105466299-huawei

334
iManager U2000 Unified Network Management System V100R002C01 Product Description Issue 05 Date 2010-11-19 HUAWEI TECHNOLOGIES CO., LTD.

Upload: ekasantosh

Post on 12-Nov-2014

173 views

Category:

Documents


0 download

DESCRIPTION

105466299-Huawei

TRANSCRIPT

iManager U2000 Unified Network ManagementSystemV100R002C01

Product Description

Issue 05

Date 2010-11-19

HUAWEI TECHNOLOGIES CO., LTD.

Copyright © Huawei Technologies Co., Ltd. 2010. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior writtenconsent of Huawei Technologies Co., Ltd. Trademarks and Permissions

and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders. NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and thecustomer. All or part of the products, services and features described in this document may not be within thepurchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees or representationsof any kind, either express or implied.

The information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but all statements, information, andrecommendations in this document do not constitute the warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.Address: Huawei Industrial Base

Bantian, LonggangShenzhen 518129People's Republic of China

Website: http://www.huawei.com

Email: [email protected]

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

i

About This Document

Intended AudienceThe iManager U2000 Product Description describes the position, functional characteristics,system architecture and networking mode of the U2000, appended with standards that theU2000 complies with, and performance indexes.

This document provides guides for getting the features and functionalities of the U2000.

The intended audiences of this document are:

l Network Planning Engineer

l Data Configuration Engineer

l System Maintenance Engineer

Change HistoryUpdates between document issues are cumulative. Therefore, the latest document issue containsall updates made in previous issues.

Changes in Issue 05 (2010-11-19)

The fifth release. The fifth release has the following changes:

17.3.19 Manageable OP-Bypass Equipment is added..

Changes in Issue 04 (2010-09-24)

The fourth release. The third release has the following changes:

This chapter is optimized: 5.2 Security Management.

Changes in Issue 03 (2010-08-16)

The third release. The second release has the following changes:

3 Configuration Requirements

This chapter is added to describes the software and hardware configuration requirements of theU2000.

iManager U2000 Unified Network Management SystemProduct Description About This Document

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

iii

Changes in Issue 02 (2010-07-30)The second release. Optimize all of this document.

Changes in Issue 01 (2010-03-30)Initial release.

About This DocumentiManager U2000 Unified Network Management System

Product Description

iv Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Contents

About This Document...................................................................................................................iii

1 Positioning and Benefits...........................................................................................................1-11.1 Network Position.............................................................................................................................................1-2

1.1.1 Network Management Trend.................................................................................................................1-21.1.2 Product Orientation................................................................................................................................1-2

1.2 Product Characteristics....................................................................................................................................1-31.3 Manageable Equipment...................................................................................................................................1-6

2 System Architecture...................................................................................................................2-12.1 Software Structure...........................................................................................................................................2-2

2.1.1 Software Structure of the U2000 Single-Server System........................................................................2-22.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby)....................................................2-3

2.2 External Interfaces...........................................................................................................................................2-42.2.1 NBI.........................................................................................................................................................2-52.2.2 SBI........................................................................................................................................................2-13

3 Configuration Requirements...................................................................................................3-13.1 Hardware Configuration of the U2000 Server................................................................................................3-23.2 Software Configuration of the U2000 Server.................................................................................................3-33.3 Configuration of the U2000 Client..................................................................................................................3-5

4 Networking and Application...................................................................................................4-14.1 Deployment Mode...........................................................................................................................................4-2

4.1.1 Centralized Deployment of a Single-Server System..............................................................................4-34.1.2 Centralized Deployment of an HA System............................................................................................4-3

4.2 Networking Mode Between the U2000 and NEs............................................................................................4-44.2.1 Inband Networking Mode......................................................................................................................4-44.2.2 Outband Networking Mode....................................................................................................................4-5

4.3 Application Scenarios of U2000 Management...............................................................................................4-64.3.1 Unified Management of Network Products...........................................................................................4-74.3.2 Single Metro Solution............................................................................................................................4-94.3.3 Single Backhaul Solution.....................................................................................................................4-124.3.4 Single Backbone Solution....................................................................................................................4-164.3.5 Single FAN Solution............................................................................................................................4-18

iManager U2000 Unified Network Management SystemProduct Description Contents

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

v

5 Basic Functions...........................................................................................................................5-15.1 Overview of Functions and Features...............................................................................................................5-35.2 Security Management......................................................................................................................................5-45.3 Topology Management................................................................................................................................... 5-95.4 Alarm Management.......................................................................................................................................5-155.5 Performance Management.............................................................................................................................5-295.6 Inventory Management.................................................................................................................................5-345.7 Log Management...........................................................................................................................................5-365.8 Database Management..................................................................................................................................5-395.9 NE Communication Parameter Management................................................................................................5-415.10 DCN Management.......................................................................................................................................5-425.11 NE Software Management..........................................................................................................................5-425.12 Report Management....................................................................................................................................5-435.13 System Monitoring......................................................................................................................................5-46

6 MSTP Network Feature Management...................................................................................6-16.1 MSTP NE Management..................................................................................................................................6-26.2 MSTP Protection Subnet Management.........................................................................................................6-106.3 E2E MSTP Management...............................................................................................................................6-116.4 SDH ASON Management.............................................................................................................................6-16

7 WDM Network Feature Management....................................................................................7-17.1 WDM NE Management.................................................................................................................................. 7-27.2 WDM NA NE Management..........................................................................................................................7-117.3 WDM Protection Subnet Management.........................................................................................................7-207.4 End-to-End WDM Management...................................................................................................................7-217.5 WDM ASON Management...........................................................................................................................7-24

8 RTN Network Feature Management......................................................................................8-18.1 RTN NE Management.....................................................................................................................................8-28.2 RTN Protection Subnet Management...........................................................................................................8-108.3 End-to-End RTN Management.....................................................................................................................8-11

9 PTN Network Feature Management.......................................................................................9-19.1 PTN NE Management.....................................................................................................................................9-29.2 E2E PTN Management..................................................................................................................................9-19

10 Router Feature and Switch Feature Management............................................................10-110.1 Router Management....................................................................................................................................10-310.2 Router V8 Management..............................................................................................................................10-610.3 Automatic NE Configuration Management................................................................................................10-710.4 Switch Management....................................................................................................................................10-810.5 Template Management..............................................................................................................................10-1310.6 Diagnosis Management.............................................................................................................................10-1410.7 Cluster Management.................................................................................................................................10-16

ContentsiManager U2000 Unified Network Management System

Product Description

vi Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

10.8 Node Redounded Management.................................................................................................................10-1710.9 Report Subsystem Management................................................................................................................10-1810.10 VPN Service Management......................................................................................................................10-1810.11 Tunnel Service Management...................................................................................................................10-20

11 Feature Management for Security Devices ......................................................................11-111.1 Security Device Management.....................................................................................................................11-211.2 Single-Point Web Configuration for Security Devices...............................................................................11-211.3 Centralized Security Policy Configuration.................................................................................................11-3

11.3.1 Policy Package Management.............................................................................................................11-411.3.2 Security Policy Configuration............................................................................................................11-411.3.3 Attack Defense Configuration............................................................................................................11-511.3.4 Policy Resource Configuration..........................................................................................................11-511.3.5 Mapping Service................................................................................................................................11-6

11.4 Report Subsystem Management..................................................................................................................11-611.5 VPN Service Management..........................................................................................................................11-6

11.5.1 IPSec End-to-End Service..................................................................................................................11-711.5.2 Remote Access Service......................................................................................................................11-7

12 FTTx Network Feature Management.................................................................................12-112.1 OLT Management.......................................................................................................................................12-212.2 ONU Management....................................................................................................................................12-12

13 MSAN Network Feature Management..............................................................................13-113.1 MSAN Management...................................................................................................................................13-2

14 DSLAM Network Feature Management............................................................................14-114.1 DSLAM Management.................................................................................................................................14-2

15 Reliability................................................................................................................................15-115.1 Reliability Design........................................................................................................................................15-215.2 Reliability Indicator.....................................................................................................................................15-315.3 HA System..................................................................................................................................................15-315.4 DCN Protection...........................................................................................................................................15-415.5 Disk Mirroring.............................................................................................................................................15-515.6 Data Backup................................................................................................................................................15-5

16 Performance Indicators.........................................................................................................16-1

17 Management Capability.......................................................................................................17-117.1 NE Equivalent Coefficient..........................................................................................................................17-2

17.1.1 Equivalent NEs in the Transport Domain..........................................................................................17-317.1.2 Equivalent NEs in the IP Domain......................................................................................................17-617.1.3 Equivalent NEs in the Access Domain..............................................................................................17-9

17.2 Management Capabilities of the U2000 on Different Hardware Platforms..............................................17-1017.3 Manageable Equipment.............................................................................................................................17-14

17.3.1 Manageable MSTP Series Equipment..............................................................................................17-15

iManager U2000 Unified Network Management SystemProduct Description Contents

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

vii

17.3.2 Manageable WDM Series Equipment..............................................................................................17-1617.3.3 Manageable NA WDM Series Equipment.......................................................................................17-1817.3.4 Manageable Submarine Line Equipment.........................................................................................17-1917.3.5 Manageable RTN Series Equipment................................................................................................17-1917.3.6 Manageable PTN Series Equipment................................................................................................17-1917.3.7 Manageable FTTx Series Equipment...............................................................................................17-2017.3.8 Manageable MSAN Series Equipment............................................................................................17-2217.3.9 Manageable DSLAM Series Equipment..........................................................................................17-2317.3.10 Manageable Router Series Equipment...........................................................................................17-2317.3.11 Manageable Switch Series Equipment...........................................................................................17-2417.3.12 Manageable Metro Service Platform Equipment...........................................................................17-2617.3.13 Manageable Broadband Access Series Equipment........................................................................17-2617.3.14 Manageable VoIP Gateway Equipment.........................................................................................17-2617.3.15 Manageable WLAN Series equipment...........................................................................................17-2717.3.16 Manageable Firewall Series Equipment.........................................................................................17-2717.3.17 Manageable DPI Equipment..........................................................................................................17-3117.3.18 Manageable SVN Series Equipment..............................................................................................17-3217.3.19 Manageable OP-Bypass Equipment...............................................................................................17-32

18 Standards Compliance..........................................................................................................18-1

A Glossary and Abbreviations..................................................................................................A-1

ContentsiManager U2000 Unified Network Management System

Product Description

viii Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figures

Figure 1-1 Position of the U2000 in the TMN hierarchy.....................................................................................1-3Figure 1-2 Centralized network management...................................................................................................... 1-4Figure 2-1 U2000 software structure....................................................................................................................2-2Figure 2-2 Veritas hot standby HA system (Solaris) software structure..............................................................2-3Figure 2-3 Veritas hot standby HA system (Windows) software structure..........................................................2-4Figure 2-4 Functions of external interfaces..........................................................................................................2-5Figure 4-1 Centralized deployment of the single-server system..........................................................................4-3Figure 4-2 Centralized deployment of the HA system.........................................................................................4-4Figure 4-3 Example network in inband networking mode...................................................................................4-5Figure 4-4 Example network in outband networking mode.................................................................................4-6Figure 4-5 Unified management of network products......................................................................................... 4-8Figure 4-6 Network management solution for a single metro network..............................................................4-10Figure 4-7 SingleBackhaul solution...................................................................................................................4-13Figure 4-8 Network management solution for a single backbone network........................................................4-17Figure 4-9 Networking application of the FTTx access network management.................................................4-19Figure 4-10 FTTx predeployment flow..............................................................................................................4-20Figure 4-11 FTTx fault diagnosis (1).................................................................................................................4-22Figure 4-12 FTTx fault diagnosis (2).................................................................................................................4-22Figure 4-13 PnP function of the MDU after replacement..................................................................................4-24Figure 4-14 Implementation of the dual homing protection..............................................................................4-24Figure 4-15 Implementation of the fast service cutover.....................................................................................4-25Figure 5-1 Basic functions of the U2000............................................................................................................. 5-1Figure 5-2 Security management overview..........................................................................................................5-4Figure 5-3 Right................................................................................................................................................... 5-5Figure 5-4 RADIUS-based user authentication....................................................................................................5-8Figure 5-5 LDAP user authentication.................................................................................................................. 5-9Figure 5-6 Topology view and its functions......................................................................................................5-10Figure 5-7 Alarm display in the topology view.................................................................................................5-12Figure 5-8 Illustration of automatic topology discovery....................................................................................5-13Figure 5-9 Clock view and its functions............................................................................................................5-14Figure 5-10 Relationships between alarm states................................................................................................5-17Figure 5-11 Alarm reporting and handling flowchart........................................................................................5-17Figure 5-12 Alarm panel....................................................................................................................................5-18

iManager U2000 Unified Network Management SystemProduct Description Figures

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

ix

Figure 5-13 Alarm bar chart...............................................................................................................................5-19Figure 5-14 Viewing alarms...............................................................................................................................5-20Figure 5-15 Alarm correlation analysis..............................................................................................................5-23Figure 5-16 Relationships between a root alarm and its correlative alarms.......................................................5-24Figure 5-17 Alarm synchronization...................................................................................................................5-26Figure 5-18 Difference between alarm masking and alarm suppression...........................................................5-27Figure 5-19 Various alarm notification means...................................................................................................5-27Figure 5-20 Alarm association...........................................................................................................................5-28Figure 5-21 Alarm maintenance experience base..............................................................................................5-29Figure 5-22 Performance management process.................................................................................................5-31Figure 5-23 Relationships between a template, an instance, and a task.............................................................5-32Figure 5-24 Inventory management window and its functions..........................................................................5-35Figure 5-25 Log management window and functions........................................................................................5-37Figure 5-26 Window and functions of dumping and exporting logs.................................................................5-38Figure 5-27 NMS database management...........................................................................................................5-40Figure 5-28 Diagram of the NE resource report.................................................................................................5-45Figure 5-29 Diagram of the network resource report.........................................................................................5-46Figure 5-30 System monitoring processes.........................................................................................................5-47Figure 5-31 System monitoring information......................................................................................................5-48Figure 9-1 Unicast MPLS tunnel .......................................................................................................................9-11Figure 9-2 CES service application model.........................................................................................................9-13Figure 9-3 ATM service application model.......................................................................................................9-14Figure 9-4 E-Line Service..................................................................................................................................9-15Figure 9-5 E-AGGR service scenario 1..............................................................................................................9-16Figure 9-6 E-AGGR service scenario 2..............................................................................................................9-16Figure 9-7 E-LAN service .................................................................................................................................9-17Figure 10-1 Cluster topology...........................................................................................................................10-16Figure 10-2 Navigation path to cluster functions.............................................................................................10-17Figure 15-1 Switchover between active and standby sites in HA system..........................................................15-4

FiguresiManager U2000 Unified Network Management System

Product Description

x Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Tables

Table 2-1 NBI functions supported by transport equipment................................................................................2-6Table 2-2 NBI functions supported by access equipment....................................................................................2-6Table 2-3 NBI functions supported by IP equipment...........................................................................................2-7Table 3-1 Configuration requirements of the U2000 servers that manage networks of different scales ............ 3-2Table 3-2 Recommended configurations of the disk array...................................................................................3-2Table 3-3 System software of the U2000.............................................................................................................3-3Table 3-4 High availability software....................................................................................................................3-4Table 3-5 Software Configurations of the U2000................................................................................................3-5Table 3-6 Hardware and software configuration requirements of the U2000 client............................................3-5Table 4-1 Deployment modes of the U2000........................................................................................................ 4-2Table 4-2 Relationships between faults and their causes that are identified by means of the alarm-based root causeidentification........................................................................................................................................................4-23Table 5-1 Overview of functions and features of the U2000............................................................................... 5-3Table 5-2 Alarm severity....................................................................................................................................5-15Table 5-3 Alarm display functions.....................................................................................................................5-19Table 5-4 Alarm function...................................................................................................................................5-20Table 5-5 Performance monitoring templates....................................................................................................5-31Table 5-6 Statistical items for resource inventory management........................................................................5-35Table 5-7 Resource Report.................................................................................................................................5-44Table 9-1 Types of PTN service interfaces..........................................................................................................9-3Table 15-1 Reliability indicators of the U2000..................................................................................................15-3Table 15-2 Data backup......................................................................................................................................15-5Table 16-1 Performance indicators.....................................................................................................................16-1Table 16-2 DCN bandwidth requirements..........................................................................................................16-2Table 17-1 Management capabilities of the U2000 on different OptiX NE Equivalents...................................17-3Table 17-2 Management capabilities of the U2000 on different IP NE Equivalents.........................................17-6Table 17-3 Management capabilities of the U2000 on different access NE Equivalents................................17-10Table 17-4 Management capabilities of the U2000 on different hardware platforms......................................17-11Table 17-5 Manageable MSTP series equipment.............................................................................................17-15Table 17-6 Manageable WDM equipment.......................................................................................................17-17Table 17-7 Manageable NA WDM equipment................................................................................................17-18Table 17-8 Manageable submarine line equipment..........................................................................................17-19Table 17-9 Manageable RTN equipment.........................................................................................................17-19Table 17-10 Manageable PTN series equipment..............................................................................................17-20

iManager U2000 Unified Network Management SystemProduct Description Tables

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

xi

Table 17-11 Manageable FTTx series equipment............................................................................................17-20Table 17-12 Manageable MSAN series equipment..........................................................................................17-22Table 17-13 Manageable DSLAM series equipment.......................................................................................17-23Table 17-14 Manageable router series equipment............................................................................................17-24Table 17-15 Manageable switch series equipment...........................................................................................17-24Table 17-16 Manageable Metro service platform equipment...........................................................................17-26Table 17-17 Manageable broadband access series equipment.........................................................................17-26Table 17-18 Manageable VoIP gateway equipment.........................................................................................17-27Table 17-19 Manageable WLAN series equipment.........................................................................................17-27Table 17-20 Manageable firewall series equipment.........................................................................................17-27Table 17-21 Manageable DPI equipment.........................................................................................................17-32Table 17-22 Manageable SVN series equipment.............................................................................................17-32Table 17-23 Manageable OP-Bypass equipment.............................................................................................17-32Table 18-1 Details of the Standards and Protocols.............................................................................................18-2

TablesiManager U2000 Unified Network Management System

Product Description

xii Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

1 Positioning and Benefits

About This Chapter

This topic describes the position of the iManager U2000 unified network management system(hereinafter referred to as U2000) in the telecommunications management network (TMN), theproduct characteristics, and the equipment that the U2000 can manage.

1.1 Network PositionThis topic provides information about the development trend of network management and theposition of the U2000 in the TMN hierarchy.

1.2 Product CharacteristicsThe U2000 improves the capability of managing converged networks, scalability, and ease ofuse to construct a customer-centered and future-oriented NMS of a new generation.

1.3 Manageable EquipmentThis topic provides information about the equipment that the U2000 V100R002C01SPC003 canmanage.

iManager U2000 Unified Network Management SystemProduct Description 1 Positioning and Benefits

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

1-1

1.1 Network PositionThis topic provides information about the development trend of network management and theposition of the U2000 in the TMN hierarchy.

1.1.1 Network Management TrendWith the development of IT and IP technologies and the convergence of telecommunications,IT, media, and consumer electronic industries, the telecommunications industry has witnessedtremendous changes. Broadband services and mobile services have become the mainstreamservices on telecommunications networks and convergence of networks is being implementedwidely, which bring changes in the market orientation and business modes of carriers.

1.1.2 Product OrientationThe U2000 is the equipment management system developed by Huawei and is also the majorand future-oriented network management product and solution.

1.1.1 Network Management TrendWith the development of IT and IP technologies and the convergence of telecommunications,IT, media, and consumer electronic industries, the telecommunications industry has witnessedtremendous changes. Broadband services and mobile services have become the mainstreamservices on telecommunications networks and convergence of networks is being implementedwidely, which bring changes in the market orientation and business modes of carriers.

l The development of the all-IP architecture is a leading factor in the transition from theexisting vertical network that is divided by technology and service to the flattenedhorizontal network.

l Improving user experience, lowering operation expenditure (OPEX), and improvingefficiency are the driving forces for fixed-mobile convergence (FMC).

l Network convergence requires network management to be consolidated.

To be oriented to the future network development trend, the U2000 combines all-IP and FMCand manages bearer and access equipment in a centralized manner.

l The U2000 can perform not only integrated management of multi-domain equipment butalso integrated management at the element and network management layers. The U2000has revolutionized the layer-based management mode to meet the managementrequirements in the transition from the existing vertical network to the flattened horizontalnetwork.

l The U2000 is a unified network management system (NMS) of multiple domains and itaims to minimize operation and maintenance (O&M) costs for customers and to bring morenetwork benefits.

1.1.2 Product OrientationThe U2000 is the equipment management system developed by Huawei and is also the majorand future-oriented network management product and solution.

In the TMN hierarchy, the U2000 is located at the element management layer and networkmanagement layer, and supports all functions of the element and network management layers.Figure 1-1 shows the position of the U2000 in the TMN hierarchy.

1 Positioning and BenefitsiManager U2000 Unified Network Management System

Product Description

1-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 1-1 Position of the U2000 in the TMN hierarchy

1.2 Product CharacteristicsThe U2000 improves the capability of managing converged networks, scalability, and ease ofuse to construct a customer-centered and future-oriented NMS of a new generation.

Centralized Network ManagementThe U2000 manages transport equipment, access equipment, and IP equipment in a centralizedmanner. Specifically, it manages Huawei products and services of the products. The productsinclude MSTP, WDM, OTN, microwave, and PTN equipment, routers, switches, MSANs,DSLAMs; the services include FTTx, firewall services.

In addition, the U2000 manages end-to-end (E2E) services across domains in access and bearernetworks, as shown in Figure 1-2. The services include SDH, WDM, microwave, packet, PTN,CX, and switch services.

iManager U2000 Unified Network Management SystemProduct Description 1 Positioning and Benefits

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

1-3

Figure 1-2 Centralized network management

Multiple Operating SystemsThe U2000 is developed based on the integrated management application platform (iMAP) ofHuawei. It supports Sun workstations, PC servers, Sybase databases, SQL Server databases, andSolaris, Windowsoperating systems (OSs).

The U2000 is a stand-alone application that can be installed on different OSs and databases.Hence, it is compatible with multiple OSs. The U2000 provides high-end solutions for large-scale networks and low-cost solutions for small- and medium-scale networks.

Leading Scalable NMS ArchitectureBy adopting the mature and widely-used client/server (C/S) architecture, the U2000 supportsdistributed and hierarchical database system, service processing system, and client applicationsystem and it also supports concurrent operations of multiple clients. Modularized architectureis scalable so that the U2000 meets the management requirements of complex and large-scalenetworks.

l The U2000 uses an object-oriented, multiprocessing, modularized, and componentizedarchitecture design, thereby decreasing the degree of the coupling of NE managementcomponents. In this way, the U2000 supports smooth online increase in managementcapability from a single domain to multiple domains.

l The U2000 has the capability of flexibly integrating NBIs.l The loose coupling framework supports the independent upgrade and maintenance of

subsystems.

1 Positioning and BenefitsiManager U2000 Unified Network Management System

Product Description

1-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Visualized Managementl Service supervision:

– Supports service-centered visualized supervision and the function of querying affectedservices by alarm.

– Provides abundant detection and diagnosis methods based on services to quickly checkservice connectivity and locate faults.

– Supports service-based performance query, threshold pre-warning, and trend analysisin the GUI.

l Service deployment:– Provides templates to set service-related parameters once instead of setting parameters

repeatedly.– Supports bulk deployment of services, increasing the configuration efficiency.– Calculates static routes and allocates labels automatically, without manual intervention.

l Object relationship:– Associates services with tunnels and tunnels with routes. Hierarchical object

relationships represent the bearer relationships explicitly.– Provides bearer relationships to quickly locate and rectify faults.

l Network-wide clock:– Supports the automatic discovery of clocks (1588 clock, synchronous Ethernet clock,

and SDH clock) and addition of the clocks to the clock topology view.– Provides the unified topology view of network-wide clocks and refreshes the tracking

relationships and synchronization status of the clocks when faults occur in networks.– Monitors clock status and displays clock alarms, tracking relationships, and protection

status in real time.

Cross-Domain E2E Service Provisioningl Supports E2E TDM service provisioning and management across traditional microwave

and MSTP networks, which speeds up network deployment and service provisioning of alarge number of microwave services.

l Supports E2E packet service provisioning and management across IP microwave and PTN/Hybrid MSTP networks, which accelerates service provisioning in an IP network.

iManager U2000 Unified Network Management SystemProduct Description 1 Positioning and Benefits

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

1-5

l Supports Ethernet, CES, and ATM service management for PTN, MSTP, RTN, SW, andNE40 devices, and supports E2E management of MPLS tunnels and PWs, which push thefixed market towards fixed-mobile convergence (FMC).

l Supports E2E service (Ethernet, CES, and ATM) provisioning across PTN and CXnetworks, and supports E2E management of MPLS tunnels and PWs, which push themobile market towards FMC.

1.3 Manageable EquipmentThis topic provides information about the equipment that the U2000 V100R002C01SPC003 canmanage.

For information about the equipment of specific types that the U2000 V100R002C01SPC003can manage, see the following topics:l Manageable MSTP Series Equipmentl Manageable WDM Equipmentl Manageable NA WDM Equipmentl Manageable Submarine Line Equipmentl Manageable RTN Equipmentl Manageable PTN Equipmentl Manageable FTTx Access Series Devicesl Manageable MSAN Series Devicesl Manageable DSLAM Series Devicesl Manageable Router Series Devicesl Manageable Switch Series Devicesl Manageable Metro Service Platform Devicesl Manageable Broadband Access Series Devicesl Manageable VoIP Gateway Devicesl Manageable WLAN Series Devicesl Manageable Firewall Series Devicesl Manageable DPI Equipmentl Manageable SVN Series Devicesl Manageable OP-Bypass Equipment

1 Positioning and BenefitsiManager U2000 Unified Network Management System

Product Description

1-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

2 System Architecture

About This Chapter

The U2000 provides solutions to single-layer management for small- and medium-scalenetworks. In addition, the U2000 provides standard external interfaces, through which theU2000 is interconnected with an upper layer management system to form a hierarchicalmanagement network. The U2000 assists the system at the network management layer and thesystem at the service management layer to manage large-scale networks.

2.1 Software StructureThis topic describes the software structure of the U2000 single-server system and U2000 HAsystem.

2.2 External InterfacesThe U2000 offers abundant northbound interfaces (NBIs) that help to achieve unifiedmanagement of transport, IP, and access equipment, fast integration between OSS and theU2000, and better quality of customer service. Currently, NBIs jointly developed by Huaweiand mainstream OSS vendors are widely used by 72% of the top 50 carriers worldwide.

iManager U2000 Unified Network Management SystemProduct Description 2 System Architecture

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-1

2.1 Software StructureThis topic describes the software structure of the U2000 single-server system and U2000 HAsystem.

2.1.1 Software Structure of the U2000 Single-Server SystemThis topic describes the software structure of the U2000 single-server system.2.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby)This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).

2.1.1 Software Structure of the U2000 Single-Server SystemThis topic describes the software structure of the U2000 single-server system.

In the U2000 single-server system, there is only one U2000 server but multiple U2000 clients.The clients can gain access to the server at the same time.

Figure 2-1 shows the structural relationships between main modules of the U2000 single-serversystem.

Figure 2-1 U2000 software structure

2 System ArchitectureiManager U2000 Unified Network Management System

Product Description

2-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

2.1.2 Software Structure of the U2000 HA System (Veritas HotStandby)

This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).

The U2000 HA system (Veritas Hot Standby) applies to geographic redundancy of an HAsystem.

The U2000 HA system (Veritas Hot Standby) supports the Solaris and Windows. Figure 2-2and Figure 2-3 show the software structure.

Figure 2-2 Veritas hot standby HA system (Solaris) software structure

iManager U2000 Unified Network Management SystemProduct Description 2 System Architecture

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-3

Figure 2-3 Veritas hot standby HA system (Windows) software structure

l The Veritas volume replicator (VVR) is used to duplicate the U2000 data on the primary

site to the secondary site so that data is synchronized between the primary and secondarysites in real time.

l The Veritas cluster server (VCS) is used to monitor the system and application service inreal time. When a fault occurs in hardware or software, the VCS restarts or stops theapplication service.

l The Veritas volume manager (VxVM) is used to manage the disks and data volumes ofservers.

