’s to the flow definition, another set of classifier conditions is added.
Configuring Network Services Quality of Service (QoS) Network Management To access the Policy Flow Form, select QoS -> Packet Flow. Table 6-13 describes the fields. Figure 6-81 shows an example QoS Policy Flow Form. TABLE 6-13 Options for the QoS Policy Flow Form Option Purpose Target Device Classes The device classes to be included in this Flow. Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device classes to include.
Configuring Network Services TABLE 6-13 Quality of Service (QoS) Network Management Options for the QoS Policy Flow Form Option Purpose Delete Flow Deletes the flow entry for all Target Device Classes. To remove the flow for a single Device Class uncheck its “target” checkbox. When the flow is saved the entry for that Device Class will be removed from the database. Save Flow If a new flow has been defined, an existing been has been changed, or targets have been removed, makes the changes permanent.
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-81 Sample QoS Policy Flow Form - Rapier 6.11.3 QoS Priority Action To create a set of priority actions (which can be associated with a QoS Flow), one or more priority action parameters are defined and given a name. Note: These parameters can be applied to one or more device classes, as long as they all support the same parameter. If they do not, an error message appears.
Configuring Network Services Quality of Service (QoS) Network Management Table 6-14 lists the allowable actions that can be assigned to a flow.
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-82 QoS Priority Action Form - iMAP Device . TABLE 6-15 Options for the QoS Priority Action Form Option Purpose Target Device Classes The device classes to be included in this Flow. Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device classes to include.Press and Hold the SHift key to select more than one device class.
Configuring Network Services TABLE 6-15 Quality of Service (QoS) Network Management Options for the QoS Priority Action Form Option Purpose Device Class table Table of the Device Classes, Targets, and a description of the device class. Supported indicates there are no detected errors. Priority Action Name A pull-down of all existing actions. If selected, the parameters of the selected action appear in the form. Device Class A pull-down of the device classes that are included in this policy.
Configuring Network Services TABLE 6-16 Quality of Service (QoS) Network Management QoS Traffic Actions for Device Classes Function SwitchBlade Rapier iMAP AlliedWare Plus Ingress Traffic Policing - handling non-conforming traffic - MAXBANDWIDTH RATE METER EXCEEDACTION BUFFERSIZE PBS EXCEEDREMARKVALUE NCDROP NCFORWARD NCREMARKDSCP NCCOUNT Egress Traffic Limiting / Scheduling MAXBANDWIDTH - MINBANDWIDTH RATE CBS BUFFERSIZE CIR FAIRHASHEDFLOWS EBS WEIGHT EIR STATS Congestion Con
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-83 AlliedView NMS Administration Guide QoS Traffic Action Form - Rapier 485
Configuring Network Services TABLE 6-17 Quality of Service (QoS) Network Management Options for the QoS Traffic Action Form Option Purpose Target Device Classes The device classes to be included in this Traffic Action. Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device classes to include.Press and Hold the SHift key to select more than one device class. Targets can also be added/removed by clicking the “Target” checkbox.
Configuring Network Services Quality of Service (QoS) Network Management 6.11.5 QoS Policy Action Form The device classes may also have action parameters at the policy/port level. Figure 6-84 shows an example QoS Policy Rule Form. Table 6-18 describes the fields. Note: A policy action can be created that supports an iMAP device with a “None” option.
Configuring Network Services TABLE 6-18 Quality of Service (QoS) Network Management Options for the QoS Policy Action Form Option Purpose Target Device Classes The device classes to be included in this Flow. Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device classes to include.Press and Hold the Shift key to select more than one device class. Targets can also be added/removed by clicking the “Target” checkbox.
Configuring Network Services Quality of Service (QoS) Network Management 6.11.6 QoS Policy Maintenance Window (Defining a Policy) Once all the attributes for a QoS policy have been created, they are associated to create or define a policy which has a unique name. Note: The names for a Policy can be up to 15 characters and should be lower case. Moreover, underscores and spaces are not allowed. Figure 6-85 shows the QoS Policy Maintenance window.Table 6-19 explains the options.
Configuring Network Services TABLE 6-19 Quality of Service (QoS) Network Management Options for the QoS Policy Maintenance Window Option Purpose Target Device Classes The device classes to be included in this Policy. Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device classes to include.Press and Hold the SHift key to select more than one device class.
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-86 Analyze Rules Window 6.11.7 QoS Policy Rule Form To associate a flow, a priority action, and a traffic action the QoS Policy Rule Form is used. This form is accessed on the QoS Policy Maintenance Form by clicking on the Add Rule button. Figure 6-87 shows an example QoS Policy Rule Form. Table 6-17 describes the fields.
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-87 TABLE 6-20 QoS Policy Rule Form Options for the QoS Policy Rule Form Option Purpose Target Device Classes The device classes that are included in this policy. This value is read-only. Priority Action Pairs Two pull-downs that have the available Flow Descriptions and Priority Actions. Select one from each to include in the rule. Note that each flow name can only be used once in a policy.
Configuring Network Services Note: Quality of Service (QoS) Network Management Names that are enclosed in square brackets, [Name], are set by Allied Telesis and cannot be changed. 6.11.9 Example of an iMAP Device Class Policy 6.11.9.1 Overview Figure 6-88 shows a sample QoS configuration for a network, and it has the following attributes: • The types of traffic flows are associated with specific VIDs.
Configuring Network Services Quality of Service (QoS) Network Management 6.11.9.2 Creating the QoS Policy Flow The QoS Policy Flow will be used to create the names for these flows. Following are the steps to create a flow for qos_voice: 1. Click on the Network Services menu and select Create/Edit QoS Configuration -> Create/Edit Flows 2. The QOS Policy Flow Dialog window appears. 3. Click on New Flow and enter qos_voice as the New Name, then Select. 4. The Edit QOS Device Class List appears.
Configuring Network Services Quality of Service (QoS) Network Management 2. With the RATE parameter, select RATE from the pull-down. In the blank filed, enter 1000. 3. Click on Click Here to Add or Replace Parameter. The default RATE is replaced with the new value. 4. Repeat these steps with the BURSTSIZE parameter, selecting the pull-down 32KB. 5. In the pull-down of parameters, select NCCOUNT. The option ON or OFF appears in a pull-down. Select ON. 6.
Configuring Network Services Quality of Service (QoS) Network Management Following are notes on using these forms: • A flow, priority, or action can be defined first and made applicable to all device types. In creating a policy, the user can control which device types a flow, priority, or action will apply to. • The user can create the flows, priorities, and actions first, and then in creating the policy create the rules that associate these together.
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-90 AlliedView NMS Administration Guide QoS Flow for enterprise Policy (CRM server) 497
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-91 AlliedView NMS Administration Guide QoS Flow for enterprise Policy (web_traffic) 498
Configuring Network Services FIGURE 6-92 AlliedView NMS Administration Guide Quality of Service (QoS) Network Management QoS Flow for enterprise Policy (medium_priority_data) 499
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-93 AlliedView NMS Administration Guide QoS Priority for enterprise Policy (high_priority) 500
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-94 AlliedView NMS Administration Guide QoS Traffic for enterprise Policy (64K_limit) 501
Configuring Network Services Quality of Service (QoS) Network Management 6.11.11 Example of an EPON/ONU Interface Policy Creating policies for the EPON/ONU involves the same steps as creating policies for the various device types, but the administrator should understand the EPON/ONU interfaces and how policies work on these interfaces. Note: The user should refer to the iMAP User Guide for complete information about provisioning the components that make up the EPON configuration.
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-95 TABLE 6-22 Default EPON and ONU QoS Policies QoS Flows for EPON Interfaces Flow Classifier Parameters IpFilterFlow IPSADDR= onuflow ETHFORMAT=ANY Notes &PROTOCOL=IP TABLE 6-23 QoS Actions for EPON Interfaces Flow Action Parameters EPON_BRUUM MINDOWNSTREAMRATE=1M; Notes MAXDOWNSTREAMRATE=2M; DOWNDELAYSENSITIVITY=TOLERANT DOWNBURSTSIZE=10K EPON_IPMC MINUPSTREAMRATE=0 MAXDOWNSTREAMRATE=1G; DO
Configuring Network Services TABLE 6-24 Quality of Service (QoS) Network Management QoS Actions for ONU Interfaces Flow Action Parameters ONU_INTERNET MINDOWNSTREAMRATE=0K Notes MAXDOWNSTREAMRATE=4M DOWNDELAYSENSITIVITY=TOLERANT DOWNBURSTSIZE=5K MINUPSTREAMRATE=1M MAXUPSTREAMRATE=2M UPDELAYSENSITIVITY=TOLERANT UPBURSTSIZE=3K ONU_VIDEO MINDOWNSTREAMRATE=20M MAXDOWNSTREAMRATE=512M DOWNDELAYSENSITIVITY=TOLERANT DOWNBURSTSIZE=30K MINUPSTREAMRATE=128K MAXUPSTREAMRATE=256K UPDELAYSENSITIVITY=TOLERANT UP
Configuring Network Services TABLE 6-25 Quality of Service (QoS) Network Management Default QoS Policies for EPON and ONU Interfaces Policy Flow Priority Action eponbruum IpFilterFlow Allow None AnyOtherIp Deny None AllPackets ONUPriority EPON_BRUUM IpFilterFlow Allow None AnyOtherIp Deny None AllPackets ONUPriority EPON_IPMC eponipmc onuvideo onuvoice oneinternet onurgmgmt IpFilterFlow Allow None AnyOtherIp Deny None AllPackets ONUPriority ONU_VIDEO IpFilterFlow Al
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-97 Example ONU Port Profile Note: The administrator can also create and view QoS policies using the CLI. When policies are created by the AlliedView NMS, they are shown at the CLI with the prefix “NMS_” added and may append an “_a” or “_b” to the name. When policies that are created at the CLI, they appear on the ONU and EPON port details screens with a question mark appended.
Configuring Network Services Note: Quality of Service (QoS) Network Management In release 10.0 SP2, the EPON supports VLAN translations. As a result, the translated VLAN ID is also included as part of setting the QOS policies. 6.11.12 QoSPolicies for the FX20 Interface 6.11.12.1 Overview The AlliedView NMS GUI for QoS allows the administrator to configure ingress traffic parameters on the iMAP ports. (Refer to 6.11.1.
Configuring Network Services Quality of Service (QoS) Network Management 6.11.12.2 Overview of GUI This feature uses the GUI framework that is used to configure SLA bandwidth parameters for ONU interfaces, as detailed in 6.11.11, but instead of defining QoSPolicies for each VLAN on an ONU, an NMS Policy consists of a set of rules in which each rule maps a queue to a specific traffic action.
Configuring Network Services Quality of Service (QoS) Network Management FIGURE 6-99 1. QoSPolicy or FX20 Egress Queues As mentioned in 6.11.12.2, the Traffic Flows are pre-defined and Traffic Priority is not used, so the first step is to create a Traffic Action (or set of Traffic Actions) that will be associated with the queues. • Select Network Services -> QoS -> Actions -> Traffic Action - This brings up the QoS Traffic Action Form.
Configuring Network Services Quality of Service (QoS) Network Management • The QOS Traffic Action form appears with its list of attributes. For the FX20 queue, only four are used, so select these and edit the values. Note: Although not necessary, you should delete the other attributes so that only the key attributes are highlighted. Refer to the following figure. • Click on Save Traffic Action, and click OK on the confirmation window.
Configuring Network Services 2. Quality of Service (QoS) Network Management With the Traffic Actions created, the QosPolicy (with its set of Rules) can be created. • Select Network Services -> QoS -> Policy - This brings up the QoS Policy Maintenance Form. Note: You can also go to the Network Service data node and select QoS policies -> Actions, and select an existing Policy • Select the New Policy button, and enter the New Policy Name, following the Policy naming conventions.
Configuring Network Services 3. Quality of Service (QoS) Network Management Add the rules that will make up this policy. • Select Add Rule under Row Operations. • On the QOS Policy Rule Form, select the Flow as one of the pre-defined queue selections, and Traffic Action as one of the Actions that you created in Step 1. Refer to the following figure.
Configuring Network Services 5. Quality of Service (QoS) Network Management The QoSPolicy can now be incorporated into an Ether-like port profile. Refer to the following figure. Caution: The Profile should be given a descriptive name, such as in the figure, to help ensure that this Profile is not included on a Triple_play provisioning form for ethernet ports other than the FX20.
Configuring Network Services Troubleshooting Policies and Profile Management 6.12 Troubleshooting Policies and Profile Management 6.12.1 Overview (QoS Deployments Table) Since QoS Deployment has interrelationships with Profiles and Ports, there are some help procedures to understand these relationships and to use them to troubleshoot problems that may occur. To view the status of policies, there is the QoS Deployments table, which lists the attributes of the policies and their deployment status.
Configuring Network Services Troubleshooting Policies and Profile Management be flagged with a status of “policy_changed”, which will force all policies to be redeployed on the next Profile deployment. After the Update Deployment Status operation is performed, if the Deployment Status indicates a policy or device change has been detected, then this may be the source of the problem.
Configuring Network Services Troubleshooting Policies and Profile Management FIGURE 6-105 Redeploy Policy Clicking on Finish at this point will redeploy the policy for that device. Clicking on Next brings up the Select Deployments form. This allows the user to redeploy a policy to the set of devices that have the policy deployed and to schedule the redeployment. Refer to the following figure. The table includes all the devices that have the policy.
Configuring Network Services Troubleshooting Policies and Profile Management FIGURE 6-106 Select Deployments For multiple devices, and to update port parameters as well, locate the affected port Profiles and use the Profiles table to redeploy to all affected devices. 6.
Configuring Network Services Protection Switching-EPSR 6.13 Protection Switching-EPSR 6.13.1 Overview of EPSR Topology In Ethernet-based layer 2 Metropolitan Area Networks (MAN), Spanning Tree Protocol (STP) is normally used to provide redundancy to achieve high availability and continuous access to resources. The iMAP and Allied Telesis Guides explain in detail how STP works and how it is configured. Starting in AlliedView NMS release 4.
Configuring Network Services Protection Switching-EPSR FIGURE 6-107 Example Ring Topologies 6.13.1.3 Summary of EPSR Configuration Data When the network administrator uses the AlliedView NMS GUI to configure an EPSR topology, the following components are involved. These will be explained in more detail as the AlliedView NMS GUI forms are described and an example configuration is created.
Configuring Network Services Protection Switching-EPSR • VLAN Protection Scheme - Type of protection you wish for your data network VLANs Note: Currently, EPSR is the only protection scheme used. • Control Data (part of the TAPS protocol) • HelloTime – The rate at which the protocol Health control message is sent by the master node for this EPSR domain. • FailOverTime – Time for which the master node waits before declaring that it has detected a break in the ring for this EPSR domain.
Configuring Network Services Protection Switching-EPSR Selecting this option brings up the Configure EPS Control Ring Panel. Click on Create Protection Domain to bring up the Create New VLAN Protection Domain dialog, as shown in Figure 6-110. Note: For AlliedWare Plus devices, which include the SB x908, x900-12X and -24X series, the Protection Domain Name can contain special characters except for percent sign ‘%’.
Configuring Network Services Protection Switching-EPSR FIGURE 6-111 Creating Control Ring (Apply Protection Domain) The user at this point can change the following attributes of the control ring (refer to Table 6-26). • • • • Interface #1/Primary (whichever one is chosen as the Primary) Is Master Is Enabled EPSR+ - Enhanced Recovery, this is defaulted to the recommended settings, and is disabled if unavailable on the node software release.
Configuring Network Services TABLE 6-26 Protection Switching-EPSR Fields for the Configuration of the EPS Control Ring Panel Option Purpose Create New Protection VLAN Domain Dialog Protection Domain - The name of the domain that will include all of the devices that are part of the Network VLAN. Naming conventions are up to 15 characters (spaces not allowed). Hello Time and Failover Time - Refer to 6.13.1.3.
Configuring Network Services Protection Switching-EPSR 6.13.2.3 View/Modify/Delete EPS Control RIng Once a control ring has been created, it can be viewed by selecting the relevant networked VLAN and selecting View EPS Control Ring. The View EPS Control Ring window appears, with the attributes of the control ring included in the New Configured Domains panel. Refer to the following figure. Note: In release 12.0, the EPSR+ field is included as well.
Configuring Network Services Protection Switching-EPSR 6.13.2.5 Show EPS Control Ring Map Once a valid control ring is configured, selecting the Network VLAN and right clicking on Show (Detached) Map brings up an icon map that shows the devices and links and their associated states. This figure can also be shown by clicking on the Network VLAN under the VLAN Network node. Refer to the following figure.
Configuring Network Services • • Protection Switching-EPSR LINKS-DOWN is red PRE-FORWARDING is orange 6.13.3 The Network VLAN Manager Application - Configure Data Ring 6.13.3.1 Create/Protect EPS Data Ring Usually, once the EPS Control Ring is created and configured (with its domain), a new EPS Data ring is created.
Configuring Network Services Protection Switching-EPSR FIGURE 6-115 Creating an EPSR Data Ring by Cloning Control Ring The user fills in the VID and the Vlan Name. The user clicks on OK, and this brings up the Protection Ring Configuration Panel with all columns filled in, as shown in Figure 6-116. If more than one control ring could be applied to the data network VLAN, these will appear in the Possible EPS Ring Protections list. The user should select the one that will be used.
Configuring Network Services Protection Switching-EPSR Finally, the user selects Configure Protection Scheme. The Task List window appears as the data ring attributes are applied to the devices. The data ring is now included in the protection domain of the associated control ring. Table 6-27 lists the fields of the Configure EPS Data Ring panel.
Configuring Network Services Protection Switching-EPSR • EPSR and other protection schemes (STP/RSTP) are mutually exclusive; ports that use EPSR will have STP disabled. • Ensure that a loop is not created while provisioning the protected VLANs (or ensure that there is no traffic on the protected VLANs until the VLAN is added to the EPSR domain). • Provisioning can be done in two ways: • Pre-provision - The AlliedView NMS allows the administrator to pre-provision the cards, links, and network VLANs.
Configuring Network Services Protection Switching-EPSR FIGURE 6-118 Example Spreadsheet 6.13.5.2 Create a Closed Network VLAN that will become the Control Ring Using the Network VLAN Manager, create a new networked-VLAN, as shown in Figure 6-119 FIGURE 6-119 Creating a Network-VLAN to Become a Control Ring In the resulting Initial Vlan Information window, fill in the Control VLAN values, as shown in Figure 6-120.
Configuring Network Services Protection Switching-EPSR 6.13.5.3 Configure the Control Ring With the network VLAN (Ctrl301) created, use the Network VLAN Manager to configure the Control Ring, as shown in Figure 6-121. Figure 6-122 warns the user about disconnecting unprotected Network VLANs and that STP will be disabled. FIGURE 6-121 Configuring Network VLAN as Control Ring FIGURE 6-122 STP Safety Warning Clicking on Yes brings up the Create New VLAN Protection Domain Dialog.
Configuring Network Services Protection Switching-EPSR FIGURE 6-123 Creating Control VLAN Domain Clicking on OK, the configuration that will be created is shown in Figure 6-124.
Configuring Network Services Protection Switching-EPSR FIGURE 6-124 Configuration for Control Ring Panel Clicking on Create Protection Domain invokes the Task Manager, which lists the task being performed for each device. Once the tasks complete successfully, click on the Ctrl301 VLAN IF and the map shows graphically how the control VLAN is configured, as shown in Figure 6-125. Refer back to Figure 6-117 to see how the GUI matches the planned configuration.
Configuring Network Services Protection Switching-EPSR 6.13.5.4 Create a Data Ring A preferred way to create a Data Ring is to clone the just created Control Ring. In the Network VLAN Manager, select the Control Ring Network VLAN (Ctrl301) and right click on Create/Protect EPS Data RIng, as shown in Figure 6-126. FIGURE 6-126 Creating a Data Ring from an Existing Control Ring The Create New Data Protection Ring Dialog appears, as shown in Figure 6-127.
Configuring Network Services Protection Switching-EPSR FIGURE 6-128 Configuration for Data Protection Ring Clicking on Configure Protection Scheme brings up the Task window to perform the configuration for each device. Once done, selecting the VLAN IF for prot302 shows the GUI, in Figure 6-129. Compare this to Figure 6-117.
Configuring Network Services Protection Switching-EPSR FIGURE 6-129 GUI for Configured Protection Data Ring 6.13.5.5 Reconfigure the Control and Data Rings Now that the Control Ring and Data Ring are configured, another device may need to be added to the configuration. Performing this involves combining many of the network services tasks, summarized as follows: • Reconfigure the links between two current devices and the new device. • Delete the link between the current devices.
Configuring Network Services Protection Switching-EPSR 6.13.5.6 Modify/Unprotect the Data Ring The configured Data Ring can be modified if necessary. Select the Data Protection Ring and select View EPS Data Protection, as shown in Figure 6-129. FIGURE 6-130 View Data Protection Ring The VLAN Protection Scheme panel appears, showing the Domain, Data VIDs, etc, for the Data Protection Network VLAN, as shown in Figure 6-131.
Configuring Network Services Protection Switching-EPSR FIGURE 6-131 View Protection Ring Configuration At this point the user could select one of the Primary Interfaces and click on Unprotect, as shown in Figure 6-132. FIGURE 6-132 Selecting an Interface on a Device and Unprotect After the Task Details Window had opened and closed, the user could select the VLAN IF and see that the Network VLAN no longer had a protection scheme, as shown in Figure 6-133. Since 11.1 of 68.
Configuring Network Services FIGURE 6-133 Protection Switching-EPSR GUI for Network VLAN no Longer with a Protection Scheme 6.13.6 Troubleshooting the EPSR Configuration Using the AlliedView NMS GUI allows the network administrator to more easily understand and resolve the following maintenance scenarios: • The EPS Control and Data rings are not configured properly and so cannot provide the protection service as described in 6.13.
Configuring Network Services Protection Switching-EPSR • The device is not part of the domain (there are no Master/Transit indicators on the VLAN Interfaces. • There is an incomplete loop (usually a missing link or device. In Figure 6-134, a control ring has been configured following the example in Figure 6-117. The .80 device is the master node and the .30 node is a transit node and both are configured (and connected) with the Ctrl300 as the network VLAN. The .
Configuring Network Services Protection Switching-EPSR FIGURE 6-136 EPSR Domains table Note that the domain name nms is not included for the .20 device for the Ctrl VID 300. Since the links and VLAN interface do exist (according to the GUI maps), the problem must be that the .20 device is not protected by any EPSR Control ring and is not part of a domain. To resolve this problem, the user can bring up the VLAN Interfaces on .20 device (in this case the VID: 300) and select Configure EPS Control Ring ...
Configuring Network Services Protection Switching-EPSR FIGURE 6-138 GUI when EPSR Activated • Network Inventory - The table now includes the LINK DOWN and FAILED states for domain nms and the changed FORWARDING and BLOCKING states that reflect the VLAN map GUI. FIGURE 6-139 EPSR with FAILED States • Alarms - Viewing the alarms shows all of the associated alarms, as highlighted below.
Configuring Network Services Protection Switching-EPSR FIGURE 6-140 AlliedView NMS Administration Guide Alarms of EPSR with FAILED state 543
Configuring Network Services Protection Switching-EPSR 6.13.6.3 EPSR Failed (No Ports for Data Flow on Device(s) When both paths are broken there is no data path to or from a device, so data service is lost on that port. In this case, the map GUI and alarms reflect this loss of service situation. • Protection Ring - Both links for device .20 are shown as blocked, so data traffic for this Protection VLAN cannot be received or transmitted on the device.
Configuring Network Services Protection Switching-EPSR FIGURE 6-142 Alarm View for EPSR Failure 6.13.7 Status of Transit Nodes for AlliedWare Plus Devices When AlliedWare Plus devices, which include the SB x908, x900-12X and -24X series, are included in the EPSR ring as Transit Nodes, their state may or may not reflect any changes that may have occurred. This occurs because the devices fail to send a trap when the EPSR state changes.
Configuring Network Services SuperLoop Prevention (Superring) 6.14 SuperLoop Prevention (Superring) 6.14.1 Overview Prior to release 9.0., if all the following conditions were present, a loop could occur between nodes when the EPSR feature was working correctly: • The network had two or more EPSR domains. • The protected (data) VLAN overlapped two or more EPSR domains. • The EPSR domains and the overlapping protected VLANs shared a common link.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-143 Example Configuration for SuperLoop Feature Following the example shown in the figure, the user wishes to have one ring at priority 126 and the other at 125. The major steps to create this configuration are as follows: 1. Create the first EPS Ring with a Control VLAN of 710, with a domain name of ctrl710. This is the same as creating an EPS Ring is Section 6.13, but the user specifies Priority=126. 2.
Configuring Network Services SuperLoop Prevention (Superring) At the end of the procedure, all created rings are part of the SuperRing, and any Protected VLANs created on the original ring will be protected by the SuperRing domain. Additional Protected VLANs can be added after the Super-Ring is created by selecting any one of the control ring maps and creating a protected VLAN on it. The NMS will automatically extend that data VLAN to all of the peer domains.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-145 Configure EPS Control Ring Panel The Network VLAN should be highlighted on the left panel. (If not select the loop Network VLAN), then select “Create Protection Domain”. This brings up the Create New VLAN Protection Domain Dialog Form, as shown in the following figure. FIGURE 6-146 Create New VLAN Protection Domain Dialog (Initial) Enter the Protection Domain Name = jptDom710 and the EPSR Priority=126.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-147 Create New VLAN Protection Domain Dialog (Complete) FIGURE 6-148 AlliedView NMS Administration Guide Create New VLAN Protection Domain (Task List) 550
Configuring Network Services SuperLoop Prevention (Superring) The figure above shows the components of the EPSR Domain that are to be created at each node. After the Domain is created, then the VLAN interfaces of the selected loop NVLAN (top left) will be added to the Domain as control VLANs. Click on the “Apply Protection Domain” button to activate the tasks.
Configuring Network Services SuperLoop Prevention (Superring) 6.14.2.2 Create Second EPS Ring that is a Peer of First EPS Ring The steps to create the second, peer EPS Ring are similar to the first. In choosing a looped Network VLAN where there is a shared link with another EPS Ring, the user must put in a non-zero value for the EPSR Priority, and this value must be different than the first ring. Select the Network VLAN and click on Create Protection Domain.
Configuring Network Services FIGURE 6-152 SuperLoop Prevention (Superring) Configuring the Second EPS Ring with Different EPSR Priority Finish by selecting OK, and the system will show how the devices will be configured. The user can change the node which will be Master at this point. Refer to the following figure.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-153 Configure EPS Control Ring Panel for Second Ring FIGURE 6-154 AlliedView NMS Administration Guide GUI for Second EPS Ring 554
Configuring Network Services SuperLoop Prevention (Superring) The VLAN Link from Port 7.5 on Node 10.52.30.37 to Port 9.5 on Node 10.52.30.35 is now a Shared EPSR Link, since it is also a link of Ring jptCtrl710. Since the rings jptCtrl720 and jptCtrl710 share a link and both have priorities greater than 0, they are peers forming a Super-Ring. Also, note that the Transmit Domains are disabled, and they cannot be enabled until the entire SuperRIng has at least one Protected VLAN on it. 6.14.2.
Configuring Network Services SuperLoop Prevention (Superring) Since the VLAN being created will be protected by multiple peer rings of a Super-Ring, the following warning is displayed: FIGURE 6-157 Creating Second Protected VLAN for SuperRing - Warning Fill-in the VID and VLAN Name (for new Protected NVLAN to be created) in the resulting menu FIGURE 6-158 Configuring the Protected VLAN for Control VLAN In the above form enter the VLAN ID and the VLAN name.
Configuring Network Services FIGURE 6-159 SuperLoop Prevention (Superring) Creating the Protection VLAN over multi-EPSR Domains This table displays the components of the Data VLAN that will cause it to be protected by the Domains indicated in the table. Clicking on the “Protect…” button performs the operations on each device to create the jptProt815 NVLAN and put it into the both Peer Domains, jptDom710 and jptDom720, resulting in the following map for jptProt815.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-160 Superloop Domain 6.14.2.4 Enable the EPS Domains Now that the SuperRing has at least one Protected VLAN on it, the domains can all be enabled. Select one of the control VLANs and on the map select View EPS Control ring, as shown in the following figure.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-161 FIGURE 6-162 View one of the EPSR Control Rings View one EPS Control VLAN (used to enable Protection Domain) Click on the tic boxes under Is Enabled, and then Modify Protection Domain. When this is done this and the other domains become enabled as well, as shown below.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-163 FIGURE 6-164 AlliedView NMS Administration Guide Protection Domain Enabled Enabled Control VLAN (Part of SuperRing) 560
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-165 Enabled Peer Control VLAN (Part of SuperRing) 6.14.2.5 Adding Protected VLANs to the SuperRing Additional Protected Vlans can be added to Super-Ring by selecting any one of the EPS Rings that make up the SuperRing, as shown in the following figure. FIGURE 6-166 Creating Second Protected VLAN for SuperRing A Warning is given to indicate that the data ring will be extended to multiple domains, as shown below.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-167 Creating Second Protected VLAN for SuperRing - Warning As with the first Protected VLAN, the GUIs lead the user through creating the second Protected VLAN. Note that the Protect Network VLAN Panel shows that all of the nodes of the SuperRing will have the VLAN added, as shown in the following figures.
Configuring Network Services FIGURE 6-169 SuperLoop Prevention (Superring) Task List showing Protected VLAN extends to all Nodes in SuperRing Selecting the Control VLAN in the left panel and then Configure Protection Scheme will take the Second Protected VLAN (816) and extend it over the entire SuperRing. When the Protected VLAN is created and the user clicks on the leaf for VLAN 816, all the nodes of the two EPS Rings are included, as shown in the following figure.
Configuring Network Services SuperLoop Prevention (Superring) FIGURE 6-170 Protected VLAN across Multiple EPS Control VLANs (816) 6.14.2.6 Viewing Network Inventory The Netwrok Inventory View shows the status of the SuperLoop, as shown in the following figure.
Configuring Network Services Customer Management 6.15 Customer Management 6.15.1 Overview Provisioning services for customers usually involves setting the values of many parameters that vary depending on the type of service customers have requested, the service features to be provided, and the components to be configured.
Configuring Network Services Customer Management 1. POTS24 for analog voice only - This is for an analog phone or modem. 2. POTS24 and ADSL for analog voice and video/data- This is using a Residential Gateway and the ADSL/POTS24 cards. 3. Ethernet - This is using a Residential Gateway and the FE10 card for digital voice and data/video 4. ADSL - This is for analog voice and data.
Configuring Network Services Customer Management 6.15.2.1 Configuration 1 - POTS24 Only In this scenario, only the middle panel (Voice Configuration) is filled in. The POTS Call Agent is filled in automatically when the POTS GW IP Addr. (the IP address for the POTS24 card) and the port is filled in. The Line Profile, a GW attribute, is available once the Gateway has been configured. Note: In this figure, the underlined numbers in the fields match the Configuration 1 numbers in Figure 6-173.
Configuring Network Services Customer Management [ FIGURE 6-175 Triple Play Form - POTS24 and ADSL Card, Analog Phone Only 6.15.2.3 Configuration 3 - FE10 Card, Digital Phone Only, Video and Data In this configuration, an iMAP 9000 is used, and using the FE card video and data are configured as well as a digital phone. The top and bottom panels are used, with the Gateway for the Derived Voice the IP Address on the Gateway Device.
Configuring Network Services Customer Management FIGURE 6-176 FE10 Card, Digital Phone Only, Video and Data 6.15.2.4 Configuration 4 - ADSL for Data and Analog Phone with Splitter In this configuration, only the top panel is filled out for the data service, since the phone service is split off from the iMAP device and goes to the Class 5 device.
Configuring Network Services Customer Management FIGURE 6-177 ADSL for Data, Analog Phone with Splitter 6.15.3 Add DS1/E1 Customer This is part of provisioning a CES customer, and brings up the Provision New DS1/E1 Port Form. The fields on this form are explained in 5.6.5. A configuration with example values is shown in 6.16.3. 6.15.
Configuring Network Services Customer Management FIGURE 6-178 Find Subscriber/Ports Form Once the port(s) appear, the user can either double-click a port or select the port and click on View/Modify Details to bring up the relevant Port Management Form, where attributes can be viewed and modified. Note: The View/Modify Details button is enabled when one entry is selected.
Configuring Network Services Customer Management FIGURE 6-179 Ambiguous Use of Customer ID 6.15.5 Deprovision Customer Ports This form allows the user to quickly find the ports/voice lines associated with a subscriber ID and deprovision them. Note: This form can also be accessed from the Port Inventory or Port Management main screen by right-clicking on the relevant port and selecting De-Provision Customer/Port.
Configuring Network Services Circuit Emulation Service FIGURE 6-180 FIGURE 6-181 De-provision Ports Form - ADSL/POTS De-provision Ports Form - DS1 Endpoints (CES) 6.16 Circuit Emulation Service 6.16.1 Overview (CES8 and iMG6x6MOD Configurations) Circuit Emulation is a service that is provided by Allied Telesis using the following: • CES8 card - The CES8 card is used to provide “Pass-thru” Circuit Emulation Service for both E1 and DS1 circuits Note: Refer to 5.5.13 and 5.6.
Configuring Network Services Circuit Emulation Service The CES configuration can be either single or dual port; in a dual port configuration both ends of the CES circuit are iMAP DS1/E1 ports managed by the NMS, while in a single port configuration, only one DS1/E1 port is configured on an iMAP device managed by the NMS. • iMG6x6MOD - With the iMG6x6MOD, a circuit emulation service can also be provided. The DS1/E1 port on the iMG can connect to either a CES8 card or another iMG6x6MOD.
Configuring Network Services Circuit Emulation Service 6.16.3 Create/Provision CES8 card to Support DS1 Ports (Same Device) The following steps are followed to create a connection between two ports on different cards in the same device, In Figure 6-182, this would be the A to A connection. (The B to B connection is for a port that is connected to a port that is outside the managed network.) Note: The two ports can also be on different devices in the same managed network.
Configuring Network Services Note: Circuit Emulation Service At this point, the card attribute Ports Type for the General Tab can be changed, but the card would need to be disabled, and there is a warning about the need to disable the card. The Profile can also be changed, and there is a warning that such a change will destroy existing provisioning data. 6.16.4 Create DS1 Profile (DS1 and P-SPAN) When a DS1 port is provisioned, a DS1 profile must already exist so it can be associated with the DS1 port.
Configuring Network Services Circuit Emulation Service FIGURE 6-185 Note: Creating a DS1 Profile (PSPAN tab) If the user has already defined PSPAN Configuration Attributes and Counter Thresholds at the iMAP, the default for these in the Profile is set to False (read only), so they will not be affected. Otherwise, the user could define them here. 6.16.5 Provision the Two DS1 Ports Selecting from the main menu Tools -> Customer Management -> Add DS1 Customer brings up the Provision New DS1 Port Form.
Configuring Network Services Circuit Emulation Service FIGURE 6-186 FIGURE 6-187 AlliedView NMS Administration Guide Provision a New DS1 Port (Dual Points) Result of Success (Fields Ready for next Customer) 578
Configuring Network Services Circuit Emulation Service 6.16.6 View Provisioning Results To see the results of the dual endpoint provisioning, go to the Port Management window for the device and sort on Customer ID. Refer to the following figure. FIGURE 6-188 Viewing Dual Endpoints - Same Customer ID This shows that ports 12.4 and 16.5 are the endpoints. By double-clicking on either of these rows, the DS1 Port Management tabbed form appears, and one can view/modify the details of the configuration.
Configuring Network Services Circuit Emulation Service 6.16.6.1 DS1 Port Tab The following figure shows the form that appears when the user double-clicks on port 16.5. The port 16.5 is on the left, since that is the row that was selected; if the user selected 12.4, port 12.4 would appear on the left. The user can change attributes that are part of the Profile, but after clicking on Modify the user would see the Profile with an ‘*” next to it, meaning the Profile is out-of-sync.
Configuring Network Services Circuit Emulation Service 6.16.6.2 PSPAN Tab The following figure shows the PSPAN tab for the two endpoints. As with the DS1 tab, the row selected is the port that appears on the left. The main attributes of the PSPANs are at the top of the form and are read only. The editable attributes are at the bottom of the form. Note, however, that the Peer IP Address and Peer UDP Port are read only since this is a two-port configuration.
Configuring Network Services Circuit Emulation Service 6.16.6.3 PMON Statistics Tab This tab shows the PMON Statistics tab. Refer to the following figure. Note that the table lists the 16.5 and 12.4 Port and PSPAN statistics together. When the user presses the function buttons (Enable, Disable, etc.), they are applied to both ports.
Configuring Network Services Circuit Emulation Service 6.16.6.4 Stats Graph Tab This form makes graphs of the statistics and allows the stats used to be saved as a list and reloaded later. Refer to the following figure. Note: The statistics for each endpoint have the suffix -A or -Z to identify each one. The -A is the port on the left side of the two ports shown at the top of the form, and the -Z is the right side.
Configuring Network Services Circuit Emulation Service 6.16.6.5 Port Thresholds Tab This form allows the user to modify the threshold values for the DS1/E1 and PSPAN statisitcs.When a new value is entered in the New Value field, the Modify button is enabled.
Configuring Network Services Circuit Emulation Service 6.16.6.6 Port Log Tag The following figure shows the Port Log tab for the two endpoints. Note that since these cards are on the same device; there is no need for a device column, and the Device name repeated twice on the top of the form. (If the two endpoints were on different devices, a Device column would be added, and the user could sort by Device.
Configuring Network Services Circuit Emulation Service 6.16.7 Provisioning iMG6x6MOD with T1/E1 Card and CES In release 10.0, it is possible to configure an iMG6x6MOD with a T1/E1 card. This card has two ports, where both are configured as either DS1 or E1 signal formats (for the two T1 or E1 ports respectively). The DS1 configuration (T1) is shown below. At the other end of the DS1 connection, a CES8 port can be configured.
Configuring Network Services Circuit Emulation Service 6.16.7.1 Create RG_CES_DS1 Profiles This has similar attributes to the iMAP CES DS1 profile, except that this will be for a DS1 port on the iMG6x6MOD. Select Network Services -> Profile -> iMG/RG Service Profiles -> Create iMG/RG CES-DS1 Port Profile. Refer to the following figures which show two profiles; each profile could be applied to a different DS1 port on the CES card on the iMG6x6MOD.
Configuring Network Services Circuit Emulation Service FIGURE 6-197 Creating a RG-CES-DS1 Profile - DS1 (15 dB) The following figure shows the PSPAN tab attributes that are datafilled as part of the RG-CES DS profile. The key attributes RTP and Bytes per Packet should match the Peer end.
Configuring Network Services Circuit Emulation Service 6.16.7.2 Create an iMG/RG CES Service Profile Select Network Services -> Profile -> Create iMG CES- Service Profile. Refer to the following figures. Key attributes are: • • • • Ports Type: {DS1/E1} CES VLAN ID - This is used if the Open Access model is being used. See 6.16.7.3. Port 1 RG-CES Port Profile Port 2 RG-CES Port Profile The CES VLAN ID can be specified here to support common CES VLANs across customers.
Configuring Network Services Circuit Emulation Service 6.16.7.3 Create an iMG/RG General Profile Create an iMG/RG General Profile. This has attributes for provisioning other services on the iMG6x6MOD as well as other iMG/RG types. Note that there is a CES VLAN Id field. If the Access Island model is being used, set the Include Service VLAN in Profile to True, and the VLANs are editable. For Open Access, set this to False, so that VLANs are filled in for the iMG/ RG Profiles for each service type.
Configuring Network Services Circuit Emulation Service 6.16.7.4 Provision the Triple-Play Form As mentioned in 7.2.4, there are different strategies to provisioning the iMG/RG. In this example, the iMG646MOD is already known to the iMAP, and now the Triple Play Form will be filled out and then applied. Refer to the following figure.
Configuring Network Services FIGURE 6-202 Circuit Emulation Service Triple Play Form - Selecting General Profile brings up CES Service Config Selection of the CES Service Profile permits entry of the following parameters.
Configuring Network Services Circuit Emulation Service FIGURE 6-203 Task Panel as iMG646MOD/T1Conpletes 6.16.7.5 Viewing Results Once the iMG646MOD is provisioned, the user can view the details by going to the RG table and selecting View/Modify Details from the pull-down, as shown in the following figures.
Configuring Network Services FIGURE 6-205 Circuit Emulation Service Right Clicking on the iMG646MOD and View/Modify Details The IMG/RG -> Mgmt Info tab now shows the CES VLAN, similar to the other services. FIGURE 6-206 iMG/RG -> Mgmt Info tab The CES Service Tab provides the specific CES parameters and allows the user to view/change the DS1 ports.
Configuring Network Services Circuit Emulation Service FIGURE 6-207 View the CES Service Parameters Selecting the View/Modify CES Port buttons brings up the CES DS1/E1 Port Management Panel, with a different panel for each port, 1 and 2. These tabs allow the user to view and change the parameters if necessary. Refer to the following figures.
Configuring Network Services FIGURE 6-208 AlliedView NMS Administration Guide Circuit Emulation Service CES-DS1 Port Parameter Form - Port 2 on the iMG6x6MOD 596
Configuring Network Services FIGURE 6-209 Circuit Emulation Service CES-DS1 PSPAN Parameter Form - Port 2 on the iMG6x6MOD AlliedView NMS Administration Guide 597
Configuring Network Services FIGURE 6-210 Circuit Emulation Service CES-DS1 PMON Statistics Parameter Form - Port 2 on the iMG6x6MOD AlliedView NMS Administration Guide 598
Configuring Network Services FIGURE 6-211 Note: Circuit Emulation Service CES-DS1 Graph Statistics Parameter Form - Port 2 on the iMG6x6MOD Only the CES8 Stats are currently available in graph format. Use the PMON Statistics tab for iMG statistics.
Configuring Network Services FIGURE 6-212 Note: Circuit Emulation Service CES-DS1 Port Thresholds Parameter Form - Port 2 on the iMG6x6MOD Only the CES8 thresholds appear. The iMG does not support thresholds that can be set.
Configuring Network Services FIGURE 6-213 Note: Circuit Emulation Service CES-DS1 Port Log Parameter Form - Port 2 on the iMG6x6MOD Only the CES8 port logs appear. The iMG port does not support the Port Log feature.
Configuring Network Services FIGURE 6-214 Note: Circuit Emulation Service CES-DS1 Port and PSPAN Parameter Form - Port 1 on the iMG6x6MOD In the example configuration, the peer end of Port 1 is not managed by the NMS. In this case, the one-sided screens will appear with the iMG supported tabs only.
Configuring Network Services NTE8 Dual Circuit Provisioning FIGURE 6-215 PMON Statistics Form - Port 1 on the iMG6x6MOD 6.17 NTE8 Dual Circuit Provisioning In Release 7.0, the NTE8 card is used to allow DS1/E1 facilities to connect (backhaul) the ethernet network, with both ends of the DS1/E1 connections being on iMAP 9000 devices. Refer to the iMAP User Guide for a complete description of the NTE8 configuration. Note: Refer to 5.5.14 and 5.6.
Configuring Network Services NTE8 Dual Circuit Provisioning The NTE8 configuration always has dual endpoints, since there must be an iMAP 9000 device at each end. Moreover, each end must be correctly provisioned for the logical hierarchy (DS1, PPP, MLPP, ETH) of the NTE8. Finally, the hierarchy for each endpoint in a pair must be the same.
Configuring Network Services 1. Create a PPP circuit as listed above, up to step 7. 2. Select an MLPPP Interface to use for the bundle. Note: NTE8 Dual Circuit Provisioning The selection is constrained by MLPPP bundle consistency on both ends; once a PPP is associated with an MLPPP, the peer PPP must be associated with the peer MLPPP. This will become clear in the examples. 6.17.
Configuring Network Services NTE8 Dual Circuit Provisioning FIGURE 6-217 AlliedView NMS Administration Guide Viewing DS1 Profile - General Tab 606
Configuring Network Services FIGURE 6-218 NTE8 Dual Circuit Provisioning Viewing DS1 Profile - DS1 Thresholds Tab (Note non-0 values) 6.17.4 Provisioning one NTE8 Circuit Selecting from the main menu Tools -> Customer Management -> Add NTE DS1 Customer brings up the Provision New NTEDS1 Port Form. This is the form where the main task for Provisioning the NTE8 endpoints are done.
Configuring Network Services NTE8 Dual Circuit Provisioning • When the user clicks on Provision, the task completes, and the user selects Yes to continue data filling the form, the Customer ID field is cleared and the just provisioned ports are no longer available in the Port pull-down. Refer to the following figures. Note: Any specified QoS Policy is applied tot he common Ethernet interface.
Configuring Network Services NTE8 Dual Circuit Provisioning FIGURE 6-220 Result of Success (Fields Ready for next Customer) 6.17.5 Adding PPPs to the MLPPP Once the NTE8 DS1 circuit has been set up, with a PPP and associated MLPPP at each end, the user can add DS1s/PPPs to the existing MLPPPs. By filling out the NTE provisioning forms, the user can ensure the provisioning goes smoothly and the correct parameters are entered. Refer to the following figure while reading below.
Configuring Network Services NTE8 Dual Circuit Provisioning FIGURE 6-221 AlliedView NMS Administration Guide Provision New NTE-DS1 Port - Dual PPP 610
Configuring Network Services NTE8 Dual Circuit Provisioning 6.17.6 Viewing Provisioning Results - Port Inventory Table To see the results of the dual endpoint provisioning, go to the Port Inventory window and sort on the Customer ID. The two ports are placed together since they share the same Customer ID. Refer to the following figure. Note: The user can also go to the Port Management window for the device and sort on Customer ID.