2.2 External InterfacesThe U2000 offers abundant northbound interfaces (NBIs) that help to achieve unifiedmanagement of transport, IP, and access equipment, fast integration between OSS and theU2000, and better quality of customer service. Currently, NBIs jointly developed by Huaweiand mainstream OSS vendors are widely used by 72% of the top 50 carriers worldwide.

In addition to conventional NBIs such as SNMP, CORBA, and TL1 NBIs, the U2000 offers theXML NBI that is based on the MTOSI 2.0 standards. The XML NBI provides multiple extensiblefunctions, including alarm management, inventory management, performance management,service provisioning, and diagnosis test. By using these interfaces, the U2000 can integrate withthe OSS in a fast and holistic manner. Figure 2-4 shows the functions of external interfaces.

2 System ArchitectureiManager U2000 Unified Network Management System

Product Description

2-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 2-4 Functions of external interfaces

2.2.1 NBIThe U2000 offers extensive network monitoring information, such as alarms, performancestatistics, and inventory information, for OSSs through northbound interfaces (NBIs). The NBIssupport network management functions, such as service provisioning and diagnosis test.Through the NBIs, the U2000 can integrate with different OSSs flexibly.

2.2.2 SBIUsing the southbound interface (SBI), the U2000 can connect to NEs and manage them. TheU2000 supports the following SBIs: SNMP, CLI, Qx, SSH, and Telnet SBIs.

2.2.1 NBIThe U2000 offers extensive network monitoring information, such as alarms, performancestatistics, and inventory information, for OSSs through northbound interfaces (NBIs). The NBIssupport network management functions, such as service provisioning and diagnosis test.Through the NBIs, the U2000 can integrate with different OSSs flexibly.

NOTE

Supported■

iManager U2000 Unified Network Management SystemProduct Description 2 System Architecture

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-5

Not supported□

The equipment of each product domain supports different NBI functions. For details, see thefollowing tables.

Table 2-1 NBI functions supported by transport equipment

Interface

Feature MSTP HybirdMSTP

WDM OTN TDMRTN

PacketRTN

Marine

XML Alarm ■ ■ ■ ■ ■ ■ ■

Performance

■ □ ■ ■ □ □ □

Inventory ■ □ ■ ■ □ □ □

Serviceprovisioning

□ □ □ □ □ □ □

CORBA

Alarm ■ ■ ■ ■ ■ ■ ■

Performance

■ □ ■ ■ ■ □ □

Inventory ■ □ ■ ■ ■ □ □

Serviceprovisioning

■ □ ■ ■ ■ □ □

SNMP Alarm ■ ■ ■ ■ ■ ■ ■

FTP Performance

■ ■ ■ ■ ■ ■ ■

TL1 Inventory □ □ □ □ □ □ □

Serviceprovisioning

□ □ □ □ □ □ □

Customer OSSTest

Diagnosistest

□ □ □ □ □ □ □

Table 2-2 NBI functions supported by access equipment

Interface Feature DSLAM GPON/FTTx

XML Alarm ■ ■

2 System ArchitectureiManager U2000 Unified Network Management System

Product Description

2-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Interface Feature DSLAM GPON/FTTx

Performance □ □

Inventory ■ ■

Service provisioning □ ■

CORBA Alarm ■ ■

Performance □ □

Inventory □ □

Service provisioning □ □

SNMP Alarm ■ ■

FTP Performance ■ ■

TL1 Inventory ■ ■

Service provisioning ■ ■

Customer OSS Test Diagnosis test ■ ■

Table 2-3 NBI functions supported by IP equipment

Interface Feature NE CX Switch PTN

XML Alarm ■ ■ ■ ■

Performance ■ ■ ■ ■

Inventory ■ ■ ■ ■

Serviceprovisioning

■ ■ ■ ■

CORBA Alarm ■ ■ ■ ■

Performance □ □ □ ■

Inventory □ □ □ ■

Serviceprovisioning

□ □ □ ■

SNMP Alarm ■ ■ ■ ■

FTP Performance ■ ■ ■ ■

TL1 Inventory □ □ □ □

Serviceprovisioning

□ □ □ □

iManager U2000 Unified Network Management SystemProduct Description 2 System Architecture

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-7

Interface Feature NE CX Switch PTN

CustomerOSS Test

Diagnosistest

□ □ □ □

XML NBI (Transport)

Complying with the TMF MTOSI 2.0 series standards, the XML NBI enables the U2000 toprovide unified alarm, performance, inventory, and service provisioning management ontransport equipment for OSSs.

The XML NBI supports the following functions:l Alarm management

– Alarm reporting

– Synchronization of active alarms

– Alarm acknowledgment

– Alarm unacknowledgment

– Collection of alarm statisticsl Performance management

– Query of history performance data

– Query of current performance data

– Reporting of performance threshold-crossing events

– Query of performance threshold-crossing eventsl Inventory management

– Query of physical inventory, such as NEs, shelves, slots, boards, and physical ports

– Query of logical inventory, such as logical ports, fibers or cables, tunnels, and services

– Export of inventory data and reporting of changes in inventory

XML NBI (Access)

Complying with the TMF MTOSI 2.0 series standards, the XML NBI enables the U2000 toprovide unified alarm, performance, inventory, and service provisioning management on accessequipment for OSSs.

The XML NBI supports the following functions:l Alarm management

– Alarm reporting

– Synchronization of active alarms

– Alarm acknowledgment

– Alarm unacknowledgment

– Collection of alarm statisticsl Inventory management

– Query of IP DSLAM inventory (ADSL ports, SHDSL ports, and templates)

2 System ArchitectureiManager U2000 Unified Network Management System

Product Description

2-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Service provisioning management– Provisioning of FTTH services (GPON)

XML NBI (IP)Complying with the TMF MTOSI 2.0 series standards, the XML NBI enables the U2000 toprovide unified alarm, performance, inventory, and service provisioning management on IPequipment for OSSs.

The XML NBI supports the following functions:l Alarm management

– Alarm reporting– Synchronization of active alarms– Alarm acknowledgment– Alarm unacknowledgment– Collection of alarm statistics

l Performance management– Query of history performance data– Query of current performance data– Reporting of performance threshold-crossing events– Query of performance threshold-crossing events

l Inventory management– Query of physical inventory, such as NEs, shelves, slots, boards, and physical ports– Query of logical inventory, such as logical ports, fibers or cables, tunnels, and services– Export of inventory data and reporting of changes in inventory– QoS management

l Service provisioning management– Provisioning of route and MAN tunnel resources (MPLS tunnels and IP tunnels)– Provisioning of route and MAN service resources (ATM PWE3, CES PWE3, Ethernet

PWE3, VPLS, and L3VPN)– ANCP service management

CORBA NBI (Transport)Complying with the TMF MTNM V3.5 series standards, the CORBA NBI enables the U2000to provide unified alarm management and inventory management. The CORBA NBI alsoenables the U2000 to provide service provisioning, performance, and diagnosis test managementfor transport equipment.

The CORBA NBI supports the following functions:l Alarm management

– Alarm reporting– Synchronization of active alarms– Alarm acknowledgment– Alarm unacknowledgment

iManager U2000 Unified Network Management SystemProduct Description 2 System Architecture

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-9

– Collection of alarm statisticsl Performance management

– Query of history performance data– Query of current performance data– Reporting of performance threshold-crossing events– Query of performance threshold-crossing events

l Inventory management– Query of physical inventory, such as NEs, shelves, slots, boards, and physical ports– Query of logical inventory, such as logical ports, fibers or cables, and trails

l Service provisioning management– Provisioning of end-to-end (E2E) services (SDH, WDM, OTN, MSTP, ASON, and

RTN) in the transport domain– Provisioning of per-NE services (SDH, WDM, OTN, and MSTP) in the transport

domainl Diagnosis test management

– Port loopback and alarm insertion– Ethernet CC, LB, and LT tests– 2M pseudo random binary sequence (PRBS) tests– OAM management on MPLS LSP, PW, PWE3 and VPLS services

CORBA NBI (Access)Complying with the TMF MTNM V3.5 series standards, the CORBA NBI enables the U2000to provide unified alarm management.

The CORBA NBI supports the following functions:l Alarm management

– Alarm reporting– Synchronization of active alarms– Alarm acknowledgment– Alarm unacknowledgment– Collection of alarm statistics

CORBA NBI (IP)Complying with the TMF MTNM V3.5 series standards, the CORBA NBI enables the U2000to provide unified alarm management. In addition, the CORBA NBI enables the U2000 toprovide service provisioning and performance management for metropolitan area network(MAN) equipment.

The CORBA NBI supports the following functions:l Alarm management

– Alarm reporting– Synchronization of active alarms– Alarm acknowledgment

2 System ArchitectureiManager U2000 Unified Network Management System

Product Description

2-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Alarm unacknowledgment– Collection of alarm statistics

l Performance management for MAN equipment– Query of history performance data– Query of current performance data– Reporting of performance threshold-crossing events– Query of performance threshold-crossing events

l Inventory management for MAN equipment– Query of physical inventory, such as NEs, shelves, slots, boards, and physical ports– Query of logical inventory, such as logical ports, fibers or cables, and trails– QoS management and protection management

l Service provisioning management for MAN equipment– Provisioning of services for MAN tunnels (MPLS tunnels and IP tunnels)– Provisioning of MAN services (ATM PWE3, CES PWE3, Ethernet PWE3, and VPLS)

SNMP NBIComplying with the SNMP v1/v2c/v3 standard, the SNMP NBI enables the U2000 to provideunified alarm management for OSSs.

The SNMP NBI supports the following functions:l Alarm reportingl Synchronization of active alarmsl Alarm acknowledgmentl Alarm unacknowledgmentl Heartbeat alarm reportingl Setting of alarm filter criteria

TL1 NBIComplying with the GR 831 standard, the TL1 NBI enables the U2000 to provide serviceprovisioning (xDSL, xPON, broadband, and narrowband services), inventory query, andinventory provisioning in the access domain for OSSs.

The TL1 NBI supports the following functions:l Service provisioning management for access equipment

– Provisioning of xDSL (ADSL, SHDSL, and VDSL2) services– Provisioning of xPON (GPON and EPON) services– Provisioning of multicast services– Provisioning of voice services– Provisioning of services for the BRAS– Management of service virtual ports and PVCs– Management of VLANs– Management of Ethernet ports

iManager U2000 Unified Network Management SystemProduct Description 2 System Architecture

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-11

– Management of ACL and QoSl Inventory management for access equipment

– Query of resources, such as equipment, shelves, boards, daughter boards, ports, andservice ports

– Notification of resource changes– Management and maintenance of resources

FTP Performance NBIThe FTP performance NBI enables the U2000 to provide performance statistics export for OSSs.The U2000 exports performance statistics to a specified FTP server for analysis purposes.

The FTP performance NBI supports the following functions:l Setting of the following conditions for exporting performance statistics:

– Monitoring period of performance events– Monitoring indicator of performance events– Export period of performance statistics

l Export of performance statistics to a specified FTP server

Customer OSS Test NBIThe customer OSS test NBI includes two types of NBI: narrowband line test NBI and ADSLline test NBI. Narrowband line test NBI tests narrowband access devices (lines and terminals).ADSL line test NBI queries ADSL ports, and captures and releases ADSL lines.

The customer OSS test NBI supports the following functions:

l Narrowband line test NBI:– Dial tone test for POTS users– Feed voltage test for POTS users– Loop current test for POTS users– Line test for POTS users– Ringing test for POTS users– DTMF or pulse test for POTS users– Howler tone test for POTS users– Circuit test for ISDN user– Line test for ISDN users– NT1 terminal test for ISDN users– Narrowband line capture test– Narrowband line release test– Ringing current voltage test– Stopping a test

l ADSL line test NBI:– Query of the information about an ADSL user port– Controlling of the DSLAM test bus

2 System ArchitectureiManager U2000 Unified Network Management System

Product Description

2-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Loopback diagnosis test performed at the central office end on the user port

– OAM test

2.2.2 SBIUsing the southbound interface (SBI), the U2000 can connect to NEs and manage them. TheU2000 supports the following SBIs: SNMP, CLI, Qx, SSH, and Telnet SBIs.

Qx Interface

Qx interfaces are simplified interfaces based on the Q3 interfaces defined in ITU-Trecommendations. They are used for private communications. Qx interfaces use a protocol basedon standard TCP/IP packets. Qx interfaces support data transmission over media such as in-bandDCCs or ECCs and out-of-band channels, featuring low overheads, standard structures, and highefficiency. Qx interfaces are classified into Qx4 interfaces and Qx5 interfaces (Qx4 is the earlierversion). Qx4 interfaces are used for managing the OptiX 2500+ and earlier transport equipment;Qx5 interfaces are used for managing transport equipment later than the OptiX 2500+. TheU2000 can adapt to various protocols.

The U2000 uses Qx interfaces to connect and manage transport equipment, such as MSTP,WDM, RTN, PTN, and OTN equipment.

SNMP SBI

The SNMP SBI is used to connect and manage SNMP equipment.

The U2000 supports the SNMP SBI that complies with the SNMP v1/v2c/v3 standard. Throughthe SNMP SBI, the U2000 can be connected to Huawei routers, switches, and security accessequipment.

SNMP is a TCP/IP-based network management protocol at the application layer. SNMP usesthe UDP protocol at the transmission layer. Through the SNMP SBI, the U2000 can manage thenetwork equipment that supports proxy processes.

Telnet/SSH Telnet (STelnet) SBI

The Telnet and STelnet SBIs are a basic type of interface used for remote login to andmanagement of NEs. The Telnet and STelnet SBIs compensate the disadvantages of the SNMPSBI and allow the U2000 to perform more management functions. Through the Telnet andSTelnet SBIs, the U2000 can be connected to Huawei routers, switches, and security equipment.l Telnet is a TCP/IP-based network management protocol at the application layer. Through

the Telnet SBI, you can log in to an NE in the CLI and run commands directly in the CLIto maintain and configure the NE. Using the TCP protocol at the transmission layer, theTelnet protocol provides services for network communication. The Telnet protocoltransmits communication data in plain text, which is not secure.

l Similar to Telnet, Secure Shell (SSH) is also a TCP/IP-based network management protocolat the application layer. The SSH protocol, however, transmits encrypted data. Using theTCP protocol at the transmission layer, the SSH protocol encrypts data at the applicationlayer. The SSH protocol ensures the security of network communications by means ofauthentication, encryption, and authorization. The SSH protocol supports authenticationby password and RSA. In addition, the SSH protocol transmits compressed data, whichspeeds up the transmission.

iManager U2000 Unified Network Management SystemProduct Description 2 System Architecture

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-13

TFTP/FTP/SFTP SBIThe TFTP, FTP, and SFTP SBIs are used for backing up NE data, upgrading NE software, andloading patches. TFTP, FTP, and SFTP are TCP/IP-based network management protocols at theapplication layer and are dependent on the UDP protocol.

l Trivial File Transfer Protocol (TFTP) is a basic and standard protocol that requires leastextra overheads, as compared with FTP and SFTP, to upload and download files. The TFTPprotocol does not support password configuration and transfers file contents in plain text.

l File Transfer Protocol (FTP) is a set of standard protocols used for transferring files onnetworks. The FTP protocol transfers passwords and file contents in plain text.

l SSH FTP (SFTP) uses the SSH protocol to provide secure file transfer and processing. Fordata backup using the SFTP protocol, passwords and data are encrypted duringtransmission.

Syslog SBIThe Syslog SBI serves as an interface for the U2000 to receive system logs from NEs. With theSyslog SBI, the U2000 can manage NE logs.

2 System ArchitectureiManager U2000 Unified Network Management System

Product Description

2-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

3 Configuration Requirements

About This Chapter

This topic describes the software and hardware configuration requirements of the U2000 serverand client.

3.1 Hardware Configuration of the U2000 ServerThis topic describes the hardware configuration requirement of the U2000 server.

3.2 Software Configuration of the U2000 ServerThis topic describes the software that can be configured for the NMS server, including systemsoftware and NMS software.

3.3 Configuration of the U2000 ClientThis topic describes the requirements on software and hardware configuration when theU2000 client runs on the Windows and Solaris OSs.

iManager U2000 Unified Network Management SystemProduct Description 3 Configuration Requirements

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-1

3.1 Hardware Configuration of the U2000 ServerThis topic describes the hardware configuration requirement of the U2000 server.

Configuration Principlesl Select proper hardware configurations according to the network scale.l If multiple configuration schemes can meet the requirements of the current network scale,

determine the specific hardware configurations according to the requirements of customers.

Configuration Requirements

Table 3-1 Configuration requirements of the U2000 servers that manage networks of differentscales

Server Type

Network Scale

Small-scalenetwork: less than2000 equivalentNEs

Medium-scalenetwork:2000-6000equivalent NEs

Large-scalenetwork:6000-15000equivalent NEs

PC Server(Windows)

HP DL380G6 (CPU:2 x Xeon quatri-core2.0 GHz or later;memory: 8 GB; harddisk: 5 x 146 GB)

HP DL580G5 (CPU:4 x Xeon quatri-core2.13 GHz or later;memory: 16 GB;hard disk: 4 x 146GB)

-

Server (Solaris) Sun T5220 (CPU: 4Cx 1.2 GHz; memory:16 GB; hard disk: 6 x146 GB)

Sun T5220 (CPU: 8Cx 1.4 GHz; memory:32 GB; hard disk: 6 x146 GB)

Sun M4000 (CPU: 4CPU x 2.53 GHz(quatri-core);memory: 32 GB;hard disk: 2 x 146GB) + disk array

Table 3-2 Recommended configurations of the disk array

Hardware Configuration Item Capacity

OceanStor S2600 6 x 300 GB

You need to determine hardware configurations according to the network scales and themanagement capacities of the NMSs based on different hardware platforms.

3 Configuration RequirementsiManager U2000 Unified Network Management System

Product Description

3-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

NOTE

If the HA system is applied, you need to multiply the hardware quantity by 2. For example, if the currentlarge-scale network applies the HA system, the following hardware requirements need to be met:

l Two M4000s and two OceanStor S2600s.

3.2 Software Configuration of the U2000 ServerThis topic describes the software that can be configured for the NMS server, including systemsoftware and NMS software.

Configuration Principles

The software for the U2000 server is as follows:

l System software: It includes the operating system software and database software. To selectthe required system software, see 3.1 Hardware Configuration of the U2000 Server.

l High availability software: It refers to the Veritas software that is applicable to only thehigh availability system.

l NMS software: It refers to the software developed by Huawei. The NMS software in thisdocument refers to the U2000 software.

Configuration Requirements

The U2000 can run on multiple OSs, including Windows, Solaris. Table 3-3 lists theconfiguration standards of the system software.

Table 3-3 System software of the U2000

Item SoftwarePlatform

SoftwareType

Version Supported OSLanguage

Deliveredsoftwareplatform

x86 (Windows32 bit)

OS WindowsServer 2003 R2Enterprise +SP2

ChineseEnglish

Database SQL Server2000 Standard +SP4

SPARC (Solaris64 bit)

OS Solaris 10(10/08) +Huawei Patch9.0.1

Database Sybase 15.0.3with EBF16476+ EBF16548

Compatiblesoftwareplatform

x86 Windows(32 bit)

OS WindowsServer 2003Standard

iManager U2000 Unified Network Management SystemProduct Description 3 Configuration Requirements

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-3

Item SoftwarePlatform

SoftwareType

Version Supported OSLanguage

Database SQL Server2000 Standard

SPARC (Solaris64 bit)

OS Solaris 10

Database Sybase 12.5

Softwareplatform nolongersupported

x86 Windows(32 bit)

OS Windows 2000Server

Database MS SQL Server7.0 or SQLServer 2000

SPARC (Solaris32 bit)

OS Solaris 8

Database Sybase 12.0

High Availability SoftwareThe high availability system of the U2000 can be deployed on the Windows, Solaris OSs withthe high availability software being Veritas. Table 3-4 shows the Veritas software versions ineach platform.

Table 3-4 High availability software

Platform High Availability Software

Solaris l Delivered configurations: Veritas 5.1l Compatible configurations: Veritas 5.0MP3+RP2 and Veritas 4.1l Configurations no longer supported: Veritas 4.0 and earlier versions +

Watchman scheme

Windows Delivered configurations: Veritas 5.1

Software Configurations of the U2000The NMS software, namely, the U2000 server software, can be installed through the installationDVD or the installation package.

3 Configuration RequirementsiManager U2000 Unified Network Management System

Product Description

3-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Table 3-5 Software Configurations of the U2000

Configuration Item

Typical Configuration

U2000software

Installation DVD or installation software packageNOTE

If you install the server software through the software package, prepare a proper softwarepackage according to the components to be installed.

3.3 Configuration of the U2000 ClientThis topic describes the requirements on software and hardware configuration when theU2000 client runs on the Windows and Solaris OSs.

The U2000 client can be installed on both Windows and Solaris. Currently, it cannot be installedon SUSE Linux.

It is recommended that the U2000 client is installed on Windows.

Table 3-6 shows the hardware configuration and software configuration.

Table 3-6 Hardware and software configuration requirements of the U2000 client

Platform Hardware Configuration Software Configuration

Windows l Recommendedconfiguration: Intel E5200(dual-core) (2.5 GHz orgreater); memory (2 GB orgreater)

l Lowest configuration: IntelE2140 (dual-core) (1.6 GHzor greater); memory (2 GBor greater)

Recommended OS:l Windows XP Professional SP3Compatible OS:l Windows XP Professional SP3l Windows Vista Business with SP1l Windows 7 Ultimate (64-bit version)

Solaris Sun T5220 Solaris 10 (10/08) with Huawei Patch9.0.1

iManager U2000 Unified Network Management SystemProduct Description 3 Configuration Requirements

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-5

4 Networking and Application

About This Chapter

The U2000 provides a centralized network-wide management solution to transport, access, andIP networks. In addition, the U2000 provides standard external interfaces to integrate with theoperations support system (OSS), thereby meeting the management requirements of large-scalenetworks.

4.1 Deployment ModeYou can select a proper deployment mode according to the network scale and deploymentrequirements.

4.2 Networking Mode Between the U2000 and NEsThe U2000 adopts the widely used C/S architecture. In such architecture, the client and the servercommunicate through the LAN or wide area network (WAN). The U2000 server communicateswith its managed NEs in inband or outband networking mode.

4.3 Application Scenarios of U2000 ManagementThis topic describes typical application scenarios of U2000 management.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-1

4.1 Deployment ModeYou can select a proper deployment mode according to the network scale and deploymentrequirements.

The U2000 supports the HA system (Veritas hot standby) to ensure the high availability (HA)of the system.

Table 4-1 provides information about the deployment modes of the U2000.

Table 4-1 Deployment modes of the U2000

NMSDeploymentSolution

SupportedPlatform

Requirement onDisasterRecovery

NetworkingComplexity

Maximum Network Scale

Centralizeddeploymentscheme for asingle-serversystem

l Windows

l Solaris

Low Simple l The Windows-basedsystem supports amedium-scale network(2,000 to 6,000 equivalentNEs).

l The Solaris-based systemsupports an ultra-large-scale network (15,000 to20,000 equivalent NEs).

Centralizeddeploymentscheme for anHA system

l Windows

l Solaris

High Simple l The Windows-basedsystem supports amedium-scale network(2000 to 6000 equivalentNEs).

l The Solaris-based systemsupports an ultra-large-scale network (15,000 to20,000 equivalent NEs).

4.1.1 Centralized Deployment of a Single-Server SystemIn the centralized deployment mode of a single-server system, there is only one U2000 serveron which all processes run. The U2000 server supports communication with and operations onmultiple clients. Centralized deployment is applicable to small- and medium-scale networksbecause the deployment scheme is simple and requires low costs.

4.1.2 Centralized Deployment of an HA SystemIn the centralized deployment mode of an HA system, the servers at the primary and secondarysites form an HA system and the data is synchronized in real time between the servers. Whenthe server at the primary site is faulty, applications are switched to the server at the secondarysite automatically to continue monitoring networks and ensure system running withoutinterruption.

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

4.1.1 Centralized Deployment of a Single-Server SystemIn the centralized deployment mode of a single-server system, there is only one U2000 serveron which all processes run. The U2000 server supports communication with and operations onmultiple clients. Centralized deployment is applicable to small- and medium-scale networksbecause the deployment scheme is simple and requires low costs.

The single-server system is deployed on Windows or Solaris, and supports the networkingscheme of a single server and multiple clients, the clients and the server are connected throughLAN or WAN, as shown in Figure 4-1.

Figure 4-1 Centralized deployment of the single-server system

......

NMS Client

......

NMS Client n

NMS Server

4.1.2 Centralized Deployment of an HA SystemIn the centralized deployment mode of an HA system, the servers at the primary and secondarysites form an HA system and the data is synchronized in real time between the servers. Whenthe server at the primary site is faulty, applications are switched to the server at the secondarysite automatically to continue monitoring networks and ensure system running withoutinterruption.

The centralized HA system can be deployed on the Windows or Solaris platform. There is onlyone server at each of the primary and secondary sites. Figure 4-2 shows an example network.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-3

Figure 4-2 Centralized deployment of the HA system

Primary Site

Ethernet Port

NMS Client

Switch Switch

Ethernet Port Router Router

GNE

DCN

Secondary SiteDiskarray (Optional) Diskarray (Optional)

4.2 Networking Mode Between the U2000 and NEsThe U2000 adopts the widely used C/S architecture. In such architecture, the client and the servercommunicate through the LAN or wide area network (WAN). The U2000 server communicateswith its managed NEs in inband or outband networking mode.

4.2.1 Inband Networking ModeIn inband networking mode, the U2000 uses the service channels that are provided by themanaged equipment to transmit messages for network management and manage the network.The messages are transmitted between the U2000 and the equipment through the servicechannels of the managed equipment.

4.2.2 Outband Networking ModeIn outband networking mode, the U2000 uses the communication channels that are provided bythe equipment other than the managed equipment to transmit messages for network managementand manage the network. Generally, the management interface on the control card of themanaged equipment functions as the access interface.

4.2.1 Inband Networking ModeIn inband networking mode, the U2000 uses the service channels that are provided by themanaged equipment to transmit messages for network management and manage the network.The messages are transmitted between the U2000 and the equipment through the servicechannels of the managed equipment.

Figure 4-3 shows an example network in inband networking mode.

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 4-3 Example network in inband networking mode

Networking DescriptionThe equipment managed by the U2000 is all connected to the managed network. The U2000needs to be connected to only the nearby equipment on the managed network. After configuringthe related routes, you can manage all the equipment on the network.

The way of connecting the U2000 with the managed network depends on the distance betweenthe U2000 and its nearby equipment. If the U2000 and its nearby equipment are in the sametelecommunications room, you can connect them in LAN mode. If the U2000 and its nearbyequipment are far from each other, you can connect them in private line mode. In this case, theprivate line mode is similar to the outband networking mode.

l Networking advantages: The inband networking mode is flexible and cost-effective. It doesnot need extra equipment.

l Networking disadvantages: When a fault occurs in the network, the communication channelbetween the U2000 and its managed network is broken. As a result, you cannot maintainthe managed network on the U2000.

4.2.2 Outband Networking ModeIn outband networking mode, the U2000 uses the communication channels that are provided bythe equipment other than the managed equipment to transmit messages for network managementand manage the network. Generally, the management interface on the control card of themanaged equipment functions as the access interface.

In outband networking mode, the U2000 can be connected to the managed equipment in multipleways. For example, the U2000 can be connected to the managed equipment through the datacommunication network (DCN), E1 lines, or routers. This topic considers the DCN as an exampleto describe how the U2000 manages equipment. Figure 4-4 shows an example network inoutband networking mode.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-5

Figure 4-4 Example network in outband networking mode

Networking descriptionThe equipment managed by the U2000 is all connected to the managed network. The U2000connects with the equipment on the managed network through the DCN that is made up of otherequipment. In this manner, the U2000 manages the network and equipment.

l Networking advantages: In outband networking mode, the U2000 is not connected to itsmanaged equipment directly but is connected to its managed equipment through otherequipment. Compared with the inband networking mode, this mode provides more reliableequipment management channels. When managed equipment is faulty, the U2000 locatesinformation about the faulty equipment in a timely manner and monitors the equipment inreal time.

l Networking disadvantages: In outband networking mode, the U2000 manages equipmentthrough a maintenance channel that is independent of the service channel. To provide sucha maintenance channel, you need to construct a network that is made up of extra equipment.Thus, the cost of constructing the network is high.