Configuring Network Services NTE8 Dual Circuit Provisioning FIGURE 6-223 AlliedView NMS Administration Guide DS1 Tab for NTE Example 612
Configuring Network Services NTE8 Dual Circuit Provisioning 6.17.7.2 PPP Tab The following figure shows the PPP tab for the two endpoints. As with the DS1 tab, the row selected is the port that appears on the left. The main attributes of the PPPs are at the top of the form and are read only. Note that the pull-down for the MLPPP includes the currently configured MLPPP and its connection to its peer MLPPP (MLPPP 21.8).
Configuring Network Services NTE8 Dual Circuit Provisioning 6.17.7.
Configuring Network Services NTE8 Dual Circuit Provisioning 6.17.7.4 PMON Statistics Tab This tab shows the PMON Statistics tab. Refer to the following figure. Note that the table lists the 14.0 and 21.0 Port statistics together. When the user presses the function buttons (Enable, Disable, etc.), they are applied to both ports.
Configuring Network Services NTE8 Dual Circuit Provisioning 6.17.7.5 Stats Graph Tab This form makes graphs of the statistics and allows the stats used to be saved as a list and reloaded later. Refer to the following figure. Note: The statistics for each endpoint have the suffix -A or -Z to identify each one. The -A is the port on the left side of the two ports shown at the top of the form, and the -Z is the right side. Note: The statistics counters may need to be enabled first on the device.
Configuring Network Services NTE8 Dual Circuit Provisioning 6.17.7.6 Port Thresholds Tab This form allows the user to modify the threshold values for the DS1/E1 and PPP statisitcs.When a new value is entered in the New Value field, the Modify button is enabled. These thresholds are set on the device and when crossed will cause thresholds crossing traps to be sent to the AlliedView NMS. These are displayed in the Event/Alarm tables.
Configuring Network Services NTE8 Dual Circuit Provisioning FIGURE 6-229 AlliedView NMS Administration Guide Port Log Tab for two Endpoints 618
Configuring Network Services NTE8 Dual Circuit Provisioning 6.17.8 Viewing NTE8 Endpoints on Physical Map Creation of PPP or MLPPP circuits through the NMS (or through CLI, directly) will trigger a discovery process on the devices so that they will know which Device and Port is currently at their far-end. This information is collected during NMS discovery of devices and will generate appropriate links on the Physical and VLAN maps, showing VLAN connectivity.
Configuring Network Services Upstream Control Protocol (UCP) Display 6.17.9 Viewing NTE8 Configuration Faults When the NTE8 configuration is set up and running, faults can be generated on four components: • • • • NTE8 Card DS1/E1 port (such as LOS, LOF, Receiving AIS, etc.) PPP (Configuration Failure, Peer Disabled, etc.) MLPPP Note: Refer to the iMAP User Guide for a complete description of these faults, and the iMAP Log Manual for a complete list of alarms.
Configuring Network Services Upstream Control Protocol (UCP) Display • VLAN type (STD or Upstream) • UCP Node Type (Primary, Secondary, Primary and Secondary, Upstream, Non-Upstream) • UCP status (active, standby) Node types are updated using SNMP traps from the relevant devices. 6.18.1 VLAN Submap Display Each VLAN interface on a VLAN submap has a UCP Node-type label on top of the VLANIF symbol that can be one of the following for i MAP 6.
Configuring Network Services FIGURE 6-233 Upstream Control Protocol (UCP) Display UCP Status in the Network Inventory Table for the VLAN Interfaces (Highlighted) 6.18.3 Events View (Change of State) When the active/standby status of the Primary/Secondary Node changes (because of failures in the network or administrative changes), SNMP traps are sent from the device indicating a state change. In the Events view, they appear as Info status events.
Configuring Network Services Note: Upstream Control Protocol (UCP) Display To ensure that the status of the VLANs/interfaces is correct, the user can rediscover the relevant devices. This will appear in the Event view as a rediscovery, but if there are UCP-related changes, they will appear in the VLAN submap and Network Inventory table.
Configuring Network Services Link Discovery 6.19 Link Discovery For VLAN-related features of the NMS, such as the VLAN topology maps, EPSR, and UPC features, the NMS depends on accurate link information to piece together the broadcast domain for each extended VLAN. The LLDP protocol is a feature on devices and this provides the information needed by the AlliedView NMS to provide the GUI for Link Discovery. This subsection describes these interfaces and the specific functions Link Discovery.
Configuring Network Services Software Upgrade with EPSR 6.20 Software Upgrade with EPSR 6.20.1 Overview Section 5.3.9 explains the software download application and how it can be used to control the download process for one or more devices and prevent errors. A special situation occurs when the devices are part of an EPSR configuration, because the order in which the devices are downloaded will prevent service outage.
Configuring Network Services Software Upgrade with EPSR FIGURE 6-235 Physical Map showing Ring Configuration FIGURE 6-236 EPSR - Control VLAN over Physical Links AlliedView NMS Administration Guide 626
Configuring Network Services Software Upgrade with EPSR FIGURE 6-237 EPSR - Data VLAN over Physical Links In the physical map, the user could highlight the three devices, right click and select Software Configuration. This would bring up the Software configuration with all three devices included, as shown below. FIGURE 6-238 Devices Chosen for Software Upgrade The user would select all three devices and click on the now active Modify Release Configuration button.
Configuring Network Services FIGURE 6-239 Software Upgrade with EPSR Modify Device Software Configuration Window - Select Load for Multiple Devices When the user selects Next, the AlliedView NMS checks the EPSR configuration and, using the configuration rules listed above, determines the order in which the devices should be loaded.
Configuring Network Services Software Upgrade with EPSR FIGURE 6-240 FIGURE 6-241 Resolving Conflicting VLAN Sets Selecting a VLAN to ignore during Upgrade 6.20.3 Upgrading One Node that is part of an EPSR Configuration In the previous example, the EPSR configuration included three devices, and all three devices were selected for a software upgrade.
Configuring Network Services Software Upgrade with EPSR • Additional EPSR Successor Nodes Detected - A successor node must be included in the upgrade procedure. The user should ensure all the listed devices are checked and select Next. • Additional EPSR Predecessor Nodes Detected - A predecessor node must be included in the upgrade procedure. The user should ensure all the listed devices are checked and select Next.
Configuring Network Services Software Upgrade with EPSR FIGURE 6-243 Select Additional Predecessor Devices to Upgrade 6.20.4 Upgrading Devices when EPSR not Properly Configured If EPSR has been improperly configured and the user selects one or more devices to upgrade, a GUI with an error message appears that warns the user that if the error is not fixed the configuration will fail or data service may be disrupted. Refer to the following figure.
Configuring Network Services Diagnostic Audit FIGURE 6-244 Error Condition for Upgrade 6.21 Diagnostic Audit The NMS provides the capability to run diagnostic audits on certain network entities. Currently, the entities that can be audited are: • Network VLANs • CES Circuits Audits are started from the “Diagnostic Audit Reporting” window, which can be launched from various menus within the NMS. The appropriate Audit Entity IDs will appear in the window, based on the menu from which it was launched.
Configuring Network Services Diagnostic Audit FIGURE 6-245 Audit Selection for Network VLAN Selecting the Audit VLAN menu item brings up the Diagnostic Audit screen with the selected VLAN, as shown in the following figure. FIGURE 6-246 Diagnostic Audit Panel The Run Audit button starts the audit and resulted in the following audit report.
Configuring Network Services Diagnostic Audit FIGURE 6-247 AlliedView NMS Administration Guide Example Audit Report 634
Configuring Network Services Diagnostic Audit 6.21.2 Audit the CES Circuit on the iMG6x6MOD or CES8 Card A similar audit capability is provided for CES Circuits.
Configuring Network Services Diagnostic Audit FIGURE 6-249 CES Circuit Audit Panel The Run Audit button starts the audit and results in the following audit report.
Configuring Network Services Diagnostic Audit FIGURE 6-250 AlliedView NMS Administration Guide Results of Running CES Audit 637
Configuring Network Services Port Authentication (802.1x) 6.22 Port Authentication (802.1x) The main components of Port Authentication are: • The Authenticator - the port on the SBx3112 that wishes to enforce authentication before allowing access to services that are accessible behind it. The SBx3112 plays this role. • The Supplicant -the user device attached to the Authenticator that wishes to access services offered by the authenticator's system.
Configuring Network Services Port Authentication (802.
Configuring Network Services Port Authentication (802.1x) The Port_Auth_Mgmt screen appears, with device information and a set of tabs, one for Port Authentication and one for Radius. Refer to the following figures. Note that for AlliedWare Plus devices, this is a new window in release 12.3.
Configuring Network Services FIGURE 6-254 Port Authentication (802.1x) Port Authentication Configuration - AlliedWare Plus Device 6.22.2 Profiles with the Port Authentication Feature To configure Port Authentication for a port, the Profiles can be used so that the feature is automatically enabled when the port is brought into service. The following Profiles include Port Authentication.
Configuring Network Services Port Authentication (802.1x) FIGURE 6-255 Profile for Port Authentication for iMAP (SBx3112) The Profile itself has a Port Authentication tab, with options for 802.1x and MAC Authentication. For AlliedWare Plus devices, there is the added field Radius Group, when a set of Radius servers are combined with a group label. (If there is not a group, the label “Radius” is filled in.). Refer to the following figure.
Configuring Network Services FIGURE 6-256 Port Authentication (802.1x) Profile for Port Authentication - SBx3112 for NMS 12.
Configuring Network Services FIGURE 6-257 Port Authentication (802.1x) Profile for Port Authentication - AlliedWare Plus Devices for NMS 12.3 (Includes MAC Authentication) 6.22.3 Etherlike Port Profile With this Profile the Port Authentication tab is used, and it provides the attributes needed to activate Port Authentication. (Refer to device specific documents, such as the SBx3112 Software Reference manual, for details on these fields.) Refer to the following figure.
Configuring Network Services Port Authentication (802.1x) FIGURE 6-258 Profile for Etherlike Port - Port Authentication 6.22.
Configuring Network Services Port Authentication (802.1x) • Roaming – to be able to move supplicant to other port not re-authentication • Supplicant Mac – enable port auth specified MAC address • Keytransmit – transmit 802.1x authentication key These items are not in the profiles nor in the view/modify screen, as explained below. For settings that are common between the AlliedWare Plus devices and iMAP devices (the SBx3112), there are some differences in the settings, as listed below.
Configuring Network Services FIGURE 6-259 Note: Port Authentication (802.1x) Service Management Form - Port Authentication Active Once Port Authentication is enabled (by setting to Enabled at both device and port), you cannot add or delete a VLAN on that port. The following type of error is seen in the console window when modifying a VLAN on a port (via view/modify the port or deploy/apply the port profile): delete VLAN=40 interface=1.2 Processing.....
7. Provisioning the iMG/RG 7.1 Overview The SE version of this document includes all iMG-related information. 7.1.1 Roadmap for this Section TABLE 7-1 Provisioning the iMG/RG Provisioning Component Section Network Modeling (Access islands, open Access, Multi-Service VLANs 7.2.2 iMG/RGs Supported 7.2.3 Provisioning Strategies 7.2.4 DHCP 7.2.5 Remote ID for iMAP device 7.2.6 Customer ID Naming 7.2.7 Viewing provisioned iMG/RG on the AlliedView NMS 7.
Provisioning the iMG/RG Provisioning Strategy • Profiles - A set of profiles is created that provides a set of templates that, when applied, ensure the RG is provisioned for a specific service type with the correct attributes. There are two main profile types: • General - These are always associated with an RG regardless of the services offered. • Service specific - These are associated with an RG only when a specific service is to be configured.
Provisioning the iMG/RG Provisioning Strategy Then each Access Island could have the same VLAN configuration (mirror configuration). The one-hundred level VLANs (200, 300 etc.) could be for testing with the prefix TEST. Note: When provisioning with Profiles for each Access Island, the only Profiles that are unique to each Access Island are the General Profiles, since the General Profile contains the VLAN and L3 static route information.
Provisioning the iMG/RG Provisioning Strategy = video VLAN (VID 40) = IP Subnet = shared (voice, data) VLAN (VID 10) iMG646PX-ON = 10.56.7.223 ONU 4.0.0 ETH 4.0.0 FXS FXS Ethernet Data to PC 10 10 EPON = 172.16.33.18 BD Fiber 40 Ethernet Ethernet Video to Set Top Box Video to Set Top Box Video Head iMG646 Customer = 10.56.7.
Provisioning the iMG/RG Provisioning Strategy Customer 2:1 Media Converters HPNA Network = data_VLAN (VID 20,) = voice_VLAN (VID 10) Video Head = video_VLAN (VID 40) = Physical Link Note 1 Note 2 HPNA 20 40 20 40 = IP Subnet 40 40 Note 1 Ethernet 20 FX SFP XE/GE NM card BD Fiber FX10 card 10 20 Video to Set Top Box Data to PC Ethernet 6 LAN Ports Available 10 ISP IP Gateway Note 1 - iMG7x6MOD takes HPNA 320 card FXS FXS Class 5 Switch iMG_7x6_model FIGURE 7-4 iMG7x6MOD Configu
Provisioning the iMG/RG Provisioning Strategy configuration as new ones. It is recommended that existing RG customers use the AlliedView Bootstrap sequence which uses DHCP. Note: Although any of these strategies can be used, strategy one is used in the example installation procedures, where the preprovisioned configuration is downloaded to the RG at the end of the DHCP/discovery process. 7.2.5 Configuring Components for DHCP Discovery 7.2.5.
Provisioning the iMG/RG Provisioning Strategy • Summary - Lists the existing configurations. The Release 2 snd 3 configurations are grouped as SNMP types and the Release 4 configurations are grouped as CWMP types. The Refresh button, which is only enabled on the Summary tab, will refresh the display and add any new configurations created. The Close button exists the program • • • • The Release 2 and 3 tabs are identical to the Boot Configuration in previous releases.
Provisioning the iMG/RG Provisioning Strategy FIGURE 7-6 iMG/RG Boot Load Configurator Tool - Release 2 (and Release 3) AlliedView NMS Administration Guide 655
Provisioning the iMG/RG TABLE 7-2 Provisioning Strategy RG/iMG Boot Load Configurator Tool - Release 2 and Release 3 Tabs Attribute Value Mgmt VLAN ID The VLAN identifier that will be placed into the im.conf file. This is the final RGMgmt vlan which the RG will use while it is in service for a particular customer in a particular access island. (If the same customer moves and takes the RG it will not work if the new residence is not serviced from the same Access Island.
Provisioning the iMG/RG TABLE 7-2 Provisioning Strategy RG/iMG Boot Load Configurator Tool - Release 2 and Release 3 Tabs Attribute Value Messages Messages show the progress and status of each load creation. The initial messages include the path to the software repository (where the zip files reside), the path to the TFTP server root (where the loads will be placed), and a summary of any existing loads already residing in the TFTP directory tree.
Provisioning the iMG/RG FIGURE 7-7 Provisioning Strategy iMG/RG Boot Load Configurator Tool - Release 4 (iMG 1400, iMG 1500, and iMG 2500 series)) AlliedView NMS Administration Guide 658
Provisioning the iMG/RG TABLE 7-3 Provisioning Strategy RG/iMG Boot Load Configurator Tool - Release 4 Tab Attribute Value Mgmt VLAN ID The VLAN identifier that will be placed into the im.conf file. This is the final RGMgmt vlan which the RG will use while it is in service for a particular customer in a particular access island. (If the same customer moves and takes the RG it will not work if the new residence is not serviced from the same Access Island.
Provisioning the iMG/RG TABLE 7-3 Provisioning Strategy RG/iMG Boot Load Configurator Tool - Release 4 Tab Attribute Value OK The OK button creates the load from the parameters entered and also creates a new MD5SUM file for all the files in the load. After successfully creating one load, additional loads can be creating by editing the parameters and selecting OK repeatedly. Not applicable to the Summary tab. Close Exits the tool.
Provisioning the iMG/RG Provisioning Strategy • 300 = 12C for TEST, so string is"\x01\x2C" • 301 = 12D for AI01, so string is"\x01\x2D" • 400 = 190 for TEST, so string is"\x01\x90" • 401 = 191 for AI01, so string is "\x01\x91" • 500 = 1F4 for TEST, so string is"\x01\xF4" • 501 = 1F5 for AI01, so string is"\x01\xF5" • 600 = 258 for TEST, so string is "\x02\x58" • 601 = 259 for AI01, so string is "\x02\x59" You need a class defined for all the iMG/RG types expected/planned to be used in each Access Island i
Provisioning the iMG/RG -----------------------------MAIN RELAY Provisioning Strategy ----------- ----------------------SPSI-AI00-MN1X71 10.10.10.1 *(dhcpsvr1) This MAIN relay instance provides relay service for the example VLANs: • • • • • RGBootstrap - 201 RGVoice - 601 Internet - 401 (non-UFO) InternetUFO - 451 - In most cases the service VLANs should be UFO. Video - 501 Following is the example for MGMT.
Provisioning the iMG/RG Provisioning Strategy ip dhcp-relay agent-option ip dhcp-relay information policy replace ip dhcp-relay server-address 10.52.201.36 ! interface vlan301 //rgmgmt ip address 10.52.110.193/28 ip dhcp-relay agent-option ip dhcp-relay information policy replace ip dhcp-relay server-address 10.52.201.36 ip dhcp-relay server-address 10.52.201.4 ! interface vlan401 //rgvoice ip address 10.52.110.
Provisioning the iMG/RG Provisioning Strategy ip dhcp-relay server-address 10.52.201.36 ! Note: Customers on each switch must be in non-shared subnets, because the AlliedWare Plus devices do standard DHCP Relay with option 82 as circuit ID only (no remote ID) and do not perform DHCP Snooping. 7.2.5.6 Summary of Steps for iMG Provisioning The following table summarizes the steps needed for iMG provisioning for the iMG types and the upstream devices.
Provisioning the iMG/RG Provisioning Strategy which identifies a specific Access Island. This, along with the VLAN IDs and Vendor-Class ID, determine which layer 3 subnets should be used for a specific subscriber. This is explained in detail in 7.2.6.2. For all of the iMG/RGs within a specific voice subnet, there must be a DNS entry with a structured name.
Provisioning the iMG/RG TABLE 7-6 Provisioning Strategy Reference for Remote ID Description 4 character name for the serving area 2 character name for the state the serving area is located in. Access Island that this device belongs in, separated by a dash.1 Characters used to identify the device and any attributes that are significant. Example Values SPSI NA -AI00- MAP1x7 -AI01-AIT- (test) 1. Use one dash on each side to help in reading the string. this part of the string.
Provisioning the iMG/RG Provisioning Strategy FIGURE 7-8 DHCP Discovery - Bootstrap VLAN 1. The RG powers up and sends a DHCP discover message over the untagged VLAN for its port. 2. The iMAP adds the Remote ID, slot.port, and VID information to the circuit ID and forwards the DHCP discover message to the DHCP server over the inband iMAP Management interface. (Neither the RG nor the end user devices need unicast access to the DHCP server as the iMAP is the proxy relay for them.
Provisioning the iMG/RG Provisioning Strategy FIGURE 7-9 DHCP Discovery - Management VLAN 6. The DHCP server provides the new IP address. 7. The AlliedView NMS uses DHCP Listener to discover the RG (its IP, and Circuit ID attributes such as MAC) in the RGMgmt VLAN. 8. The AlliedView NMS telnets to the RG, and using CLI it configures the RG and saves this to FLASH on the RG. 9. The user should then connect the LAN devices.
Provisioning the iMG/RG Provisioning Strategy Before VoIP can work, the following must have already been done, or voice service will not work: 1. Profiles have been filled out correctly to support voice service. In particular, in the Voice profile for the RG, the voice domain name must be filled out, and the voice VLAN that is filled in for the RG General profile has already been created. Also, the route to the Genband must be filled out in the RG General Profile if the Genband is on a separate subnet.
Provisioning the iMG/RG Provisioning Strategy 1. The AlliedView NMS puts together the FQDN for the RG voice interface (i.e. rgvoip-.domain) and the port of the iMAP (as _slot.port). The AlliedView NMS also adds the line entries that were filled out in the Triple-Play form. 2. The AlliedView NMS configures each voice line that has been set up for the RG (creates the voice VLAN, creates the voice IP interface, enables DHCP) 3.
Provisioning the iMG/RG Viewing iMG/RG on the AlliedView NMS To change the customerID, the administrator must change the customerID for all three types; this is done by changing the CustomerID for all three areas on the Triple-Play Service Management form. Refer to 6.15.4 and 7.10.10. 7.3 Viewing iMG/RG on the AlliedView NMS Once the iMG/RGs have been provisioned, they can be viewed in various ways that allow the administrator to track their configuration and their status.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-12 iMG/RG Inventory View Sorted by Upstream Port 7.4 Creating RG Profiles with Field Descriptions 7.4.1 Overview 7.4.1.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions • SPSI-AI00_1I_2V (1 Internet, 2 video) • SPSI-AI00_1I_3V (1 Internet, 3 video • etc.... Note: Because rate limiting may be a factor the name may need to highlight this as well. Note: “Packaged” marketing terms may also be appropriate names here, such as “DVLK-AI01-DSLPro+VVid” 7.4.1.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-14 AlliedView NMS Administration Guide RG General Profile - Mgmt.
Provisioning the iMG/RG TABLE 7-7 Creating RG Profiles with Field Descriptions Create RG General Port Profile Form - Mgmt InfoTab Attribute Value Profile Name A descriptive name that should match the service/function provided The prefix of profile name should start with a short but meaningful name that indicates the routing function and the Access Island and the service potential of the general profile, with the number of ports. Refer to 7.4.1. This is used for scoping.
Provisioning the iMG/RG TABLE 7-7 Creating RG Profiles with Field Descriptions Create RG General Port Profile Form - Mgmt InfoTab (Continued) Attribute Value New Limited User Password Password for the Limited User New Manager Password Password for the user that the AlliedView NMS uses when it provisions the device. The userID is part of AlliedView NMS, has super user privileges, and cannot be changed. Super User Login The super user that can be created and changed by the administrator.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-15 RG General Profile - Wireless Tab The wireless tab allows the iMG634WA/WB to be configured, and uses the standard wireless parameters.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-16 AlliedView NMS Administration Guide RG General Profile - Port Assignment Tab 678
Provisioning the iMG/RG TABLE 7-8 Creating RG Profiles with Field Descriptions Create RG General Port Profile Form - Port Assignment Tab Attribute Value Port Assignments The selection made here controls which fields appear on the Provision New Triple Play Customer form. Settings - Port assignments will not be displayed when provisioning a new customer. The values as set in the profile will be used.