4.3 Application Scenarios of U2000 ManagementThis topic describes typical application scenarios of U2000 management.

4.3.1 Unified Management of Network ProductsThis topic describes the application of the U2000 for unified management of network products,that is, typical solutions provided by the U2000.

4.3.2 Single Metro SolutionThe U2000 provides perfect solutions for single metro networks in terms of network deployment,service deployment, and service assurance.

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

4.3.3 Single Backhaul SolutionAll-IP networks become a trend in telecommunications and various mobile data services sproutout everywhere. With the development of all-IP networks and mobile data services, networksbecome complex to maintain because devices are in a huge number and of various types and arewidely used. Therefore, the operation, administration, and maintenance (OAM) system must beimproved with proper OPEX to support the configuration of more complex, flexible and variousservices and to provide fault monitoring means.

4.3.4 Single Backbone SolutionThe U2000 provides perfect solutions for single backbone networks in terms of networkdeployment, service deployment, and service assurance.

4.3.5 Single FAN SolutionThe single FAN Solution is the optical access solution that supports a large capacity ofsubscribers and long-distance transmission and provides high bandwidth. The U2000 providesa comprehensive solution for FTTx access devices to manage and maintain the OLT, ONU,SBU, CBU, and ONT in a centralized manner.

4.3.1 Unified Management of Network ProductsThis topic describes the application of the U2000 for unified management of network products,that is, typical solutions provided by the U2000.

l The U2000 is the platform for managing access, transport, and datacom equipment. Itsupports unified management of equipment across domains and also revolutionizes thevertical management mode to support unified management at the element and networkmanagement layers. In addition, the U2000 supports right- and domain-based management.This feature enables the U2000 to manage the equipment in each domain respectively tomeet the requirements for managing different networks and departments withoutinterference.

l The U2000 follows the network convergence trend and provides management solutions forvarious networking scenarios. The U2000 has a uniform GUI style, which is simple andconvenient for service provisioning. Highly effective service monitoring and serviceassurance ensure good user experience and cut the network O&M cost effectively.

l The U2000 provides unified northbound interfaces (NBIs), thereby reducing the workloadof OSS integration.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-7

Figure 4-5 Unified management of network products

Network Deploymentl Centralized deployment and right- and domain-based management

By controlling the rights of NMS users, the U2000 assigns different management rights todifferent users and specifies the objects that can be managed by the users, which ensuressystem security.

l High availability solution

The U2000 supports the high availability (HA) feature. In this manner, the HA systemmonitors the U2000 and automatically implements data protection in real time.

Service Provisioning

The U2000 automatically creates a service after you click the source and sink. This functionensures that new services can be provisioned quickly. Specifically, the time required forprovisioning services decreases from minutes to seconds and the efficiency of the configurationon a per-NE basis is improved by 90%.

l Automatic discovery of end-to-end services.

l Provisioning of end-to-end services across domains.

– Supports E2E TDM service provisioning and management across traditional microwaveand MSTP networks, which speeds up network deployment and service provisioningof a large number of microwave services.

– Supports E2E packet service provisioning and management across IP microwave andPTN/Hybrid MSTP networks, which accelerates service provisioning in an IP network.

– Supports Ethernet, CES, and ATM service management for PTN, MSTP, RTN, SW,and NE40 devices, and supports E2E management of MPLS tunnels and PWs, whichpush the fixed market towards fixed-mobile convergence (FMC).

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Supports E2E service (Ethernet, CES, and ATM) provisioning across PTN and CXnetworks, and supports E2E management of MPLS tunnels and PWs, which push themobile market towards FMC.

Service AssuranceThe U2000 supports cross-domain fault location, which greatly improves the efficiency ofrectifying faults and ensures normal running of services.l Network-wide equipment is monitored in a centralized manner and the number of alarms

decreases greatly.l Multiple network management systems (NMSs) and teams are combined into one NMS

and one team, thereby greatly improving the efficiency of rectifying faults.l Alarm correlation and intelligent analysis help to accurately locate faults.l Service-oriented alarm management helps to directly locate the base station that is affected

by an alarm and thus the efficiency of rectifying faults is improved by 50%.l Unified fiber management enables the U2000 to clearly display the fiber connections of

network-wide equipment. You can directly locate the equipment that a fiber is connectedto according to an alarm generated on the fiber.

4.3.2 Single Metro SolutionThe U2000 provides perfect solutions for single metro networks in terms of network deployment,service deployment, and service assurance.

Networking DiagramUnder the trend of all-service and super-broadband, the integration of mobile broadband andfixed broadband speeds up, and operators tend to act as all-service operators. An integratedsuper-broadband bearer network helps to quickly and flexibly deploy all services and greatlyreduce the TCO of the network. The construction of such a bearer network becomes a challengefor operators.

Carrying multiple services is one of the most distinctive features of the Metro Ethernet. Servicessuch as the high-speed internet (HSI), IPTV, and voice over IP (VoIP) services must beestablished on logical channels, as shown in Figure 4-6.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-9

Figure 4-6 Network management solution for a single metro network

The U2000 provides perfect solutions for single metro networks in terms of network deployment,service deployment, and service assurance.

Network DeploymentThe U2000 must meet the following requirements in the network deployment stage:

l Automatic discovery of network-wide equipmentThe U2000 supports the ability to automatically discover network topologies and links.

l Automatic discovery of existing servicesThe U2000 provides the function of automatically discovering services. With this function,existing services on the network side can be restored to the U2000 through only two steps.

l Visualized service deployment– One-stop configuration: The U2000 provides the tunnel template, L2/L3VPN/VPLS/

PWE3 service template, and QoS policy template for you to perform one-stop serviceconfiguration. These templates predefine 80% parameters, thus reducing theconfiguration workload.

– Batch deployment: The U2000 supports the ability to deploy services in batches andthe deployment efficiency is increased two to three times.

– Automatic computation: The U2000 automatically computes static routes and assignslabels without any manual intervention.

Service DeploymentThe Metro Ethernet often carries heavy service traffic. To adapt to this feature, the U2000provides the functions of deploying services in batches and quickly creating end-to-end servicesto accelerate the deployment process.

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l End-to-end service management and deployment

The U2000 allows you to quickly establish specific logical channels on physical networksthrough GUIs. You can verify the validity of services before deployment and modifyservices after the logical channels are established.

– Creation of an end-to-end tunnel: After you select the ingress, egress, and transit nodes,an end-to-end tunnel can be automatically created. After tunnel configuration,parameter settings can be instantly deployed and both the primary and bypass hop-by-hop tunnels can be displayed in the topology view. The U2000 supports the ability tocreate forward and backward tunnels at the same time, which facilitates tunnelmanagement. In addition, the U2000 supports automatic assignment of LSP labels, thusfreeing you from manually assigning labels.

– Creation of an end-to-end service: After you select the ingress node, the egress node,and the tunnel that is used to carry an end-to-end service, the service can beautomatically created. The U2000 can automatically check service configurations andservice connectivity, ensuring that services can be successfully deployed at a time.

l Batch management of multicast parameters

The U2000 supports the ability to set, adjust, and verify multicast parameters in batches,which helps operators to improve the efficiency of IPTV service deployment and helpsusers to know the running status of multicast services in real time.

Service Assurance

The U2000 monitors the running status of the network 24 hours a day and 7 days a week inmultiple ways. It can detect network faults or degradation in a timely manner and report end-to-end SLA data of the network.

The U2000 provides the following service assurance measures for the broadband bearer network:

l Reduction of IP alarms

On the U2000, four technologies are used to reduce the great number of IP alarms, and thenumber of alarms in typical scenarios is reduced by 85%.

l Fault location

The U2000 can display network-wide routes and allows you to accurately diagnose servicefaults layer by layer and hop by hop. Service faults can be located to specific NEs andprotocols, and the location duration is reduced from several hours to only several minutes.

l Visualized service monitoring

– Supports service-oriented visualized service monitoring so that you can directly queryservices affected by a specific alarm.

– Provides abundant service-based test and diagnosis methods that can be used to quicklycheck service connectivity and rectify faults.

– Provides service-based functions of displaying performance through GUIs, generatingalerts when performance thresholds are exceeded, and analyzing the performance trend.

– Supports layered management so that you can query the network bearing relation in realtime.

l Visualized object relation

– On the U2000, services are associated with tunnels and tunnels are associated withroutes so that the network bearing relation can be easily identified.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-11

– When a fault occurs, you can quickly locate and rectify the fault according to the bearingrelation.

l Fast check of network-wide links– The network scanning tool can automatically compute IP links between equipment,

which improves the network check efficiency.– The status of network-wide links can be monitored through only two clicking

operations.– Different network quality is shown in different colors: red, yellow, and green. This helps

you to easily find network problems and rectify the problems accordingly.l Independent Web-based performance report system (iWeb)

– You can log in to the iWeb report system anytime, any place.– You can use the Internet Explorer to log in to the iWeb report system, without upgrading

any client.– The iWeb report system provides various reports, including resource reports,

performance reports, and fault reports.l Real-time alarm monitoring and notification

The U2000 can monitor network faults and the status of equipment and interfaces in realtime. By notifying the related personnel of network faults through SMSs or emails, theU2000 effectively ensures the normal running of the network.

l Performance monitoring 24 hours a day and 7 days a weekThe U2000 regularly collects the traffic data of all the links or some key links on the entirenetwork to provide effective support for network monitoring.

l End-to-end SLA monitoring on network nodesThe U2000 regularly collects the SLA data between PEs, between the local CE and PE,and between the PE and remote CE. With these data, you can discover network degradation,predict the trend of network running, and optimize the network accordingly.

NOTE

l PE: Provider Edge

l CE: Customer Edge

4.3.3 Single Backhaul SolutionAll-IP networks become a trend in telecommunications and various mobile data services sproutout everywhere. With the development of all-IP networks and mobile data services, networksbecome complex to maintain because devices are in a huge number and of various types and arewidely used. Therefore, the operation, administration, and maintenance (OAM) system must beimproved with proper OPEX to support the configuration of more complex, flexible and variousservices and to provide fault monitoring means.

All-IP implementation in the mobile bearer network presents the following challenges to theOAM:l Unified management of many types of devices: Fibers, microwaves, copper cables, and

Ethernet may function as media to carry services of mobile bearer networks. Themaintenance and management of various types of media challenge carriers.

l End-to-end (E2E) service provisioning and QoS assurance: The OAM experience oftraditional SDH and MSTP networks must be inherited for the OAM of all-IP bearernetworks. In addition, all-IP networks need to be merged with connectionless bearer

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

networks. Therefore, carriers need to improve their capabilities in E2E service managementand QoS monitoring.

l As shown in Figure 4-7, in mobile bearer networks, 2G and 3G services on the base station(BS) side are transmitted through TDM-E1, IMA-E1, or FE ports and then carried overE2E PWs. In addition, fixed networks and mobile networks are merged. Specifically, theCX series equipment carries broadband services and the PTN equipment functions as themobile access service gateways at the two ends.

Figure 4-7 SingleBackhaul solution

The U2000 provides solutions to the Network Deployment, Service Provisioning, and ServiceAssurance of mobile bearer networks.

Network Deployment

One visit to site without field software commissioning

l The data communication network (DCN) becomes available automatically and theU2000 searches for devices remotely. In this case, software commissioning engineers orcustomer engineers do not need to visit sites and only hardware installation engineers needto visit sites to install devices. That is, the devices do not require field softwarecommissioning.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-13

l Software commissioning is implemented in the network management center (NMC) in acentralized manner. Hence, customer engineers do not need to visit sites for cooperationand the duration of software commissioning is reduced by 50%.

Auto-discovery of NEs and linksl The U2000 automatically searches for all NEs in a specified range and creates the NEs in

the Main Topology.l NEs that are searched out are displayed in a list, which helps you modify and maintain NE

properties in a unified manner.l The U2000 automatically searches for fibers in a specified range and creates the fibers in

the Main Topology.

Fast fiber search and creation. Automatic fiber search helps you create fibers quickly andcorrectly and facilitates network construction.

Automatic network-side IP address assignmentl Automatic IP address assignment on the NE network side: Network-side IP addresses of

NEs can be automatically assigned when fibers are created, which simplifies networkdeployment.

l Centralized management of IP addresses of NEs: A report is provided to collect the IPaddresses of all NEs on the entire network.

Plug-and-play (PnP) function of devices. After a device is connected to a microwave network,all devices on the network are searched out and are displayed in a list. The U2000 supports one-touch device creation.

PnP function of cards. A physical card is automatically displayed when the NE Panel isdisplayed. The U2000 supports one-touch card creation.

Packet service cutover of PTN equipment. Six steps complete the cutover of packet services. Inthe daytime, cutover tasks are created in batches and service data to be cut over are verified. Atnight, services are automatically cut over. Automatic cutover reduces the workload and increasesthe efficiency.l With an increase in services, packet service cutover can quickly balance the service traffic

load between the RNC and base station controllers (BSCs).l To meet the requirements of frequent network adjustment, packet service cutover can

efficiently and correctly adjust services to reduce errors and service interruption.

Automatic WDM optical power commissioning. Automatic WDM optical powercommissioning lowers the skill requirements for deployment engineers and increases the overalldeployment efficiency to a great extent.l WDM optical power is automatically adjusted.l Multiple types of fibers are supported, such as G.652, G.653, G.655, and the combination

of G.652 and G.655.l Mainstream WDM equipment from Huawei and many networking modes are supported.

For example, the chains, rings, intersecting rings, and mesh networks are supported.

Wizard-based network adjustment. Wizard-based network adjustment simplifies networkadjustment.l Nodes can be added to a ring or link and the link capacity can be expanded.l Wizard-based and step-by-step operations increase the efficiency in network adjustment

and lower the skill requirements of OAM engineers.

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l The entire process of network expansion can be assured. Specifically, network resourcesare checked before network expansion, an automatic service rollback is triggered upon anexpansion failure, and a comparison report is generated after a successful networkexpansion. This ensures a high reliability in network expansion and facilitates management.

Service ProvisioningE2E management and service provisioningl The E2E packet service provisioning and management of the IP microwave and PTN/MSTP

devices speeds up service provisioning on the IP network.l The E2E TDM service provisioning and management of the traditional microwave and

MSTP devices increases the efficiency in the network deployment and service provisioningof a huge number of microwave devices.

l E2E service provisioning on the network of the PTN equipment and CX equipment issupported.

l E2E packet service provisioning on the network of the PTN equipment and MSTPequipment is supported.

l The network of the OptiX RTN 910/950 and PTN equipment is supported and E2E CESservice provisioning can be performed on the mixed network.

l The network of the PTN equipment and CX equipment is supported.

Visualized E2E service provisioningl Visualized tunnels.l Visualized protection relationships between tunnels.l Visualized service topologies that can be previewed.

Bulk deployment: The U2000 supports the bulk deployment of Metro Ethernet services to bettermeet the requirements of deploying these services in a large number. Bulk deployment speedsup service deployment.

Fast service provisioning: Configuration is applied to NEs quickly after you specify the source,sink, and TE constraints. In addition, hops of working and protection trails are displayed in thetopology view.

Quick, accurate, and automatic service restoration. The U2000 provides an automatic servicerestoration function that is easy to use. By using this function, only two steps are required torestore network-side services to the E2E service configuration on the U2000. As a result, servicesare quickly provisioned.l Services are automatically created after you specify the source and sink and select a routing

policy. In this case, service provisioning is efficient and errors are reduced.l Services can be created in batches, which achieves the fast provisioning of a large number

of services.l The creation and management of E2E services that traverse both microwave and MSTP

equipment are supported, which is unique in the industry.

Service AssuranceService-based E2E OAMl All OAM data are configured based on E2E services and you do not need to configure

OAM data for each node on an E2E trail separately.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-15

l Default parameters are provided and one-touch tunnel configuration is supported. Wizard-based Ethernet OAM is supported and a remote maintenance endpoint point (MEP) isautomatically generated.

Service-based fault diagnosis and fast fault locatingl E2E service diagnosis is supported and the diagnosis is not required on each node. This

helps to locate a fault quickly.l Fault information is collected during a diagnosis. The fault information helps analyze fault

causes quickly.

Visualized network-wide clockl Clocks such as IEEE 1588v2 clocks, synchronous Ethernet clocks, and SDH clocks can be

auto-discovered in the topology view. In addition, network-wide clocks are displayed in aunified topology view. In the topology view, the clock tracing status and clocksynchronization status are refreshed in real time when a network fault occurs.

l The clock status is monitored in real time and the clock alarm, clock tracing status, andclock protection are displayed in real time.

Server-centered alarm monitoringl Relevant alarms are displayed in the E2E service management window when the network

is faulty and affects service provisioning.l Services affected by alarms can be located by a one-touch operation in the alarm

management window.l You can view network-wide alarms on the U2000 client or Web browser after alarms are

generated.

4.3.4 Single Backbone SolutionThe U2000 provides perfect solutions for single backbone networks in terms of networkdeployment, service deployment, and service assurance.

With the development of carrier-class IP technologies such as MPLS, VPN, and OAMtechnologies, carrier-class network technologies based on the IP backbone network becomeincreasingly mature. The single backbone solution is provided for multi-service core bearnetworks, Internet backbone networks, and international gateways. Carrier-class maintenancemust be performed strictly on the IP core network because of its core position on atelecommunications network. As shown in Figure 4-8, the single backbone network has thefollowing networking features:

l The core layer uses the dual-plane structure and fully meshed connections are set upbetween Ps.

l Dual-homing connections are set up between convergence-layer equipment (PEs) and Ps.l Two sets of equipment are deployed on important nodes for backup.l The MPLS VPN is planned in a unified manner to perform isolation between users or

services.

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 4-8 Network management solution for a single backbone network

Network DeploymentThe U2000 meets the following requirements in the network deployment stage:

l Automatic discovery of topologies and servicesThe U2000 supports the ability to automatically discover network topologies, links, and IPservices.

l End-to-end reliabilityThe U2000 supports the abilities to manage mainstream routing protocols such as OSPF,IS-IS, and BGP, configure IGP (OSPF and IS-IS) fast convergence, and configure BFD,VRRP, IP FRR, VPN FRR, and MPLS OAM to ensure service reliability.

l End-to-end QoS deploymentThe U2000 supports QoS deployment in common Diff-Serv mode so that traffic can beclassified according to the service priorities of users. On a PE, complex traffic classificationis performed according to the source IP address, destination IP address, interface, andVLAN; on a P, only simple traffic classification is performed. In addition, the U2000supports VPN HQoS deployment to schedule multiple services on a VPN and differentVPN traffic on public TE tunnels.

Service DeploymentThe U2000 provides the following functions to effectively and accurately deploy services:

l Supports the setup of MPLS tunnels.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-17

l Supports the deployment of mainstream services (for example, L2VPN, L3VPN, andPWE3 services) that are carried over tunnels, provides multiple service configurationtemplates and batch configuration templates, and supports the automatic verification ofparameter settings.

l Provides simple and user-friendly GUIs to effectively improve service deploymentefficiency.After a service is created in the topology view, the U2000 immediately displays the creationand deployment results. All parameters can be set in only one GUI, which quadruples theconfiguration efficiency.

Service AssuranceThe U2000 provides the following service assurance measures for the single backbone network:

l Protection switchover in less than 50 ms in case of local faultsYou can configure MPLS TE FRR to implement fast route convergence. This ensures thattraffic can be switched in 50 ms after a fault occurs on a node or link on the network. Onan MPLS TE network, after the primary LSP is configured with FRR, traffic is quicklyswitched to the bypass LSP if a link or a set of equipment becomes faulty. MPLS TE FRRis a temporary local protection mechanism. With this mechanism, when the primary LSPrecovers, traffic is switched back to the primary LSP or a new LSP.

l Protection switchover in less than 200 ms in case of end-to-end faultsWith VPN FRR deployed, when a fault occurs on a remote PE, the local PE can quicklyswitch traffic to the remote backup PE in 200 ms. The switching duration is irrelevant tothe number of routes on the private network.

l Real-time alarm monitoring and notificationThe U2000 can monitor network faults and the status of equipment and interfaces in realtime. On the U2000, the status and severities of equipment alarms are identified by colorsof nodes in the topology view. Maintenance engineers can quickly locate alarm-affectedservices from specific equipment alarms. By notifying remote users of network faultsthrough SMSs or emails, the U2000 ensures the timely processing of network faults.

l Performance monitoring 24 hours a day and 7 days a weekThe U2000 periodically collects the key performance indicators of networkwide links orspecified links and dynamically displays the network running status, providing importantreferences for locating network faults. The U2000 provides support for network monitoringby regularly collecting the traffic data on network-wide links or important links.

l End-to-end SLA monitoring on network nodesThe U2000 regularly collects the SLA data between PEs, between the local CE and PE,and between the PE and remote CE. With these data, you can discover network degradation,predict the trend of network running, and optimize the network accordingly.

l Layered fault diagnosis and locationAfter a fault occurs, the U2000 analyzes the tunnel associated with the specific service andthe route associated with the tunnel, and then diagnoses the service according to differentnetwork layers to accurately locate the faulty point (equipment, port, or service) and thecauses of the fault for the purpose of troubleshooting.

4.3.5 Single FAN SolutionThe single FAN Solution is the optical access solution that supports a large capacity ofsubscribers and long-distance transmission and provides high bandwidth. The U2000 provides

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

a comprehensive solution for FTTx access devices to manage and maintain the OLT, ONU,SBU, CBU, and ONT in a centralized manner.

In the FTTx access solution, a single fiber is used to provide voice, data, and video services. TheFTTx access solution meets the networking requirements for the fiber to the curb (FTTC), fiberto the building (FTTB), fiber to the home (FTTH), base station transmission, IP private lineinterconnection, and wholesale services. Figure 4-9 shows the networking application of theFTTx access network management.

Figure 4-9 Networking application of the FTTx access network management

Network DeploymentIn an FTTx network, the U2000 provides the ONU predeployment and remote acceptancefunctions. By using the functions, you can improve the ONU deployment efficiency and reducethe operational expenditure (OPEX).l The U2000 provides the ONU predeployment function. Before powering on an ONU, create

a corresponding virtual NE and configure service data on the U2000. After you power onthe ONU, the U2000 automatically applies the preset configuration to the ONU to completethe service deployment. Therefore, the network predeployment and device installation canbe started at the same time. In this way, the time required for network construction isreduced by half.

l The U2000 provides the function of predeploying NEs by means of a sheet. By using thisfunction, you can import data of NEs to the U2000 in batches, thus installing the devices

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-19

without software commissioning and performing remote acceptance. Engineers only needto visit a site once. The plug and display (PnP) feature of the ONU is implemented.Therefore, the deployment efficiency is greatly improved, and the network constructioncost is reduced.

l The U2000 provides flexible authentication that works together with the preconfigurationfunction to implement the PnP of the ONU. In this way, the installation cost is greatlyreduced. After you replace an ONU with a new one upon a fault, you only need to enterthe authentication information. Then, the U2000 automatically applies the configurationdata of the faulty ONU to the new ONU. You do not need to re-configure the new ONU.

l The U2000 provides the remote acceptance function for the ONU. Specifically, theU2000 automatically applies the preconfiguration data after the ONU goes online andimplement the remote service acceptance, if you create an acceptance task for the ONUwhen it is offline.

The U2000 provides a solution to quick ONU deployment. With the solution, engineers onlyneed to visit a site once and complete the ONU deployment in five steps as follows:

1. Plan data: With the Excel-based plan tool, you can easily copy and paste data. This functionis applicable to the configuration of a large amount of data.

2. Perform offline deployment: Import Excel sheets that contain planned data to the U2000and complete the offline pre-provisioning of services.

3. Install ONUs on site: Install ONUs without software commissioning on site.4. Activate services: Power on ONUs. The PnP features of the ONUs take effect.5. Perform remote acceptance: Engineers do not need to visit the site. Instead, NEs

automatically report acceptance results without manual intervention.

Figure 4-10 shows the FTTx predeployment flow.

Figure 4-10 FTTx predeployment flow

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Service ProvisioningThe U2000 provides the following three convenient and fast service provisioning means. Withthese means, you can fast provision the configuration data of FTTx NEs regardless of whetherthe OSS is interconnected with the EMS.l Automatic provisioning upon interconnection with the OSS:

The U2000 provides standard and open northbound interfaces (NBIs) that implement fastinterconnection with the OSS for the FTTx solution.

l Sheet-based service provisioning:The U2000 provides the convenient and fast predeployment for ONUs and preconfigurationfor services in the FTTx solution. With this function, the U2000 automatically provisionsservices and thus reduces costs in labor.

l FTTx service provisioning template:The U2000 provides templates for provisioning FTTx services. You can customize serviceprovisioning templates for different subscribers. With such a template, you can implementthe one-touch service provisioning. In this way, the efficiency and correctness of serviceprovisioning are greatly improved.

Service Assurancel FTTx fault diagnosis:

By using the traditional method, you need to locate a subscriber fault part by part. Inaddition, you need to locate faults of different types in different user interfaces for functionmodules. Those user interfaces are not integrated and thus you need to frequently switchbetween the user interfaces. As the FTTx is used more widely, access fault diagnosisbecomes more important. The U2000 provides the FTTx fault diagnosis function. With thisfunction, you only need to enter the object to be diagnosed and then perform one-touchfault diagnosis. Figure 4-11 and Figure 4-12 show the fault diagnosis of FTTx services.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-21

Figure 4-11 FTTx fault diagnosis (1)

Figure 4-12 FTTx fault diagnosis (2)

l Root cause identification upon an FTTx alarm:

With this function, you can quickly and correctly identify the cause why an ONU isunreachable. The cause can be identified as a backbone fiber fault, a branch fiber fault, or

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

power-off of an ONU. In this way, the orders for useless field jobs are reduced.Table 4-2shows how to identify the cause of a fault by means of the alarm-based root causeidentification.

Table 4-2 Relationships between faults and their causes that are identified by means of thealarm-based root cause identification

Cause Alarm ReportedFrom the OLT

Alarm ReportedFrom the ONU

U2000 Alarm

Backbone fiber cut LOS alarm withoutthe ONU ID

None When the OLTreports the LOSalarm for the PONport, the U2000determines that thebackbone fiberconnected to thePON port is faulty.

Branch fiber cut LOSi alarm with theONU ID

None When the OLTreports the LOSialarm with the ONUID, the U2000determines that thebranch fiberconnected to theONU is faulty.

ONU power-off Power-off alarmwith the ONU ID

Dying gasp alarm When the OLTreports the power-off alarm with theONU ID, theU2000 determinesthat the ONU ispowered off.

l PnP (plug and play) of the MDU after replacement:

When an MDU is faulty, you need to locate the fault and recover services quickly. It is timeconsuming to locate and troubleshoot an internal fault in the MDU. Therefore, it isrecommended that you directly replace the faulty MDU and save and repair faulty MDUsin a centralized manner. The U2000 provides the PnP function of the MDU. With thisfunction, you only need to rebind the MAC address or SN of the MDU on the U2000 andthen the U2000 automatically applies the configuration and NE software version to theMDU. You need configure the MDU neither on site nor on the OSS.Figure 4-13 showsthe implementation of the PnP function after replacement.

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-23

Figure 4-13 PnP function of the MDU after replacement

l Dual homing protection at the PON port:

As the split ratio increases, the number of subscribers connected to a PON port increases.The dual homing protection at the PON port is provided to fast recover services when thebackbone fiber between the PON port and the splitter is faulty. The U2000 supports thedual homing protection of type B at the PON port. When the active fiber connected to theOLT is faulty, the U2000 automatically switches the services to the standby fiber. Thissolution improves the disaster tolerance capability of the OLT. Figure 4-14 shows theimplementation of the dual homing protection at the PON port.

Figure 4-14 Implementation of the dual homing protection

4 Networking and ApplicationiManager U2000 Unified Network Management System

Product Description

4-24 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Fast service cutover at the PON port:

The PON port on a live network is not pluggable. When an PON port or card is faulty orthe network is adjusted, you can delete the faulty PON port, create an EPON port or card,and then add all MDU data to the new port or card to implement batch data migration. Inthis case, the data configuration is complex and relevant services will be interrupted for along period of time. The U2000 provides the service cutover function. When a PON portof an OLT is faulty, disconnect the fiber from the faulty PON port and connect the fiber toan idle PON port of the same OLT. Then, duplicate the configuration data of the faultyPON port to the idle PON port. That is, you migrate the configuration of the MDUsconnected to the PON port to the idle PON port. In this manner, relevant services fastrecover.Figure 4-15 shows the implementation of the dual homing protection.

Figure 4-15 Implementation of the fast service cutover

iManager U2000 Unified Network Management SystemProduct Description 4 Networking and Application

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

4-25

5 Basic Functions

About This Chapter

The U2000 provides all management functions at element management layer and networkmanagement layer.

Figure 5-1 shows the basic functions of the U2000.

Figure 5-1 Basic functions of the U2000

Security management

Fault management

Topology management

Performance management

Network management

Alarm severity and status

Network-wide alarm monitoring

Alarm statistics

Alarm handling

Remote alarm notification

Alarm correlation analysis

Performance handling process

Monitoring template management

Security management policy

Right- and domain-based management

Subnet management

NE management

NE user management

Security of NE access

NE license management

Card management

Link management

Monitored instance management

Performance data viewing

Data lifecycle management

Network performance monitoring

MSTP network management

WDM network management

RTN network management

PTN network management

Router and switch network management

Security network management

Access network management

5.1 Overview of Functions and FeaturesThis topic presents an overview of functions and features of the U2000.

5.2 Security ManagementThis topic describes how to implement security management by managing users, login, and theauthorization of right- and domain-based operations, ensuring the security of the U2000.Meanwhile, the security management supports the log management in terms of the login,

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-1

operations, and running, and supports the HA scheme and data backup to achieve an excellentsecurity solution.

5.3 Topology ManagementIn topology management, the managed NEs and their connections are displayed in a topologyview. You can learn the network structure and monitor the operating status of the entire networkin real time by browsing the topology view.

5.4 Alarm ManagementWhen an exception occurs on a network, the U2000 needs to notify maintenance engineers ofthe exception in a timely manner, so that the maintenance engineers will recover the networkefficiently.

5.5 Performance ManagementThe performance of a network may deteriorate because of internal or external problems andfaults may occur. The performance management function enables you to detect the deterioratingtendency in advance and solve the potential threats so that faults can be prevented.

5.6 Inventory ManagementThe U2000 supports unified inventory management of physical resources and service resourceson the entire network. On the U2000, you can quickly and clearly view information about variousresources network-wide. The inventory information serves as a reference for service planningand expansion planning.

5.7 Log ManagementLogs record the information about operations performed on the U2000 and important events thatoccur in the U2000. The U2000 allows administrators to query and save logs and collect statisticson logs periodically. This facilitates detection of unauthorized logins and operations and faultanalysis. Specifically, by browsing and collecting statistics on logs, you can query the clientfrom which a U2000 user logs in to the U2000 server and query the operations performed bythe user after login. You can also dump and print logs. Logs also can record operations that theOSS performs on NEs through NBIs.

5.8 Database ManagementDatabase management involves the management of NE databases and U2000 databases, andmaintenance of data consistency between the U2000 and NEs.

5.9 NE Communication Parameter ManagementThe U2000 communicates with managed NEs successfully only after you correctly set theconnection parameters of the U2000 and the managed NEs.

5.10 DCN ManagementDCN management is applicable to MSTP, WDM, microwave, submarine cable NEs.

5.11 NE Software ManagementThe NE software management module (called DC) is an independent subsystem of the U2000and it is used to manage software and data on NEs. The DC enables you to back up NE data andupgrade or downgrade NE software.

5.12 Report ManagementThe U2000 provides reports about alarms, logs, and resources. You can print the required dataor save the data as a file when viewing it. The reports in tabular format can be filtered byequipment type and saved in XLS, TXT, HTML, or CSV files.

5.13 System MonitoringThe U2000 provides a GUI-based system monitoring tool, which is used to manage theU2000 and query the system information.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

5.1 Overview of Functions and FeaturesThis topic presents an overview of functions and features of the U2000.

Table 5-1 Overview of functions and features of the U2000

FunctionorFeature

Description

Unifiednetworkmanagement

The U2000 provides the unified GUI-based management of Huawei NEs in thetransport, IP, and access domains. It is a unified network management system(NMS) that offers comprehensive functions in managing NE alarms, networkalarms, security, performance, topology, logs, inventories, reports, anddatabases. This function meets the requirements of network convergence andrapid development of customer services.

Centralized taskmanagement

Centralized task management is an NMS task management mechanism thatmanages and coordinates all scheduled tasks in a unified management GUI. Twotypes of tasks are managed in the centralized task management: system scheduledtasks (periodic) and custom scheduled tasks (one-off). The two types of taskscan run automatically at a scheduled time and users can set parameters andbrowse the task status, progress, and results.

NEtemplatemanagement

NE template management allows users to bulk configure NEs by means ofduplication, which makes NE configuration faster and easier. After a template isreferenced in NE configuration management, NE resources are assignedautomatically with parameter values in that template. This avoids tedious andlabor-intensive configuration.

NE dataconfiguration andmanagement

In NE data configuration, the U2000 supports bulk configuration of NE servicesby using configuration templates, importing data sheets, and loadingconfiguration files. In data management, the U2000 supports the backup,restoration, and synchronization of NMS data and NE data. With this function,services can be provisioned quickly in the GUI.

Licensemanagement

NE license management allows users to query, apply for, install, and adjust NElicenses (in case of capacity change and server change). By setting NE licenses,users can perform functions as required. NE licenses also controls the validityperiods of and functions available to NEs. Users can view the status of NEs andmake adjustment accordingly in license management.

Clientautoupdate(CAU)

The CAU function enables the U2000 client to upgrade automatically throughthe Internet provided that the U2000 server functions properly and communicatessuccessfully with the U2000 client.

Checkafter theupgrade

The U2000 can be upgraded smoothly without service interruption. After theupgrade, the NE status, basic services, and routing relationships are checked anda check report is generated. This helps to ensure the normal running of majorservices immediately after the upgrade and achieve timely detection of issuessuch as data loss.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-3

FunctionorFeature

Description

OnlineHelp

The Online Help is displayed if users press F1 when using the U2000. It providescomprehensive help information and supports fast searches for information. Thehelp information is also available in offline mode.

5.2 Security ManagementThis topic describes how to implement security management by managing users, login, and theauthorization of right- and domain-based operations, ensuring the security of the U2000.Meanwhile, the security management supports the log management in terms of the login,operations, and running, and supports the HA scheme and data backup to achieve an excellentsecurity solution.

Figure 5-2 shows the overview of security management.

Figure 5-2 Security management overview

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

NOTEThis section mainly describes the NMS user security.l For the security solution to the log management, see Log Management.l For the U2000 HA scheme, see Deployment Mode.l For the backup and restoration of the database, see 5.8 Database Management.l For details about the firewall security policy, system enhancement policy, OS and database security

policy, and data transmission security policy, see chapter "Security Planning" in the iManager U2000Planning Guide

User ManagementThis feature is to assign NMS users the appropriate rights for management and maintenancefunctions according to the O&M requirements when NMS users are planned.l User management: The U2000 uniquely identifies the login, operation, and management

rights of NMS users according to user names and passwords. Only one default user, useradmin, is provided after the U2000 is installed. User admin is a superuser and has alloperation and management rights. Other users are directly or indirectly created by useradmin.– The U2000 supports the creation, modification, and deletion of users.– The creation of users involves setting detailed information about users, the user group

to which a user belongs, the management domains, the operation rights, and the ACL.l User group management: The U2000 supports the creation, modification, and deletion of

user groups. The U2000 supports the function of creating a user group to manage users thathave the same rights and to bulk manage rights of NMS users, which reduces managementcosts. After the management attributes of a user group are set and a user is added to theuser group, the user has all rights of the user group. A user can be added to multiple usergroups. In this case, the user has all the rights of the user groups as well as the rights thatare assigned to the user. The U2000 provides five default user groups: security managementgroup, operator group, administrator group, monitor group, and maintainer group.

Right ManagementA right defines the operations that can be performed on managed objects. Different users havedifferent operation rights over different managed objects. The right elements include managedobjects and operation rights, as shown in Figure 5-3.

Figure 5-3 Right

Right management Managedobjects

Operation rights(login,operation, querying)= +

After NMS users are planned, the users can perform operations on NEs only after rights areassigned to them.

l Management domain rights define the objects that can be managed by users or user groups,and the range of the configuration data. For example, if user A is not authorized to manageequipment C and object set D, equipment C and object set D are invisible to user A in the

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-5

topology view. An object set is a collection of multiple pieces of equipment. The U2000supports the creation, modification, and deletion of object sets.

l Operation rights define the operations that a user can perform. When multiple users managethe same device or object set, they have different operation rights over the device if differentoperation rights are assigned to them. An operation set is a collection of multiple rights.Operation right management is implemented by managing the operation sets or specificrights. If operation sets are assigned to users or user groups, they have rights that theoperation sets include. The U2000 supports the creation, modification, and deletion ofoperation sets.

l The U2000 also supports right- and domain-based management. Only the operations withinthe rights of a user in a certain domain can be performed on NEs of this domain. Onlysystem administrator and members of the security management group can assign rights anddomains to other users.– Domain-based management refers to dividing equipment nodes, services, or data to

different domains. The administrators of different domains manage different objectswith the domain rights that are assigned to them. Meanwhile, certain NEs can beassigned directly to a certain user.

– Right-based management refers to domain-based authentication. Users and user groupshave different operation rights if they are assigned these rights. After dividing domainsand then dividing rights, the personnel with different duties or positions in the samedomain have different operation rights over different objects in the domain.

User Authentication ManagementU2000 provides three types of user authentication management: local authentication, RADIUSauthentication, and LDAP authentication.l Local authentication: NMS user management, login authentication, and the security

strategy are all implemented by the U2000 server. Local authentication is the managementmethod of the login authentication by default. For the details, see Local Authentication.

l RADIUS authentication: When a user logs into the U2000, the RADIUS server verifiesand authenticates the login request, and the U2000 assign rights to login users accordingthe rights that their user group has. For the details, see RADIUS-based Authentication.

l LDAP authentication: When a user logs into the U2000, the LADP server verifies andauthenticates the login request, and the U2000 assign rights to login users according therights that their user group has. The LADP-based authentication is similar to the RADIUS-based authentication, but the authentication protocols are different. For details, see LDAP-Based Authentication.

Local AuthenticationIn the local authentication mode, user security management ensures the secure running of theU2000 in multiple aspects, including local user management, right management, passwordpolicy, account policy, and login control.

l Setting of the password policy– Setting the minimum password length and maximum password length.– Setting the correlation policy between the current password and history passwords,

including the maximum times for password repetition, the number of characters ofhistory passwords that the current password cannot contain, and whether the passwordcan be similar to history passwords.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Setting the validity period of the password, including the maximum and minimumperiod validity of the password, the number of days warning given before the passwordexpiry.

– Setting the rules for the forms of passwords.l The account policy involves the account validity period, minimum length of a user name,

automatic unlocking time, maximum number of login attempts, timeout period for a loginor unlocking failure, and user policy of no login within a period.

l Login control involves the login mode, the login period control, and the IP address control.– User login mode specifies whether multiple users are allowed to log into the U2000 at

the same time. Usually, multiuser mode is adopted. If you need to perform specialoperations on the U2000 server, you can set the user login mode to single-user mode,avoiding interferences from the operations of other users.

– Users can log in to the U2000 only in the specified login period.– The ACL controls the login IP addresses of clients. Users can log in to the U2000 server

only from certain IP addresses. Therefore, even if the user account and the passwordare obtained by unauthorized users, these users cannot log in to the U2000 server, andthus the U2000 security is improved.

RADIUS-Based AuthenticationWhen the RADIUS authentication is adopted, the administrator does not need to create a useraccount on the NMS in advance. The user account for logging in to the U2000 is an existingaccount that can pass the authentication of the RADIUS server.

When a user enters the user name and password, the security process of the U2000 server sendsthe user name and password to the RADIUS server. If the user passes the RADIUSauthentication, the security process learns the user group to which this user belongs, and thenthe security process assigns rights to the user according to the operation set policy of the usergroup.

NOTE

Before adopting the RADIUS authentication mode, make sure that the name of the user group defined onthe U2000 is the same as that defined in the account database of carriers. In addition, make sure that theaccount to be authorized for logging in to the U2000 is added to the corresponding user group.

For the RADIUS-based authentication process, see Figure 5-4.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-7

Figure 5-4 RADIUS-based user authentication

User anduser group datebase

RADIUSserver

User groupprivilege

Securityserver

U2000 user

U2000 server

AAA agent

SecurityNBI

OSSAuthentication

GUI

LDAP-Based AuthenticationAs a distributed client/server system protocol, LDAP is adopted in the VPN and WAN to controlthe users' access to the network and prevent unauthorized users from accessing the networks.The LDAP-based authentication mode is similar to the RADIUS-based authentication modeexcept for different authentication protocols. Compared with the RADIUS authentication, theLDAP authentication supports the following features:l Supporting common mode (encryption-free), SSL mode, and TLS mode for the

communication between the U2000 and the LDAP server.l Supporting multiple LDAP authentication servers and being compatible with the HA

scheme of the U2000.

For the LDAP-based authentication process, see Figure 5-5.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 5-5 LDAP user authentication

User anduser groupdatabase

LDAP server

User groupdatabase

Securityserver

U2000 user

U2000 server

AAA agent

SecuriytNBI

OSS

Session Management

l If a user does not perform operations on the client temporarily, the user can lock the clientmanually or set the time for the U2000 to automatically lock the client to preventunauthorized operations. To unlock the client, the user must enter the password of thecurrent login user or use the account of the administrator.

l The members of the administrator group can monitor sessions and operations of commonU2000 users, forcibly log out U2000 users, and unlock U2000 users.

l The U2000 can automatically detect and clear invalid sessions.

l Client lockout: If a user does not perform operations on the client temporarily, the user canlock out the client or set the time to automatically lock the U2000 client to preventunauthorized operations. To unlock the client, the user must enter the password of thecurrent login user or use the account of the administrator.

5.3 Topology ManagementIn topology management, the managed NEs and their connections are displayed in a topologyview. You can learn the network structure and monitor the operating status of the entire networkin real time by browsing the topology view.

The U2000 has the Physical Root, Clock View, Tunnel View, and Custom View. Requiredinformation can be easily learned in different views, which enables you to learn and monitor theoperating status of the entire network conveniently.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-9

The U2000 offers service topology management for various end-to-end services, for example,VPLS services, PWE3 services, L3VPN services, E-AGGR services, and tunnel services. Bymeans of the service topology, users can view and configure services easily.

Topology View and Its FunctionsThe topology view of the U2000 consists of a navigation tree on the left side and a view on theright side. The navigation tree shows the network hierarchy. The view displays the objects atdifferent coordinates on the background map, which helps to identify the locations of deployedobjects.

Figure 5-6 shows the topology view of the U2000 and its functions.

Figure 5-6 Topology view and its functions1 2 43 5

678910111213

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

1: Name of the networkmanagement systemYou can change the name ofthe network managementsystem (NMS) as required.

2: Menu barWith submenus, you canperform operations on the NMSand NEs, such as configuringand managing tasks.

3 and 4: Toolbar buttonsl 3: You can click a

button to perform asimple task quickly.For example, exiting anNMS, locking aterminal, logging out ofan NMS, launching theNE Explorer, viewingalarms, and viewingperformance data.

l 4: You can click abutton to perform asimple task quickly onthe Main Topology. Forexample, zooming in,zooming out,refreshing, saving,locking, or unlockingviews, showing orhiding navigation trees,and searching forobjects.

5: Alarm button barAlarms of different severitiesare displayed in differentcolors.The number displayed on analarm button indicates thenumber of the alarms of thecorresponding severity. Youcan click a button to view thealarms of the correspondingseverity on the currentU2000. For example,viewing current alarms anddisplaying the alarm panel.When an abnormal eventoccurs in the U2000, thecolor of Abnormal eventindicator is changed fromgreen to red. You can clickthe indicator to view thecurrent abnormal event onthe U2000.

6: Filter tree and legendIn this area, you can set thedisplay types of the objects in aview and view the descriptionsof legends in the view. Thefilter tree and legends help youto locate an object quickly.

7: Current client time

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-11

8: Name of the current loginuser of the U2000.

9: Name and the IP address ofthe U2000 server that theU2000 client currently logs into.The name of the U2000 serveris the name that you set on theU2000 client.

10: Physical mapIn this area, all NEsmanaged by the U2000 aredisplayed.In the Main Topology, youcan launch the NEExplorer, viewperformance data, createNEs, configure NE data,create connections, viewfibers/cables, deletetopological objects, andview current alarms.

11: Coordinates of thepointer in the MainTopology.

12: Topology navigation treeIn this area, all NEs managed bythe U2000 are displayed. Usingthis tree, you can locate therequired NE quickly.

13: Network-wide NEstatisticsYou can collect statisticson the NE types and thenumber of NEs of eachtype on the entire network.

Alarm Display in the Topology ViewIn the topology view, alarms are displayed in different colors or icons to indicate different statusof the subnets and NEs. The alarms are displayed with two methods: color-coded display andsmall icon display. The default method is the small icon display, as shown in Figure 5-7.

You can choose nodes of different levels from the Physical Root navigation tree, for example,a subnet, a node, or an NE to browse current alarms.

Figure 5-7 Alarm display in the topology view

The alarm display in the topology view has the following features:

l The color of a topological node indicates the operating status (such as normal, unknown,or offline) and alarm status of the monitored NE.

l When an NE generates multiple alarms of different severities, the color or icon that indicatesthe highest alarm severity of these alarms is displayed in the topology view.

l When multiple nodes in a subnet generate alarms, the subnet is displayed in the color oricon that indicates the highest alarm severity of these alarms.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l You can switch to the current alarm window of an NE using the shortcut menu of the NEnode. In addition, you can query the details of current alarms in the NE Panel.

Automatic Topology Discovery

The U2000 provides an automatic topology discovery function to automatically add NEs to thetopology view. Therefore, the operational expenditure (OPEX) is reduced.

The U2000 supports the automatic topology discovery as follows:

l Bulk creation of NEs

– Bulk creation of SNMP/ICMP-based NEs: SNMP/ICMP-based NEs involve the router,switch, security access NEs. When the U2000 communicates with the preceding NEssuccessfully, it can search out the required NEs by IP address or by network segmentand then bulk create these NEs.

– Bulk creation of transport/ PTN NEs: Based on the IP address, network segment, ornetwork service access point (NSAP) address of a GNE, the U2000 automaticallysearches out all the NEs that communicate with the GNE and bulk creates the NEs.

– Bulk import of NEs: Security GNEs, service monitoring GNEs, and security virtualnetwork (SVN) series security NEs periodically sends proactive registry messages thatcontain the IP addresses of NEs to the U2000 server. With the proactive registrymanagement, the U2000 bulk creates the NEs after receiving the messages.

l Configuring NEs automatically: The U2000 provides the function of configuring auto-discovered NEs (such as PTN NEs) automatically.

l Searching for NEs at a scheduled interval: The U2000 searches for NEs of a specified typein a specified network segment according to the preset conditions at a scheduled interval.It automatically adds the new NEs to the topology view. NE types are as follows: theaccess router, switch, and security NEs.

l Creating fibers/cables or links automatically: The U2000 supports the function of bulkcreating fibers/cables and links. It supports the function of bulk searching and adding newfibers/cables and links to the topology view automatically after a search.

Figure 5-8 Illustration of automatic topology discovery

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-13

1. The automatic topology discovery is implemented step by step through a wizard. Thewizard instructs you to set the parameters required for the automatic discovery, such as NEtype, SNMP parameters, and the IP address range.

2. After you set the parameters, the U2000 searches for the required NEs in the specifiednetwork segments according to the preset conditions. All NEs from Huawei and othervendors that meet the conditions are displayed in the topology view. Meanwhile, the basicconfiguration data of the NEs is uploaded, which simplifies the configuration of these NEs.

3. You can stop the automatic topology discovery at any time. If the discovery fails, the causeis displayed.

Clock View and Its Functions

In the clock view, you can set the NE clocks, query network-wide clock synchronization status,search for clocks, and traces clocks. The U2000 supports the passive optical network (PON)clocks synchronous Ethernet clocks, IEEE 1588 v2 clocks, and SDH clocks. In the clock view,NEs of various types can be displayed, such as the PTN, router, access, MSTP, RTN, and NGWDM NEs.

Figure 5-9 shows the clock view of the U2000 and its functions.

Figure 5-9 Clock view and its functions

l Discovering the clock topology automatically: The U2000 searches for clock links betweenall NEs in the entire network to obtain the clock tracing relationships of all NEs. You cansearch for clock links by NE or by clock link type. When the clock source of an NE ischanged, the U2000 performs a search again to renew the clock tracing relationships.

l Viewing the clock topology: After the U2000 automatically discovers the clock topology,you can view the clock tracing relationships in the entire network. To adjust the clocktopology, you can manually create and delete topological nodes and links.

l Configuring clocks: In the clock configuration window of the NE Explorer, you canconfigure the clocks of the NE. You can configure the following clocks: PON clocks

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

synchronous Ethernet clocks, IEEE 1588 v2 clocks, and SDH clocks. The clockconfiguration function varies with NE types.

l Monitoring the change of clocks: When an NE or a link fails or a switching of clock sourcesoccurs in a network, the U2000 automatically updates the clock tracing relationships andthe clock synchronization status in the topology view. According to the clock alarms of theNE whose clock is changed, you can identify the fault.

l Switching clocks manually: You can select a clock link and set its clock tracing relationshipas the current clock tracing relationships of the NE.

5.4 Alarm ManagementWhen an exception occurs on a network, the U2000 needs to notify maintenance engineers ofthe exception in a timely manner, so that the maintenance engineers will recover the networkefficiently.

Alarm management consists of the following functions:l Network-wide alarm monitoring and remote alarm notification enable the U2000 to notify

maintenance engineers of network exceptions in time so that the engineers will rectify faultsquickly and effectively.

l Alarm correlation analysis, alarm association (with NEs, ports, or services), alarm masking,alarm suppression, and maintenance experience base improve the accuracy and efficiencyof alarm processing.

l Alarm synchronization ensures the reliability of alarms.l Custom functions such as alarm filtering, alarm redefinition, and time localization meet

individualized requirements in different scenarios.

Alarm SeverityTable 5-2 shows different alarm severities and the handling methods.

Table 5-2 Alarm severity

Alarm Severity Definition Handling Method

Critical A critical alarm indicates afault or an event that mayseriously affect an NE or theentire network, such as aboard failure or a clock boardfailure.

Handle a critical alarmimmediately to avoid asystem breakdown.

Major A major alarm indicates afault or an event that mayaffect part of a network, suchas a board failure or linefailure.

Handle a major alarm in atimely manner to avoid lossof important functions.

Minor A minor alarm indicates ageneral fault or an eventabout the functioning of aboard or line.

Minor alarms remindmaintenance engineers ofidentifying alarm causes andrectifying possible faults.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-15

Alarm Severity Definition Handling Method

Warning A warning alarm indicates afault or an event that does notaffect the systemperformance and services butmay potentially affect theservice quality of the NE orresources. Some warningalarms indicate statuschange. For example, whenan NE recovers, a switchingalarm is generated.

Maintenance engineers canlearn the information aboutthe operating status of thenetwork and NEs accordingto warning alarms and handlethe alarms depending onactual situations.

Handle different severities of alarms by using different methods. The U2000 supports thefunction of redefining the alarm severity so that you can change the severity of a specific alarmas required. The severity of an alarm needs to be adjusted when the impact of the alarm becomeslarger or smaller.

Alarm Statusl Alarm acknowledgment and alarm clearance

– Alarm acknowledgment: An acknowledged alarm indicates that this alarm has beenhandled by a user. An alarm can be acknowledged in the following two ways:

– Manual acknowledgment: You can select an alarm from the current alarm windowto acknowledge it.

– Automatic acknowledgment: If you enable the automatic alarm acknowledgment,the U2000 acknowledges an alarm immediately after it is cleared or automaticallyacknowledges the alarms that are cleared within the specified time at 01:00 everyday.

– Alarm clearance: When you delete an alarm, the alarm is cleared from the NE and thecurrent alarm library of the U2000. After that, the alarm is moved to the history alarmlibrary.

l Alarm status classification

Based on the acknowledgment and clearance status, alarm status can be classified into thefollowing types:

– Unacknowledged and uncleared

– Acknowledged and uncleared

– Unacknowledged and cleared

– Acknowledged and cleared

NOTE

Acknowledged and cleared alarms become history alarms after a preset period elapses. All non-history alarms are current alarms.

l Changing alarm states

– Changing the clearance status

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

When the condition triggering an alarm disappears, the NE or the U2000 server recovers.In this case, the NE or the U2000 server reports a clearance alarm. The alarm statechanges from uncleared to cleared. You can also manually clear an alarm.

– Changing the acknowledgment status

If an alarm is acknowledged, it indicates that the alarm will be handled or has beenhandled. After the alarm is acknowledged, the alarm state changes fromunacknowledged to acknowledged.

You can unacknowledge an acknowledged alarm if necessary. After the alarm isunacknowledged, the alarm state changes from acknowledged to unacknowledged.

l Relationships between alarm states

Figure 5-10 shows the relationships between alarm states and how an alarm changes fromone state to another.

Figure 5-10 Relationships between alarm states

Alarm Reporting and Handling Flowchart

Figure 5-11 shows the alarm reporting and handling flowchart of the U2000.

Figure 5-11 Alarm reporting and handling flowchart

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-17

Network-Wide Alarm MonitoringTraditionally, a network is maintained separately by domain. Faults across domains need to belocated manually, which lowers the locating efficiency. The U2000 provides unified means ofalarm monitoring, such as the alarm panel and alarm browsing, which helps users to understandthe operating status of the network in real time. It also provides alarm query templates that area collection of common query criteria. You can create different alarm query templates accordingto the region, type, and network layer of the device on which an alarm is generated. The alarmquery templates facilitate the query and monitoring of alarms.

The alarm display function is implemented in three different ways: alarm panel display, alarmbar chart, and alarm query and browsing. Figure 5-12 shows the alarm panel, and Figure5-13 shows the alarm bar chart.

Figure 5-12 Alarm panel

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 5-13 Alarm bar chart

Table 5-3 Alarm display functions

Function Description

Alarm panel The alarm panel collects statistics on the alarms of managed objectsby severity and displays the number of the alarms of each severity.The alarm panel provides a summary of system faults and can beused as a monitoring panel.

Alarm bar chart The alarm bar chart shows the real-time alarm statistics. The alarmbar chart displays the alarm statistics collected by the alarm panel.

Querying and viewingalarms

l Viewing current alarms: Query the fault alarms that are nothandled, that is, unacknowledged or uncleared alarms.

l Viewing history alarms: Query the fault alarms that are handled,that is, acknowledged and cleared alarms.

l Viewing alarm logs: Query all fault alarms that are reported byNEs.

l Viewing event logs: Query current abnormal events.l Setting an alarm query template: Save common query conditions

as an alarm query template. You can directly use the template toquery alarms based on the same query conditions. This functionhelps you to view and monitor the required alarms.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-19

Alarm browsing consists of operations of viewing current alarms, history alarms, alarm logs,and event logs, and supports multiple custom functions, as shown in Figure 5-14 and Table5-4.

Figure 5-14 Viewing alarms

Dynamic alarm templateAlarm sortingAlarm browsing

Alarm details

Alarm color display Alarm filtering Alarm cause and handling suggestion Alarm handling means

Table 5-4 Alarm function

Function Description

Dynamic alarm panel The alarm panel shows the number of the alarms of differentseverities of the U2000 client. Pop-ups of the alarm panel or theblinks of alarm indicators show current alarms. Click the alarmpanel to display the window for viewing alarms.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Function Description

Alarm filtering When a large number of alarms exist, you can filter alarms by alarmname, alarm severity, status, type, last occurrence time segmentand clearance time segment. The alarm filtering function improvesthe efficiency of viewing alarms.You can filter alarms by attributes of alarm sources, such as theobjects of NEs, object groups, and maintenance areas, and createthe required alarm filter templates by customizing the filter criteria.In this manner, you can select the required alarm filter template tofilter alarms.

Alarm template The alarm template can be customized. Therefore, you can sortalarms flexibly as required and locate the required alarms quickly.

Alarm viewing You can view the alarms relevant to NEs and services on theU2000 to learn the operating status of the NEs and networks.l Viewing current alarms: View current alarms of all severities

on the entire network.l Viewing all current alarms of a specific severity: You can

quickly learn the critical, major, or minor alarms of the entirenetwork from the alarm icons on the toolbar.

l Viewing the alarms of a specified NE or U2000: You can selectan NE or a U2000 in the Main Topology and quickly learn thecurrent alarms of the selected object.

l Viewing the current alarms of a trail: In the trail managementwindow, you can quickly learn the alarms and events of themanaged trails. This function facilitates trail maintenance.

l Viewing history alarms: By viewing all history alarms of theU2000, you can learn the faults that occurred on the U2000 andNEs. The history alarm data can be used for long-termperformance analysis.