Provisioning the iMG/RG TABLE 7-8 Creating RG Profiles with Field Descriptions Create RG General Port Profile Form - Port Assignment Tab Attribute Value Advanced Port params Brings up specific features: - Disable on Power Failure feature for the port. Refer to 7.15.2. - Flow Control - Refer to 7.16 - DSCP Status - Enables the support of DSCP IP field on the incoming frames. Refer to the Allied Telesis Gateway Software Reference Manual, command SWITCH SET SUPPORT DSCP.
Provisioning the iMG/RG TABLE 7-9 Creating RG Profiles with Field Descriptions Create RG General Port Profile Form - IP Routes Tab Attribute Value IP Route IP Routes that are available for the RG The user should always create a route to the “back office” management subnets. (The AlliedView has one as well that is unavailable to the user.) Enabled Activates the other IP Route Fields Subnet Subnet address Mask Mask over the subnet address, usually 255.255.255.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions • Session Chaining - Some applications spawn their own secondary sessions. This process is known as session chaining. When secondary sessions are successfully established, the source/destination addresses of the session will also be added to the table of currently open primary sessions. • Firewall - The Firewall feature ensures that only traffic that has been already defined is allowed to access the internal network.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-18 AlliedView NMS Administration Guide iMG/RG Internet Profile - General Tab 683
Provisioning the iMG/RG TABLE 7-10 Creating RG Profiles with Field Descriptions Create RG Internet Port Profile Form Attribute Value Profile Name A descriptive name that should match the service/function provided. Note: Profiles that use the Access Island (AI) concept have the ‘Include Internet VLAN in Profile’ set to False. For the Open Access (OA) model, the field is set to True and a VLAN number can be entered in the ‘iMG/ RG Internet VLAN ID’ field (2..
Provisioning the iMG/RG TABLE 7-10 Creating RG Profiles with Field Descriptions Create RG Internet Port Profile Form Attribute Value Use DHCP to Obtain WAN IP Address If True, use DHCP Discovery to obtain the network-side IP address for the RG. If False, static IP provisioning and IP/masks must be manually entered. DNS Servers DNS servers associated with the DHCP discovery Local IP address The IP address of the iMG/RG for the LAN that it services.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-19 TABLE 7-11 RG Internet Profile - Triggers Create RG Internet Profile Security Tab Attribute Value Security Whether the feature is Enabled or Disabled. This option is activated only for Routed Service. Moreover, it controls whether the Enable/Disable fields for Firewall and NAT are activated. Note: Security does not have to be enabled to enter Triggers and Mgmt. Stations, although this would not usually be done.
Provisioning the iMG/RG TABLE 7-11 Creating RG Profiles with Field Descriptions Create RG Internet Profile Security Tab Attribute Value Advanced Trigger Parameters These are attributes for when the user wants more control over the trigger feature: - Secondary Start Port - The start of the secondary port range for an existing trigger. - Secondary End Port - The end of the secondary port range for an existing trigger.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions 7.4.3.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-21 AlliedView NMS Administration Guide RG Internet Profile - Firewall Tab -Port Filters Attributes 689
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-22 TABLE 7-12 RG Internet Profile - Firewall Tab -Validators Attributes Create RG Internet Profile Firewall Tab Attribute Value Firewall Whether the feature is Enabled or Disabled. This option is activated only for Routed Service. Note: Include Firewall Info as part of Profile Security does not have to be enabled to enter IDS and Port Filters. Whether IDS and Port Filters are included in the profile.
Provisioning the iMG/RG TABLE 7-12 Creating RG Profiles with Field Descriptions Create RG Internet Profile Firewall Tab Attribute Value IDS parameters Whether IDS is Enabled or Disabled. If Enabled, the IDS Parameters window is activated. Note: IDS parameters can be datafilled and enabled regardless of whether the FIrewall feature is enabled, since IDS applies to the iMG/RG, and is not associated with specific Firewall attributes.
Provisioning the iMG/RG TABLE 7-12 Creating RG Profiles with Field Descriptions Create RG Internet Profile Firewall Tab Attribute Value Port Filters - These are the rules that determine what kind of traffic can pass between the external and internal network. These allow blocking of certain types of traffic - Port Filter Name - A label to help identify the filter. It cannot start with a digit.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-23 TABLE 7-13 RG Internet Profile - NAT Tab Create RG Internet Profile NAT Tab Attribute Value NAT Whether the feature is Enabled or Disabled. This option is activated only for Routed Service. IKE Translation Specifies how Internet Key Exchange Packets are translated. - Ports - Source port is translated for IKE packets. - Cookies - IKE cookies are used to identify IKE packets.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions 7.4.
Provisioning the iMG/RG TABLE 7-14 Creating RG Profiles with Field Descriptions Create RG Video Port Profile Form Attribute Value Profile Name A descriptive name that should match the service/function provided Example Names: • Flood - This would match the NONE for IGMP Mode (IGMP Snooping turned off) • Snoop (646 and 656) - Note that all RG600 series RG/IMG will support snooping in the next sw release. • • • • • • Proxy - The RG performs the IGMP function.
Provisioning the iMG/RG TABLE 7-14 Creating RG Profiles with Field Descriptions Create RG Video Port Profile Form Attribute Value IGMP Security Enabled or Disabled When “learning” is enabled the RG will only allow those trusted hosts (STB) if specified in the Triple Play screen to participate in IGMP (ask for broadcast channels When “autolearning” is enabled as well as “learning” the RG when booting up will automatically learn “X” number of trusted hosts (STB) as specified in the video profiles “trust
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions FIGURE 7-25 RG Voice Port Profile (MGCP) FIGURE 7-26 AlliedView NMS Administration Guide RG Voice Port Profile (SIP) 697
Provisioning the iMG/RG TABLE 7-16 Creating RG Profiles with Field Descriptions Create RG Voice Port Profile Form Attribute Value Profile Name A descriptive name that should match the service/function provided The prefix of profile name could include the string that identifies the Access Island as well as the service potential, such as: SPSI-AI01-UpTo4Line Note: Profile Scoping VOIP Type The user would give this name to the profile because it would have four voice lines filled in; if the user had
Provisioning the iMG/RG TABLE 7-16 Creating RG Profiles with Field Descriptions Create RG Voice Port Profile Form Attribute Value Advanced VOIP Params Sets attributes for RTCP (Control parameters for RTP) or SIP. Also includes the type of MGCP/SIP to be used in the Profile: iMG/RG MGCP Profile (for example Genband) iMG/RG Admin Profile (for example Sonus) This is where the LCFO option is added. Refer to 7.13.
Provisioning the iMG/RG TABLE 7-16 Creating RG Profiles with Field Descriptions Create RG Voice Port Profile Form Attribute Value Create Activated when a Profile Name has been typed, it creates the profile with the entered values. Cancel Closes the window FIGURE 7-27 AlliedView NMS Administration Guide Advanced Line Attributes - SIP (Arrows for 12.
Provisioning the iMG/RG Creating RG Profiles with Field Descriptions 7.4.6 Business Group ID for SIP The concept the Business Group ID for SIP is specific to Lucent and Sonus. To configure this ID, access the iMG/RG -> Voice Service Tab. If the user chooses the Voip Type as SIP, and then under Advanced VOIP Attributes chooses the iMG/RG Admin. Profile as Lucent or Sonus and clicks on Done, the New Line Configuration table will now include the Bus. Group ID. Refer to the following figure.
Provisioning the iMG/RG Basic Configurations with Sample Profiles 7.5 Basic Configurations with Sample Profiles 7.5.1 Overview The following descriptions isolate each service. In most cases services are bundled, but describing each service and its specific Profile(s) allows key fields/values to be highlighted.
Provisioning the iMG/RG Basic Configurations with Sample Profiles 7.5.2 Transparent LAN Service (TLS) Most commonly, TLS is used to join two sites (usually of a business) through the upstream switches of the RGs. This is an Ethernet transport service, at layer 2. Note that data must be untagged. Refer to Figure 7-29. FIGURE 7-29 TLS Configuration The following screen examples show the sample profiles included with the NMS and what they contain..
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-30 FIGURE 7-31 AlliedView NMS Administration Guide RG General Profile for TLS - Mgmt Info Tab RG General Profile for TLS - Port Assignment Tab 704
Provisioning the iMG/RG Basic Configurations with Sample Profiles 7.5.3 Internet - Bridged In Internet - Bridged service, a data device (such as a PC) connects with the ISP on the same VLAN, so there is no routing. In essence, the RG is like one end of a TLS connection. Refer to Figure 7-32. FIGURE 7-32 Internet - Bridged Configuration The following table lists the sample profiles included with the AlliedView NMS and what they contain.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-33 Internet Bridged Service - Profile “Bridged Service” 7.5.4 Internet - Routed In Internet - Routed service, the RG has a routing function; there are two VLANs, one local to the RG and one for transport to the ISP. The RG IP address is included in packets from the data device. The DHCP function on the LAN side of the RG is included in the Triple Play form. Refer to Figure 7-34.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-34 Internet - Routed Configuration The following table lists the sample profiles included with the AlliedView NMS and what they contain. TABLE 7-20 Example Profiles for Internet - Routed Profile Type Example Profile Name RG General Profile “Internet_Routed_or_NAT” Description In Mgmt. Info tab, Internet VLAN (400) filled in.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-35 Internet Routed Service - Profile “Routed custSec” - General Tab AlliedView NMS Administration Guide 708
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-36 Internet Routed Service - Profile “Routed custSec” - Security Tab 7.5.5 Internet - Routed - NAT In Internet - Routed NAT service is similar to the Routed service, with the key difference that IP numbering is local; the ISP sends packets to an RG IP address that is defined on a VLAN that is not local to the RG. A local VLAN is defined for the local IP numbering. Refer to Figure 7-37.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-37 AlliedView NMS Administration Guide Internet - Routed NAT Configuration 710
Provisioning the iMG/RG Basic Configurations with Sample Profiles The following table lists the sample profiles included with the AlliedView NMS and what they contain. TABLE 7-21 Example Profiles for Internet - Routed - NAT Profile Type Example Profile Name Description RG General Profile “Internet_Routed_or_NAT” In Mgmt. Info tab, Internet VLAN (400) filled in.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-39 Internet Routed NAT Service - Profile “Routed/all security” - Security Tab FIGURE 7-40 Internet Routed NAT Service - Profile “Routed/all security” - Security Tab AlliedView NMS Administration Guide 712
Provisioning the iMG/RG FIGURE 7-41 Basic Configurations with Sample Profiles Internet Routed NAT Service - Profile “Routed/all security” - NAT Tab 7.5.6 Video - Snooping In Video - Snooping service, the iMAP uses the STB/MAC locking feature, so the iMAP tracks the STB usage. IGMP is enabled in the iMAP so that it can track the joins/leaves via snooping. Refer to Figure 7-38. Note that when video is set to NONE, all video streams go to all ports, so a 100 meg data stream must be used.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-42 Video - Snooping Configuration The following table lists the sample profiles included with the AlliedView NMS and what they contain.
Provisioning the iMG/RG TABLE 7-22 Basic Configurations with Sample Profiles Example Profiles for Video - Snooping Profile Type Example Profile Name Description RG General Profile “Video_only” In Mgmt. Info tab, Video VLAN (500) filled in. Port Assignment tab has one or more ports filled, as Video IP Routes not used RG Video “Snooping” IGMP Node is Snooping The IGMP time-out must be at least 10 seconds greater than the router queries, but not so much higher that it will time-out.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-44 Video - Proxy Configuration The following table lists the sample profiles included with the AlliedView NMS and what they contain.
Provisioning the iMG/RG TABLE 7-23 Basic Configurations with Sample Profiles Example Profiles for Video - Proxy Profile Type Example Profile Name Description RG General Profile “Video_only” In Mgmt. Info tab, Video VLAN (500) filled in. Port Assignment tab has one or more ports filled, as Video IP Routes tab has no entries.
Provisioning the iMG/RG Basic Configurations with Sample Profiles cannot be shared on the same RG. (In most cases, an ISP has one main strategy for providing voice service and so applies the same service to all RGs.) Refer to Figure 7-46.
Provisioning the iMG/RG Basic Configurations with Sample Profiles The following table lists the sample profiles included with the AlliedView NMS and what they contain. TABLE 7-24 Example Profiles for Voice Profile Type Example Profile Name Description RG General Profile “Voice_only” In Mgmt. Info tab, Voice VLAN (600) filled in. Port Assignment tab has no ports datafilled.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-48 RG Voice Profile - “SIP1” 7.5.9 ADSL iMG with multiple VCs The user can provision the iMG/RG General Profile and ADSL Port Profile so that the ADSL-based iMG/RG can support service VLANs with different VC configurations. The format used to specify a specific VLAN/VC combination is vc:.:.
Provisioning the iMG/RG FIGURE 7-49 Basic Configurations with Sample Profiles The RG General and ADSL Port Profile to Support VLAN/VC Configuration When the user then fills out the Triple-Play form for the ADSL-based iMG/RG, and uses these profiles, the VLAN/VC settings will be set immediately on the iMAP, and on the iMG/RG when it placed into service (connected and powered on).
Provisioning the iMG/RG FIGURE 7-50 Basic Configurations with Sample Profiles Triple Play Form with Profiles to Configure VLAN/VC for Internet Service The user also must be aware that when provisioning an ADSL iMG/RG, the profiles must be aligned so that the services can be provisioned. The main guidelines are: • When specifying the VC in an iMG/RG profile, and the profile is applied to a non-DSL iMG/RG, the VPI, VCI, and Framing attributes are ignored.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-51 Provisioning Error for DSL-based iMG/RG Once the iMG/RG is provisioned and in service, the user has the option to change the settings in the Triple Play Service Management window. Moreover, once this is updated, the NMS will update the iMAP port configuration if necessary. In the following figure, the user has decided to change the internet VLAN so that it is on VLAN 21 (rather than 20), and has VPI=1, VCI=45.
Provisioning the iMG/RG Basic Configurations with Sample Profiles FIGURE 7-52 Changing an existing VLAN/VC Configuration After choosing Save iMG/RG Configuration, the user will see that the NMS will make the necessary changes, and in the ADSL Configuration -> VCs/VLANs tab the changes are reflected. Refer to the following figure.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-53 Note: Result of changing VLAN/VC for Internet Service If all four VCs are being used and the user wishes to change a VPI/VCI attributes for one of the existing VCs, this cannot be done; the user must delete one of the VCs and then add the new VPI/VCI combination to a new VC. 7.6 Datafilling the Triple Play Form - Examples 7.6.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples The form is divided into four main panels: RG, Video/Data Configuration, Video/Data Configuration and Derived Voice. Using this form is an efficient and error-free method to data fill a customer, and this becomes even more true when used in conjunction with Profiles and the use of Scoping. Following are examples: 1. An iMG624A with the following services and components: (7.6.
Provisioning the iMG/RG TABLE 7-25 Datafilling the Triple Play Form - Examples Example Profiles for Configuration 1 - with RG 624 Profile Type Example Profile Name Description Upstream Port Profile “Auto2+ w/NoFA” Profile name provides description: RG General Profile “DVLKND-AI01-P-1I_2V_1T” Auto2+ = ADSL mode used w/NoFA = with No Filtering and No Ageing Profile name provides description: DVLKND-AI01- = Access Island 01 P = Phone (Derived Voice) 1I = 1 internet 2V = 2 Video 1T = 1 TLS RG Inter
Provisioning the iMG/RG FIGURE 7-55 Datafilling the Triple Play Form - Examples Triple Play Customer Form for RG 634 - Two Voice, Two Video, TLS, and One Internet AlliedView NMS Administration Guide 728
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-56 RG General Profile for Configuration 1 FIGURE 7-57 AlliedView NMS Administration Guide RG Voice Profile for Configuration 1 729
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples 7.6.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-59 AlliedView NMS Administration Guide Triple Play Customer Form for RG 646 - Configuration 2 731
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-60 FIGURE 7-61 RG General Profile for Configuration 2 - Mgmt. Info RG General Profile for Configuration 2 - Port Assignment Once the RG is pre-provisioned, it appears in the Network Inventory View under iMG/RGs. Right clicking on the device and selecting View/Modify Details brings up the tabbed form that includes all of the device attributes. Subsection 7.7 goes through these tabs and highlights important attributes.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples 7.6.4.1 Prerequisites (Profiles and Hard-coded Values) Before setting up a static model, the user should create some profiles that in critical ways do not have certain values filled in. This will control the Triple Play form when these Profiles are chosen. The following figures show two profiles: • HomeNetworkInet-StaticIP - Note that the Use DHCP to Obtain IP Address is set to False.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-63 RG Voice Profile - Static Configuration Moreover, some hard-coded values must be known before beginning the procedure, since these static Profiles will make certain fields appear that must be filled in on the Triple Play form: • RGMgmt IP Address - This does not need to be known if the user sets up discovery so that the IP address is included in the Discovery process.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples - VLAN=1 untagged - IP address = 192.168.1.1 - DHCP=Off 5. telnet into the ADSL modem using the 192.168.1.1 address. 6. Change the IP address to the unique IP address. 7. Save the configuration and set this as the default - You can now take the RG to the customer site if not already there. 7.6.4.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-64 Triple Play Form for Static Provisioning After clicking on Provision, the AlliedView NMS stores all of the values. If the RG has previously been discovered, the values in the Triple-Play form are applied. If the RG has not been discovered, discovery can be done in two ways: • Wait for the 24-hour discovery cycle to discover the RG.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-65 Adding the RG to. the Network Manually (Add Node Form) When the user clicks on Add Node, the AlliedView NMS immediately begins configuring the RG. In the iMG/RG table (under Network Inventory), the RG with the ID “Static Customer” at first has no columns filled in since it has not been discovered. Once discovered, the columns begin to fill in.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-66 Adding RG with Static Values - Discovery Complete Note that the Upstream Port field is not filled in, since DHCP discovery was not used. 7.6.4.5 Viewing Static Configuration Viewing the status windows shows the differences between the statically and dynamically configured iMG/RG. The following figures list the tabbed windows that show these differences.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-67 AlliedView NMS Administration Guide Static iMG/RG Configuration - Status Tab 739
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-68 AlliedView NMS Administration Guide Static iMG/RG Configuration - Internet Service Tab 740
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-69 Static iMG/RG Configuration - Voice Service Tab 7.6.5 Configuration 4 - EPON/ONU Interface Connected with iMG646PX-ON This example is similar to the first two examples, but the use of Profiles is highlighted because of the use of EPON/ONU specific QoS policies, as explained in 6.11.11.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-70 Triple-Play for the EPON/ONU Figure 7-70 shows the Triple-Play form when filled out for the ONU interface. The main differences are the ONU interface format (the EPON slot.port and ONU logical ID) and the MAC address for the ONU.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-71 Service Management Window -> iMG/RG Tab for EPON/ONU Figure 7-71 shows the Service Management Form once the iMG/RG is configured. The iMG/RG-> Mgmt. Info tab provides a summary of all the main attributes.
Provisioning the iMG/RG FIGURE 7-72 Datafilling the Triple Play Form - Examples Service Management Window -> ONU Configuration Tab for EPON/ONU Figure 7-72 shows the Service Management Form with the ONU Configuration tab. On this form the user can change the VLAN-QoS policy association. The available VLANs and policies are included in the pull-down menus. Note: The EPON supports translations.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples = data_VLAN (VID 20) = voice_VLAN (VID 10) Video Head = video_VLAN (VID 40) = Physical Link Customer = IP Subnet 40 40 Ethernet 20 SFP XE/GE NM card xDSL xDSL FX10 card 10 20 Video to Set Top Box Data to PC Ethernet 10 ISP SIP (Note 1) SIP Proxy Note 1 Network has Proxy, Register, Location and Redirect Servers FXS FXS SIP FIGURE 7-73 Note: Configuration 5 - VoIP using SIP This example is included because a phone is i
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-74 Triple Play Form with SIP for Voice 7.6.7 Configuration 6 - Multi-Service VLAN Configuration 6 involves placing more than one service on a VLAN.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples = voice VLAN (VID 10) = IP Subnet = shared (video, data) VLAN (VID 40) iMG646PX-ON = 10.56.7.223 ONU 4.0.0 ETH 4.0.0 FXS EPON = 172.16.33.18 Internet (IP 2) Data to PC 10 10 Video (IP 1) Ethernet FXS BD Fiber 40 Ethernet NMS (IP 3) Ethernet Video to Set Top Box iMG646 Customer = 10.56.7.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples 7.6.7.1 RG Forms FIGURE 7-76 AlliedView NMS Administration Guide Shared VLAN - RG General - Mgmt.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-77 AlliedView NMS Administration Guide Multi-service VLAN - Internet - General Profile 749
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-78 AlliedView NMS Administration Guide Multi-service VLAN - Video Profile 750
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples Multi-service VLAN - Voice Profile FIGURE 7-79 7.6.8 Configuration 7 - iMG7x6MOD with HPNA The iMG7x6MOD can be configured using the RG forms. Moreover, VLAN translation may be needed to ensure the iMG can be integrated into the network.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples 7.6.8.1 RG Forms The iMG6x6MOD product, when using the HPNA LAN interface card, can have devices connected to the residence coax network. Since there is now a set of devices associated with the HPNA as well as the LAN ports, the user must ensure that the VLAN configuration matches the system configuration.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-82 RG General Profile for iMG646MOD (No translations datafilled) For the HPNA, the Port Assignment tab includes the HPNA port, with the options as shown in Figure 7-83 and Table 7-28.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-83 TABLE 7-28 RG Profile - Port Assignment for HPNA Provisioning the iMG/RG in Release 10.0 Pull-down Option Description Internet (Untagged) The HPNA can support only internet service Video (Untagged) The HPNA can support only video service Internet (Tagged) The HPNA supports internet service, but could support video service as well.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples Customer = data_VLAN (VID 20) = voice_VLAN (VID 10) Video Head = video_VLAN (VID 40) = Physical Link SBx908 40 40 Ethernet 20 SFP SFP XE/GE card 20 Data to PC BD Fiber GE (Etherlike) 10 Video to Set Top Box Ethernet 10 ISP IP Gateway FXS FXS Class 5 Switch FIGURE 7-84 iMG/RG Connected to x908 Upstream Device. The Triple-Play form can be used to pre-provision the iMG/RG using the already created Profiles.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-85 Note: Provisioning Ports on AlliedWare Plus Devices After the ports have been provisioned with the NMS, then de-provisioned, their customer ids remain blank. Over time all nonprovisioned ports will be blank. It's only when the device is newly installed that they have default descriptions and require this extra de-provisioning step. • Upstream port numbering - These use the 3-number format (for stack.module.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-86 Triple Play Form with x908 Upstream Device Once the form is filled in and the NMS has performed provisioning in software, the iMG will begin its provisioning either immediately (if the iMG/RG is already connected and powered on), or later (when the iMG /RG is connected and powered on). When complete, the iMG is listed and includes its IP address, upstream port, and the associated profiles. Refer to the following figure.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples Examples where this type of communication is useful include: • • • • Sharing a networked printer in a home where there are multiple PCs Recording TV broadcast to a DVR and viewing on demand content from the DVR to a PC or STB Viewing video, pictures and music libraries stored in a PC on a TV Future applications may also include networked appliances (e.g. smart refrigerator, etc.) The iMG/RG can support three configurations: 1.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples Mediaroom configuration differs depending on the type of device you are configuring. Some of the fields utilized by the iMG 600, iMG 700, and iBG 910 series devices do not apply to the iMG 1400, iMG 1500, and iMG 2500 series devices. 7.6.10.1 iMG/RG General Profile In a Mediaroom configuration you can connect local media devices to any non-wireless port to receive service.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-90 4. IP Routes for Mediaroom - Routes If you are creating a new profile, ensure the entire profile is complete and click Create. If you are modifying an existing profile, click Modify. 7.6.10.2 iMG/RG Internet Profile Note: Several fields in the Internet Profile are dependent on each other; that is, some fields are not available until other fields are set.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-91 Internet Service Type for Mediaroom - Routed Service 3. Select the Security tab. 4. In the Security drop-down list, select Enabled. Security must be enabled before you can complete subsequent steps. 5. If you are configuring an iMG 600, iMG 700, or iBG 910 series device, in the Rapid Route drop-down list, select Enabled. This enhances NAT routing functionality in the iMG for better throughput of routed traffic.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-92 Security and Rapid Route for Mediaroom 6. Select the NAT tab. 7. In the NAT drop-down list, select Enabled. NAT must be enabled before you can set the address fields on the General Internet Info tab.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples FIGURE 7-93 8. NAT for Mediaroom Select the General Internet Info tab. You can now set the following fields: Local IP Address Local Mask Local DHCP Start IP Address Local DHCP End IP Address 9. If you are creating a new profile, ensure the entire profile is complete and click Create. If you are modifying an existing profile, click Modify. 7.6.10.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples 2. In the IGMP Mode drop-down list, select Proxy. This must be set first in order to set the Use DHCP to obtain WAN IP Address field. 3. In the Use DHCP to obtain WAN IP Address drop-down list, select True. 4. If you are configuring an iMG 600, iMG 700, or iBG 910 series device, in the Multicast Acceleration drop-down list, select Enabled.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples • iMG624-A/B • iMG634-A/B • iMG634-WA/WB 7.6.11 Configuration 10 - Video with static IP Address (iMG1000 and 2000 Series) In most networks, for security reasons routers will not accept source IP addresses of all zeros or will ensure that the IGMP traffic (including joins/leaves) has a proper IP address.