Alarm query You can query alarms by object where the alarms are generated,function type, alarm status, or alarm severity. The query resultscan be saved and printed.

Alarm display in color Alarms of different severities are displayed in different colors inthe alarm list. The colors can be customized.

Alarm display in thetopology view

When an NE reports an alarm, the icon in the upper left corner ofthe NE or the color of the NE in the topology view varies with thealarm severity. You can right-click the NE to query current alarmsof the NE.

Alarm locating You can select an alarm and locate the topological object wherethis alarm is generated. For a physical alarm, you can locate theboard where the alarm is generated in the NE panel.

Alarm sortCustomized display

You can sort alarms by field and customize the columns displayedin the alarm list. Alarms can be saved to a file (.txt, .html, .xls,or .csv) and can be printed.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-21

Function Description

Details You can obtain the details of an alarm, such as the alarm name andidentification information.

Handling suggestion The handling suggestion provides information, such as the alarmcause, recovery suggestion, alarm description, maintenanceexperience, and cause type.In the Handling Suggestion area, a link to the corresponding alarmreference topic in the Online Help is provided. You can click onClick here to show detail information to display thecorresponding alarm reference topic in the Online Help.

You can view the information about an alarm in the alarm browsing window, including theseverity, name, alarm source, location information, occurrence time, first occurrence time, lastoccurrence time, clearance time, acknowledgment time, clearance user, acknowledgment user,clearance status, acknowledgment status, location, direction, trail domain, alarm reversion,protection subnet name, alarm plane, trail name, ASON object name, and affected services.

Alarm StatisticsYou can quickly learn alarm information by collecting statistics on alarms and analyzing them.

The U2000 can collect statistics on alarms based on the preset conditions. The conditions canbe the name, severity, function type, generation time, alarm status, source of an alarm, or acombination of the preceding items.

Alarm Masking and Correlation Analysisl By using the alarm masking function, you can set the alarm/event masking conditions to

avoid display of a large number of redundant alarms.l While an NE is being repaired, tested, or deployed, the NE may report a large number of

alarms which can be ignored. In this case, you need to mask these alarms so that theU2000 does not display and save them.

The U2000 provides the following correlation analysis means: alarm/event correlation analysis,transient alarm analysis, repeated event analysis, alarm/event frequency analysis, and analysison duration of acknowledged but uncleared alarms. Figure 5-15 shows the implementation ofalarm correlation analysis.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 5-15 Alarm correlation analysis

l Correlation Analysis– The Default Correlation and Correlation Analysis windows are provided for a

correlation analysis. In the Default Correlation window, the predefined rules for thealarm correlation analysis are displayed. These rules can be enabled if required. In theCorrelation Analysis window, the rules for the alarm correlation analysis can becustomized.

– Correlative alarms are the alarms whose causes are relevant to each other. One of thealarms is the root cause.

– Various alarms are generated when a certain fault occurs. If non-root alarms arereported, the fault locating and analysis are affected. You can set the rules for thecorrelation analysis on the U2000 according to certain features of correlative alarms,such as generation time and physical locations where the alarms are generated. In thismanner, the U2000 directly discards non-root alarms that meet the preset conditions,labels them as correlative alarms, and saves them to a suppressed alarm database, ordowngrades their severities.

– Figure 5-16 shows the relationships between a root alarm and its correlative alarms.– The alarm for high memory usage of a service causes the alarm for high memory usage

and the alarm for high CPU usage. The alarm for high CPU usage causes the alarm forabnormal exit of the U2000 service. Therefore, the alarm for high memory usage of aservice is the root alarm and the rest are the correlative alarms.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-23

Figure 5-16 Relationships between a root alarm and its correlative alarms

l Transient alarm analysis/Repeated event analysis– Transient alarms are the alarms that are cleared twice within the preset period.

– If transient alarms are reported continuously within a short period, the NE or servicesmay be repeatedly switched between the normal state and the abnormal state. Toresolve the problem in time, enable the transient alarm analysis to raise the alarmseverity so that maintenance engineers will pay attention to the alarms. For example,if an alarm is reported and cleared repeatedly for five times within ten seconds, theU2000 changes the severity of the alarm to major.

– If the repeated alarms generated due to certain faults or under certain circumstancesare redundant to maintenance engineers, lower the alarm severity, sort the repeatedalarms, or directly mask these alarms.

– Repeated events are the events that are reported repeatedly within the preset interval.

– Alarms or events that are reported repeatedly within a short period due to certain faultsmay be redundant to maintenance engineers. For these alarms or events, you can setanalysis rules for transient alarm and repeated events on the U2000. Then, the U2000displays only the first repeated event or cleared transient alarm and discards the rest.

l Alarm/Event frequency analysis– Alarms of the same type that are generated within a period may be relevant to each

other. After you enable the alarm/event frequency analysis, if the number of the samealarms generated within a period reaches a certain number, it can be concluded thatthose alarms are relevant to each other.

– After you set rules for the event/alarm frequency analysis, if the number of specifiedalarms generated within a specified period exceeds the preset threshold, it can beconcluded that these alarms are relevant to each other. Then, the U2000 handles thesealarms according to the preset method.

l Analysis on duration of acknowledged but uncleared alarms– Major alarms are normally cleared within 30 minutes after they are handled. If a major

alarm is not cleared in 30 minutes after it is processed, further actions are required. Toensure that major alarms are handled in time, enable the analysis on duration of

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-24 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

acknowledged but uncleared alarms. If a major alarm is not cleared in 30 minutes afterit is handled, the U2000 changes the severity of the alarm to critical.

– Enable this analysis function for the acknowledged alarms that are not cleared for a longtime. The U2000 changes severities of the alarms to a higher level to remindmaintenance engineers of handling the alarms in a timely manner.

l Alarm Correlation on NEs– Alarm correlation rules on NEs are an inherent alarm performance monitoring

mechanism of a logical function block of an NE. These rules cannot be modified.Understanding the monitoring mechanism helps you to correctly analyze and identifyfaults, thus improving the maintenance efficiency.

– A root alarm is directly caused by an abnormal event or a fault on the network. A rootalarm generally causes correlative alarms whose severities are lower. For example,when a fiber is cut, the SDH physical interface (SPI) functional module of an opticalboard detects the R_LOS alarm (root alarm). Then, the regenerator section termination(RST) function module of the regeneration section generates correlative alarms, suchas the R_LOF, R_OOF, B1_SD, and B1_EXC. To prevent the generation of correlativealarms, you can set the preceding alarm correlation analysis rules and enable the alarmcorrelation analysis on the NE to suppress correlative alarms. In this manner, the NEreports only the root alarm R_LOS to the U2000.

l Alarm Correlation on the NMSAfter you set alarm correlation analysis rules on the U2000 and enable the alarm correlationanalysis, correlative alarms are masked.

CAUTIONl Alarm correlation analysis depends on alarm correlation rules. The rules will affect the

analysis result. Exercise caution when setting the rules.l The default correlation analysis rules on the U2000 are recommended.l By default, the alarm correlation analysis is disabled. Manually enable this function if

necessary.

Alarm Dumping and AcknowledgmentAlarm acknowledgment enables you to check whether alarms are handled according to theacknowledgment status of the alarms. Then, you can handle alarms in a timely manner.

l Alarm dumping: Automatic dumping and manual dumping of alarms are supported.Automatic dumping is classified into overflow dumping and periodic dumping.

l Alarm acknowledgment: Alarms can be acknowledged manually or automatically.

NOTEAlarm logs can be saved in various formats, such as TXT, HTML, PDF, CVS, and XLS.

Alarm SynchronizationAfter communication between the U2000 and an NE recovers from an interruption, or theU2000 is restarted, some alarms on the NE are not reported to the U2000. The NE alarms on theU2000 are different from the actual alarms on the NE. In the case, you need to synchronize

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-25

alarms. Manual synchronization of alarms ensures that the U2000 displays the current operatingstatus of the NE correctly.

The U2000 supports the function of synchronizing NE alarms manually or automatically. Youcan set the policy for automatic alarm synchronization. After you enable automatic alarmsynchronization, the U2000 automatically synchronizes alarms to ensure alarm consistencybetween the U2000 and NEs after the communication between the U2000 and NEs recovers orthe U2000 is restarted. Figure 5-17 shows the implementation of alarm synchronization.

Alarms are synchronized according to the following rules:

l If an alarm is cleared from an NE but uncleared on the U2000, the alarm will be clearedfrom the U2000.

l If an alarm is present on an NE but absent on the U2000, the alarm will be added to theU2000.

Figure 5-17 Alarm synchronization

Alarm Redefinition

The U2000 allows you to redefine the severities of alarms on NEs according to the requirements.

This function changes the alarm severity displayed on the U2000, highlighting only the requiredalarms.

Alarm Suppression

The U2000 supports the function of suppressing NE alarms. If you set the status of an alarm toSuppressed, the NE does not report the alarm.

The difference between alarm suppression and alarm masking is as follows: If you enable alarmmasking, an NE still reports the masked alarm but the U2000 does not receive the alarm. If youenable alarm suppression, the NE does not report the suppressed alarm. For details, see Figure5-18.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-26 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 5-18 Difference between alarm masking and alarm suppression

Various Alarm Notification MeansThe U2000 provides various alarm notification means. It can notify maintenance engineers ofalarms at any time from anywhere. Therefore, the maintenance engineers will locate and rectifyfaults quickly and effectively.

The U2000 also supports two remote notification means: email and short message service (SMS).When a fault occurs in a network, the U2000 notifies non-onsite maintenance engineers of thefault. Then, the maintenance engineers will locate and rectify the fault promptly.l Different filter criteria can be set to enable the U2000 to notify maintenance engineers of

only the required alarms.l For the alarms that are cleared within a period (a customized delay), the U2000 does not

notify maintenance engineers of these alarms because they do not affect services any more.

Figure 5-19 shows the alarm notification means.

Figure 5-19 Various alarm notification means

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-27

Alarm Association

The U2000 supports the function of locating alarms, that is, associating alarms with thetopological object (NE or NE panel) where the alarms are generated. This function improvesfault locating efficiency. Figure 5-20 shows the alarm association function.

Figure 5-20 Alarm association

Alarm association

Alarm source: NE, board, or port etc

Alarm Maintenance Experience Base

You can obtain the alarm handling information from the alarm maintenance experience base.This base is a database that stores alarm details. For details, see Figure 5-21.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-28 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Alarm maintenance experience is summarized and recorded on the U2000 by users duringmaintenance. If a similar fault occurs, relevant alarm handling information is available in thebase for reference to achieve quick and efficient alarm handling.

By using the function of importing alarm/event maintenance experience, you can import thepreviously exported alarm/event maintenance experience to the U2000.

By using the function of exporting alarm/event maintenance experience, you can export alarm/event maintenance experience on the U2000 to a file. This makes it easier to view alarm/eventmaintenance experience in the file.

Figure 5-21 Alarm maintenance experience base

Alarm Time LocalizationThe NE that reports an alarm and the U2000 may be in different time zones. For the correctalarm generation time, the U2000 automatically converts the alarm generation time (expressedin the NE time) into the local time of the U2000.

The U2000 can display the time when an alarm is generated, acknowledged, cleared, or receivedas the local time of the U2000 client or server.

5.5 Performance ManagementThe performance of a network may deteriorate because of internal or external problems andfaults may occur. The performance management function enables you to detect the deterioratingtendency in advance and solve the potential threats so that faults can be prevented.

BenefitNMS provides performance monitoring functions to support performance management at boththe NE level and the network level. By creating a performance instance, you can enable the NMSto collect performance data from network devices according to a specified period.

l Monitoring NE performance. This function supports the monitoring of performanceindicators at the NE level, including:– CPU usage– Memory usage– Hard disk usage– Total of online accesses

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-29

– Number of PPPoE online accesses– Number of packets received or forwarded by devices

l Monitoring network traffic. This function is used to collect the traffic statistics of networkports and is implemented by collecting the statistics of the following performanceindicators:– Inbound traffic– Outbound traffic.– Inbound bandwidth utilization– Outbound bandwidth utilization– Error Packet Rate

l Monitoring SLA data. This function supports multiple types of SLA data monitoring andis implemented by monitoring the following performance indicators:– Delay and loss ratio of ICMP, TCP, UDP, and SNMP packets between network nodes– Delay, jitter, and loss ratio of packets between network devices– Connection delay and download speed of Internet services such as the HTTP and FTP

servicesl Collecting interface-based traffic and performance indicators. This function supports

the collection of interface-based traffic in BGP/MPLSVPN, VPLS, and PWE3 services,and the collection of performance indicators such as delay, packet loss ratio, and jitter inthe BGP/MPLS VPN SLA service.

l Setting performance thresholds. This function allows you to set the thresholds for specificperformance indicators. The NMS also provides default global settings to facilitate batchconfiguration. You can set the following parameters:– Upper and lower thresholds– Trend thresholds– Non-burst peak thresholds– The NMS reports alarms when the values of some indicators are out of the set ranges

l Maintaining data. With this function, you can perform the following operations:– Storing performance statistics– Dumping performance statistics– Regularly compressing performance statistics

ProcessThe U2000 provides a graphical user interface (GUI) to monitor the key indicators of a networkand provide statistics on the collected performance data. This facilitates network performancemanagement.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-30 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 5-22 Performance management process

Function Description

The following is a function description of performance module.

Performance Monitoring Template Management

Performance monitoring template: a collection of performance indicators. The indicators areincluded in various indicator groups. By setting a performance monitoring template, you canmanage a performance monitoring task easily.

The following table describes different types of performance monitoring templates.

Table 5-5 Performance monitoring templates

Template Description

Data monitoring template A data monitoring template is a collection ofindicators for collecting performance data. Itmay contain indicators and indicator groupsfor collecting performance data of networkresources. In the case of network qualityanalysis (NQA) indicators, set certain servicelevel agreement (SLA) parameters in thetemplate and apply the parameters to datamonitoring instances.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-31

Template Description

TCA monitoring template A threshold crossing alert (TCA) monitoringtemplate is a collection of indicators withspecified thresholds. It may monitor TCAs ofthe specified resources. TCAs are classifiedinto upper threshold alarms and lowerthreshold alarms. Thresholds include theupper and lower thresholds for triggering andclearing alarms and the upper and loweralarm severities. In the case of NQAindicators, set certain SLA parameters in thetemplate and apply the parameters to TCAmonitoring instances.

Template-Based SLA Parameters

This function collects most SLA parameters into data templates and TCA templates. In thismanner, you need not create SLA parameters when creating an instance, which improvesoperation efficiency.

Monitoring Instance Management

Instance: An instance consists of a resource and a template. By means of an instance, you cancollect data of certain performance indicators of a resource. An instance is considered as one ormore performance collection tasks.

Task: A task is the minimum unit for performance collection. A task consists of a resource andan indicator group. The management of a task is implemented by management of an instance.Figure 5-23 shows the relationships between a template, an instance, and a task.

Figure 5-23 Relationships between a template, an instance, and a task

Monitoring instances enable you to collect performance statistics on resources of specifiedequipment according to a preset monitoring template and schedule policy. One monitoringinstance collects statistics on only one resource. A monitoring instance can be either a datamonitoring instance or a TCA monitoring instance. You can perform the following operationson the U2000:

l Create monitoring instances for resources, such as NEs, boards, ports, and links, andmonitor the IP SLA of the PTN and third-party equipment.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-32 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Modify monitoring instances.

l Query monitoring instances.

l Suspend monitoring instances.

l Resume monitoring instances.

l Synchronize resources corresponding to monitoring instances.

l Query TCAs.

l Query the VPN SLA test result by means of a matrix.

l Control the management capability, that is, control the number of created monitoringinstances by a license.

Schedule Policy Management

The schedule policy enables you to set the time segments and periods at which the data iscollected. The schedule policy can be applied to resources when a monitoring instance is createdor modified.

Viewing History Performance Data

You can collect the network performance data in a specified period to learn the networkperformance. History performance data provides reference data for predicting a performancechange of the network.

You can view the history performance data of a network in a graph, bar chart, or table, and savethe performance data in different file formats.

NOTE

l The information displayed in a graph or bar chart can be saved in HTML, CSV, TXT, or PDF format.

l The information displayed in a table can be saved in TXT, CSV, or HTML format.

In addition, you can compare the performance data in different periods in a graph or bar chartor compare the indicators of different resources in the same diagram.

Viewing Real-Time Performance Data

You can view real-time performance data in a table, graph, or bar chart, and save the performancedata in different file formats.

NOTE

l The information displayed in a graph or bar chart can be saved in HTML, CSV, TXT, or PDF format.

l The information displayed in a table can be saved in TXT, CSV, or HTML format.

Sorting Resources with Top N Performance

You can view resources with top N performance sorted by indicators, and the result will berefreshed in real time.

Sorting Resources with Top N Deteriorated Performance

You can sort resources with top N deteriorated performance by alarms of the resources.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-33

Query of Top N Deteriorated ResourcesThis function sorts resources by TCA duration according to the preset conditions, enabling youto locate the current deteriorated resources quickly. In addition, this function enables you tolearn the health status of the entire network and solve problems accordingly.

Data Lifecycle ManagementYou can back up performance data to a specified storage medium manually or automaticallywhen excessive performance data is saved in the database of the U2000.

Data can be dumped in the following two ways:l Automatic Dumping: Performance data is dumped automatically based on the preset

parameters, such as different periods and the database usage.l Manual Dumping: Performance data is dumped based on the user-defined conditions

according to the dump type before the end date.

Monitoring Network PerformanceYou can view the performance data of NEs, interfaces, IP links, L2 links, static, tunnels, dynamictunnels, and test cases on the same network through network grouping. In addition, you canperform various tests on a network, such as the tests of UDP jitter and FTP ping, to evaluate thequality of networks and services and analyze correlation between the quality of networks andservices.

l Creating a network groupAssociate the monitoring instances of resources of different types within the same networkaccording to the customized grouping rules, such as an area-based rule or service-basedrule. Then, you can browse and compare data easily.

l Analyzing the interface performance trendAfter the network interface indicators are set, a performance trend analysis graph for eitherthe current time, or 12 hours before and after the current time can be generated. Theperformance trend analysis graph helps you understand the general change trend of theinterface performance in a timely manner.

l Viewing the results of network monitoring test cases in a matrixYou can view the results of network monitoring test cases in a matrix. In this manner, youcan understand the information about network-related indicators, evaluate networkperformance, and analyze correlation between the indicators and network performance.

5.6 Inventory ManagementThe U2000 supports unified inventory management of physical resources and service resourceson the entire network. On the U2000, you can quickly and clearly view information about variousresources network-wide. The inventory information serves as a reference for service planningand expansion planning.

l You can perform the following operations on the U2000:– Maintain inventory information– Query inventory information– Collect statistics on resource inventories according to the preset statistical items

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-34 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Save inventory information to XLS, TXT, HTML, or CSV files

– Print inventory informationl The U2000 supports auto-discovery of a new asset (such as a new device, board, etc). If an

existing asset is updated, an NE icon would remind you of that the data on the U2000 isasynchronous with the data on the NE. With the U2000, you can quickly identify the causesof the data asynchronization.

Figure 5-24 shows the inventory management window of the U2000.

Figure 5-24 Inventory management window and its functionsView inventory resources by type Collect statistics on inventory resources

Perform operations on inventory records

Table 5-6 Statistical items for resource inventory management

Resource Statistical Item

Telecommunications Room

Telecommunications Room Name, Relevant Station, Country, Province,City, Location, Room Number, Cabling Mode, Antistatic Floor or Not,Thickness of the Antistatic Floor (mm).

Rack Rack Name, Relevant Telecommunications Room, Rack Type, Height(mm), Width (mm), Depth (mm), Power Box Type, Voltage, Number ofBatteries, Internal Battery or Not, Internal Power Supply or Not, InternalMDF or Not, Internal Transmission or Not, Number of Shelves .

Shelf Shelf Name, Shelf Type, Relevant NE, Shelf ID, Software Version, Alias,Relevant Telecommunications Room, Relevant Rack, Shelf No.,Equipment No..

NE NE Name, NE Type, NE IP Address, NE MAC Address, NE ID, SoftwareVersion, Physical Location, Create Time, Fiber/Cable Count, Run Status,Relevant Subnet, Relevant Subnet Path, Alias, Patch Version List.

Board Board Name, Board Type, Relevant NE, NE Type, Shelf ID, Slot ID,Hardware Version, Software Version, Serial Number, Alias.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-35

Resource Statistical Item

Subboard Subboard Name, Subboard Type, Slot Number, Sub-Slot Number,Relevant NE, Hardware Version, Software Version, Serial Number, Alias,Subboard Description, .

Port Port Type, NE Type, Device Name, Frame, Slot, Port, Name.

Optical Module Port, Logical Card, Physical Card, Serial Number, CLEI Code, PartNumber, Date of Manufacture, User Label.

Slot UsedStatistics

NE Type, Total Slot Number, Used Slot Number.

ONU Terminal Type, ONU Version, Amount.

Fiber/Cable Name, Level/Capacity, Direction, Source NE, Source Port, Sink NE, SinkPort, Length, Attenuation, Fiber/Cable Type, Medium Type, Created on,Creator, Maintainer, Alarm Severity, Disabled Status.

Link Alarm Severity, Link Name, Type of Borne Network Protocol, Source NE,Source Port, Source IP, Sink NE, Sink Port, Sink IP, Link Level, Link Rate,Up Band Width, Down Band Width, User Label.

Router/SwitchInterface

Name, NE Name, Description, IPv4 Address, IPv6 Address, MACAddress, Type, Rate, Administrative Status, IPv4 Operating Status, IPv6Enable Status, IPv6 Operating Status.

PON PortSplitting Status

OLT Device Name, Name, Optical Split, Used Optical Split, Idle OpticalSplit, Remaining Bandwidth.

5.7 Log ManagementLogs record the information about operations performed on the U2000 and important events thatoccur in the U2000. The U2000 allows administrators to query and save logs and collect statisticson logs periodically. This facilitates detection of unauthorized logins and operations and faultanalysis. Specifically, by browsing and collecting statistics on logs, you can query the clientfrom which a U2000 user logs in to the U2000 server and query the operations performed bythe user after login. You can also dump and print logs. Logs also can record operations that theOSS performs on NEs through NBIs.

Figure 5-25 shows the log management window and functions of the U2000.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-36 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 5-25 Log management window and functions

Log ClassificationThe logs of the U2000 are classified into operation logs, system logs, security logs, and NE logs.The logs can be saved to TXT, HTML, CSV, PDF, and XLS files.

l Operation logs record the non-security-related operations that users perform, such ascreating a subnet and enabling or disabling the alarm sound.

l System logs record the operations that the U2000 automatically performs, such as scheduledtasks and system tasks.

l Security logs record the security-related operations that users perform, such as login, logout,lockout, and unlocking.

l NE Syslog operation logs record operation results of managed NEs. You can learn theoperation logs of NEs on the U2000 client instead of from each NE.

l NE Syslog running logs record the operating information of NEs managed by the U2000.The U2000 obtains from NEs all Syslog running logs of NEs. You can browse the Syslogrunning logs of the managed NEs on the U2000 instead of from each NE.

Querying and Collecting Statistics on LogsU2000 administrators can set query conditions to query logs by operation user, operationterminal, operation result, risk level, operation time, operation name, operation object, or acombination of all of the preceding items according to the requirements. The administrators canlearn about the operations performed on the U2000 by the current user.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-37

Forwarding Logsl U2000 log forwarding: The U2000 can forward its operation logs to the Syslog server to

save the operation information, which releases storage space on the U2000 server. The logsserve as a reference for maintenance.

l NE log forwarding: The U2000 can forward the information about various NEs in the formatthat complies with the system log protocol to the Syslog server. Then, U2000 administratorsand maintenance engineers can view the status of NEs according to the importance of theNE information.

Dumping and Exporting Logs

The log dumping function enables you to delete the logs that are not required, automatically ata scheduled time or manually. This function prevents logs from occupying too much space. Thelog exporting function enables you to export logs to a file for logs viewing or fault locating.Figure 5-26 shows the window and functions of the U2000 for dumping and exporting logs.

Figure 5-26 Window and functions of dumping and exporting logs

l Dumping logs

– Operation logs, system logs, and security logs can be dumped periodically andautomatically or dumped manually. The logs can also be dumped upon an overflowwhen the size of the logs exceeds the preset threshold.

– The U2000 provides only one default system task for each type of logs. You cannotdelete the system tasks or create new dumping tasks. You can only modify theparameters of the system tasks.

– Dumped logs are saved to CSV or XML files. You can compress the files into a ZIPfile. By default, logs are dumped to the $IMAP_ROOT/dump/ThresholdExport/Log (Solaris/Linux) or %IMAP_ROOT%\dump\ThresholdExport\Log (Windows)path.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-38 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– After the logs are dumped, they are deleted from the database to release the databasespace.

l Exporting logs– The U2000 provides only one default system task for each type of logs. You cannot

delete the system tasks or create new exporting tasks. You can only modify theparameters of the system tasks.

– Exported logs are saved to CSV or XML files. You can compress the files into a ZIPfile. By default, logs are exported to the $IMAP_ROOT/dump/fileint/syslogs (Solaris/Linux) or %IMAP_ROOT%\dump\fileint\syslogs (Windows) path.

– After the logs are exported, they are not deleted from the database.

5.8 Database ManagementDatabase management involves the management of NE databases and U2000 databases, andmaintenance of data consistency between the U2000 and NEs.

NE Database ManagementTo ensure NE data security, the U2000 provides the functions of backing up and restoring NEdata.

In NE software management, you can back up and restore NE data on a server.l Back up the NE database to a local or remote server in a manual or scheduled manner.l Restore the NE database from a local or remote server.

You can use the system control and communication unit (SCC) or CF board on the NE to backup and restore the NE database for the transport access NEs.l Back up the NE database to the SCC board manually.l Back up the NE database to the CF board manually or automatically.l Restore the NE configuration data from the SCC board or CF board.

NMS Database ManagementThe database of the U2000 supports two types of storage files. One type is used to store dataand the other type is used to store the logs that record the operating information of the database.To ensure data security, periodically back up the database. See Figure 5-27.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-39

Figure 5-27 NMS database management

NMS Database

All important system data are stored in the NMS database.

Storage Device

Automatically Back Up

Manually Back Up

Alarm

Performance

Security

Configuration

Log

……

The U2000 provides a database backup and restoration tool. The tool facilitates databasemaintenance and ensures the stability and security of the U2000. It provides the following NMSdatabase management functions:

l Back up the U2000 database to a local or remote server in the following ways:– Immediate backup– Scheduled backup through task scheduling

l Restore the U2000 database from a local or remote server.l Dump data in the U2000 database, including logs (such as operation logs, system logs,

security logs, and alarm/event logs) and other data (such as performance data).– Manual dump– Periodic dump

l Import or export script files: Export the configuration data in the U2000 to script files, orimport the configuration data to the U2000 from script files. The configuration upgradewizard instructs users to restore the U2000 database by using the configuration data scriptthat has been backed up. The functions of importing and exporting script files are applicableto only the PTN MSTP, WDM, and microwave NEs.Script files can be exported in a scheduled manner through task scheduling.The U2000 information about the MSTP and WDM NEs can be exported to a TXT file sothat the information can be used by the MDS 6600. In addition, the U2000 can import aTXT file that contains the MDS 6600 data.

l Initialize the U2000 database: Clear and initialize the U2000 database before restoring thedatabase in the case where the database data is in disorder or damaged.

Keeping Data Consistency Between the U2000 and NEsIf the configuration data is not synchronous between the U2000 and the NE, the NE icon has a

sign. The U2000 provides rich functions to ensure the security and consistency of the NE

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-40 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

configuration data, such as the uploading, downloading, consistency check, synchronization,duplication, preconfiguration, and the initialization of the NE data on the U2000.l Uploading: Data on NEs is reported to the U2000 to overwrite the NE data on the U2000.