Provisioning the iMG/RG Datafilling the Triple Play Form - Examples When filling out the Triple-Play form, the administrator should select Display Preferences and select the tic-box VideoIP Address Panel. The user can then fill in a static Video IP Address and Mask, which allows video to work. Refer to the following figure.
Provisioning the iMG/RG Provisioning the iMG/RG (Managed Object Properties) FIGURE 7-97 Configure iMG with Static Video IP Address 7.7 Provisioning the iMG/RG (Managed Object Properties) 7.7.1 Overview • Managed Object Properties for the iMG/RG Section 8 of the AlliedView NMS User Guide describes all the relevant managed objects and their properties so that the user can control how the MO is provisioned. This is especially helpful in understanding how MO properties can be filtered in Custom Views.
Provisioning the iMG/RG Provisioning the iMG/RG (Managed Object Properties) FIGURE 7-98 AlliedView NMS Administration Guide Managed Object Properties Form for an iMG/RG 768
Provisioning the iMG/RG TABLE 7-29 Provisioning the iMG/RG (Managed Object Properties) Managed Object Properties for Nodes Custom Map View Property MO Form Property Description for Nodes Example Name The device name, which is a unique name that is used as the key in the database. This name cannot be changed. name 172.16.33.
Provisioning the iMG/RG TABLE 7-29 Provisioning the iMG/RG (Managed Object Properties) Managed Object Properties for Nodes (Continued) Custom Map View Property MO Form Property Description for Nodes Example SysLocation A string value to identify where the device is located sysLocation Building_A (This would assume the device was located in Building_A) Category The family of the device category Telesis (includes all MAP devices) Rapier* (all Rapier devices) RG* (all RG devices) Release The rel
Provisioning the iMG/RG TABLE 7-30 Provisioning the iMG/RG (Managed Object Properties) Managed Object Properties for Ports Custom Map View Property MO Form Property Description for Ports Name The device name, which is a unique name that is used as the key in the database. This name cannot be changed. name 172.16.33.
Provisioning the iMG/RG Provisioning the iMG/RG (Managed Object Properties) • cr*, maj*, mino* • critical, major, minor Click on the More button and then Select Additional Criteria to include more attributes that will filter this form. Use the exact name for the criteria and follow the rules above. You can also choose Select Props to View to select which fields will appear in the view. (This is different than defining the criteria to filter a view.
Provisioning the iMG/RG Provisioning the iMG/RG (Managed Object Properties) 7.7.3.1 All iMG/RGs in an Access Island (in IP Network Map) As shown in Figure 7-99, there is a Custom Map View for all iMG./RGs for Access Island 1 that shows all iMG/RGs that are part of this Access Island. To create this Custom View, perform the following steps: 1. Select the Network Node that will have the Custom View as a sub-node (this can also be done later). 2.
Provisioning the iMG/RG Provisioning the iMG/RG (Managed Object Properties) 7.7.3.2 All iMAP Nodes in an Access Island In the Nodes view of Network Directory tree, a Custom View can be created that includes all the iMAPs for an Access Island. To create this Custom View, perform the following steps: 1. Select Nodes under Network Inventory. 2. Right click and select Custom Views -> Add Custom View (or Control-V) 3. On the Object Properties form, fill in the Name you wish to give this Custom View.
Provisioning the iMG/RG Provisioning the iMG/RG (Managed Object Properties) 7.7.3.3 iMAP Cards Grouped by Type To create Custom Views for each card type, create Custom Views with the following filtering criteria.
Provisioning the iMG/RG Provisioning the iMG/RG (Managed Object Properties) 7.7.3.4 Provisioned / Available Ports in an Access Island In the Ports node, it is useful to create a Custom View for provisioned and unprovisioned ports, since the administrator could then quickly see the pool of unprovisioned ports that could be used for adding subscribers.
Provisioning the iMG/RG Provisioning the iMG/RG (Managed Object Properties) FIGURE 7-103 Custom View for G6 Events in last 48 hours • All RG/iMG events in the network - Refer to the following figure.
Provisioning the iMG/RG Provisioning the iMG/RG (Application Manager) FIGURE 7-104 Custom View for RG/iMG Events 7.8 Provisioning the iMG/RG (Application Manager) 7.8.1 Overview Caution: If AlliedView NMS users are accessing applications via an IP route that includes Network Address Translation (NAT), certain AlliedView NMS modules may not work correctly as the server may send information to the clients over different ports than those initiated by the clients.
Provisioning the iMG/RG Provisioning the iMG/RG (Application Manager) The way to access the Application Manager is unchanged • Right-click on a device (as an icon or table row), and select Provision -> (Provisioning Task). • From the main menu, select Tools -> Application Manager. The following figure shows the result when the user selects Tools -> Application Manager.
Provisioning the iMG/RG Provisioning the iMG/RG (Application Manager) FIGURE 7-106 List of CPE Devices available for an Application 7.8.2 Backup/Restore This follows the same steps as for Allied Telesis Devices. Refer to Section 5. 7.8.3 Device Configuration This follows the same steps as for Allied Telesis Devices. Refer to Section 5. 7.8.4 Software Configuration This follows the same steps as for Allied Telesis Devices. Refer to Section 5.
Provisioning the iMG/RG Provisioning Guidelines for Models 7.9 Provisioning Guidelines for Models 7.9.1 Open Access Figure 7-107 shows an example configuration in which there are nine Service Providers, three for each type of service. As a result, there are nine VLANs that exist for these services, and changing a service provider for a service requires a different VLAN to be used. With the updated iMG/RG profile GUIs in 9.0, the following is done to provision the Open Access model: • Mgmt.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-107 iMG/RGs in a Network with Multiple Providers for each Service Once the Open Access model is configured, the Service Management Form is similar to the Access Island model; on the Mgmt. Info tab, the service VLANs are read only, and so the user must go to the individual service tabs to change a VLAN. Refer to the following figure.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-108 Service Management - iMG/RG -> Mgmt. Info Tab 7.9.2 Multi-service VLANs Note the following when provisioning a multi-service VLAN configuration: • If the internet service is Routed NAT and on the same VLAN as the RG Mgmt VLAN, you must have the Firewall=ON and two port filters to allow TCP and ICMP traffic. Otherwise the NMS will lose connectivity and cannot discover the iMG.
Provisioning the iMG/RG Provisioning Guidelines for Models • Prior to release 10.0, if Bridged Internet service was configured, the DHCP and IP address/mask fields were grayed out, now they are not, since you may want to add another service such as voice. 7.9.3 iMG6x6MOD/iMG7x6MOD - Translation and HPNA Diagnostics 7.9.3.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-109 2. HPNA Testing - Master Tab View the HPNA network stations information - The user can view the information about the stations in the HPNA network. The information to be displayed is shown in the diagram. The Stations sub-tab contains the HPNA Network station information.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-110 3. HPNA Testing - Stations Tab View the HPNA network statistics - The user can view the statistics for each of the stations in the HPNA network. The Statistics Tab contains the HPNA Network station statistics. The tab will show a table where each row is a different statistic and each column is a station in the HPNA Network. The user can press the “Reset Statistics” button, and the HPNA statistics on the iMG are set back to 0.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-111 4. HPNA Testing - Statistics Tab View the HPNA performance metrics The user can view the performance metrics between each pair of stations in the HPNA network. The tab will show a table where each row is a different from-station/to-station pair and each column is a metric. The user then presses the “Collect Performance Metrics” buttons to start the data collection. Refer to the following figure. FIGURE 7-112 5.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-113 HPNA Testing - Confirmation Window since will affect Service 6.The user then presses the No button to cancel the operation before service is affected. 7.9.4 iBG915-FX 7.9.4.1 Overview With the iBG915-FX, the main difference between this CPE and CPE already supported is that the iBG915-FX supports 8 VoIP lines, four more than any previous iMG/RGs. Also, the iBG915-FX supports 5 LAN ports, rather than 3, 4 or 6 LAN ports.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-115 Modify iMG/RG Voice Profile for iBG915-FX • iMG/RG Voice Service Tab on the Triple Play Service Management Window The iMG/RG Voice Service Tab of the Triple Play Service Management window is updated to show the current configuration of all eight voice lines on the iBG915-FX. In addition, the user can make updates to those additional lines. Refer to the following figure.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-116 Service Management for iBG915-FX • iMG/RG General Tab on the Triple Play Service Management Window The iMG/RG General Tab of the Triple Play Service Management window is updated to not display the RG Loopback detection field when viewing an iBG915-FX. • iMG/RG Internet Service Tab on the Triple Play Service Management Window The iMG/RG Service Tab of the Triple Play Service Management window shows the Service Rate Limiting fields.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-117 iBG915-FX - Internet tab includes CPU-based Rate Limiting • iMG/RG Port Assignment Tab on the Triple Play Service Management Window The iMG/RG Port Assignment Tab of the Triple Play Service Management window is updated to show the current configuration of the five LAN ports on the iBG915-FX. In addition, the user can make updates to those ports. Refer to the following figure.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-118 iBG915-FX Port Assignments • iMG/RG Video Tab on the Triple Play Service Management Window Like the iMG6x6-MOD CPEs, the iBG915-FX does not support the IGMP security feature present on some of the other iMG/RGs. Because of this, the IGMP Security, IGMP Security Autolearning, and Trusted Host Limit fields, along with the Locked STD MAC Addresses table are not displayed on the Video Tab.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-119 Provisioning New Customer for iBG915-FX • GenBand G2/G6 - Add Voice Line Window The window that allows that user to configure a voice line for an IBG915-FX on the GenBand G6 is modified to allow the user to specify telephone ports 5-8. Refer to the following figure.
Provisioning the iMG/RG Provisioning Guidelines for Models 7.9.5 iMG with WAN 1G Module 7.9.5.1 Overview Products such as the AT-iMG7x6MOD can support the same card configuration as the AT-iMG6x6MOD, described in 7.6.8. In addition, it can support the following: • 1 Gigabit Bidirectional WAN Module • 1 Gigabit Bidirectional WAN Module with a Gigabit LANRJ-45 connection, allowing both the LAN and WAN ports to be configured on one module.
Provisioning the iMG/RG Provisioning Guidelines for Models For existing Ethernet port profiles these changes are not an issue, because they will not have the port direction field explicitly set. However, new port profiles should be created with the port direction set to match the provisioning scenario in which they will be used, as follows: The following iMAP GE ports should have new profiles set with the direction of Customer when connecting with with a 1G WAN card • • • • GE8 on the 9x00 iMAP GE4 (5.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-123 AlliedView NMS Administration Guide Setting the GE Port profile to Provision the VLANs 796
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-124 Setting the GE Port profile to set Port Direction As with other profile settings, the port direction can be (re)set on the Customer Management Form, under the Ether-like Configuration tab. Refer to the following figure. Caution: With the iMG7x6MOD, do not change the port direction once it has been set for Customer. To change the direction will mean a loss of service.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-125 Customer Management, showing Port Direction The RG General Profile is changed to include the G-Lan port (the port available when the 1 Gigabit WAN with RJ-45 LAN card is used). When this card is used, the General Profile includes the altered Port Assignments to allow the customer to provision services on the G-Lan port. Note: For the iMG726BD-ON, there are 2 G-Lan ports.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-126 RG General Profile and LAN Port 7.9.6 Split Management for Wireless iMG 7.9.6.1 Overview This feature allows a subscriber (rather than an NMS administrator) to configure wireless parameters on wireless iMG devices. This is done by accessing the web GUI that can be accessed on the device with a user ID / password.
Provisioning the iMG/RG Provisioning Guidelines for Models 7.9.6.2 Setting up Split Management - New CPE The iMG/RG General Profile has the field Split Management and also shows the default user ID / password (admin / admin). Note that the user ID/ password are read-only. Refer to the following figure. In the Internet Service Profile, with the internet service type set to “Routed Service”, the local IP addresses are used to access the device.
Provisioning the iMG/RG Provisioning Guidelines for Models 7.9.6.3 Setting up Split Management - Existing CPE If a device is already provisioned, the feature is by default de-activated. This is shown by accessing the Service Management form for the iMG and going to the iMG/RG tab, Mgmt. Info subtab, as shown in the following figure. FIGURE 7-128 Mgmt.
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-129 AlliedView NMS Administration Guide Service Management Form - Routed Service 802
Provisioning the iMG/RG Provisioning Guidelines for Models FIGURE 7-130 Service Management Form - Bridged Service 7.9.6.5 The Subscriber Using the Feature Once the feature is activated, the subscriber can connect to the iMG over the web interface using the default id / password of admin / admin. Although the subscriber at this point can change wireless parameters, it is recommended that the subscriber first change the password for security.
Provisioning the iMG/RG Provisioning Guidelines for Models When this change is made, or any change is made by the subscriber, the subscriber will need to save the configuration so it can be redeployed if the iMG should reboot.
Provisioning the iMG/RG Note: Provisioning Guidelines for Models When modular devices (iMG 726, iMG746, etc.) are used, one VLAN is used to manage HPNA and CES. Therefore, when the HPNA or CES card is provisioned, there is one less VLAN available. To allow for this, the RG General Profile can support these additional VLANs. Refer to the following figure. FIGURE 7-132 RG General Profile - Additional VLANs The Add/Remove button allows the user to create or modify the additional VLANs in iMG.
Provisioning the iMG/RG FIGURE 7-133 Provisioning Guidelines for Models Panel to Add/Remove/Modify Custom VLANs (Once Profile is Created) This panel includes the name and indication if the VLAN is tagged on WAN port. The table format used works similar to others in NMS where the top table shows current values and the bottom table is for editing. Since iMGs cannot have more than 14 VLANs, this will limit the number of VLANs in device to 14 (including Default and all service VLANs).
Provisioning the iMG/RG Installation Procedures FIGURE 7-134 Advanced Port Attributes - Custom VLANs 7.9.9 Error Conditions when Provisioning 7.9.9.
Provisioning the iMG/RG Installation Procedures 7.10.2 Installation Restrictions 7.10.2.1 Initial and Subsequent “push down” of Configuration Data When provisioning the RG from the AlliedView NMS, there is the initial sequence of: 1. Pre-provisioning (ports, profiles) 2. Discovery (DHCP) 3. the “pushing down” of the initial configuration data.
Provisioning the iMG/RG Installation Procedures • Have an iMG/RG General Profile with a name such as “DVLK-AI01-Vacant” and include scoping so that when it is used only iMAPs from AI01 are accessible. Refer to Figure 7-135, Figure 7-136, and Figure 7-137. Note: For Open Access, the Profile Name could be “DVLK-Vacant” since the Access Island number is not used as part of Scoping. • Have a port profile available that reflects the type of port and the capabilities desired, such as “DVLK-AI01-100Mbps”.
Provisioning the iMG/RG Installation Procedures FIGURE 7-135 AlliedView NMS Administration Guide Profile for DVLK-AI01-Vacant - Mgmt Info 810
Provisioning the iMG/RG Installation Procedures FIGURE 7-136 AlliedView NMS Administration Guide Profile for DVLK-AI01-Vacant - Port Assignment 811
Provisioning the iMG/RG Installation Procedures FIGURE 7-137 AlliedView NMS Administration Guide Profile for DVLK-AI01-Vacant - IP Routes 812
Provisioning the iMG/RG Installation Procedures FIGURE 7-138 Provision Triple Play - No Services 7.10.3.4 Add Services to an Already Provisioned Port When services must be added to the pre-provisioned port, the same steps are used when adding services to a port that already has some service(s) configured, using the View/Modify Customer window. Following is a summary of these steps. For details, refer to the procedures in the rest of this Subsection. 1.
Provisioning the iMG/RG Installation Procedures 7.10.4.2 Pre-requisite Procedures Before performing this procedure, the user should have already done the following: 1. At the iMAP, ensure the following are already configured: • VLANs for DHCP and services have been created. • The iMAP card/port that interfaces the iMG/RG has been installed and enabled. 2. User has work order that should include the following: • Attributes that will be used for GenBand configuration 3.
Provisioning the iMG/RG Installation Procedures 6. Enter a port Profile. Only those port profiles relevant for the type of port are available. 7. Select an Internet Svc. Profile, in this case HomeNetworkInet. Note that the Local IP Addr, Mask, and DHCP Start/End addresses are datafilled. 8. Select an Video Svc. Profile, in this case Video-Proxy. Note that the Local IP Addr, Mask, and DHCP Start/End addresses are datafilled. 9. Select a Derived Voice Svc. Profile, in this case VOIPPhone.
Provisioning the iMG/RG Installation Procedures • To provision now, click on Provision. The Task Details screen appears and shows progress states. If there is a failure, double-click on the relevant sub-task for details. • To provision, select Hold and then Provision. • To provision at set time, click on Schedule, enter the date/time, and then Provision Note: 13.
Provisioning the iMG/RG Installation Procedures FIGURE 7-141 IMG/RG Table - iMAP Port Configured, no iMG/RG Configured Note the following: • The Customer ID, Type (Family level), and Upstream Port are identified. • The iMG/RG IP address, software release, and associated profiles are not included. These are filled in as a result of plugging in the iMG/RG by the customer, which begins the DHCP configuration steps. 15. End of this part of the Procedure 7.10.4.
Provisioning the iMG/RG Installation Procedures 7.10.5 Provisioning / De-Provisioning Voice Service 7.10.5.1 Overview When a customer has video and data service (double-play), and wishes to add voice service, the use of AlliedView NMS makes this possible, through the use of profiles, with a small number of steps. Moreover, adding or removing a second line for a service is accomplished using only a few GUI screens.
Provisioning the iMG/RG 5. Installation Procedures In the RG General profile pull-down, select the Profile DeskLab-3Play-1Video, as shown in Figure 7- 142. FIGURE 7-142 Applying Different RG General Profile for Triple-Play 6. Click on Modify. 7. Note the results - The VLAN defined in the General Profile is added. 8. Still in the Mgmt. Info tab, select the Voice Service tab 9. For the Voice Service Profile pull-down, select VOIPPhone. Refer to Figure 7-143.
Provisioning the iMG/RG Installation Procedures FIGURE 7-143 Applying Voice Profile 10. Click on Modify. 11. Select the Status tab (there are no sub-tabs). 12. Click on Add Voice Line. The Add Voice Line form appears. 13. In the Add Voice Line form, note that the Voice Endpoint (used for DNS) is already defined, as well as the interface group. These were defined in the Voice service profile. 14. Select from the pull-down the Voice Endpoint Port, the Line Profile, and the CRV.
Provisioning the iMG/RG Installation Procedures FIGURE 7-144 Add Voice Line (line 1) 15. Click on the now activated Add. 16. Back on the Status tab, click on Update Customer Info. 17. Note the results. 18. End of Procedure Note: For the Open Access Model, the same procedure would be used, with the administrator ensuring that there was no conflict in VLAN configuration between the iMG/RG General Profile and the Voice Service Profile. 7.10.5.3 Add Second Voice Line 1.
Provisioning the iMG/RG Installation Procedures FIGURE 7-145 Add Voice Line (line 2) 8. Click on the now activated Add. 9. Back on the Status tab, click on Update Customer Info. 10. Note the results. Refer to Figure 7-146. 11. End of Procedure.
Provisioning the iMG/RG Installation Procedures FIGURE 7-146 Results of Second Voice Line Added 7.10.5.4 Remove Second Voice Line 1. Find the iMG/RG for the customer in the iMG/RGs table using various methods: • Bring up the iMG/RGs node in the Network Inventory table and do a search (Ctrl-F) on the Customer ID. • Bring up the Ports node in the Network Inventory table and do a search (Ctrl-F) on the Customer ID. 2. Right click on the iMG/RG or Port and select View/Modify Details.
Provisioning the iMG/RG Installation Procedures FIGURE 7-147 Two MGC Tabs (one for each Voice Line) 5. Click on Remove. 6. When the Confirmation window appears, click on Yes. 7. Note the results. The MGC tab is removed and only one MGC tab remains. 8. End of Procedure. 7.10.5.5 Remove Voice Service (Triple- to Double-Play) 1. Ensure the pre-requisites are met: • General Profile available to support the result of customer having no voice service (double play) 2.
Provisioning the iMG/RG Installation Procedures FIGURE 7-148 5. Deleting Voice Profile Click on Modify. Note: At this point you could select Save iMG/RG Configuration, and the customer would have no voice service but still have it configured on the RG. 6. Select the Mgmt. Info tab (still under the iMG/RG tab). 7. For the iMG/RG General Profile, select the double-play General Profile the customer will use. Refer to the following figure.
Provisioning the iMG/RG Installation Procedures FIGURE 7-149 Customer Using Profile for Double Play (no Voice) 8. Select Save iMG/RG Configuration. 9. As the changes takes effect, any phone connected to the RG will no longer have dial tone. 10. END OF PROCEDURE 7.10.6 Provisioning / De-Provisioning Video Service 7.10.6.
Provisioning the iMG/RG Installation Procedures FIGURE 7-150 Customer without Video (Double Play) • There is an RG General Profile for Triple-Play that matches the customer attributes for double-play and adds the necessary attributes for video (especially the video VLAN and routes). - RG General - DeskLab-3Play-1Video 2. Find the iMG/RG for the customer in the iMG/RGs table using various methods: • Bring up the iMG/RGs node in the Network Inventory table and do a search (Ctrl-F) on the Customer ID.
Provisioning the iMG/RG Installation Procedures FIGURE 7-151 Applying Different RG General Profile for Triple-Play 6. Click on Modify. 7. Note the results - There is now a VLAN provisioned for one video. 8. Still in the Mgmt. Info tab, select the Video Service tab. 9. For the Video Service Profile pull-down, select Video-Proxy. Refer to Figure 7-152. FIGURE 7-152 10. Applying Video Profile Click on the now active Modify.
Provisioning the iMG/RG 11. Installation Procedures Note the results - The Video Service Profile changes form None to Video-Proxy with the Video Svc. VLAN from the RG GeneralMgmt profile Note: Do not make changes to the IGMP values, or the video service will be out of synch with the video profile. (If you do so, and * will appear next to the Profile Name.) 12. Return to the Mgmt. Info sub-tab. 13. Click on Save iMG/RG Configuration. 14. Back on the Status tab, click on Update Customer Info. 15.
Provisioning the iMG/RG FIGURE 7-153 Installation Procedures Applying Different RG General Profile for Triple-Play (Second VIdeo) 6. Click on Modify. 7. Click on Save iMG/RG Configuration. 8. Back on the Status tab, click on Update Customer Info. 9. Note the results: On the iMG/RG Port Assignments tab, there are two ports for Video, 1 and 3, as shown in the following figure. 10. Restart cpe (iMG/RG). 11. End of Procedure.
Provisioning the iMG/RG Installation Procedures FIGURE 7-154 Results of Second Video Line Added (Ports) 7.10.6.4 Remove Second Video Line 1. Ensure the prerequisites are met: • An RG General Profile exists that supports more than one video, i.e. DeskLab-3-play-1Video. 2. Find the iMG/RG for the customer in the iMG/RGs table using various methods: • Bring up the iMG/RGs node in the Network Inventory table and do a search (Ctrl-F) on the Customer ID.
Provisioning the iMG/RG FIGURE 7-155 Installation Procedures Applying Different RG General Profile for Triple-Play (Remove Second VIdeo) 6. Click on Modify. 7. Click on Save iMG/RG Configuration. 8. Back on the Status tab, click on Update Customer Info. 9. Note the results. In the Port Assignments tab, there is only one video port. Refer to the following figure. 10. At the iMG/RG/Mgmt. Info tab, select Save iMG/RG Configuration. 11. Restart the CPE (iMG/RG) 12. End of Procedure.
Provisioning the iMG/RG Installation Procedures FIGURE 7-156 Results of Second Video Line Removed 7.10.6.5 Remove Video Service (Triple- to Double-Play) 1. Ensure the pre-requisites are met: • General Profile available to support the result of customer having no video service (double play) 2. Right click on the iMG/RG or Port and select View/Modify Details. This brings up the Triple Play Service Management screen. 3. Select the iMG/RG - Video Service tab. 4.
Provisioning the iMG/RG Installation Procedures FIGURE 7-157 5. Deleting Video Profile Click on Modify. Note: At this point you could select Save iMG/RG Configuration, and the customer would have no video service but still have it configured on the RG. 6. Select the Mgmt. Info tab (still under the iMG/RG tab). 7. For the iMG/RG General Profile, select the double-play General Profile the customer will use. Refer to the following figure.
Provisioning the iMG/RG Installation Procedures FIGURE 7-158 Customer Using Profile for Double Play (no Video) 8. Select Save iMG/RG Configuration. 9. Back on the Status tab, click on Update Customer Info. 10. Note the results: any video connected to the RG will no longer work. 11. END OF PROCEDURE 7.10.7 Change Quality of Existing Data Service This will be supplied in a future release. 7.10.
Provisioning the iMG/RG • • • • • Installation Procedures The NMS only supports PPPoE on Internet service. The NMS only supports rate limiting on Internet service. All LAN ports are set as untagged. All service VLANs must be tagged on the WAN ports. Any parameters (especially voice) not supported by the NMS may or may not be preserved when changing over to the NMS. 7.10.9 De-Provision iMG/RG from AlliedView NMS 7.10.9.
Provisioning the iMG/RG Installation Procedures • Ports (iMAP) - De-provisions the iMG/RG, the associated profiles, and the associated ports. If a POTS24 was being used to provide voice service, the POTS24 port would appear here as well. • Voice Line - If there is a connection to the GenBand, the attributes associated with it are shown here. If more than one voice line is being used, all would appear here.
Provisioning the iMG/RG Installation Procedures FIGURE 7-161 7. Delete RG-Port Association (Delete Object and Traces) The user can now either: • Place the iMG/RG back in its box for storage. When the RG is reconnected, it must be to a port in the same Access Island. • Transfer the RG to another iMAP port in the same Access Island. 8. End of Procedure. 7.10.9.3 De provision the iMG/RG (Different Access Island) 1.
Provisioning the iMG/RG Installation Procedures FIGURE 7-163 Using telnet to Access the RG 7. Login to the iMG/RG. 8. Set back to factory defaults (>sys config set factory) 9. You can now unplug the RG and place it back in its box. 10. Return to the De-Provision Ports Form. 11. This time select the Ports panel. 12. Right click on the iMG/RG and select Delete Object and Traces, as shown in the following figure. FIGURE 7-164 Delete RG-Port Association (Delete Object and Traces) 13.
Provisioning the iMG/RG Installation Procedures • If the iMG/RG is to be reconfigured where the same RGMgmt VLAN is used, the iMG/RG would not be set back to its factory settings before re-provisioning, similar to 7.10.9.2. • If the iMG/RG is to be reconfigured where a different RGMgmt VLAN is used, the iMG/RG would be set back to its factory settings before re-provisioning, similar to 7.10.9.3. 7.10.10 Changing a Customer ID 7.10.10.1 Overview Section 7.2.
Provisioning the iMG/RG Note: Installation Procedures For information on the Windows Loader, refer to the Software Reference Manual for the AT-RG600. This document can be found on the Allied Telesis website. 4. The RG should then reboot and go back to Normal mode, with the bootstrap loading on the RG-mgmt VLAN. 5. Using the AlliedView NMS application (Device Backup/Restore), restore the last saved configuration file for the RG. 6. The bootstrap VLAN can now be removed from the subscriber’s port. 7.
Provisioning the iMG/RG Installation Procedures = voice VLAN (VID 10) = IP Subnet = shared (video, data) VLAN (VID 40) iMG646PX-ON = 10.56.7.223 ONU 4.0.0 ETH 4.0.0 FXS 10 10 EPON = 172.16.33.18 Video (IP 1) Internet (IP 2) Data to PC Ethernet FXS BD Fiber 40 Video to Set Top Box Ethernet NMS (IP 3) Video to Set Top Box Ethernet iMG646 Customer = 10.56.7.
Provisioning the iMG/RG Installation Procedures FIGURE 7-166 AlliedView NMS Administration Guide General Form for Multi-service VLAN - Mgmt.
Provisioning the iMG/RG Installation Procedures FIGURE 7-167 AlliedView NMS Administration Guide General Form for Multi-service VLAN - Port Assignment Tab 844
Provisioning the iMG/RG FIGURE 7-168 Installation Procedures Internet Form for Multi-service VLAN - General Internet Info Tab - Configuration 1 AlliedView NMS Administration Guide 845
Provisioning the iMG/RG Installation Procedures FIGURE 7-169 AlliedView NMS Administration Guide Video Form for Multi-service VLAN - Configuration 1 846
Provisioning the iMG/RG Installation Procedures FIGURE 7-170 2. Voice Form for Multi-service VLAN - Configuration 1 Data fill the Triple-Play Form. Since there are three different customers and types of interfaces, the Customer ID for each must be unique, and the slot.Port will be different. (The iMAP could be the same if all of the interface cards were on the same iMAP. Refer to the following table.
Provisioning the iMG/RG Installation Procedures FIGURE 7-171 AlliedView NMS Administration Guide Triple-Play Form EPON Interface - Configuration 1 848
Provisioning the iMG/RG Installation Procedures FIGURE 7-172 FIGURE 7-173 AlliedView NMS Administration Guide Triple-Play Form FX Interface - Configuration 1 Triple-Play Form ADSL Interface - Configuration 1 849
Provisioning the iMG/RG Installation Procedures 7.10.13.2 Creating a Data and Video/Voice VLAN (Configuration 2) In this configuration, the Data VLAN is on a separate VLAN, and video and voice share a single VLAN. Refer to the following figure and notes in 7.10.13 before performing the procedure. iMG646PX-ON = 10.56.7.223 ONU 4.0.0 ETH 4.0.0 = IP Subnet = voice, video VLAN (VID 10) FXS = data VLAN (VID 20) FXS Ethernet EPON = 172.16.33.
Provisioning the iMG/RG FIGURE 7-175 Installation Procedures Internet Form for Multi-service VLAN General Internet Info Tab - Configuration 2 AlliedView NMS Administration Guide 851
Provisioning the iMG/RG Installation Procedures FIGURE 7-176 AlliedView NMS Administration Guide Video Form for Multi-service VLAN - Configuration 2 852
Provisioning the iMG/RG Installation Procedures FIGURE 7-177 2. Voice Form for Multi-service VLAN - Configuration 2 Data fill the Triple-Play Form. Since there are three different customers and types of interfaces, the Customer ID for each must be unique, and the slot.Port will be different. (The iMAP could be the same if all of the interface cards were on the same iMAP. Refer to the following table.
Provisioning the iMG/RG Installation Procedures FIGURE 7-178 Triple-Play Form EPON Interface - Configuration 2 FIGURE 7-179 AlliedView NMS Administration Guide Triple-Play Form FX Interface - Configuration 2 854
Provisioning the iMG/RG Installation Procedures FIGURE 7-180 Triple-Play Form ADSL Interface - Configuration 2 7.10.13.3 Creating a Video and Data/Voice VLAN (Configuration 3) In this configuration, the Video VLAN is a separate VLAN, and data and voice share a single VLAN. Refer to the following figure and notes in 7.10.13 before performing the procedure.
Provisioning the iMG/RG Installation Procedures = video VLAN (VID 40) = IP Subnet iMG646PX-ON = 10.56.7.223 ONU 4.0.0 ETH 4.0.0 = shared (voice, data) VLAN (VID 10) FXS FXS Data to PC Ethernet 10 10 EPON = 172.16.33.18 BD Fiber 40 Video to Set Top Box Ethernet Video to Set Top Box Ethernet Video Head iMG646 Customer = 10.56.7.
Provisioning the iMG/RG FIGURE 7-182 Installation Procedures Internet Form for Multi-service VLAN General Internet Info Tab - Configuration 3 AlliedView NMS Administration Guide 857
Provisioning the iMG/RG Installation Procedures FIGURE 7-183 AlliedView NMS Administration Guide Video Form for Multi-service VLAN - Configuration 3 858
Provisioning the iMG/RG Installation Procedures FIGURE 7-184 2. Voice Form for Multi-service VLAN - Configuration 3 Data fill the Triple-Play Form. Since there are three different customers and types of interfaces, the Customer ID for each must be unique, and the slot.Port will be different. (The iMAP could be the same if all of the interface cards were on the same iMAP. Refer to the following table.
Provisioning the iMG/RG Installation Procedures FIGURE 7-185 Triple-Play Form EPON Interface - Configuration 2 FIGURE 7-186 AlliedView NMS Administration Guide Triple-Play Form FX Interface - Configuration 3 860
Provisioning the iMG/RG Provisioning the iMG/RG (no iMAP or AW+) FIGURE 7-187 Triple-Play Form ADSL Interface - Configuration 3 7.11 Provisioning the iMG/RG (no iMAP or AW+) 7.11.1 Overview Note: Section 7.6.9 provides an overview of provisioning the iMG/RG on AlliedWare Plus (AW+) devices, and how it has the same feature coordination as with iMAPs.
Provisioning the iMG/RG Provisioning the iMG/RG (no iMAP or AW+) • Since there are no iMAPs in this scenario, the administrator is responsible for all network connections between the iMG/ RG, DHCP server, NMS, and service providers. (The network is shown as only a cloud rather than a cloud that includes iMAP interfaces and specific service providers.) These concepts are explained below. 7.11.2 DHCP Provisioning 7.11.2.1 iMGs/RGs at Release 3-x As explained in 7.2.
Provisioning the iMG/RG Provisioning the iMG/RG (no iMAP or AW+) Pre-provision: - Fill out MAC Address of the iMG/RG on the Triple Play form - RGbootConfigurator set up with Download file with TFTP Enable - dhcpd.
Provisioning the iMG/RG Provisioning the iMG/RG (no iMAP or AW+) 7.11.2.2 iMGs/RGs at Release 4 and above As described above, the TFTP Discovery option is used to handle customer provisioning without an iMAP or AlliedWare Plus upstream device and without forwarding DHCP Relay messages to the NMS (option 82). The iMGs at release 4 and above do not support TFTP discovery, and so the RGbootConfigurator does not have the TFTP Discovery option (tab 4; refer to 7.2.5).
Provisioning the iMG/RG Provisioning the iMG/RG (no iMAP or AW+) FIGURE 7-191 Triple Play Form without iMAP-related Fields 7.11.4 GUI Displays Once the iMG/RG is provisioned, the Details Panels are changed as follows: • There is no Eth/ADSL tab. • The statistics tab doesn't have PMON or RMON stats • The graph Stats Tab only lists iMG stats Refer to the following figure.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-192 Service Details Display for iMG/RG without iMAP Interface 7.12 Provisioning an iMG/RG with the LAN4 Feature 7.12.1 Overview The AlliedView NMS can manage the ADSL iMG 624/34 family over the Ethernet lan4 interface. Moreover, the iMG/RGs must be using the 3-7 release and up. Refer to the following figure. Note: In this configuration the 624/634 becomes a replacement for the manufacture discontinued iMG-613TX.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-193 LAN4 Feature with iMG/RG 624/634 Family Devices Other than their loss of lan4 port for subscriber services and appropriate changes in the GUIs, the management capabilities are the same. Moreover, this feature works as follows: • The administrator can data fill profiles so that the NMS automatically determines during installation whether the iMG is managed over the LAN4 or WAN port and correctly configures the device.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-194 RG General Profile - Port 4 has Management Option Also note that once “Management” is selected for a Port in the Create Profile wizard, the Admin State of the node is automatically set to “Enabled” and the user is not allowed to set it to “Disabled” as long as the service is set to “Management”. Refer to the following figure.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature 7.12.3 Service Management GUI Once the RG is discovered and configured by the NMS, the “Management” service is not used by the system. Once the NMS has discovered the node is managed via LAN 4 it no longer allows the customer to change the port 4 service in the View/ Modify wizard. This is accomplished by removing the Port 4 entry in the “Port Assignments” table of the iMG/RG., as shown in the following figure.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-197 Selecting Properties for a Custom View In the next frame that opens select the “Additional table Columns” button, as shown in the following figure.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-198 Selecting Additional Table Columns From here additional properties that are in the database can be entered and labeled. In our case the property we need to enter is “adslLinkConnected”, the label chosen for this example is “Adsl Mgmt”, indicating whether the iMG/RG is managed via an ADSL port. Refer to the following figure.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-199 Adding AdslMgmt Column The end result of apply this custom view is shown below. The top two RGs show an ADSL managed 634B-R2 box and a LAN4 managed 634B-R2 device, as shown in the following figure. FIGURE 7-200 ADSL Mgmt Column as False if has LAN4 Mgmt 7.12.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-201 Boot Configurator for 3-7 Device 2. If not already created, create the relevant profiles that are needed. The only difference between these profiles and the ones for an ADSL uplink is the Port Assignment tab, as shown in Figure 7-195. 3. Use the Triple-Play form and provision the customer, using the profiles create in Step 2. The uplink port is an FE. Refer to the following figure.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-202 4. Triple-Play form Using General Profile for LAN4 Review the iMG/RG table. Note that there are still no associated profiles and no IP address, as shown in the following figure. FIGURE 7-203 iMG Pre-provisioned 7.12.5.2 Connect the iMG and Power On 5. Connect the customer equipment to one or more LAN ports 1, 2, and 3. 6. Plug the ethernet uplink into LAN4. 7. Power on the iMG. 8.
Provisioning the iMG/RG Provisioning an iMG/RG with the LAN4 Feature FIGURE 7-204 9. iMG Provisioned using LAN4 The tabs for the Details screen are the same as an ADSL uplink, with the one difference the Port Assignments tab has no port 4, as shown in Figure 7-196. 7.12.6 Deprovision the iMG and Re-provision with the ADSL Uplink In this procedure, the iMG that currently uses LAN4 for the uplink is de-provisioned and then re-provisioned using the ADSL port as the uplink. 7.12.6.
Provisioning the iMG/RG 2. Provisioning an iMG/RG with the LAN4 Feature Note in the iMG/RG list that the device has all of the profiles dropped and the IP address is appended with _OLD, since the IP address is now released. Refer to the following figure. FIGURE 7-206 iMG De provisioned 7.12.6.2 Pre-provision the iMG for ADSL Management 3. If not done already, create profiles for the iMG.
Provisioning the iMG/RG LCFO FIGURE 7-208 9. iMG Provisioned using ADSL (no longer LAN4) Note that in the Customer Details form, the Port Assignments tab now has port 4. 7.13 LCFO The Loop Current Feed Open option is used to indicate that the calling/called party has gone onhook and is a useful feature for businesses that have key systems that transfer calls. This is available on all iMGs that are 3-7 and up. Both MGCP and SIP are supported.
Provisioning the iMG/RG iMG/RG Diagnostic Features FIGURE 7-210 Advanced VOIP Attributes (SIP) - LCFO The LCFO option is also displayed from the “Advanced VOIP Params...” button that is on both the Port Management View/ Modify “Voice Service” tab, and the iMG/RG Voice Service Profile display. Note: When LCFO is enabled, it applies to all VoIP lines on the iMG/RG. 7.14 iMG/RG Diagnostic Features This section lists and describes the diagnostic features that are available for the various iMG/RG models.
Provisioning the iMG/RG iMG/RG Diagnostic Features The VOIP Diagnostics panel is added to the Triple Play View/Modify suite of tabbed panels. VOIP Diagnostics belongs to the iMG/RG Diagnostics sub-tab and is only displayed for iMG6x6MOD and iMG7x6MOD CPE. Refer to the following figure. Note: This tab is not available for any other type of CPE FIGURE 7-211 VOIP Diagnostics Tab Initially the table displays each enabled voice port on the iMG and its current status.
Provisioning the iMG/RG iMG/RG Diagnostic Features FIGURE 7-212 Warning when Diagnosing VOIP Lines The results of tests are displayed in the details panels, as shown in the following figure. FIGURE 7-213 GR909 Test Results 7.14.2 iMG LAN Diagnostics In the MOD iMGs and the iMG726-BD-ON, the LAN diagnostic feature was added in release 3.7.4. In NMS release 12.0, the NMS supports this LAN diagnostic functionality. With the NMS, the user can diagnose CPE LAN ports.
Provisioning the iMG/RG iMG/RG Diagnostic Features FIGURE 7-214 LAN Diagnostics Tab for MOD-type iMG Initially the table displays each LAN port on the iMG and its current status. Not all modules include a Glan interface; if the Glan interface is not present, the Glan row will be omitted from the table. The current status consists of ID, Speed, Status (enabled/disabled), and Connected (true/false). These are polled from the device and updated approximately every 30 seconds while the tab is displayed.
Provisioning the iMG/RG iMG/RG Diagnostic Features FIGURE 7-216 LAN Port Diagnostics in Progress When completed, the results for each interface will be displayed in the Test Result field. Notice the Glan interface, when present, will contain an additional Tx/Rx pair.
Provisioning the iMG/RG System Power Management FIGURE 7-217 LAN Port Diagnostics Complete For more information on these tests refer to the ATI Gateway Product Family Software Reference Manual. 7.15 System Power Management This feature allows the user to modify power management for the device. When enabled at the device level, specified ports immediately shut down, usually so that services such as lifeline POTS can continue as long as possible on battery backup.
Provisioning the iMG/RG TABLE 7-38 System Power Management iMG/RG Power Management Feature and Port State Support Device Type System Power Mgmt iMG616-BD-R2 Y LAN Port Power Mgmt LAN Port State TEL Ports Power Mgmt TEL Ports State iMG616-RF/RF+ Y iMG616-SRF+ Y iMG616-W Y Y Y Y Y iMG626-MOD Y Y Y Y Y iMG646-MOD Y Y Y Y Y iMG726-MOD Y Y Y Y Y iMG746-MOD Y Y Y Y Y iMG726-BD-ON Y Y Y Y Y iMG624-A Y iMG634-A Y iMG624-A-R2 iMG634-A-R2 iMG634-B-R2 iMG634-WA-R2
Provisioning the iMG/RG System Power Management FIGURE 7-218 AlliedView NMS Administration Guide System Power Management - RG General Profile 885
Provisioning the iMG/RG System Power Management FIGURE 7-219 System Power Management - iMG/RG -> Mgmt. Info 7.15.2 LAN Ports Power Management In 3-8, there is also for certain iMG/RGs the ability to configure power management per LAN port, so that a port is automatically disabled in case of power failure. (Before 3-8, some devices had a default setting that of disabling all LAN ports except port 1.) The NMS supports this feature on iMG/RGs as listed in Table 7-38.
Provisioning the iMG/RG System Power Management FIGURE 7-220 LAN Port Power Management on Service Management Form 7.15.3 LAN Ports State In the Service Management Form for iMG/RG -> Port Assignments, the field Oper. State shows the state of the port: • Up - Include the time the link has been active • Down - The port is out of service because of a problem or it has been disabled. • Power Down - The port is out of service because of the Port Power Management feature.
Provisioning the iMG/RG System Power Management FIGURE 7-221 Oper.State for Port - Link Up Time 7.15.4 TEL Ports Power Management In 3-8, there is, similar to the LAN Port Power Management, the ability for certain iMG/RGs the ability to configure power management per voice port, so that a port is automatically disabled in case of power failure. The NMS supports this feature on iMG/RGs as listed in Table 7-38.