The data that is present on the U2000 but absent on NEs is not deleted.l Downloading: The NE data on the U2000 is applied to the NEs to overwrite the data on

the NEs.l Consistency check: Check whether the NE data on the U2000 is consistent with the data

on NEs. If it is inconsistent, synchronize or upload the NE configuration data.l Synchronization: Upload the inconsistent data (including the conflicting data, and the data

that is present on NEs but absent on the U2000) to the NE layer on the U2000. The datathat is present both on the U2000 and NEs is not uploaded, and the data that is present onthe U2000 but absent on NEs is not deleted.

l Duplication: When NEs are of the same type and of the same software version, if theconfiguration data of an NE to be configured is the same as that of a configured NE, youcan configure the new NE by duplicating the data of the configured NE. Duplicating theNE data only changes the data on the U2000 and does not affect the data on the NE. Tomake the duplicated data take effect on the NE, you need to apply the configuration.

l Preconfiguration: The configuration data of an NE is saved only at the NE layer on theU2000 and does not affect the actual configuration data on the NE. The preconfigurationfunction is generally used for the large-scale service adjustment or expansion.

l Initialization of the NE data on the U2000: The NE data on the U2000 is deleted and theNE becomes unconfigured after the initialization.

NOTE

The PTN RTN, NA WDM, and NG WDM product series do not support preconfiguration and thedownloading of configuration data. The U2000 provides more reliable functions, that is, the databasepackage backup and restoration, to resolve the data restoration problem. This is because:

l The configuration data does not contain complete NE data. The complete data can be obtained byusing the database package restoration function.

l During the downloading of configuration data, the U2000 converts the configuration data to the Qxinterface information. Then, the data can be exchanged between the U2000 and the NE, but theefficiency is relatively low. In the database package restoration mode, databases are directlydownloaded to the NE, which ensures a high efficiency.

l On the U2000, only one set of configuration data can be saved, but the database package can havemany backup copies. Select the backup package as required.

5.9 NE Communication Parameter ManagementThe U2000 communicates with managed NEs successfully only after you correctly set theconnection parameters of the U2000 and the managed NEs.

You can query or set the following parameters on the U2000:

l Query and set the NE access protocol parameters.l Manage the default access protocol parameters.l Query and set the NE Telnet or STelnet parameters.l Manage the Telnet or STelnet parameter template.

DCN management is applicable to PTN NEs. The U2000 communicates with NEs, and managesand maintains network nodes through a DCN network. In the DCN network, the U2000 and NEsare considered as nodes. These nodes are connected through Ethernet or data communications

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-41

channel (DCC). In an actual network, the U2000 and NEs may be located at different floors ofthe same building or in different buildings or cities. Hence, the U2000 and NEs are usuallyconnected through an external DCN network that consists of equipment such as switches androuters. Relatively, the DCN network between NEs is referred to as an internal DCN network.

DCN management involves the following operations:

l Modify gateway NE (GNE) parameters.l Change the GNE of a non-GNE.l Set the secondary GNE of a non-GNE.l Convert a GNE to a non-GNE.l Convert a non-GNE to a GNE.l Check the GNE switching status.l Test the communication between the U2000 and a GNE.l Check the network communication status.

5.10 DCN ManagementDCN management is applicable to MSTP, WDM, microwave, submarine cable NEs.

The U2000 communicates with NEs, and manages and maintains network nodes through a DCNnetwork. In the DCN network, the U2000 and NEs are considered as nodes. These nodes areconnected through Ethernet or data communications channel (DCC). In an actual network, theU2000 and NEs may be located at different floors of the same building or in different buildingsor cities. Hence, the U2000 and NEs are usually connected through an external DCN networkthat consists of equipment such as switches and routers. Relatively, the DCN network betweenNEs is referred to as an internal DCN network.

DCN management involves the following operations:

l Modify gateway NE (GNE) parameters.l Change the GNE of a non-GNE.l Set the secondary GNE of a non-GNE.l Convert a GNE to a non-GNE.l Convert a non-GNE to a GNE.l Check the GNE switching status.l Test the communication between the U2000 and a GNE.l Check the network communication status.

5.11 NE Software ManagementThe NE software management module (called DC) is an independent subsystem of the U2000and it is used to manage software and data on NEs. The DC enables you to back up NE data andupgrade or downgrade NE software.

l The DC implements the upgrade and downgrade of NEs in the following ways:l Saving: After the system is configured, the data is saved in the memory of NEs. This feature

saves the system configuration to the flash memory or hard disk of NEs. This prevents theloss of the configuration file in case of system restart. The DC saves data through:

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-42 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Saving operation (manual)– Saving task (manual)– Saving policy (automatic)

l Backup: Backs up the configuration to storage devices other than NEs. The backup data isused for restoring the NE configuration. If the DC has the rights to manage the NE and noloading, backup, or restoration operation is being performed on the NE, the NE accepts therequest for backup. The DC then transmits the contents for backup to the specified backupdirectory on the FTP/TFTP/SFTP server through FTP/TFTP/SFTP. The DC backs up datathrough:– Backup operation (manual)– Backup task (manual)– Backup policy (automatic)

l Loading: Loads software for the upgrade to an NE. If the DC has the rights to manage theNE and no loading, backup, or restoration operation is being performed on the NE, the NEaccepts the request for loading. The DC then transmits the contents for loading to the NEthrough FTP/TFTP/SFTP. The DC loads data through:– Loading operation (manual)– Loading task (manual)– Upgrading task (automatic)

l Restoration: Restores NE data from the backup to an NE. If the DC has the rights to managethe NE and no loading, backup, or restoration operation is being performed on the NE, theNE accepts the request for restoration. The DC then transmits the contents for restorationto the NE through FTP/TFTP/SFTP. The DC restores data through the manual restorationoperation.

l Policy and Task: The DC provides different methods for implementing features. Forexample, you can save and back up data through a policy or a task.– A policy is periodic. It is mainly used for the operations that are performed frequently,

such as data saving and data backup.– A task is not periodic. It is mainly used for the operations that are not performed

frequently, such as data upgrading and data loading.Users can select a method according to the actual situation.

5.12 Report ManagementThe U2000 provides reports about alarms, logs, and resources. You can print the required dataor save the data as a file when viewing it. The reports in tabular format can be filtered byequipment type and saved in XLS, TXT, HTML, or CSV files.

You can view reports on the U2000 in the following ways:l Viewing resource reports on the U2000 clientl Viewing iWeb reports through the IE browser, including alarm reports, log reports,

performance reports, and resource reports of equipment in the IP domain

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-43

Table 5-7 Resource Report

Type Report

SDH statistics report Port statistics report

Statistics report of SDH tributary port resources

Statistics report of lower order cross-connections

SDH fiber/cable or radio link resource usage report

Statistics report of trails between SDH NEs

Statistics report of SDH protection subnet resources

Statistics report of SDH trail resources

Microwave report Radio link report

Microwave license capacity report

MSTP Ethernet report Statistics report of Ethernet port resources

Statistics report of services resources between EthernetNEs

WDM statistics report Report on WDM protection group switching status

WDM NE master/slave shelf info report

Statistics report of WDM client-side port resources

Statistics report of WDM link resources

Statistics report of inter-station wavelength resources

Statistics report of WDM bandwidth resources

WDM channel resource report

Wavelength resource usage report

xPON statistics report Report on PON port splitting status

PTN statistics report Interface resource report

Project document Board manufacturer information

Export electronic labels

Clock tracing diagram

Networking diagram

Timeslot allocation diagram

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-44 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Resource Report DiagramFigure 5-28 and Figure 5-29 show the diagrams of the NE-level resource report and the network-level resource report.

Figure 5-28 Diagram of the NE resource report

Display the NEs on NMSThe resource report shows the

statistical value of each parameter

The buttons for querying and setting parameters and the print and save buttons are displayed

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-45

Figure 5-29 Diagram of the network resource report

Display the NEs on NMSThe resource report shows the

statistical value of each parameter

The buttons for querying and setting parameters and the print and save buttons are displayed

iWeb Report

The iWeb report system provides a complete set of flexible and convenient services. It allowsyou to generate, distribute, and manage reports based on the Web. The powerful report systemhelps you to monitor, analyze, and improve network performance, and make decisionsaccordingly.

The iWeb report system supports the following alarm and log reports:

l Details report on equipment alarm severity distribution

l Report on equipment alarm severity distribution

l Equipment connectivity statistics report

l General alarm information report

l History change record report

For information on the functions of the iWeb report system, see 10.9 Report SubsystemManagement.

5.13 System MonitoringThe U2000 provides a GUI-based system monitoring tool, which is used to manage theU2000 and query the system information.

The function of managing system processes enables you to perform the following operations asshown in Figure 5-30.

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-46 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Monitor the processes, databases and server information about the U2000 in real time. Forthe running status of the U2000 server, see System Information Monitoring.

l Start and stop processes automatically or manually.– When the U2000 is started, all the processes start automatically.– The U2000 restarts a process automatically if this process stops abnormally.– Processes can be started or stopped manually as required.

l Set the security communication mode.

Figure 5-30 System monitoring processes

System Information Monitoring

The U2000 provides a GUI-based system monitoring function. Users can view the serviceprocess status and resource usage (such as the CPU, memory, hard disks, and database) of theU2000 in real time, and the running status of all the components installed on the U2000 server.

When items monitored by the U2000 are abnormal, the corresponding status icons turn red. Bydefault, the U2000 sets thresholds for certain monitored items such as the CPU usage anddatabase usage. When a value of the monitored item reaches the corresponding threshold, thesystem sends an alarm and the corresponding status icon turns red. Users can modify thethresholds if necessary.

The system monitoring tool of the U2000 also provides the function of querying systeminformation, as shown in the following figure.l Query process information.l Query hard disk information.l Query database information.l Monitor the server.l Query component information.l Query operation logs.

iManager U2000 Unified Network Management SystemProduct Description 5 Basic Functions

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

5-47

Figure 5-31 System monitoring information

5 Basic FunctionsiManager U2000 Unified Network Management System

Product Description

5-48 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

6 MSTP Network Feature Management

About This Chapter

This topic describes the functional features of MSTP NE management and network management.

6.1 MSTP NE ManagementNE management refers to the management of configurations of an NE in terms of attributes,communication, services, protection, and clocks. The configuration data is saved to the databaseof the U2000 and to the database of the NE.

6.2 MSTP Protection Subnet ManagementA protection subnet is a network structure with the comprehensive self-protection function. Inthe U2000, the protection subnet is a generalized concept that includes not only the networkstructure with the comprehensive self-protection function, such as an MSP ring and a pathprotection (PP) ring, but also the network structure without the self-protection function, such asan unprotected ring and an unprotected chain.

6.3 E2E MSTP ManagementE2E network management is also referred to as trail management. You can construct theconfiguration data of E2E network management by searching for the data at the NE layer of theU2000, or directly configure the data at the network layer of the U2000, and apply the data toall the related NEs. Compared with configuring NE data on a per-NE basis, configuring NE databy using the trail management function is faster and more convenient.

6.4 SDH ASON ManagementThe automatically switched optical network (ASON) is a new generation of optical network thatintegrates the exchange and transport functions. After a user initiates a service request, the ASONselects a route automatically, establishes and removes connections through the signaling control,and performs network connections automatically and dynamically. An ASON NE refers to theequipment that is equipped with both SDH and ASON features. An ASON is managed by theU2000 that combines ASON and SDH features.

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-1

6.1 MSTP NE ManagementNE management refers to the management of configurations of an NE in terms of attributes,communication, services, protection, and clocks. The configuration data is saved to the databaseof the U2000 and to the database of the NE.

Basic NE ConfigurationYou can perform the following operations on the U2000:l Modify NE attributes such as:

– NE name– NE ID– Extended NE ID– Remarks– NE pre-configuration

NOTE

For the NE whose ID needs to be set through the DIP switch, modify the NE ID on the U2000.

l Synchronize NE time: Align all NEs with the system time of the U2000 serverautomatically.

l Query physical resources in the following lists:– NE list– Board manufacturer information– Board list– Cabinet list– Subrack list– Equipment room list

l Use the board plug and play function: After a board is inserted into the slot, the NE Panelautomatically displays the board icon and board information.

l Replace a board. You can replace a board with a board of another type on the U2000.– Query the actual physical board type of a board that is used as a board of another type.– The user can replace board A with board B whose rate and number of ports is the same

or less as of board A.l Enable the function of automatically disabling the NE: periodically disable some NE

functions that may affect services, such as loopback and automatic laser shutdown (ALS).When the time expires, these operations will stop automatically.

l Environment monitoring information. The following items can be set:– PMU interface– EMU interface– CAU interface– NE fan speed

l Virtual NE management– Create a virtual NE.

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Add a board.– Create fibers between the virtual NE and other NEs.– Create SDH services.– Create protection subnets.– Search for and create trails on the virtual NE.

l Support the replacement of the boards.l Supports the management of inband DCN.l Support graphical display of performance events relevant to the optical power.l Create a board with adjustable bandwidth for a preconfigured NE.

Orderwire ConfigurationYou can perform the following operations on the U2000:

l Set and query the orderwire phone numbers, call waiting time, and orderwire phone portavailability.

l Set and query the network-wide conference call number.l Set and query the length of the subnet ID and the related subnet of the optical interface.l Configure and query the SDH network node interface (NNI) connection for orderwire.l Configure and query the F1 data port.l Configure and query the broadcast data port.

Board Protection ConfigurationYou can perform the following operations on the U2000:

l Configure board 1+1 protection.l Configure 1:N tributary protection switching (TPS) protection for a tributary board.l Configure board level protection.l Configure port protection.l Query the data backup status between the active and standby SCC boards.

SDH Interface ConfigurationYou can perform the following operations on the U2000:l Interface board management: query and set the SDH interface boards installed on NEs.l Set the parameters of SDH interfaces.l Set the parameters of CES interfaces.l Set the parameters of PDH interfaces.l Modify the optical/electrical attributes of the port.l Set overhead interfaces, including:

– Orderwire– Hotline number– Special line number– Conference call number

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-3

– Subnet number length– F1 data port– Broadcast data port– Communication port– Data port– Out-ring route

l Set the optical amplifier board interface.l Manage the optical power of a board.l Set tone and data access (TDA) interfaces, including:

– TDA clock source– TDA power feeding

l Query and set the overhead including:– Regenerator section overhead (J0)– Lower order path overhead (V5, J2)– VC4 higher order path overhead (J1, C2) and its pass-through or termination– VC3 higher order path overhead (J1, C2)

l Enable the PRBS function.l Enable the function of pre-alerts for the port optical power.l Set and query the TUG structure in the transmit and receive directions.l Perform lower order loopbacks.l Query the in service (IS) port status and the out of service (OOS) port status of a line board

or a data board.l Manage the power consumption.l Set and query the optical power threshold of a line board.

Configuration for SDH Services and ProtectionYou can perform the following operations on the U2000:

l Configure VC12, VC3, or VC4 services and select protection groups for them. In theplatform 4.0 equipment, select protection groups of these services.

l Manage Transmux services, including M13/E13 Transmux and M13/E13 Transmux Serverservices.

l Configure VC4-4C, VC4-8C, VC4-16C, or VC4-64C concatenated service; bind or unbindservices, and select protection groups for them.

l Configure other services: enterprise system connection (ESCON) services, 64 kbit/sservices (including TDA board services, Nx64 kbit/s services), and DSL services.

l Manage subnetwork connection multiple protection (SNCMP) services.l Activate or deactivate services.l Manage subnetwork connection protection (SNCP) services.l Manage subnetwork connection tunnel protection (SNCTP) services.l Convert an SNCP service to a normal service or convert a normal service to an SNCP

service.

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure multiple multiplex section protection (MSP) rings at a single optical port.Configure multiple MSP rings by VC4 at an optical port to increase the usage of networkresources.

l Configure REG. After the line board is set as REG, each pair of optical interfaces of theline board provides a special receive or transmit function. Through the internal switch, theSDH signals from the receiving optical interface are sent out directly to the correspondingtransmitting optical interface after passing through the regenerator section layer and beingamplified. The REG function is completely implemented by the board without thecooperation of the SCC board and a cross-connect board.

l Query the capacity of higher order and lower order cross-connections on an NE.

Configuration for ATM Interfaces, Services, and Protection

You can perform the following operations on the U2000:

l Query and configure the ATM interface board on an NE.l Query the bandwidth of ATM board.l Set the parameters for an ATM interface.l Configure ATM traffic.l Configure ATM cross-connections.

– Create a network to network interface (NNI) on the ATM processing board.

– Configure ATM cross-connections.

– Configure ATM protection groups.

– Configure ATM protection pairs.

– Configure ATM services from ATM board to SDH line.

– Activate or deactivate ATM cross-connections.l Configure ATM bound path.l Perform ATM operation, administration and maintenance (OAM).

– Set or query the section-end attribute of a connection point.

– Set or query the continuity check (CC) activation status of the connection point.

– Perform a remote loopback test.

– Set or query the NE loopback location identifier (LLID).

– Upload, download, duplicate the OAM data of the NE or perform the related consistencycheck.

l Configure an inverse multiplexing over ATM (IMA) group.

Configuration for Ethernet Interfaces and Services

You can perform the following operations on the U2000:l Query and configure the Ethernet interface board on an NE.l Configure fast Ethernet transparent transmission board.l Set the parameters of the Ethernet internal interfaces, including:

– Basic attributes

– TAG attributes

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-5

– Network attributes– Encapsulation/mapping– Link capacity adjustment scheme (LCAS)– Bound path– Advanced attributes

l Configure the parameters of the external ports of Ethernet interface, including:– Basic attributes– Flow control– TAG attributes– Network attributes– Advanced attributes

l Configure point-to-point LPT and point-to-multipoint LPT.l Configure E-Line services, including Ethernet private line (EPL) and Ethernet virtual

private line (EVPL). Create a new service and configure a bound path.l Configure Ethernet private LAN (EPLAN) services. Create a new virtual bridge (VB) and

configure the following parameters: service mount, VLAN filtering table, VLAN unicast,MAC address disabling, bound path, self-learning MAC address, VB port MAC addresstable capacity, and VLAN MAC address table capacity.

l Configure the parameters of Ethernet Layer-2 switching, including:– Aging time– Spanning Tree Protocol– Multiple Spanning Tree Protocol– IGMP snooping protocol

l Configure QinQ service: QinQ is an embedded technology in VLAN, and tags users withmulti-layer VLAN ID, so that VLAN can be extended. Perform operations such as adding,stripping and exchanging of tags in different scenarios.

l Configure Ethernet link aggregation group (LAG), which contains intra-board LAG andinter-board LAG.– Create or delete an LAG.– Add or delete LAG ports.– Query LAG ports and aggregation state.

l Configure the parameters of quality of service (QoS), including:– Flow configuration– CAR configuration– CoS configuration– Flow shaping management– Port shaping management– Differentiated service (DiffServ) domains– CAR policy– Port WRED Policy– V-UNI ingress policy– V-UNI egress policy

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– PW policy– Weighted random early detection (WRED) congestion and discarding policy of services– QinQ policy– Weighted fair queuing (WFQ) schedule policy– CoS queue scheduling priority mapping

l Test frame receiving and transmitting on Ethernet boards, including the EGT, EFT, EGS,EFS and EMS boards.

l Query the opposite NE of the data services on these boards.l Use QoS template to simplify the QoS configuration for Ethernet services.l Enable the automatic reporting function of RMON performance of Ethernet boards.l Support the dumping of history RMON performance of Ethernet boards.l Support the protocol diagnosis function.l Support the alarm function in the case of no traffic at Ethernet ports.l Support the Ethernet port mirroring.l Set and query the MAC address of a data board.l Support the traffic statistics function at a port.l Support traffic monitoring and report for an Ethernet port.l Allow the board to respond to the ping command.l Create flows in batches.l Support the ability to manage multi-protocol label switching (MPLS). The MSTP

equipment builds a label switched path (LSP) with a PE router, identifies LSP labels andservice priorities, and encapsulates LSPs into virtual concatenation groups (VCGs) fortransmission.

l Configure the static routes and address resolution.l Configure E-Line services, E-LAN services, E-AGGR services, and clock services.

RPR ManagementYou can perform the following operations on the U2000:

l Modify resilient packet ring (RPR) node information.l Set and query the node information of an NE in the RPR.l Set the RPR link information of an NE.l Query the topology of the RPR that the NE belongs to.l Query the protection status, switching status, and switching position of the RPR that an NE

belongs to.l Configure forced switching, manual switching, or clear switching in the RPR that an NE

belongs to.

Clock ConfigurationYou can perform the following operations on the U2000:l Query the clock synchronization status.l Set the clock source priority tables, including:

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-7

– System clock source priority list– Priority table for phase-locked sources of 1st external clock output– Priority table for phase-locked sources of 2nd external clock output

l Set clock source switching, including:– Clock source restoration parameters– Clock source switching condition– Clock source switching

l Configure clock subnets, including:– Clock subnet– Clock quality– Synchronization status message (SSM) output control– Clock ID status

l Set phase-locked sources output by external clock, including:– External clock output phase-locked source– 2 Mbit/s phase-locked source external clock attributes

IEEE 1588 Packet ClockYou can perform the following operations on the U2000:

l Configure the selection mode of a frequency source.l Set the PTP clock source port.l Set the quality level of the clock source.l Set the PTP clock source priority.l Configure a PTP clock service.l Set the clock interface configuration.l Set the external clock interface configuration.

Ethernet OAM ManagementYou can perform the following operations on the U2000 for configuring the 802.1ag EthernetOAM:

l Create and configure maintenance nodes.l Perform a continuity check (CC) check.l Perform a loopback (LB) check.l Perform a link trace (LT) check.l Perform a ping test.l Perform performance detection.

You can perform the following operations on the U2000 for configuring the 802.3ah EthernetOAM:

l Query remote OAM parameters.l Set link monitoring parameters. This function helps to detect the events of frame error,

frame error period, and frame error seconds.

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Perform a remote loopback test.

l Enable the reporting of Ethernet OAM loopback events.

Peform OAM management for MPLS tunnels.

MPLS Tunnel Protection Group Configuration

You can perform the following operations on the U2000 for configuring an MPLS tunnelprotection group:

l Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,including the switching mode, return mode, wait-to-restore (WTR) time, and hold-off time.

l Perform MPLS tunnel protection switching.

l Query the protection switching status of an MPLS tunnel.

MS PW Configuration

By creating a multi-segment pseudowire (MS-PW) to transmit services, tunnel resources andtransmit services over different networks can be saved.

CES Service Configuration

CES is mainly used for service transparent transmission of TDM trail switching data in the PTNnetwork.

You can perform the following operations on the U2000 for configuring CES services:

l Create the corresponding PW when creating a CES service.

l Create UNI-UNI and UNI-NNI CES services.

l Create CES services of structure-aware TDM circuit emulation service over packetswitched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).

l Configure QoS of the CES service.

l Configure CES service alarm transparent transmission.

l Select the tunnel where a PW is carried online.

MSTP Configuration

The MSTP can be used to clear loops in a network. The MSTP uses a specific algorithm to blocksome redundant trails and change a loop network to a non-loop tree network. This functionprevents packet increase in a loop network and generation of broadcast storms in an endlesscycle. Different from the STP and RSTP, the MSTP can forward data according to VLAN packetsand achieve load balance of VLAN data.

You can perform the following operations on the U2000 for configuring the following MSTPattributes:

l Configure parameters of port groups and bridges.

l Configure CIST and MSTI parameters.

l Query CIST status and MSTI status.

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-9

OSPF Protocol ConfigurationYou can perform the following operations on the U2000 by using OSPF protocol as the networkprotocol:

l Manage the OSPF routes and set relevant parameters.l Enable or disable port-level OSPF and LSA.l Import static routes.

CES ACR ClockCES ACR (Adaptive Clock Recover) is based on CES services and recovers the clock of thesource at the sink in adaptive mode. The sink equipment can recover the TDM clock (in FIFOmode) according to the change in the buffer for receiving CES services (the change is causedby the packets received on the NNI side).

Packet FunctionImplement the packet functions, such as the PW OAM, PW APS, MCSP, MC LAG, MS PW,CES, and bidirectional tunnel.

6.2 MSTP Protection Subnet ManagementA protection subnet is a network structure with the comprehensive self-protection function. Inthe U2000, the protection subnet is a generalized concept that includes not only the networkstructure with the comprehensive self-protection function, such as an MSP ring and a pathprotection (PP) ring, but also the network structure without the self-protection function, such asan unprotected ring and an unprotected chain.

To perform protection subnet management, the relevant license is required.

You can perform the following operations on the U2000:

l Create protection subnets of different types.– Linear MSP: 1+1 and M:N.– MSP ring: two-fiber bidirectional MS shared protection ring, two-fiber unidirectional

MS dedicated protection ring, and four-fiber bidirectional MS shared protection ring.– PP ring: two-fiber unidirectional PP ring and two-fiber bidirectional PP ring.– Dual node connection (DNI) protection.– Non-protection (NP) ring and NP chain.

l Search for a protection subnet according to the information of NEs and fibers or cables, toform a complete protection subnet.

l Transfer an NP chain to a 1+1 linear MSP without interrupting services.l Start or stop the MSP protocol of the MSP subnet, such as enabling or disabling the MSP

protocols network-wide or the MSP protocol for a single node.l Support the automatic generation of the services on the protection channel according to the

services on the working channel.l Adjust the bandwidth dynamically. To be specific, you can dynamically adjust the MSP

bandwidth according to the service demands and how the network bandwidth is usedcurrently to improve the utilization of network bandwidth. For example, for an STM-16

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

MSP of an 8 x VC4 bandwidth, if the 6 x VC4 bandwidth is enough, then change theprotection bandwidth from 8 x VC4 to 6 x VC4 bandwidth and save 4 x VC4 for the useof non-MSP-protected services.

l Expand the capacity of an MSP ring and a linear MSP chain. To be specific, you can expandthe link capacity by replacing the line boards on both sides of the link without interruptingactive services. For example, upgrade an STM-16 MSP ring to STM-64 smoothly.

l Change the revertive mode of linear MSP protection without restarting the protocol.

l Expand and add nodes to multiple types of protection subnets, including MSP, SNCP, PP,NP ring, NP chain and their combinations.

l Query the names, types and status of all protection subnets.

l Query and set the switching status, wait-to-restore (WTR) time, and the trigger conditionof the protection subnet.

l Query all the isolated nodes and delete useless nodes.

l Set and view SDH NNIs.

l Query the relevant trail by protection subnet.

l Manage the entire RPR ring network. To be specific, you can create, delete, and search foran RPR ring; you can manage the RPR ring protection parameters and link parameters.RPR ring topology can be displayed through a view.

l Generate the MSTP protection subnet report to facilitate the statistics and maintenance ofthe protection subnets.

6.3 E2E MSTP ManagementE2E network management is also referred to as trail management. You can construct theconfiguration data of E2E network management by searching for the data at the NE layer of theU2000, or directly configure the data at the network layer of the U2000, and apply the data toall the related NEs. Compared with configuring NE data on a per-NE basis, configuring NE databy using the trail management function is faster and more convenient.

To perform E2E network management, the relevant licenses is required.

MSTP Trail Management

You can perform the following operations on the U2000:

l Create and maintain an SDH trail.

– Create an SDH trail, designate a timeslot, and select the protection priority strategy andthe resource usage strategy. The service levels include VC12, VC3, VC4, VC4 servertrail, VC4-4C, VC4-8C, VC4-16C and VC4-64C.

– Activate or deactivate, and lock or unlock an SDH trail.

– Join or split, and enable or disable a VC4 server trail.

– During search of SDH trails, the U2000 retains the attributes of the existing ones as theyare.

– Upgrade an SDH trail to an ASON trail.

– Downgrade an ASON trail to an SDH trail.

– Query the service status on a per-NE basis according to SDH trails.

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-11

– Manage optical power: Query the input power, output power, and power thresholds forSDH boards.