Provisioning the iMG/RG FIGURE 7-222 LAN Flow Control Controlling power Management for Voice Lines on Service Management Form 7.15.5 Voice Ports State Also on the Advanced Line Params for voice service is a read-only field that shows the state of the port: • Busy - The line is being used. Note that during this state, it cannot be powered down by the Power Management feature if there is a loss of power. • Idle - Line is ready to place and receive calls. • Out of Service - Line has been disabled.
Provisioning the iMG/RG LAN Flow Control FIGURE 7-223 FIGURE 7-224 AlliedView NMS Administration Guide Flow Control for LAN Ports - RG General Profile Flow Control for LAN Ports - Service Management Form 890
Provisioning the iMG/RG Port-Based Rate Limiting - Reference 7.17 Port-Based Rate Limiting - Reference Following are the rules and tables to use to select port-based rate limiting for the iMG/RG for that include release 3-7. The settings that are possible depend on the type of iMG/RG and the software release that the device is using. The following table lists the device types and loads supported. Refer to this table when reviewing the rate limits.
Provisioning the iMG/RG TABLE 7-39 Port-Based Rate Limiting - Reference Functional Groupings of iMG/RG (Continued) Group Model Load Name Characteristics Uniqueness ADSL B iMG624A-R2 iMG624A-R2 8/32 Meg Flash/RAM iMG634A/B-R2 iMG634A/B-R2 Marvell Switch iMG634WA/WB-R2 iMG634WA/ WB-R2 Solos Processor Third Generation ADSL CPE - Greater performance - able to support 2 INP.
8. Setting Up Performance Management 8.1 Overview Performance monitoring basically means collecting useful data from network devices and determining how efficiently the network is functioning. Performance is measured based on factors such as: • Number of bytes of data received (over a period) by a particular interface of a device. • Number of bytes of data sent (over a period) by a particular interface of a device. • An estimate of the interface's current bandwidth in bits per second.
Setting Up Performance Management Data Collection Screen Use the following table to locate the task you wish to perform. Use the screen or form name to locate the relevant section. TABLE 8-1 Task List for Performance Monitoring Task Screen / Form Name (if Applicable) Section Data Collection Screen Configured Collection (8.2.2) Data Collection (Statistics) - Overview (8.3.1) - Create Polling Filters Create, Modify, Delete (8.3.2) - Create Statistic DataCollection Detailed Properties (8.3.
Setting Up Performance Management Data Collection Screen FIGURE 8-1 Collection View Panel The following table lists the components in.the following figure. TABLE 8-2 Data Collection Screen Components Component Description for Data Collection Screen Components Property Columns For every statistic the associated properties are displayed in columns, such as Statistic name, Poll ID, Data Identifier, DNS Name, interval etc.
Setting Up Performance Management TABLE 8-2 Data Collection Data Collection Screen Components (Continued) Component Description for Data Collection Screen Components Navigation Buttons You can see four navigation buttons provided at the top right of the frame. They are Go to first page, Go to previous page, Go to next page and Go to Last page respectively. They will get automatically enabled and disabled based on your choice of page length and total number of hosts.
Setting Up Performance Management Data Collection • Polled Data - The actual name (statistic) for the data to be collected in the database. Examples would be Interface_In_Octets or Ether_History_Octets. • Poll Filter - The Polled Data for the Managed Object is filtered so that existing polled data can be modified/deleted, or new polled data can be added. When the server starts up, the definitions in the AlliedView NMS internal files are used as follows: 1.
Setting Up Performance Management Data Collection FIGURE 8-3 Modify Polling Properties Form - File 8.3.2.1 Adding a Polling Object To add a polling object: 1. Select the Add radio button under the list of polling objects (left panel). 2. Fill in the fields under Polling Properties as follows: • Name - Required, a string to identify the Polling Object. • Status - Checked means active and so the data collection for the associated Polled Data can be done.
Setting Up Performance Management • • • • Data Collection Global: status, type, managed, Boolean: isGroup, isContainer, isSNMP, is DHCP, isRouter, isNode, isNetwork, isInterface, System: sysName, sysOID, Interface: ifSpeed, ifDescr, ifIndex Use the More and Fewer buttons to get the correct number. Note: The Fewer button will remove the last criteria you added. The criteria are set as an AND condition. To change this, define a User Class.
Setting Up Performance Management TABLE 8-3 Data Collection Data Configuration Fields Field Description Active If you uncheck the checkbox, data collection will be temporarily stopped for this Data identifier. To resume data collection you will have to check this checkbox. Default: True (checked).
Setting Up Performance Management 2. Under Polling Properties, change the Active and Update Managed Objects checkboxes, if desired. Note: 3. Data Collection The information under Device Match Criteria is not editable. Under Collection Statistics, select a Data Object from the list and change the field values as needed. Note: Check the Advanced checkbox to enable all of the fields and checkboxes, if necessary. Repeat for each Data Object you need to change. 4.
Setting Up Performance Management Data Collection FIGURE 8-4 Data Collection for Adding a Statistic The following table lists the properties and descriptions. TABLE 8-4 Properties for Adding a Statistic Property Description Name Any meaningful string for the Data Identifier. Required. SnmpVersion One of the three SNMP versions - VI, V2 or V3. Required. Read Community Enter the string with which the devices are identified in a network.
Setting Up Performance Management TABLE 8-4 Data Collection Properties for Adding a Statistic (Continued) Property Description Active If you uncheck the check box, the data collection will be stopped for this OID. (The statistic row once created will be blue.) To activate data collection, check the box. Default value: True (checked). Period The time interval for periodic data collection. For example, if set to 2, for all the Data identifiers, data will be collected once in every 2 seconds.
Setting Up Performance Management TABLE 8-4 Threshold Notification Properties for Adding a Statistic (Continued) Property Description Log Directly Checking means to store the collected data in flat files rather than storing them in database. Default value: false (unchecked). Log File The log file name with a full path (the location on the hard disk as where the log file has to be stored). parentObj Name of the Managed Object which acts as the parent for this Data Identifier.
Setting Up Performance Management Threshold Notification • Value • Type • Max - When collected data exceeds a value, report an error • Min - When collected data drops below a value, report an error • Equal - When collected data equals a value, report an error • What message should be generated when the threshold is exceeded. • At what value should this threshold get reset. Thresholds are defined and associated with statistics.
Setting Up Performance Management Threshold Notification Thresholds can be associated with Data identifiers for which data collected is of type string. An example is SysDescr. To monitor a change in system description use String Thresholds. • Percentage Values Assume you want to set the number of pages to be loaded in a printer to depend on the Toner level. Moreover, when the toner level is 80% of the number of pages to be printed, you wish to be notified.
Setting Up Performance Management Threshold Notification FIGURE 8-6 Threshold Properties (type long) The following table lists the properties for the threshold form. TABLE 8-5 Properties for Thresholds Property Description Name Any action in a network can be captured and an appropriate name can be given to the event generated on such actions. For example, when ManagedObjects are added into the database an event can be generated. This event may be named as AddMOevent.
Setting Up Performance Management TABLE 8-5 Threshold Notification Properties for Thresholds (Continued) Property Description Threshold Type Type of Threshold value you are going to specify. Possible values are Max, Min or Equal: Max - If Collected value exceeds Threshold value, an event will be generated. Min - If Collected value is less than Threshold value, an event will be generated. Equal - If Collected value is equal to Threshold value, an event will be generated.
Setting Up Performance Management AlliedView NMS Administration Guide Threshold Notification 909
9. Setting Up Fault Management 9.1 Overview Network Events are entities that represent the various happenings in the network devices. Events can convey general information or the current status of the devices in a network. There are many powerful tools that allow an Administrator to control how managed objects (specific aspects of a device) report changes in their state.
Setting Up Fault Management Overview FIGURE 9-1 AlliedView NMS Administration Guide Fault Management Configuration for the AlliedView NMS 911
Setting Up Fault Management Event View 9.1.2 Task Overview The following table lists the tasks that can be done at the Application interface. If you are using NMS, use the Screen Name as well to locate the relevant section. For all menu options, refer to the AlliedView NMS User Guide Appendix. TABLE 9-1 Task List for Fault Management Task Form/Screen Name (if Applicable) Section Review Events Screen Network Events (9.2) Configure Trap Parsers Telesis Trap Parser Configuration (9.
Setting Up Fault Management Note: Configuring Trap Parsers Trap parsers are critical to alarm correlation and should only be changed under the supervision of Allied Telesis Technical Support personnel. To configure the Trap parser, select Edit -> Configure -> Trap Parsers from the main menu of the Network Events Panel. The Trap Parser Configuration form is shown in the following figure.
Setting Up Fault Management Configuring Trap Parsers Select a Trap Parser from the list to see how the fields are configured for that Trap parser. The following table describes these fields at a general level, as well as the option buttons. Many of the fields will have a variable name, discussed after this table. TABLE 9-2 Trap Parser Configuration Form Option Description Trap Port Port that receives the trap. You must provide at least one, or the traps will not be received.
Setting Up Fault Management TABLE 9-2 Configuring Trap Parsers Trap Parser Configuration Form Option Description Add Trap Parser Create a new trap parser with all fields editable. The Update button adds it to the Trap Parser list. If all of the fields are the same as an existing Trap Parser, an error message appears. If the name you choose already exists in a file (config directory) or the MIB (mibs directory), an error message appears. Modify Trap Parser Change an already existing trap parser.
Setting Up Fault Management Configuring Trap Parsers 9.3.1 Using Trap Values in the PDU To help define the values for the event output, tokens are available in the incoming trap PDU. These can be used when defining the output values for the trap parser. These are listed in the following table.
Setting Up Fault Management TABLE 9-3 Configuring Trap Parsers Tokens to Access the Properties of the Trap PDU (Continued) Token Description $N Here N is a non-negative integer. This token will be replaced by the (N+1)th SNMPvariable value in the variable bindings of the received trap. The Index N starts from 0. For example, for the following varbinds, 2.2.1.1.221 INTEGER 30 .1.3.6.1.2.1.1.1 STRING abc 2.2.1.1.
Setting Up Fault Management TABLE 9-3 Configuring Event Parsers Tokens to Access the Properties of the Trap PDU (Continued) Token Description $IFSourceMO This tag is similar to $SourceMO, except that the properties of the interface managed object corresponding to the source address of the received trap could be accessed using this tag.
Setting Up Fault Management Configuring Event Parsers NMS Home>/conf directory will be loaded automatically when the server is restarted and then displayed in the Configured Event Parsers List. Note: Event parsers are important to alarm correlation and should only be changed under the supervision of Allied Telesis Technical Support personnel. If you delete any of those you made degrade or destroy existing NMS functionality.
Setting Up Fault Management Configuring Event Parsers 9.4.2 Setting Event Parsers Select an Event Parser from the list to see how the fields are configured for that Event parser. The following table describes these fields at a general level, as well as the option buttons. Many of the fields will have a variable name, discussed after this table. TABLE 9-4 Event Parser Configuration Form Option Description Name Name of the event. The name should match the type of event.
Setting Up Fault Management TABLE 9-4 Configuring Event Parsers Event Parser Configuration Form (Continued) Option Description Output String The output of the event parser is an Event object, which will be the modified instance of the incoming event. The attributes of the Event object are defined by what are specified in the event parser, so it is necessary to select correct values for important attributes such as failure object (affected Entity), severity, and message text.
Setting Up Fault Management TABLE 9-4 Configuring Event Parsers Event Parser Configuration Form (Continued) Option Description Save to File To reuse the configured event parsers and to save the event parser configuration as a backup. These files can later be loaded in to the same or another event manager. This will enable sharing of the event parser data by other users. When this option is chosen, a dialog window will be brought which will prompt you to enter a filename (the default being event.
Setting Up Fault Management Configuring Event Parsers For Event Custom Views, refer to the NMS User Guide, Section 9. For Alarm Custom Views, refer to the NMS User Guide, Section 9. Note that for custom alarm views only one user property, sysLocation, is available. This is explained in the User Guide. 9.4.4 Setting up a SYSLOG Event to Create an Alarm By using the Event Parser Configurator, the user can parse a SYSLOG event so that an alarm is produced.
Setting Up Fault Management Configuring Event Parsers 9.4.5 Changing Severity of Default Events (i.e. Status Update Failure) The default Event Parser Configuration Form allows the user to view and modify the events that are generated by the devices. As explained in 9.4.1, these events have attributes (especially the alarm level) that should not be changed unless with consultation with Allied Telesis personnel.
Setting Up Fault Management Configuring Event Parsers FIGURE 9-8 5. Viewing Object Details Copy the message text (using ctl-c) so the text can be used in the new event parser to identify events of this type. 9.4.5.3 Bring up the Event Parser Configuration Dialog From the event browser, select Edit -> Configure ->Event Parsers. The Event Parser Configuration Form will appear, as was shown in Figure 9-4. 9.4.5.4 Configure the Event Parser 1. Click on Add Event Parser. The fields are now editable. 2.
Setting Up Fault Management Configuring Event Parsers FIGURE 9-9 Note: Creating an Event Parser and Changing the Severity The Match Strings are used to identify which events you want to change. The Output Strings say how to change those events. In this case we're changing all those that match the existing message text exactly. 9.4.5.5 Limit to a Specific Device Type If you want to you can restrict this modification to one device type. In this example it will be the AT-AR745. 1.
Setting Up Fault Management Configuring Event Parsers 3. Click on the tic box, and then OK to add the type criteria. 4. The Event Parser Configuration Form is now the only form that is on the screen. Click on Update, Apply, and Close. Now only AT-AR745's when disconnected will go critical and all the others will still be major. 9.4.5.6 Ensure the Event Parser is created 1. Select Edit -> Configure ->Event Parsers again. 2.
Setting Up Fault Management Note: Configuring Event Parsers As mentioned in 9.4.1, there are a number of pre configured event parsers already defined by AlliedView NMS. If you delete any of those you may degrade or destroy existing NMS functionality. 9.4.6 Changing Severity of Port-based Alarms Two attributes for the Event object are PortProfile and Customer ID.
Setting Up Fault Management Configuring Event Filters FIGURE 9-13 Configuring Event Parser with portProfile Property 9.5 Configuring Event Filters 9.5.1 Overview Event Filters provides a way to setting a matching criteria to filter events and then configuring an action (such as an email) for these events. Select Edit -> Configure -> Event Filters from the main menu of the Network Events Panel. The Event Filter Configuration form appears, as shown in the following figure.
Setting Up Fault Management Configuring Event Filters FIGURE 9-14 AlliedView NMS Administration Guide Event Filter Configuration Form 930
Setting Up Fault Management Configuring Event Filters 9.5.2 Setting Event Filters The user can add, modify, or delete an Event Filter from the left side of the form. Refer to the following table for all options. TABLE 9-5 Event Filter Configuration Form Option Description / Fields Filter Name Name of the filter. This field matches the filter chosen in the Configured Filter List.
Setting Up Fault Management TABLE 9-5 Configuring Event Filters Event Filter Configuration Form Option Description / Fields Setting Match Criteria Determines whether the incoming event should be filtered or not. If a field is left blank, it is automatically matched. The condition for the event filter to be applied is that all the match criteria specified should be satisfied. If one criteria fails, the filter will not be applied.
Setting Up Fault Management TABLE 9-5 Configuring Event Filters Event Filter Configuration Form Option Description / Fields Delete Filter Icon Allows a Filter Name to be deleted. Update Filter Updates the Event Filter so it is ready to be applied to the NMS server. Cancel File Cancels any changes made. Apply Makes changes to the server. Help Brings up this section of the User Guide. 9.5.3 Setting Event Filter Actions At least one action needs to be associated with the incoming filtered event.
Setting Up Fault Management TABLE 9-6 Configuring Event Filters Action Types and Associated Fields for Event Filter Actions (Continued) Action Type Filter Action Detail Description Run Command Action Run Command Action Name Name of this action required for identification. Run Command This is used to specify the actual command to be executed in the NMS server machine. The command specified here should not require a shell to run unless the shell program is specified in the command.
Setting Up Fault Management TABLE 9-6 Configuring Event Filters Action Types and Associated Fields for Event Filter Actions (Continued) Action Type Filter Action Detail Description Send E-Mail Action Send E-Mail Action Name A name to identify this action. SMTP Server A valid mail server address. Custom Filter Recipient’s Address The Address to where the email is to be sent. Sender’s Address The address from where the email is being sent. Subject Subject of the email.
Setting Up Fault Management Configuring System Logs (NMS System Log Server) If any changes are made and the window is closed without clicking Apply, a prompt will appear asking whether to make the changes. 9.5.5 Setting Up Event Filters for SYSLOG Events Section 9.6 describes how to configure system logs. To configure the event filter for system logs, you set the Category field (shown in Figure 9-16) with the string “SYSLOG-” and the Event Type.
Setting Up Fault Management Configuring System Logs (NMS System Log Server) 9.6.1 Configuring the System Log Server The AlliedView NMS System Log Server is automatically configured to Enabled during installation. You can view the current configuration and modify it to better meet your requirements, if necessary. To view the current configuration, select Tools > System Log Configuration for the Panel-Specific Menu. The System Log Server Configuration form, shown in the following figure, will appear.
Setting Up Fault Management Configuring System Logs (NMS System Log Server) • Log to Database - Enables or disables storing of logs in the NMS database. • Log to Local File - Enables or disables storing of the logs to a local file, /logs/syslog.
Setting Up Fault Management Configuring System Logs (NMS System Log Server) FIGURE 9-16 Modify Log Properties Form - File To add a filter, select the desired filter in the Available Filters list, and then click Add>>. To remove a filter, select the filter you want to remove in the Apply Filters list, and then click <
Setting Up Fault Management Alarm View Display FIGURE 9-17 Log Management Viewer 3. To sort the logs, click the header on which you want to sort (e.g. Device SeqID, Device Date, etc.) until the desired sort is performed (up arrow for descending or down arrow for ascending). 4. Click Close to close the window. 9.6.5 Disabling and Re-enabling Logs from a Device You can disable logs from a device as follows: 1.
Setting Up Fault Management Alarm View Display FIGURE 9-18 Alarm View Main Panel Refer to the NMS User Guide for general information on navigating in the view and using the search tool.
Setting Up Fault Management Alarm Propagation 9.8 Alarm Propagation 9.8.1 Overview In a network, components (managed objects) are in a hierarchy, and faults at one level usually affect the status of another level. Network administrators need to understand how the AlliedView NMS reports and propagates alarms so that they can control what alarms appear in the Alarm View and quickly locate and resolve them.
Setting Up Fault Management Alarm Propagation 9.8.2.1 Example 1 - Parent Object set to Max for Polling-Based Alarms (default) • The administrator sets the Tester attribute for interfaces (IF) in the MO Property Form to PING or SNMPPING, so if an interface fails, a major alarm is reported by the interface. • For the parent node, the administrator sets the Tester attribute to Max.
Setting Up Fault Management Configuring Alarm Filters 9.9 Configuring Alarm Filters 9.9.1 Overview Alert filters are used to filter and modify the properties of an incoming alert. When the alert matches specified criteria, an action (such as sending an email) will occur. To parse alarms, select Edit -> Configure -> Alarm Filters from the main menu of the Alarms Panel. The Alert Filter Configuration form appears as shown in Figure 9-20.
Setting Up Fault Management Configuring Alarm Filters 9.9.2 Example to Configure Alarm Filter and Actions 9.9.2.1 Summary Procedure Adding an alarm filter and an action is done as follows. Note: An alarm filter must have at least one action. 1. Click 2. Modify the alert filter name as needed and the match (Source and Severity) criteria fields. If needed, expressions can be used: wildcard (*), negation (!), and separators (,). Use the More option if needed. in the Alert Filter panel. 3. Click 4.
Setting Up Fault Management Configuring Alarm Filters FIGURE 9-21 2. Accessing the Alert Filters Window Create the filter and set up the basic criteria for filtering. The steps would be: 1. Select the button on the bottom left 2. Rename the filter to something that will indicate its use. 3. Add a match criteria. Here the source is the incoming address and it can be wild-carded by using the “*”. 4. Refer to the following figure, which displays these three steps.
Setting Up Fault Management Configuring Alarm Filters 3. To create a criteria beyond the Source and Severity, select Advanced. The Match Criteria Properites sceen appears. 4. In this example we will setup a filter to eliminate an alarm that comes in with the message “Unable to login to this device….”. Enter this using a wildcard in the Message field as shown in Figure 9-23, then select OK. 5. Back on the Alert Filters screen, we need to associate it with some action to take.
Setting Up Fault Management Configuring Alarm Filters FIGURE 9-24 6. Add Action Window (Notifications when Criteria Met) Since we want to suppress the “Unable to Login..” alarm so that we no longer see it in the alarm list, select the Suppress Action type and New.button, as shown in Figure 9-24. The Suppress Action window appears, as shown in the Figure 925. FIGURE 9-25 7. Enter Notification Name Add the Notification Name (in this case Suppress_Alarm), and Click OK, as also shown in Figure 9-25.
Setting Up Fault Management 8. Configuring Alarm Filters Back on the Add Action screen, select the Noticfication Type you created (here Suppress_Alarm) and Select Add, as shown in Figure 9-26. FIGURE 9-26 9. Adding an Action to the Alert Filter This returns you to the Alert Filters window, and Suppress_Alarm is added to the Actions List. Refer to Figure 9-27.
Setting Up Fault Management 10. Configuring Alarm Filters With the attributes for the Alert Filter complete, click on Apply. The new filter name (Filter_iMG_LoginFailure) is now added to the list of Alert Filters, and this filter will be applied when processing alarms. Refer to the following figure. FIGURE 9-28 Alert Filter added to List 11. With the Alert Filter added, Click on Load/Save. This brings up the Filter Details window that allows you to save the filters to the alert.filters file.
Setting Up Fault Management Retrieval of Alarms during (Re)Discovery (Telesis MAP Devices Only) 9.10 Retrieval of Alarms during (Re)Discovery (Telesis MAP Devices Only) 9.10.1 Overview Prior to release 6.0, the (re)discovery process included establishing communication and transferring configuration information, but did not include alarm processing. In release 6.0, a feature, Alarm Retrieval During (Re)Discovery, allows the administrator to have alarm retrieval included during (re)discovery.
Setting Up Fault Management Retrieval of Alarms during (Re)Discovery (Telesis MAP Devices Only) FIGURE 9-29 Retrieve Alarms Form The following options are available on the retrieve alarms dialog: • Enable retrieve alarms: When selected it will enable this feature and current alarms on MAP devices will be displayed during discovery. • Display retrieved Info alarms: When selected it will enable displaying retrieved alarms that have 'Info' severity.
10. Using the HTML Interface 10.1 Overview The administrative tasks that can be done from the html interface are: • Manage/Unmanage • Start/Stop Discovery • Delete Object(s) The html interface and how these tasks are accessed are explained in detail in the AlliedView NMS User Guide. Note: To quit the html interface, use the Logout option. Closing the browser will require 30 minutes for the client session to time out. Refer to the AlliedView NMS User Guide for details.
11. Built-in Browsers - SNMP MIB and CWMP 11.1 Overview - SNMP MIB Management Information Bases (MIBs) are a collection of definitions that define the properties of the managed objects. To enable a management application to operate intelligently on the data available on the managed device, the manager needs to know the names and types of managed objects in the device. This is made available by the MIB modules. A MIB describes a set of managed objects.
Built-in Browsers - SNMP MIB and CWMP MIB Browser Screen and Toolbar 11.2 MIB Browser Screen and Toolbar The information contained in the MIBs can be retrieved and viewed by accessing the MIB Browser from the Tools menu. The Mib Browser panel is shown in the following figure. FIGURE 11-1 MIB Manager View The operations allowed with the Mib Browser are available through the series of icons in the Toolbar at the top of the Mib Browser’s main window.
Built-in Browsers - SNMP MIB and CWMP Loading and Unloading MIBs 11.3 Loading and Unloading MIBs 11.3.1 Overview To load the MIB files in the Mib Browser, use the LOAD MIBs button or select File -> Load MIB menu item. This brings up the Load a Mib File Screen as shown in the following figure. Note: The MIB Browser for NMS is strict on syntax, and if there is an error, such as an extra comma in the object type list, the MIB will not load.
Built-in Browsers - SNMP MIB and CWMP Loading and Unloading MIBs 11.3.2 Loading Options (Directly, as Compiled Files, Using MySQL) The Mib Browser has the following Mib Settings for loading the MIBs, as shown in the following figure. FIGURE 11-3 Options for Loading MIBs • Loading MIBs directly. • Loading MIBs as compiled files. • Loading MIBs from database. You can also load MIBs directly in plain text format, although for large MIBs the loading time will be higher.
Built-in Browsers - SNMP MIB and CWMP Loading and Unloading MIBs The compiled MIB files reduce the loading time, leading to performance improvement. The applications and the applets have the option of loading the MIB files directly or as compiled MIB files. The Load MIBs from compiled File option is provided in the dialog box to decide whether to load MIB from compiled MIBs or not. By default, this option is enabled. If this is unchecked, the user can directly load the MIB file as provided.
Built-in Browsers - SNMP MIB and CWMP MIB Browser Settings 11.3.6 Unloading MIBs To unload the loaded MIB, select the node of the MIB Tree then click the UNLOAD MIB icon or select the File -> UnLoad MIB menu item. This removes the MIB Tree of the unloaded MIB 11.4 MIB Browser Settings The Mib Browser can be used for MIB browsing and to view and operate on available data through an SNMP agent. The Mib Browser allows configuration of various options needed for SNMP operations.
Built-in Browsers - SNMP MIB and CWMP MIB Browser – Table Operations Multi-var checkbox before doing a SNMP operation for multiple varbind SNMP request. Otherwise, it will do a request for the OID in the Object Identifier field. To do multiple-variable SNMP SET, ensure that the proper OIDs and values are given in the text fields before adding them to the list. Check the Multi-Var check box before doing the multiple variable SET.
Built-in Browsers - SNMP MIB and CWMP TABLE 11-3 MIB Browser – Table Operations SNMP Properties (Continued) Option Functions for SNMP Properties Settings Pops up another dialog box in which the following options can be set. Polling Interval - sets the polling interval for the retrieval of the tables. By default, it is 5 seconds. Page Size (Rows) - sets the number of rows to be retrieved. No of Column View - sets the number of columns to be displayed in the SNMP Table - Panel. Default is 5 columns.
Built-in Browsers - SNMP MIB and CWMP Trap Viewer 5. Right-click the table header, and then select the add a new row to the table option. This displays a window for entering the values of the table. 6. Set the value for the column with RowStatus syntax to 4 for creating a new row, and then enter the values. Note: 7. If the RowStatus is not present in the table definition, then you can only modify the existing row by double-clicking the corresponding cell in the table.
Built-in Browsers - SNMP MIB and CWMP Trap Parser The trap table has the following properties: • • • • Class - Defines the Severity of the Trap. Source - Displays the IP address of the source from where the trap was send. Date - Displays the date of receiving the trap. Message - By default, contains the VarBind list of the Trap, if any, else it is blank. To view more details of the received trap, right-click a table entry and choose View Trap Details.
Built-in Browsers - SNMP MIB and CWMP Trap Parser FIGURE 11-6 Trap Parser Editor Each incoming trap must have the Match Criteria to show the traps in the Trap Table. You may enter any number of parser match criteria into a single parser file with a different parser name. The Trap Viewer looks for a match criterion sequentially. Thus, if a match is found for a received trap, the trap is shown on the Trap Table.
Built-in Browsers - SNMP MIB and CWMP Trap Parser • Enterprise OID - The enterprise field is the SNMP enterprise identifier in the trap, which is used to uniquely identify traps for a particular application. The parser is applied only when the trap enterprise field starts with the enterprise field you specify. The only exception is that when the enterprise field is left blank, the trap is allowed to be parsed. • OID and Value - This extends the match criteria.
Built-in Browsers - SNMP MIB and CWMP 8. Trap Parser Close the Trap Parser Editor. A parser file is now created. 11.8.3 Adding a Trap Definition from MIBs to a Parser File: 1. Choose the MIB file (standard or any other) in the MIB File text field. 2. The setting of the MIB is automatically shown on the MatchCriteria and Output Event parameters sections. If any modification is made after saving to a file, you must click Mod below the Trap list box, and then choose the same file from the Save option.
Built-in Browsers - SNMP MIB and CWMP • • • • Graphs Oid - .1.3.6.1.2.1.1.1.0 Value - xyz Agent - 192.168.1.1 Port - 4001 The TrapParser gets trap from any trap originator and parses the trap event. 11.9 Graphs The Mib Browser enables a real-time plotting of SNMP data on a graph. Currently, two types of graph are supported: line graph and bar graph. The SNMP data to be polled should be of integer or unsigned integer data type.
Built-in Browsers - SNMP MIB and CWMP CWMP 11.10 CWMP The CPE WAN Management Protocol (CWMP) is a messaging protocol designed for communication between the CPEdevices and the management system. Specifications for this protocol are written by The Broadband Forum (formally DSL Forum) in technical reports. The TR-069 specification defines the messaging format based on XML for communicating using CWMP.
12. Northbound Interface 12.1 Overview A northbound interface on an NMS/EMS allows other software applications (higher level network management systems) to communicate with (or manage) the lower level NMS without the user acting on the lower level NMS directly.
Northbound Interface TABLE 12-1 SOAP Implementation Northbound Interface APIs for Release 10.0 Capability Detail Autonomous events configuration for clients allow clients to receive network events from the NMS immediately without the need for the client to poll the NMS every time.
Northbound Interface SOAP Implementation Note: Axis 1 (1.4) does not support callback operations and is considered slower compared to other technologies such as CORBA because it uses HTTP as the protocol and text (XML) data. Axis 2 (currently in beta version) is expected to be an improvement of its predecessor. Note: With a standard northbound interface, the higher level NMS would not have to implement different clients to communicate with NMS/EMS from different vendors.
Northbound Interface User Interaction FIGURE 12-1 Client / Server Model for AlliedView NMS 12.3 User Interaction 12.3.1 Web Services Activation Web services in NMS will not be activated by default and can be activated at runtime when needed by the NMS administrator. When not in use the administrator can also deactivate web services provided by NMS. The script AT_WebService.bat/sh can be used to enable and disable the APIs when executed as below.
Northbound Interface User Interaction 12.3.1.2 Review the Associated WSDL and Available Services Use http://:9090/axis/services to see the WSDL and the services available. Note that a relevant file is available only after activating the web services. 12.3.1.3 Deactivate Web Services (Axis/SOAP) This operation must be done after the server is started. 1. Change directories to /bin 2. Execute AT_WebService.bat/sh with 'undeploy' parameter • AT_WebService.
Northbound Interface User Interaction 12.3.4.1 Client Implementation There are several ways to implement a client program and several tools are also available to simplify web services development. Here are some examples: • Use the WSDL provided with client code generator tools (e.g. wsdl2java, wsdl2cpp, etc.) to generate client stub source code for the client to use when calling remote objects.
Northbound Interface User Interaction .
Northbound Interface TABLE 12-2 User Interaction Operations Table Module / Operation Parameters Types Return Types Notes Faults/ getEventFilters None HashMap of event filters with each filter containing a HashMap that has criteria and actions. Criteria contain strings and an action contains a HashMap with different actions. Returns a HashMap of event filters. This Map contains other HashMaps for criteria and actions and also actions contain other HashMaps for each action.
Northbound Interface TABLE 12-2 User Interaction Operations Table Module / Operation Parameters Types Return Types Notes Mdti/ getDeviceInfo Device IP address (a in NMS database) HashMap or device general information properties Returns device general information from the device. This retrieves results from the device (not database).
Northbound Interface TABLE 12-3 User Interaction Provision Parameters Keys Values Description DEVICE IP address of the iMAP device SLOT_PORT Slot and port number of the selected port (X.
Northbound Interface TABLE 12-3 User Interaction Provision Parameters Keys Values Description RG_PORT_SPEED_X (AUTO/COAX/ FULL_100M/HALF_100M/ FULL_10M/HALF_10M) RG Ethernet port speed (X is port number) RG_PORT_UP_RATE_X RG Ethernet port upstream rate in kbps (X is port number) RG_PORT_DOWN_RATE_X RG Ethernet port downstream rate in kbps (X is port number) AlliedView NMS Administration Guide 979
13. Appendices 13.1 Exporting Tabular Data Data displayed in tabular form in the AlliedView NMS can be exported to a file on the NMS server or to your Web browser for viewing. Tabular data appears in the following views: • Fault Management • Performance • Network Inventory The procedure for exporting tabular data is the same for all of these views. Note: The one exception is the Performance view; this is explained separately, in 13.1.1.2.
Appendices Exporting Tabular Data FIGURE 13-2 Export Alarms Data Form - No Criteria Set The Export Alarms Data from consists of a destination panel and a database match criteria panel. In the destination panel, you can select the destination for the exported data as either a file on the NMS server or your Web browser. In the Database Match Criteria panel, you can specify the match criteria, a qualifier, and a match string. The criteria correspond to fields in the data table, such as Status, Owner.
Appendices Note: 3. Exporting Tabular Data Click Fewer to remove the last qualifier that you added. Click OK to export the data. A confirmation dialog box will appear indicating that the data export was successful. Click OK in the confirmation dialog box. The following figure shows an example of how to export all major alarms on device to file alarms_major using the percent sign (%) as the data separator. The resulting data file is described in 13.1.3. FIGURE 13-3 Export Major Alarms Data Example 13.
Appendices Exporting Tabular Data FIGURE 13-4 Viewing Instances in a Device for a Statistic When exporting the statistical data in a table, the user can isolate this instance as part of the match criteria. The following figure shows setting up the instance criteria for the statistic and the results (in a web browser). Note that the time between each polled value is 15 seconds.
Appendices Exporting Tabular Data FIGURE 13-5 FIGURE 13-6 Setting the Criteria for Performance (Instance) Results of Performance Statistic by Instance (15-second Intervals) 13.1.2 Exporting Selected Items To export manually selected items from a data table, select the items you wish to export (use SHIFT+left-click to select multiple items), and then select Edit -> Export Selected Rows from the Panel-Specific Menu Bar. The Export Events Data form, shown in the following figure, will appear.
Appendices Exporting Tabular Data FIGURE 13-7 Export PhysicalLinks Data Form - Exporting Selected Data The Database Match Criteria panel does not appear on this form since the items were manually selected. On this form, select a target for the exported data as described in the previous paragraphs. The resulting data file is described in the following section. 13.1.3 Viewing a Data Export File If you export table data to a file, you can access the file using your Web browser as follows: 1.
Appendices Exporting Tabular Data FIGURE 13-8 Exported Data File Example- File 13.1.4 Viewing Data on a Web Browser If you exported the data to your Web browser, the data will be displayed in a new browser window. An example is shown in the following figure. You can use the menus in your Web browser to view, print, or save the information.
Appendices dhcpd Files FIGURE 13-9 Tabular Data Displayed in a Web Browser 13.2 dhcpd Files Following is a complete example of a dhcpd file, with comments highlighted. There are five files, since DHCP-related configurations for each Access Island are placed in separate configuration files. 13.2.1 dhcpd.conf # dhcpd.
Appendices dhcpd Files authoritative; ddns-update-style interim; #option domain-name-servers 166.163.129.19,166.163.128.15,166.163.128.5; default-lease-time 86400; max-lease-time 86400; # To identify the network that this machine is physically on. #subnet 10.52.110.32 netmask 255.255.255.240 { subnet 10.52.201.0 netmask 255.255.255.0 { } if exists agent.
Appendices dhcpd Files on release { if ((substring(option vendor-class-identifier,0,8)="iMG646PX") or (substring(option vendor-class-identifier,0,9)="iMG646MOD")) { log (info, concat( " RELEASE> ",binary-to-ascii(10, 8, ".", leased-address), " MAC: ",binary-to-ascii(16,8,":",hardware), " released on iMAP: ",(option agent.remote-id), " INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 2)), " VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.
Appendices dhcpd Files class "SPSI-AI00-RG613TXMgmt" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.circuit-id,2,2)="\x01\x2c") and (option vendor-class-identifier = "RG613TX")); option vendor-class-identifier "RG613TX"; } class "SPSI-AI00-RG624AMgmt" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.
Appendices dhcpd Files class "SPSI-AI00-iMG624AMgmt" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.circuit-id,2,2)="\x01\x2c") and (option vendor-class-identifier = "iMG624A")); option vendor-class-identifier "iMG624A"; } class "SPSI-AI00-iMG624A-R2Mgmt" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.
Appendices dhcpd Files } class "SPSI-AI00-iMG646PX-ONMgmt" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.circuit-id,3,2)="\x01\x2c") and (option vendor-class-identifier = "iMG646PX-ON")); option vendor-class-identifier "iMG646PX-ON"; } class "SPSI-AI00-iMG726BD-ONMgmt" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.
Appendices dhcpd Files option vendor-class-identifier "iMG2524"; } class "SPSI-AI00-ComtrendMgmt" { match if (substring (option agent.remote-id,0,9) ="SPSI-AI00") and (substring (option agent.circuit-id,2,2) ="\x01\x2c") and (substring (option vendor-class-identifier,0,5) ="uDHCP") ; # option bootfile-name "10.52.201.4"; } ### RG Boot vlan 200 ### class "SPSI-AI00-RG613TXBoot" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.
Appendices dhcpd Files option vendor-class-identifier "iMG606BD-R2"; } class "SPSI-AI00-iMG613RFBoot" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.circuit-id,2,2)="\x00\xc8") and (option vendor-class-identifier = "iMG613RF")); filename "FIBER/AI00/IMG600"; option tftp-server-name "10.52.201.4"; option vendor-class-identifier "iMG613RF"; } class "SPSI-AI00-iMG616BDBoot" { match if ((substring(option agent.
Appendices dhcpd Files match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.circuit-id,2,2)="\x00\xc8") and (option vendor-class-identifier = "iMG634A")); filename "ADSL/AI00/IMG634A"; option tftp-server-name "10.52.201.4"; option vendor-class-identifier "iMG634A"; } class "SPSI-AI00-iMG634A-R2Boot" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.
Appendices dhcpd Files filename "FIBER/AI00/IMG646MOD"; option tftp-server-name "10.52.201.4"; option vendor-class-identifier "iMG646MOD"; } class "SPSI-AI00-iMG646PX-ONBoot" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.circuit-id,3,2)="\x00\xc8") and (option vendor-class-identifier = "iMG646PX-ON")); filename "FIBER/AI00/IMG6XX"; option tftp-server-name "10.52.201.
Appendices dhcpd Files option vendor-class-identifier "iMG1505"; } class "SPSI-AI00-iMG1525Boot" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.circuit-id,2,2)="\x00\xc8") and (option vendor-class-identifier = "iMG1525")); filename "FIBER/AI00/IMG1525"; option tftp-server-name "10.52.201.4"; option vendor-class-identifier "iMG1525"; } class "SPSI-AI00-iMG2504Boot" { match if ((substring(option agent.remote-id,0,9)="SPSI-AI00") and (substring(option agent.
Appendices dhcpd Files (substring (option agent.remote-id,0,9)="SPSI-AI00") and (substring (option agent.circuit-id,2,2)="\x01\x90") and (substring(option vendor-class-identifier,0,8)="iMG616BD") ) or ( (substring (option agent.remote-id,0,9)="SPSI-AI00") and (substring (option agent.circuit-id,2,2)="\x01\x90") and (substring(option vendor-class-identifier,0,11)="iMG616BD-R2") ) or ( (substring (option agent.remote-id,0,9)="SPSI-AI00") and (substring (option agent.
Appendices dhcpd Files ) or ( (substring (option agent.remote-id,0,9)="SPSI-AI00") and (substring (option agent.circuit-id,2,2)="\x01\x90") and (substring(option vendor-class-identifier,0,11)="iMG726BD-ON") ) or ( (substring (option agent.remote-id,0,9)="SPSI-AI00") and ((substring (option agent.circuit-id,2,2)="\x01\x90") or (substring (option agent.circuit-id,3,2)="\x01\x90")) and (substring(option vendor-class-identifier,0,9)="iMG726MOD") ) or ( (substring (option agent.
Appendices dhcpd Files (substring(option vendor-class-identifier,0,11)="iMG606BD-R2") or (substring(option vendor-class-identifier,0,11)="iMG616BD-R2") or (substring(option vendor-class-identifier,0,11)="iMG726BD-ON") or (substring(option vendor-class-identifier,0,7)="iMG1505") or (substring(option vendor-class-identifier,0,7)="iMG1525") or (substring(option vendor-class-identifier,0,7)="iMG2504") or (substring(option vendor-class-identifier,0,7)="iMG2524") ) ) or ( (substring (option agent.
Appendices dhcpd Files 13.2.2.2 spsi-ai00-awplus-class # spsi-ai00-awplus-class for Service Provider Solutions Interop (SPSI) lab Access Island 0, # AlliedWare Plus access ports for provisioning 3play iMGs # Jul-7-10 JWS: copied from spsi-ai00-class, modified for AW+ # Jul-23-10 JWS: changed for aw+ dhcp snooping # Apr-3-12 JWS: added img1505 ###################################################################### # AGENT REMOTE ID: # None, since not supported by AW+ 5.3.3-0.
Appendices dhcpd Files 13.2.2.3 spsi-ai00-subnet # spsi-ai00-subnet for Service Provider Solutions Interop (SPSI) lab Access Island 0 # Jul-15-08 JWS: modified for migration of nms server ip from 10.52.110.4 to 10.52.201.4 # Aug-11-08 JWS: modified for migration of dns domain from stelar.net to spsi.lab.telesyn.
Appendices dhcpd Files primary 10.52.201.36; key rndckey; } pool { authoritative; range 10.52.111.132 10.52.111.190; # default-lease-time 86400; default-lease-time 300; # max-lease-time 86400; max-lease-time 300; option routers 10.52.111.129; option subnet-mask 255.255.255.192; option broadcast-address 10.52.111.191; option domain-name "rgvoip.spsi.lab.telesyn.corp"; option domain-name-servers 10.52.201.
Appendices dhcpd Files allow members of "SPSI-AI00-iMG726MODBoot"; allow members of "SPSI-AI00-iMG746MODBoot"; allow members of "SPSI-AI00-iMG1505Boot"; allow members of "SPSI-AI00-iMG1525Boot"; allow members of "SPSI-AI00-iMG2504Boot"; allow members of "SPSI-AI00-iMG2524Boot"; allow members of "SPSI-AI00-iMG634WABoot"; allow members of "SPSI-AI00-iMG624ABoot"; allow members of "SPSI-AI00-iMG624A-R2Boot"; allow members of "SPSI-AI00-iMG634ABoot"; allow members of "SPSI-AI00-iMG634A-R2Boot"; allow members
Appendices dhcpd Files allow members of "SPSI-AI00-iMG1525Mgmt"; allow members of "SPSI-AI00-iMG2504Mgmt"; allow members of "SPSI-AI00-iMG2524Mgmt"; allow members of "SPSI-AI00-iMG624AMgmt"; allow members of "SPSI-AI00-iMG624A-R2Mgmt"; allow members of "SPSI-AI00-iMG634AMgmt"; allow members of "SPSI-AI00-iMG634A-R2Mgmt"; allow members of "SPSI-AI00-iMG634WAMgmt"; allow members of "SPSI-AI00-RG634AMgmt"; allow members of "SPSI-AI00-RG624AMgmt"; allow members of "SPSI-AI00-RG613TXMgmt"; allow members of "SP
Appendices dhcpd Files } } 13.2.2.4 spsi-ai00-awplus-subnet # spsi-ai00-awplus-subnet for Service Provider Solutions Interop (SPSI) lab Access Island 0, # AlliedWare Plus access ports for provisioning 3play iMGs # Jul-7-08 JWS: copied from spsi-ai00-subnet, modified for AW+ # Apr-3-12 JWS: added img1505 ###################################################################### # AGENT REMOTE ID: # None, since not supported by AW+ 5.3.3-0.
Appendices dhcpd Files # STB Video vlan subnet } subnet 10.52.110.224 netmask 255.255.255.240 { pool { authoritative; range 10.52.110.226 10.52.110.238; default-lease-time 86400; max-lease-time 86400; option routers 10.52.110.225; option subnet-mask 255.255.255.240; option broadcast-address 10.52.110.239; allow members of "aminet"; allow members of "thomson"; } } 13.2.3 DNS Configuration File options { allow-transfer { 10.3.0.5; }; directory "/etc/named.d/"; /* 10.3.0.
Appendices dhcpd Files file "ddns/10.48.2.ndb"; }; zone "3.48.10.in-addr.arpa." { type master; allow-update { dhcp-srvr; }; file "ddns/10.48.3.ndb"; }; zone "4.48.10.in-addr.arpa." { type master; allow-update { dhcp-srvr; }; file "ddns/10.48.4.ndb"; }; zone "5.48.10.in-addr.arpa." { type master; allow-update { dhcp-srvr; }; file "ddns/10.48.5.ndb"; }; zone "6.48.10.in-addr.arpa." { type master; allow-update { dhcp-srvr; }; file "ddns/10.48.6.ndb"; }; zone "7.48.10.in-addr.arpa.
Appendices dhcpd Files zone "2.6.10.in-addr.arpa." { type master; file "networks/10.6.2.ndb"; }; zone "1.40.10.in-addr.arpa." { type master; file "networks/10.40.1.ndb"; }; zone "map" { type master; file "master/map.ndb"; }; zone "net" { type master; file "master/net.