– Set and query the overhead bytes of all NEs on the trail, such as the trace byte.– The U2000 prompts users to configure trace bytes when timeslot out-of-sequence occurs

to the MS.– Query the status of a lower order service.– Set overhead pass-through or termination for all NEs on the trail.– Insert alarms such as AIS and remote defect indication (RDI) into the trails at the VC4

level.– Set loopback on any nodes on a trail, including VC4 loopback, tributary loopback,

optical interface loopback and cross-connection loopback.– Perform a PRBS test on a trail.– Modify the add/drop ports on a trail and the timeslots occupied by the trail without

interrupting services.– Adjust the original route partially by changing the NE, board or timeslot that the trail

passes through.– Modify the route for concatenated services without interrupting services.– Set SNCP switching on a trail.– Implement the function of automatically generating dually-fed SDH services for 1+1

linear MSP.– Duplicate an SDH trail so that SDH trails can be created in batches.– Duplicate an SDH trail that is configured with DNI protection, so that SDH trails can

be created in batches.– Manage discrete SDH services, such as querying or analyzing discrete services.– Analyze the connectivity of an SDH trail and locate a fault of an SDH trail.– View the usage of VC12 or VC3 trails related to a VC4 server trail in graphical format,

and the information about the VC12 or VC3 trails.– Convert SDH discrete cross-connections to a mono nodal trail.– Manage SDH trails based on permissions and domains.– Search for fibers on an SDH trail.

l Manage the alarms and performance events related to an SDH trail.– Configure alarm suppression or alarm reversion for a trail.– Query current and history alarms, current and history performance data, unavailable

time (UAT) and performance threshold-crossing records of an SDH trail.– Set performance parameters for an SDH trail.– Query the SDH trails and customer information affected by an alarm.– Display R_LOS alarms in the Transmission Media Layer Route view.

l Search for trails. Based on the NE configuration data at the NE layer, and the fiberconnection data and protection subnet information at the network layer, the U2000generates the network layer information about E2E trails.

l Name trails automatically.l Filter trails in three ways.

– Filter all: Filter all trails and display only the qualified trails.

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Secondary filter: Filter those trails that are already displayed according to the filtercriteria.

– Incremental filter: Filter all trails and display the newly qualified trails together withthe currently displayed ones.

Ethernet Trail ManagementYou can perform the following operations on the U2000:

l Create and maintain an Ethernet trail.l Create trunk links at VC12, VC3, VC4, VC4-4C, VC4-8C and VC4-16C levels.l Create an unterminated trunk link.l Create an Ethernet trail. The service includes EPL, EVPL, unterminated EPL, EPLAN,

EVPL based on QinQ, EVPL based on RPR and EVPLAN based on RPR.l Create a protection Ethernet trail that has one source and dual sinks.l Create an Ethernet trail that belongs to multiple VLANs.

NOTE

For release 4.0 NEs (version 4.bb.cc.dd), the SDH NNI needs to be created on Ethernet line boards.

l Activate or deactivate an Ethernet trail.l During search of Ethernet trails, the U2000 retains the attributes of the existing ones as

they are.l Manage discrete Ethernet services, such as querying or analyzing discrete services.l Search for an Ethernet trail.l Filter trails in three ways.

– Filter all: Filter all trails and display only the qualified trails.– Secondary filter: Filter those trails that are already displayed according to the filter

criteria.– Incremental filter: Filter all trails and display the newly qualified trails together with

the currently displayed ones.l Manage the alarms and performance events related to an Ethernet trail.

– Query the Ethernet trails and customer information affected by an alarm.– Query current and history alarms related to an Ethernet trail.– Implement the RMON performance function for an Ethernet trail.

ATM Trail ManagementYou can perform the following operations on the U2000:

l Create and maintain an asynchronous transfer mode (ATM) trail.– Create an ATM trunk link.– Create an ATM trail.– Activate or deactivate an ATM trail.– Manage ATM discrete services, such as querying or analyzing discrete services.– Search for an ATM trail.

l Manage the alarms and performance events related to an ATM trail.

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-13

– Query the ATM trails and customer information affected by an alarm.– Query the current and history alarms related to an ATM trail.

l Filter trails in three ways.– Filter all: Filter all trails and display only the qualified trails.– Secondary filter: Filter those trails that are already displayed according to the filter

criteria.– Incremental filter: Filter all trails and display the newly qualified trails together with

the currently displayed ones.

Management of Packet ServicesYou can perform the following operations on the U2000:

l Manage PWE3 services.– Create an ETH PWE3 service or a CES PWE3 service.– Predeploy a PWE3 service.– Implement the function of automatically discovering PWE3 services.– Modify and delete PWE3 services, and filter PWE3 services to view the desired services.– Manage multi-hop PWE3 services.– Manage the protection of PWE3 services.– View the topology of PWE3 services.– View the alarms of a PWE3 service.– View the performance of a PWE3 service.– Manage discrete PWE3 services.– Manage PWE3 services based on permissions and domains.– Create PWE3 services by using the duplication function.– Manage PWE3 service templates.– Implement the function of automatically generating Ethernet OAM for PWE3 services.– Set loopback and view the loopback status.

l Manage tunnels.– Create a tunnel based on the static CR protocol.– Predeploy a tunnel.– Implement the function of automatically discovering tunnels.– Modify and delete tunnels, and filter tunnels to view the desired tunnels.– View the topology of tunnels, including working routes and protection routes.– View the alarms of a tunnel.– View the performance of a tunnel.– View the results of testing and checking a tunnel.– Manage discrete tunnels.– Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the

function of automatically discovering 1+1 or 1:1 tunnel protection groups.– Manually switch 1+1 or 1:1 tunnel protection groups.

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– View the topology of a 1+1 or 1:1 tunnel protection group.– Configure OAM.– View the tunnel names in the global LSP view.– Manage bidirectional tunnels.

l Manage VPLS services.– Create a VPLS service.– Predeploy a VPLS service.– Implement the function of automatically discovering VPLS services.– Modify and delete VPLS services, and filter VPLS services to view the desired services.– Manage VPLS services.– View the topology of VPLS services.– View the alarms of a VPLS service.– View the performance of a VPLS service.– Manage discrete VPLS services.– Manage VPLS services based on permissions and domains.– Manage VPLS service templates.– Implement the function of automatically generating Ethernet OAM for VPLS services.– Set loopback and view the loopback status.

l Manage E-AGGR service.– Create an E-AGGR service.– Predeploy an E-AGGR service.– Implement the function of automatically discovering E-AGGR services.– Modify and delete E-AGGR services, and filter E-AGGR services to view the desired

services.– View the topology of an E-AGGR service.– View the alarms of an E-AGGR service.– View the performance of an E-AGGR service.– Manage discrete E-AGGR services.– Manage E-AGGR services based on permissions and domains.– Manage E-AGGR service templates.– Configure OAM.– Set loopback and view the loopback status.

l Manage composite services.– Manage composite services in the scenarios where an EPL service accesses a PWE3

service, a PWE3 service accesses another PWE3 service, and a PWE3 service accessesan E-AGGR service.

– Modify and delete composite services, and filter composite services to view the desiredservices.

– Implement the function of automatically discovering composite services.– View the topologies of composite services and the internal connections between

composite services.

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-15

– View the status of composite services.

Network Expansion and Service Handover ManagementYou can perform the following operations on the U2000:

l Expand a PTN by adding nodes, deleting nodes, and upgrading or adjusting link capacities.l Implement the handover of PWE3 trails at present.l Prepare a manual or automatic service handover plan.l Prepare a service handover plan by using either the rollback handover policy or the best-

effort handover policy.l Hand over, restore, and verify the trails of handover groups in batches.l Create and modify handover groups and handover plans, and delete handover groups and

handover plans in batches.l Create and delete active and preconfigured services in handover groups.

Clock Topology ManagementThe U2000 provides the following functions:

l Supporting the IEEE 1588 V2, SDH, and synchronous Ethernet clocksl Displaying the clock trace relationshipl Displaying the clock alarm status

6.4 SDH ASON ManagementThe automatically switched optical network (ASON) is a new generation of optical network thatintegrates the exchange and transport functions. After a user initiates a service request, the ASONselects a route automatically, establishes and removes connections through the signaling control,and performs network connections automatically and dynamically. An ASON NE refers to theequipment that is equipped with both SDH and ASON features. An ASON is managed by theU2000 that combines ASON and SDH features.

ASON Topology ManagementYou can perform the following operations on the U2000:

l Discover ASON topologies and resources automatically.l Synchronize NEs in a domain: The U2000 can obtain the topology of the network through

the active NE.l Set an account and a password for NE management, and implement the function of

automatically uploading the configuration data of NEs that are already created.l Set the active and standby NEs.l Synchronize cross-connections for NEs.l Manage domains, including creating and deleting domains, and changing the domain name.l Query the ASON NE software version.l Search for ASON discrete signaling.l Manage the node IDs of ASON NEs.

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Enable or disable the optical virtual private network (OVPN) status of the NE.l Query SRGs relevant to an NE.

Control Link ManagementYou can perform the following operations on the U2000:

l Synchronize network-wide control links.l Filter links by domain or source/sink information.l View control links.l Query the current alarm and history alarm about a control link.l Set alarm suppression for a control link.l Customize whether to display the color of alarms in the SDH Control Link

Management window.l Print or save the report list about control links information.

Component Link ManagementYou can perform the following operations on the U2000:

l Synchronize network-wide component links.l Filter component links by domain or source/sink information.l View component link information.l Create component links.l Delete component links.l Set resources reservation.l Query VC4 timeslot usage status.l Query link timeslot segmentation.l Print or save the report list about component links information.

TE Link ManagementYou can perform the following operations on the U2000:

l Synchronize network-wide traffic engineering (TE) links by domain.l Filter TE links by domain, source/sink information or OVPN customer.l View TE links.l Create virtual TE links.l Delete virtual TE links.l Create fibers.l Set the distance for a TE link.l Set the risk link group number.l Create a link resource report.l View bandwidth usage.l Allocate TE links to an OVPN customer.

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-17

l Query the alarms of a TE link.l Set alarm suppression for a TE link.l Query the performance of a TE link.l View the interrupted TE links.l Query SRGs relevant to a TE link.l Customize the cost for a TE link.l Query the affected TE links according to control plane alarms.

ASON Trail ManagementYou can perform the following operations on the U2000:

l Filter ASON services by actual route, original route or shared mesh restoration trail.l Synchronize ASON trails by domain or basic attributes.l View ASON trails.l View the details of an ASON trail.l Create an ASON server trail of the diamond, gold, silver, or copper class.l Create an ASON trail of the diamond, gold, silver, copper or iron class.l Set the OVPN customer of an ASON trail.l Activate or deactivate ASON trails or SDH ASON server trails.l Delete inactive SDH ASON trails or inactive SDH ASON server trails.l Delete SDH ASON trails or SDH ASON server trails on the NMS side.l Duplicate ASON trails.l Optimize ASON trails.l Pre-calculate and optimize service trails.l Set routing attributes of ASON trails, including rerouting lockout status, revertive lockout

status, rerouting priority, rerouting revertive mode, WTR time, schedule revertive time,rerouting policy, trigger condition, crankback and rerouting triggered by B3 bit error.

l Query the rerouting reversion status of a revertive ASON trail.l Create the associated trails with a same initial node or different initial nodes.l Set association for ASON trails.l Remove association for ASON trails.l Set the association source for ASON trails.l Query the related SDH trails for ASON trails.l Set a preset restoration trail for an ASON trail.l Downgrade an ASON trail to an SDH trail.l Migrate a trail without interrupting services.l View the actual route, original route or associated route of an ASON trail.l View the preset restoration trail or shared mesh restoration trail of an ASON trail.l Revert ASON trails manually.l Switch the working or protection trail of a diamond trail manually.l View the alarms of an ASON trail.

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Set alarm suppression for the selected ASON trail.l View the control plane performance of an ASON trail.l View the performance events of an ASON trail.l Create the ASON trail report.l Refresh the original route, actual route or associated route of an ASON trail.l Refresh the preset restoration trail or shared MESH restoration trail for an ASON trail.l Set an actual route as an original route.l Restore to the original route in batches.l Set names for ASON trails in batches according to the naming rules.l Query the service level agreement (SLA) conformity of ASON trails.l View actual routes of gold services after MSP switching.l Save the attributes of the service after you create an ASON service successfully.l Restore the default attributes of an ASON service when you create the ASON service.l Set SNCP access to an ASON trail.l Manage creators of SDH ASON trails.l Reroute the preset SDH ASON restoration trail in case of a fault.l Implement the function of automatically refreshing routes after a diamond trail protection

switching.l Set the associated route attribute of the associated ASON trails.

UNI Trail ManagementYou can perform the following operations on the U2000:

l Synchronize UNI services by domain.l View the information about a UNI service.l Filter UNI services by domain or source/sink information.l Deactivate a UNI service.l Delete a UNI service.

ASON Clock Subnet ManagementYou can perform the following operations on the U2000:

l Create an ASON clock subnet.l Create a preconfigured ASON clock subnet.l Convert a preconfigured ASON clock subnet into an ASON clock subnet.l Convert a traditional clock subnet into an ASON clock subnet.l Manage a hybrid network composed of an ASON clock subnet and a traditional clock

subnet.l Manage the startup time for the SDH ASON clock recovery.

SRG ManagementYou can perform the following operations on the U2000:

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-19

l Create, delete and modify an SRG.l Manage SRGs of the pipe type, fiber type, NE type, site type, and customized type.

One-End Terminated ASON Server Trail ManagementYou can perform the following operations on the U2000:

l Create and delete a one-end terminated ASON server trail.l Activate and deactivate a one-end terminated ASON server trail.l Associate one-end terminated ASON server trails.l Create and delete an ASON-SDH trail that contains one-end terminated ASON server trails.l Activate and deactivate an ASON-SDH trail that contains one-end terminated ASON server

trails.l Search for an ASON-SDH trail that contains one-end terminated ASON server trails.l Set association relationships between the ASON trails that have different sources and sinks.

Integration of SDH and ASON TrailsYou can perform the following operations on the U2000:

l Specify the explicit route for ASON services when creating an ASON-SDH trail. That is,an ASON-SDH trail includes an SDH trail and an ASON trail.

l View SDH and ASON trails at the same time in the SDH Trail Management window.l Manage overhead bytes, alarms and performance of an ASON-SDH trail in a unified

manner.l Query the related ASON trails by an SDH trail.l Query the related SDH trails by an ASON trail.l Downgrade an ASON trail to an SDH trail.l Upgrade an SDH trail to an ASON trail.l Set the revertive attributes when an SDH trail is being migrated to an ASON trail.l Create dually fed and selectively received VC4 ASON server trails.l Calculate working and protection routes using the SPC first policy.l The alarm in the ASON section of an ASON-SDH trail supports the alarm statistics

function.

Script Export and Import for Simulated Network Planning InformationYou can perform the following operations on the U2000:

l Export the scripts of the simulated network planning information, including the network-wide configuration file, NE configuration file, network layer information file, ASONinformation file, TE link information, associated ASON service information, routecalculation policy, component link information, ASON resource reservation information,WTR time information, preset restoration trails and route calculation policy for nodes.

l Import the scripts of the simulated network planning information.

ASON NE Catastrophe RestorationThe U2000 supports an ASON NE catastrophe restoration scheme.

6 MSTP Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

6-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

SDH ASON Management on a Per-NE BasisYou can perform the following operations on the U2000:

l Manage the ASON features of NEs.l Manage IDs of ASON NEs.l Manage the ASON feature of boards.l Manage control plane parameters, including the bandwidth occupancy (%), bandwidth

weight, distance weight, hop weight, and customized cost weight. In addition, the routeselection policy is supported.

l Manage control channels.l Query LMP component links.l Query LMP TE links.l Set the LMP auto discovery mode.l Manage fiber resource thresholds.l Query OSPF control links.l Query OSPF SDH TE links.l Query OSPF component links.l Manage OSPF IP addresses.l Manage OSPF TE link flood thresholds.l Manage OSPF protocol authentication.l Manage ASON trail groups.l Query ASON trails.l Maintain SDH ASON signaling.l Maintain SDH ASON switch controllers.l Maintain ASON shared mesh switch controllers.l Manage the auto-reporting status of control plane alarms.l Manage the levels and suppression status of control plane alarms.l Manage control plane performance parameters.l Query the performance of the control plane.l Manage resource reservation.l Manage the VC4 timeslot occupation status.l Manage the virtual interfaces of ASON links.l Manage the inactive PPPoE interfaces.

iManager U2000 Unified Network Management SystemProduct Description 6 MSTP Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

6-21

7 WDM Network Feature Management

About This Chapter

This topic describes the functions and features of WDM NE management and networkmanagement.

7.1 WDM NE ManagementNE management refers to management of the configurations of an NE in terms of attributes,services, protection, and clocks. The configuration object is a single NE. The data is saved tothe NE database on the U2000 and the NE database on the NE.

7.2 WDM NA NE ManagementNE management includes setting of attributes and configuration of communication, services,protection, and clocks on a per-NE basis. The configuration data is saved at the NE layer on theU2000 and in the database of the NE.

7.3 WDM Protection Subnet ManagementA protection subnet is a network with holistic self-protection. On the U2000, the protectionsubnet is a general concept that refers to not only a network with holistic self-protection, suchas a multiplex section protection (MSP) ring or a path protection (PP) ring, but also a networkwithout self-protection, such as an unprotected ring or an unprotected chain.

7.4 End-to-End WDM ManagementEnd-to-end network management is also referred to as trail management. You can construct theconfiguration data about end-to-end network management by searching for the data at the NElayer of the U2000, or directly configure the data at the network layer of the U2000, and applythe data to all related NEs. Compared with configuring NE data on a per-NE basis, configuringNE data by using the trail management function is quicker and more convenient.

7.5 WDM ASON ManagementThe automatically switched optical network (ASON) is a new generation of optical network thatintegrates switch and transport functions. After a user initiates a service request, the ASONselects a route automatically, establishes and disconnects connections by using signaling control,and establishes network connections automatically and dynamically. An ASON NE refers to theequipment that is enabled with both WDM and ASON features. An ASON network is managedby the U2000 that combines ASON and WDM features.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-1

7.1 WDM NE ManagementNE management refers to management of the configurations of an NE in terms of attributes,services, protection, and clocks. The configuration object is a single NE. The data is saved tothe NE database on the U2000 and the NE database on the NE.

Basic NE ConfigurationYou can perform the following operations on the U2000:

l Synchronize NE time: Send the computer system time, NTP server time, or standard NTPserver time at the U2000 server to all NEs for synchronizing the NE time. You can set theU2000 to automatically synchronize the NE time by specifying the automaticsynchronization period.

l Query the physical inventory information, including information about thetelecommunications rooms, racks, NEs, shelves, boards, and ports.

l Implement the board plug and play feature: After a board is inserted into a slot, the NEPanel automatically displays the board and the board information.

l Disable NE functions automatically: You can set the time when the U2000 automaticallydisables certain NE functions that may affect services. At the time specified, these functionsare automatically disabled.

l Modify the following NE attributes:– NE name– NE ID– Extended NE ID– Remarks– NE pre-configuration

l Modify the following attributes of an optical NE:– Name– Remarks– Resources assigned

l Manage environment monitoring information: You can set the PMU interface, NE fanspeed, temperature monitoring, and voltage monitoring.

l Manage network operator information: You can set the information about the networkoperator, including the international identifier, domestic identifier, and user-definedidentifier.

l Search for and create NEs by discovering NE IP addresses automatically.

Orderwire ConfigurationYou can perform the following operations on the U2000:

l Set a board as an orderwire board and query the orderwire board information.l Set and query the orderwire phone numbers, call waiting time, dialing mode, and orderwire

phone port availability.l Set and query network-wide conference call numbers.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Set and query the subnet number length and the related subnet of an optical interface.l Set and query an NNI orderwire phone.l Set and query an F1 data port.l Set and query a broadcast data port.l Set E1 cross-connections.

Configuration for Ethernet Interfaces and ServicesBy using the U2000, you can perform the following operations:

l Configure Ethernet port mirroring. You can monitor packets, perform routine maintenanceand in-service commissioning through a mirrored port in a flexible manner.

l Set the following attributes of an internal Ethernet interface:– Basic attributes– Flow control– Tag attributes– Network attributes– Bound path– Advanced attributes

l Set the following attributes of an external Ethernet interface:– Basic attributes– Flow control– Tag attributes– Network attributes– Advanced attributes

l Configure E-Line services such as Ethernet private line (EPL), Ethernet virtual private line(EVPL) (QinQ), and VLAN subnetwork connection protection (SNCP) services.

NOTE

l QinQ is a VLAN embedding technique that employs multi-layer VLAN IDs to identify different users.In this manner, VLAN resources are expanded. The U2000 supports the function of adding labels.

l A VLAN SNCP service is a VLAN-based E-Line service that is configured with SNCP protection.You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between aVLAN SNCP service and a common Ethernet service.

l Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB)and set parameters including service mounting, VLAN filtering, VLAN unicast, MACaddress disablement, bound path, and MAC address automatic learning.

l Set the following parameters for QoS:– Flow– CAR– CoS– Flow shaping– Port shaping

l Configure link capacity adjustment scheme (LCAS): LCAS can dynamically adjust thenumber of virtual containers for mapping desired services, so as to satisfy different

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-3

bandwidth requirements of services. In this manner, bandwidth utilization and robustnessof virtual connections are improved.

l Configure OAM for Ethernet services.l Configure OAM for Ethernet ports.l Configure the intra-board LAG function.l Configure the inter-board LAG function.l Configure the VLAN group function.l Configure port MAC address filtering.l Test frames received and transmitted on Ethernet boards.l Configure the protocol diagnosis function.l Configure the QinQ type area.l Configure the following attributes for Ethernet Layer 2 switching:

– Aging time– Spanning tree– IGMP snooping protocol

l Configure the multiple spanning tree protocol (MSTP): MSTP is compatible with STP andRSTP, and it also addresses the defects of STP and RSTP. MSTP supports fast convergence.In addition, MSTP provides multiple redundancy trails for data forwarding, implementingload balancing of VLAN data during data forwarding.

l Configure MPLS tunnels: On a PSN network, an MPLS tunnel carries pseudo wires (PWs)where various services are encapsulated. In this manner, data packets can be transparentlytransmitted among NEs. You can dynamically adjust the required number of virtualcontainers for service mapping so as to adapt to the requirements for different servicebandwidths, at the same time improving bandwidth utilization and robustness of virtualconcatenations.

l Configure link-state pass through (LPT): LPT is used to return the remote-end link statusto the near end. The near-end equipment performs operations depending on the remote-endlink status. The Ethernet board periodically monitors the network to learn the Ethernetstatus. When the connection status of Ethernet ports changes due to a link fault, you canuse the LPT function to quickly switch services from the working route to the protectionroute between the two ends. The LPT feature protects transmission of important data.

l Configure Ethernet ring protection switching (ERPS): Based on the traditional Ethernetmechanism, ERPS uses the ETH OAM function and the ring automatic protection switching(R-APS) protocol to achieve fast protection switching on the Ethernet ring network.

l Configure automatic reporting of RMON performance of Ethernet boards.l Dump history RMON performance data of Ethernet boards.

WDM Board ConfigurationYou can perform the following operations on the U2000:l Configure optical transponder boards.l Configure service multiplexing and de-multiplexing boards.l Configure tributary and line boards.l Configure protection boards.l Configure optical amplifier boards.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure spectrum analysis boards.l Configure optical supervisory channel boards.l Configure optical add/drop multiplexing boards.l Configure variable optical attenuator boards.l Configure optical equalization boards.l Configure automatic optical fiber monitoring boards.l Configure dispersion compensation boards.l Configure wavelength management boards.

Dynamically manage ports.

Query the line rate of an optical transport network (OTN).

Overhead Configuration

You can configure OTN overheads as follows on the U2000:l Configure and query section monitoring (SM) overheads.l Configure and query optical transmission section (OTS) overheads.l Configure and query path monitoring (PM) overheads.l Configure and query tandem connection monitoring (TCM) overheads.l Query optical channel payload unit (OPU) overheads.l Configure and query fault type and fault location reporting channel (FTFL) overheads.

You can configure WDM overheads as follows on the U2000:l Configure optical channel (OCh) overheads at SDH interfaces.l Configure optical transponder unit (OTU) overheads at OTN interfaces.l Configure optical demultiplexer unit (ODU) overheads at OTN interfaces.l Query OPU overheads at OTN interfaces.l Configure OTS overheads at OTN interfaces.

You can configure SDH overheads for the OptiX OSN 8800 T32 and OptiX OSN 8800 T64 asfollows on the U2000:l Configure regenerator section overheads (J0).l Configure lower order path overheads (V5 and J2).l Configure VC4 higher order path overheads (J1 and C2) and pass-through or termination.l Configure VC3 higher order path overheads (J1 and C2).

WDM Service Configuration

At an optical add/drop multiplexer (OADM) station, you can perform ADM configurations forGigabit Ethernet (GE)/fiber channel (FC) services by using the OTU board as follows:

l Configure several WDM service boards in specified slots to form a cross-connect unitgroup.

l Perform the add/drop, pass-through, and loopback operation on GE/FC services in eachcross-connect unit group.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-5

l Implement wavelength cross-connection protection (WXCP), with working and protectioncross-connections configured on the sink NE.

Configure electrical cross-connections:

l The U2000 allows you to configure electrical cross-connections to control the service flowat the electrical layer, and to dynamically groom, converge, and split sub-wavelengthservices. In this manner, the network structure and network survivability are enhanced.

l The U2000 supports integrated grooming of GE, ODU0, ODU1, ODU2, and ODU3services implemented by the XCS.

l The U2000 supports distributed grooming of GE, ODU0, ODU1, and ODU2 services andAny services.

l The U2000 supports unidirectional and bidirectional SNCP at the ODU3, ODU2, ODU1,or ODU0 level.

Configure optical cross-connections:

l Create optical cross-connections dynamically, and manage optical cross-connections byboard or NE, including creation, activation, deactivation, deletion and query.

l Create, query, and delete edge ports.

l Configure optical broadcast cross-connection services on a per-NE basis.

Perform service management operations:

l Lock WDM trails and view the lock status of the corresponding trails in the ServiceManagement window of the NE Explorer.

l View the name of the trail that a service belongs to.

l Query the trail that a service belongs to.

Perform service package management on the OptiX OSN 1800. The service package modulehelps you perform typical service configurations. In this manner, you need not perform onsitecommissioning. This reduces costs in deployment commissioning and product maintenance. Inaddition, the equipment can be configured in a one-key manner.

Manage licenses for service types and cross-connect capacities of the OptiX OSN 8800 T32 andOptiX OSN 8800 T64.

ROADM Configuration

By using the reconfigurable optical add/drop multiplexer (ROADM) function on the U2000,you can perform add/drop and pass-through configuration for optical channels. The WDMequipment uses the DWC and wave selective switch (WSS) to implement the ROADM function.

l Configure ROADM boards based on DWC boards: Wavelength grooming is implementedby using the DWC boards. This configuration method is often used for common nodes ona chain or ring network.

l Configure ROADM boards based on WSS boards: There are two types of networkstructures, WSSD+WSSM and WSS+RMU/ROAM. This configuration method is oftenused for cross-connect nodes on a ring network.

l Configure ROADM boards based on multiplexing and demultiplexing boards:Wavelengths cannot be groomed dynamically. This configuration method is often used forcommon nodes on a chain network.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Clock ConfigurationYou can perform the following operations on the U2000:l Configure a clock source for a board.l Configure transparent transmission for an external clock.l Configure a clock for the SCC board.

– Configure a clock for the optical supervisory channel unit.– Specify the clock source traced by the SCC board.– Define clock source priorities.

PTP Clock (1588V2 Clock) ConfigurationYou can perform the following operations on the U2000:

l Configure the frequency source mode.l Configure PTP clock synchronization attributes.l Query the clock source received at a port.l Configure the PTP clock subnet.l Configure PTP packet attributes.l Configure an external time interface.

Physical Clock ConfigurationYou can perform the following operations on the U2000:

l Configure input attributes of external clocks.l Configure the system clock source priority table.l Configure clock source protection and clock source switching.l Configure phase-locked source output of external clocks.l Configure the quality of clock sources.

WDM Protection ConfigurationYou can perform the following operations on the U2000:

l Configure optical line protection.l Configure an optical wavelength protection group.l Configure port protection.l Configure 1:N (N ≤ 8) optical channel protection.l Configure 1+N (N ≤ 48) optical channel protection.l Configure protection for clock transparent transmission.l Configure optical wavelength share protection (OWSP) with the Metro WDM equipment

and the NG WDM equipment.l Configure WXCP protection for GE/FC services.

– Configure a WXCP protection group for the sink NE.– Configure and query WXCP protection parameters.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-7

– Query the status of WXCP protection switching.– Query services with WXCP protection.– Perform WXCP protection switching.

l Configure a TPS protection group.l Configure a DPPS protection group.l Configure 1+1 protection for boards.

– Configure 1+1 protection for SCC boards.– Configure 1+1 protection for cross-connect and synchronous timing (XCS) boards.– Perform working/protection switching.– Query the switching status.

l Configure SNCP protection.– Configure sub-wavelength (SW) SNCP for GE services or Any services on an OTU

board.– Configure SNCP for optical channel data unit (ODUk) services.– Configure MS SNCP.– Configure VLAN SNCP for an Ethernet board.– Perform protection switching.– Query the switching status.

l Configure board protection switching (BPS).l Configure distribute board protect system (DBPS). DBPS protects 10GE and GE ports on

a TBE board. The cross-connection granularity is the GE service.l Configure ODUk SPRings at the ODU1 and ODU2 levels.l In 1+1 protection for SCC boards, you can query the data backup status between the active

and standby SCC boards.

Optical Power AdjustmentYou can perform the following operations on the U2000:

l Manage the optical power. For example, query the input power, output power, and powerthreshold of each WDM board.

l Perform intelligent power adjustment (IPA). When a fiber is cut, the optical amplifier boarddetects signal loss at the local station. The local station reports an exception event to theU2000. After the user confirms the event, the optical amplifier boards at the upstream anddownstream stations reduce their output power to a safe value to prevent a fiber maintainerfrom being injured by the laser emitted from the cut fiber. After the fiber is reconnected,the optical signals recover to normal and the optical power of each optical amplifier boardautomatically returns to a normal value.

l Perform automatic level control (ALC). The U2000 supports adjustment modes includingwavelength count detection, power detection, and link attenuation (gain mode). Inwavelength count detection mode and power detection mode, you can manually controlwhether to enable the ALC function.– The wavelength count detection mode applies to a transmission link where no service

is added or dropped or where the number of wavelengths added and dropped are thesame at an OADM station. When the spectrum analyzer unit detects that the total opticalpower of the wavelengths greatly differs from the standard power corresponding to the

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

wavelength count, an exception event is reported to the U2000. After the user confirmsthe event, the user needs to manually issue a command to adjust the attenuation of eachstation on the link.

– The power detection mode applies to a transmission link where the number of addwavelengths differs from the number of drop wavelengths at an OADM station. Whenthe optical amplifier board detects that the output power is abnormal, the stationautomatically issues a command to adjust the attenuation of each station on the link.This mode does not involve a spectrum analyzer unit and is therefore cost-effective.

– The link attenuation adjustment mode also applies to a transmission link where thenumber of add wavelengths differs from the number of drop wavelengths at an OADMstation. When the optical power is attenuated to the detection threshold, a command isautomatically issued to adjust the attenuation of each station on the link.

NOTE

The link attenuation adjustment mode is also referred to as the gain mode, which compares line attenuationwith amplifier gain, and then compares the difference between line attenuation and amplifier gain withnode gain compensation offset. After the nominal gain of the optical amplifier unit and the attenuation ofthe attenuation adjustment unit are adjusted, the attenuation is equal to the gain, ensuring the power budgetof the entire link.

l Perform automatic power equilibrium (APE). If the MCA board at the receive end detectsthat the optical power of certain channels is abnormal, the station reports an exception eventto the U2000. After the user confirms the event, the U2000 issues a command to the opticalattenuation adjustment board of the upstream station. This board adjusts the optical powerof the abnormal channel so that the optical signal noise ratio (OSNR) of each channel atthe receive end is equalized.

l Perform ROADM optical power equalization. After ROADM is enabled for dynamicallyconfiguring wavelength services, the WDM equipment outputs multiplexed wavelengths.The optical power between each channel, however, may be greatly different, especially fornew add wavelengths. To avoid negative impact on transmission performance, the ROADMoptical power equalization mechanism is provided. The ROADM first distinguishesbetween pass-through wavelengths and the add wavelengths. Then the DWC/WSS adjuststhe optical power of the pass-through wavelengths, and the optical attenuation adjustmentboard adjusts the add wavelengths based on wavelength flags.

l Configure pre-alerts for optical power at ports.

Dispersion Compensation

You can perform the following operations on the U2000:

l Perform dispersion compensation (with the help of the DCM board) at each band toimplement dispersion equalization.

l Use tunable dispersion compensators (TDCs) to adjust dispersion precisely.

l In the submarine system, use a separate dispersion compensation board, such as the TDC1or TDC2 board, to perform dispersion compensation for signals on the line side of an OTUboard.

Wavelength Monitoring

By using the U2000, you can perform wavelength monitoring management for the OptiX BWS1600G, OptiX OSN 6800, OptiX OSN 8800 T32, and OptiX OSN 8800 T64.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-9

WDM PRBS

By using the U2000, you can perform a pseudo-random binary sequence (PRBS) test on a boardto check the path quality. You can also check whether a WDM link functions properly before aservice is provisioned.

SDH Board Configuration

By using the U2000, you can configure SDH line boards for the OptiX OSN 8800 T32 and OptiXOSN 8800 T64. You can perform the following operations:

l Configure dynamic SDH ports.

l Adjust the rates of optical ports on SDH boards.

l Query the status of a port.

Configuration for SDH Services and Protection

You can perform the following operations on the U2000:

l Configure SDH line boards, SDH services, and SDH service protection for the OptiX OSN8800 T32 and OptiX OSN 8800 T64.

l Configure VC12, VC3, or VC4 services and select protection groups for them.

l Activate or deactivate services.

l Configure SNCP services.

l Switch between an SNCP service and a common service.

l Query the capacities of higher order and lower order cross-connections on an NE.

l Configure subnetwork connection tunnel protection (SNCTP). SNCTP provides protectionchannels at the VC4 level. When the working channel is faulty, all its services are switchedto the protection channel.

l Configure linear multiplex section protection (MSP). In the MSP protection, bytes K1 andK2 in the SDH multiplex section overhead (MSOH) are used to transmit protocolinformation to control the transmit and receive routes of services on a chain network.

l Configure MSP rings, including two-fiber and four-fiber MSP rings.

l Configure transoceanic MSP rings. A transoceanic multiplex section (MS) is an MS basedon the transoceanic MSP protocol and used to provide path protection for higher-orderservices on a transoceanic ring network.

Power Consumption Management

You can perform the following operations on the U2000:

l Manage NE power consumption to achieve energy conservation and environmentprotection when the NE runs in the normal state.

l Query power consumption of a board or an NE.

l Configure energy conservation for an NE. You can dynamically adjust NE powerconsumption to achieve environment protection and energy conservation.

l View network-wide NE power consumption reports.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Submarine Line Management

You need to create a line group for actual submarine lines on the U2000. Hence, you can measureand analyze line data, and monitor the working status of lines. By using the U2000, you canperform submarine line management as follows:

l Create a submarine line.

l Modify a submarine line.

l Activate a submarine line.

l Delete a submarine line.

Submarine Line Monitoring

You can monitor and test the status of fibers and repeaters and analyze test data to monitor theworking status of a submarine system and identify faults. By using the U2000, you can performsubmarine line monitoring as follows:

l Managing submarine line thresholds.

l Monitor submarine lines and the status of a repeater in in-service mode.

l Use the fast fault identification function.

l Identify a fault on a submarine line in off-service mode.

l Perform tests of multiple types: manual test, comparison test in single-test mode, andcomparison test in periodic mode.

l Synchronize, query, and analyze the test data.

l Refresh monitoring information in real time.

l Query the gain report and performance report.

PFE Management

By using the U2000, you can manage the PFE 1670. The PFE 1670 is the power supplyequipment for the submarine transmission system.

FC Service Test

The FC service test uses the 12LOM board to replace the FC test equipment (such as theSmartBits) for running the test. The FC service test verifies whether the FC service line and theequipment under test are in the normal state. By using the U2000, you can perform FC servicetests.

7.2 WDM NA NE ManagementNE management includes setting of attributes and configuration of communication, services,protection, and clocks on a per-NE basis. The configuration data is saved at the NE layer on theU2000 and in the database of the NE.

Basic NE Configuration

By using the U2000, you can perform the following operations:

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-11

l Synchronize the NE time: Send the computer system time and NTP server time at theU2000 server to all NEs for synchronizing the NE time. You can configure the U2000 toautomatically synchronize the NE time by specifying the automatic synchronization period.

l Query physical resources in the following items:

– NE list

– Bard manufacturer information

– board list

– Shelf list

– Telecommunications room listl Implement the board plug and play feature: After a board is inserted into a slot, the NE

Panel automatically displays the board and the board information.l Disable the NE functions automatically: You can set the time when the U2000

automatically disables certain NE functions that may affect services, such as the loopbackand automatic laser shutdown (ALS) functions. At the time specified, these functions aredisabled automatically.

l Configure or modify the NE attributes:

– Modify the NE name.

– Modify the NE remarks.

– Enable or disable automatic board installation.

– Enable or disable LAN port access control.

– Set start time for 24-hour performance monitoring.

– Enable or disable daylight saving time (DST).

– Modify the IP address and subnet mask of an NE.

– Enable or disable ARP proxy.

– Enable or disable the OSI protocol.

– Modify a shelf name.

– Modify shelf remarks.

– Set the time zone and DST.

– Perform a cold reset or warm reset on an NE.

– Reset the NE in DBERASE mode, with the NE database erased.

– Reset the NE in SWDL mode after the NE software is downloaded.

– Enable or disable performance reporting.

– Enable or disable alarm reporting.

– Enable or disable database change (DBCHG) reporting.

– Clear audible and visual alarm indication of an NE in a cabinet.

– Set the NE alarm delay time, including the delay time for alarm start and the delay timefor alarm end.

– Set the longitude and latitude of an NE.

– Set the affiliated gateway IP address.

– Set the affiliated gateway port.

– Set the state model of an NE.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Set the country code and national segment code of an NE.– Enable or disable the buzzer of an NE.

l Modify the following attributes of an optical NE:– Type– Name– Remarks– Vendor– Resources assigned

l Query and modify the parameters in the Card Attribute window.– Set the primary and secondary states.– Query logical boards and physical boards on an NE.– Query the PCB version, software version, FPGA version, and BIOS version of a board.– Query the CLEI code, vendor ID, part number, serial number, date of manufacture, and

board description.– Query the backup power and rated power voltage.– Set the upper temperature threshold and lower temperature threshold.– Set the fan speed, working mode, and LED state.– Perform a cold reset on a board.– Perform a warm reset on a board.

l Manage environment monitoring information: You can set the fan speed mode and speedlevel on an NE.

l Manage fibers and cables as follows:– View fiber cable information.– Create or delete a fiber cable.– Create a fiber cable report.

l Dynamically add a port: SFP/XFP client-side colored ports support the new functions ofdynamically add, delete, and modify.

l Search and create NEs by discovering NE IP addresses automatically.

Orderwire ConfigurationBy using the U2000, you can perform the following operations:

l Set and query orderwire phone numbers and call waiting time.l Set and query network-wide conference call numbers.l Set and query the subnet number length.

Configuration for Ethernet Interfaces and ServicesBy using the U2000, you can perform the following operations:

l Configure Ethernet port mirroring. You can monitor packets, perform routine maintenance,and in-service commissioning through a mirrored port in a flexible manner.

l Set the following attributes for an internal Ethernet interface:

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-13

– Basic attributes– Tag attributes– Network attributes– Advanced attributes– Flow control

l Set the following attributes for an external Ethernet interface:– Basic attributes– Flow control– Tag attributes– Network attributes– Advanced attributes

l Configure Ethernet private line (EPL), Ethernet virtual private line (EVPL) (QinQ), andVLAN subnetwork connection protection (SNCP) services.

NOTE

l QinQ is a VLAN embedding technique that employs multi-layer VLAN IDs to identify different users.In this manner, VLAN resources are expanded. The U2000 supports the function of adding labels.

l A VLAN SNCP service is a VLAN-based E-Line service with SNCP protection. You can create VLANSNCP and QinQ VLAN SNCP services, and perform conversion between a VLAN SNCP service anda common Ethernet service.

l Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB)and set parameters including service mounting, VLAN filtering, VLAN unicast, MACaddress disablement, bound path, and MAC address automatic learning.

l Set the following parameters for QoS:– Flow– CAR– CoS– Port shaping

l Configure OAM for Ethernet services.l Configure OAM for Ethernet ports.l Configure the intra-board LAG function.l Configure the DLAG function.l Configure the VLAN group function.l Configure port MAC address filtering.l Test frames received and transmitted on Ethernet boards.l Configure the protocol diagnosis function.l Configure the QinQ type area.l Set the following parameters for Ethernet Layer 2 switching:

– Aging time– Spanning tree– IGMP snooping protocol

l Configure automatic reporting of RMON performance of Ethernet boards.l Dump history RMON performance data of Ethernet boards.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

WDM Board ConfigurationBy using the U2000, you can perform the following operations:

l Configure optical transponder boards.l Configure service multiplexing and de-multiplexing boards.l Configure tributary and line boards.l Configure protection boards.l Configure optical amplifier boards.l Configure spectrum analysis boards.l Configure optical supervisory channel boards.l Configure optical add/drop multiplexing boards.l Configure variable optical attenuator boards.l Configure wavelength monitoring.l Configure optical equalization boards.

Overhead ConfigurationBy using the U2000, you can configure OTN overheads as follows:

l Configure and query section monitoring (SM) overheads.l Configure and query path monitoring (PM) overheads.l Configure and query tandem connection monitoring (TCM) overheads.l Query optical channel payload unit (OPU) overheads.l Configure and query fault type and fault location reporting channel (FTFL) overheads.

By using the U2000, you can configure WDM overheads as follows:

l Configure an optical channel (OCh) overhead management-SONET interface.l Configure OTU overheads at the OCh overhead management-OTN interface.l Configure ODU overheads at the OCh overhead management-OTN interface.l Configure OPU overheads at the OCh overhead management-OTN interface.l Configure TCM overheads at the OCh overhead management-OTN interface.l Configure OTS overheads at the OCh overhead management-OTN interface.

WDM Service ConfigurationAt an optical add/drop multiplexer (OADM) station, you can configure ADM for GE/Anyservices by using the LQG, LOG, and other boards as follows:l Configure several WDM service boards in specified slots to form a cross-connect unit

group.l Perform the add/drop, pass-through, and loopback operation on GE services in each cross-

connect unit group.l Implement unidirectional and bidirectional WXCP protection with working and protection

cross-connections configured on the sink node.

Configure electrical cross-connections: The U2000 allows you to configure electrical cross-connections to control service flows at the electrical layer. In this manner, the network structureand network survivability are improved. The following two features are supported:

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-15

l Integrated grooming of GE, ODU1, ODU2, and ODU3 services implemented by XCS.l Distributed grooming of GE, ODU1, ODU2, and Any services.

Configure ODU3, ODU2, ODU1, ODU0, GE/Any, and OTU1 cross-connections, andunidirectional and bidirectional SNCP at the ODU0, ODU1, ODU2, and ODU3 levels.

l Create OCh cross-connections dynamically, and manage optical cross-connections byboard or NE, including creation, activation, deactivation, deletion and query.

l Create edge ports.

Perform the following service management operations:l Lock WDM trails and view the lock status of the trails in the Service Management window

of the NE Explorer.l View the names of the trails that a service traverses.l Query the trails that a service traverses.

ROADM ConfigurationBy using the ROADM function on the U2000, you can perform add/drop and pass-throughconfigurations on optical channels. The WDM equipment uses DWC and WSS to implementthe re-configuring of optical add/drop multiplexing.

l DWC type of ROADM: DWC is applicable to common nodes on a chain or ring network.l WSS type of ROADM: WSS is applicable to cross-connect nodes on a ring. This feature

is applicable to grooming of multi-dimensional optical cross-connections. A maximum ofeight dimensions are supported.

The U2000 supports optical broadcast cross-connection services on a per-NE basis.

Clock ConfigurationBy using the U2000, you can perform the following operations:

Configure the master clock.l Add a clock source.l Delete a clock source.l Query a clock source.

Configure a clock for the OTC board.l Set the input attributes of a clock for the OTC board.l Set the output attributes of a clock for the OTC board.l Set the working route of a clock for the OTC board.l Set the synchronization clock source.

WDM Protection ConfigurationBy using the U2000, you can perform the following operations:

l Configure 1+1 optical channel protection.l Configure 1:N optical channel protection.l Configure inter-shelf protection.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure port protection.

– Configure optical line protection.

– Configure intra-board 1+1 protection: This function includes intra-board 1+1 protectionimplemented by dual-fed OTU boards and intra-board 1+1 protection implemented withthe help of the DCP or OLP board.

– Configure client-side 1+1 protection.

l Configure protection for clock transparent transmission.

l Configure OWSP protection.

l Configure WXCP protection for GE/OTU1 services.

– Configure a WXCP protection group for the board in the sink slot.

– Configure and query WXCP protection parameters.

– Query the status of WXCP protection switching.

– Query services with WXCP protection.

– Perform WXCP protection switching.

l Configure board 1+1 protection.

– Configure SCC board 1+1 protection.

– Configure XCS board 1+1 protection.

– Configure AUX board 1+1 protection.

– Perform switching between working and protection boards.

– Query the switching status.

l Configure SNCP protection.

– Configure subwavelength (SW) SNCP for GE or Any services on an OTU board.

– Configure SNCP for optical channel data unit (ODUk) services.

– Configure VLAN SNCP for an Ethernet board.

– Perform protection switching.

– Query the switching status.

l Configure board protection switching (BPS). The BPS protection uses two boards: theworking and protection boards. BPS protection protects any single port on the two boardsby board-level switching.

l In 1+1 protection for SCC boards, you can query the status of data backup between theactive and standby SCC boards.

Optical Power Adjustment

By using the U2000, you can perform the following operations:

l Manage the optical power. For example, query the input power, output power, and powerthreshold of each WDM board.

l Perform intelligent power adjustment (IPA). When a fiber is cut, the optical amplifier boarddetects signal loss at a station. The station reports an exception event to the U2000. Afterthe user confirms the event, the optical amplifier boards at the upstream and downstreamstations reduce their output power to a safe value to prevent the fiber maintenance personnelfrom being injured by the laser emitted from the cut fiber. After the fiber is reconnected,

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-17

the optical signals recover to normal and the optical power of each optical amplifier boardautomatically returns to a normal value.

l Perform automatic level control (ALC). Link attenuation (gain mode) can be used as theadjustment mode. The link attenuation adjustment mode applies to a transmission linkwhere the number of add wavelengths differs from the number of drop wavelengths at anOADM. When the optical power is attenuated to the detection threshold, a command isautomatically issued to adjust the attenuation of each station on the link.

NOTE

The link attenuation adjustment mode is also referred to as the gain mode, which compares line attenuationwith amplifier gain, and also compares node gain with compensation offset. After the nominal gain of anoptical amplifier unit and the attenuation value of an attenuation adjustment unit are adjusted, theattenuation value is equal to the gain value, ensuring the power budget of the entire link.

l Perform automatic power equilibrium (APE). If an MCA board at the receive end detectsthat the optical power of certain channels is abnormal, the station reports an exception eventto the U2000. After the user confirms the event, the U2000 issues a command to the opticalattenuation adjustment board at the upstream station. This board adjusts the optical powerof the abnormal channel so that the optical signal-to-noise ratio (OSNR) of each channelat the receive end is equalized.

l Perform ROADM optical power equalization. After ROADM is enabled for dynamicallyconfiguring wavelength services, the WDM equipment outputs multiplexed wavelengths.The optical power, however, may deviate greatly on channels, especially on newwavelength channels. To avoid negative impact on transmission performance, the ROADMoptical power equalization mechanism is provided. The ROADM first distinguishesbetween pass-through wavelengths and add wavelengths. Then the DWC/WSS adjusts theoptical power of the pass-through wavelengths, and the optical attenuation adjustmentboard adjusts the add wavelengths based on wavelength flags.

l Configure pre-alerts for the optical power at a port.

Dispersion Compensationl The G.652 and G.655 fibers have positive dispersion coefficient and positive dispersion

slope at the 1550 nm window. After an optical signal is transmitted over a certain distance,accumulation of positive dispersion broadens the optical signal pulse and seriously affectssystem transmission performance. To minimize this impact, a negative DCM is used onthe network. The negative DCM uses negative dispersion to compensate the positivedispersion of the transmission fiber, so as to maintain the original shape of the signal pulse.

l An OEQ NE can apply dispersion compensation at each band to achieve dispersionequalization.

l The U2000 supports 40G dispersion compensation, which uses the TDC to adjust dispersionprecisely.

Wavelength MonitoringWavelength monitoring uses a wavelength supervisory unit to monitor the wavelengths that aretransmitted from a WDM-side optical interface on the OTU board (including the serviceconvergence unit) and to control wavelength shift. By using the U2000, you can performwavelength monitoring. This function ensures wavelength stability.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

WDM PRBSBy using the U2000, you can perform pseudo-random binary sequence (PRBS) on a board tocheck the path quality. You can also check whether a WDM link functions properly before aservice is provisioned.

Housekeeping ConfigurationBy using the U2000, you can perform the following operations:

l Set and query the environmental alarm property.– Create environmental alarm attributes.– Set the normal state of the environmental alarm property.– Query environmental alarm attributes.– Modify environmental alarm attributes.– Delete environmental alarm attributes.

l Set and query the external control property.– Create external control attributes.– Query external control attributes.– Modify external control attributes.– Delete external control attributes.– Set the control time of the external control relay.

Query of AO Buffer RecordsBy using the U2000, you can perform the following operations:

l Query the records in the automatic output (AO) buffer. The record information includes:– Time at which the record is generated– Autonomously generated correlation tag (ATAG) of the record– Type of the record– Description of the record

l Filter the records in the AO buffer.l Save the records in the AO buffer to a file.l Export the AO buffer information to the browser of the operating system for printing.

EAPE ManagementEnhanced automatic power equalization (EAPE) management can reduce the bit error rate (BER)of a service. By using the U2000, you can query the EAPE function of an OCh trail.

Power Consumption ManagementBy using the U2000, you can perform the following operations:l Manage NE power consumption to achieve energy conservation and environment

protection when the NE runs in the normal state.l Query the power consumption of a board or an NE.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-19

l Configure energy conservation for an NE. You can dynamically adjust NE powerconsumption to achieve environment protection and energy conservation.

l View network-wide NE power consumption reports.

ASON ManagementTopology Management

By using the U2000, you can perform the following operations:l Discover ASON topologies and resources automatically.l Synchronize NEs in a domain: On the U2000, you can obtain the topology of a network

from the active NE.l Set the active and standby NEs.l Manage domains, including creating and deleting domains, and changing domain names.l Query the ASON NE software version.l Manage IDs of ASON NEs.l Query the status (enabled/disabled) of the ASON NE software.l Enable or disable the ASON feature of an ASON NE.

TE Link Management

By using the U2000, you can perform the following operations:l Synchronize network-wide links by domain or payload type.l Filter links by domain, link signal type, payload type, or source/sink information.l View TE links.l Create fibers.l Manage TE links whose payload type is OCh.l Set the length of a TE link.l Create a link resource report.

7.3 WDM Protection Subnet ManagementA protection subnet is a network with holistic self-protection. On the U2000, the protectionsubnet is a general concept that refers to not only a network with holistic self-protection, suchas a multiplex section protection (MSP) ring or a path protection (PP) ring, but also a networkwithout self-protection, such as an unprotected ring or an unprotected chain.

To perform protection subnet management on the U2000, the relevant license is required.

You can perform the following operations on the U2000:

l Search for a wavelength protection subnet.– Create a 1:N wavelength protection subnet by using the search function.– Create ODUk SPRings at ODU1 and ODU2 levels by using the search function.

l Manage a wavelength protection subnet.– Set parameters of a 1:N wavelength protection subnet.– Perform and verify 1:N wavelength protection switching.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Set parameters of an ODUk SPRing protection subnet.– Perform and verify the ODUk Wavelength Protection Switching– Query and delete a protection subnet.– Query and delete an isolated node.– Query protection subnet resources.

7.4 End-to-End WDM ManagementEnd-to-end network management is also referred to as trail management. You can construct theconfiguration data about end-to-end network management by searching for the data at the NElayer of the U2000, or directly configure the data at the network layer of the U2000, and applythe data to all related NEs. Compared with configuring NE data on a per-NE basis, configuringNE data by using the trail management function is quicker and more convenient.

To perform end-to-end network management on the U2000, the relevant license is required.

You can perform the following operations on the U2000:

l Search for a trail.Based on the NE configuration data and fiber connection data at the NE layer, the U2000generates the network-layer information about end-to-end trails, including OTS trails, OChclient trails, OCh trails, optical multiplex section (OMS) trails, optical supervisory channel(OSC) trails, ODUk trails and optical channel transport unit (OTUk) trails.– Manage conflicts trails generated during the search process.– Joint trails automatically during the trail search process.– Reserve user-defined information about trails during WDM trail search.– Search for inverse multiplexing trails for 40G and 10G services.– Optimize OMS trails search.

l Create a trail.The U2000 automatically generates an OTS trail after fibers are correctly connectedbetween specified boards.– Select an NE in the topology and view relevant alarms when creating a trail.– Analyze failure causes when a route fails to be computed at the optical or electrical layer

during trail creation.– Create and manage third-party WDM wavelength trails (OCh trails).– Create ODU0, ODU1, ODU2 or ODU3 trails, and create ODU0, ODU1, ODU2 or

ODU3 cross-connections by using the trail management function.– Search for and manage ODU3 trails.– View detailed information about a route during WDM trail creation.– Create a client trail, and create GE, FC, and FE services based on OCh or ODUk trails

by using the trail management function.– Create SNCP or WXCP by using the trail management function.– Create a WDM trail by double-clicking an NE and select the source and sink nodes.– Select the explicit route for protection when creating a WDM trail.– Use the end-to-end management function for ASON-WDM trails.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-21

– Create multi-layer WDM trails, and create client and ODUk cross-connections by usingthe trail management function.

– Create trails by means of duplication. That is, create multiple trails by duplicating atrail. In addition, generate client and ODUk cross-connections in batches by using thetrail management function.

– Create WDM trails where fiber jumpers are connected inside a station.– Set port attributes.– View new cross-connections.

l Manage customers that trails belong.– Create a customer and customer group.– View and modify customer information.– View the trails related to a customer.– View current and history alarms for a customer.– Delete a customer.

l View trails.– Join trails of the same level.– Split a trail into trails of the same level.– Query the route information about a trail.– Display the signal flow diagram of a trail.– Query the transmission media layer for a trail.– Query the client trail for a trail.– Query the server trail for a trail.– Query detailed information about a trail, including its attributes and channel allocation.– Query the optical power of a trail. That is, query the optical power of a WDM trail, and

the input and output optical power of the source and sink nodes of the trail.– Query DPPS protection for a trail.– Query valid routes for protected WDM trails.– Query the associated working and protection trails for OCh trails.– Display intra-site fibers in solid lines and inter-site fibers in dotted lines in the signal

flow diagram of a trail.– Display working and protection routes in different colors in the signal flow diagram of

a trail.– Switch from the signal flow diagram of a trail to another window to query alarms.– Query the detailed information about a trail group. The information includes the

direction, name, trail status, source and sink nodes, source and sink wavelengths, bearerrate, rate, and service type.

– Enable or disable service alarms.– Switch between the window for viewing WDM trails and the window for viewing

associated SDH trails.– Support lockout of WDM trails.

l Manage the alarms and performance events related to a trail.– Query current alarms of a trail.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– Query history alarms of a trail.

– Query current performance data of a trail.

– Query history performance data of a trail.

– Query UAT of a trail.

– Query performance threshold-crossing records of a trail.

– Set the performance parameters and performance threshold of a WDM trail.

– Query Ethernet performance of an OCh client trail with services.

– Manage in real time network-wide WDM trails with alarms.

– View alarms in case of a fiber cut in the signal flow diagram. That is, when alarms occurin case of a fiber cut, a fiber is displayed in red in the signal flow diagram.

– Set the alarm threshold of a trail.

– Manage service alarms.l Query reports on resource statistics.

– Collect the statistics on WDM client-side port resources.

– Collect the statistics on WDM inter-site wavelength resources.

– Collect the statistics on WDM link resources.

– Collect the statistics on WDM wavelength resources.

– Generate a statistics report on WDM wavelength resources utilization.

– Generate a statistics report on WDM bandwidth resources.l Manage trails.

– Query 1+1 protection of optical-layer trails and perform 1+1 protection switching forthe optical-layer trails.

– Query trails with WXCP and SNCP protection, and perform protection switching forthe trails.

– Use the TTI byte to check fiber connection relationships over an OCh trail.

– Apply the automatic naming rule for WDM trails.

– Modify the source and sink of ODUk (k = 0, 1, 2, 3) trails and client trails.

– Support ODU trail end-to-end management.

– Search for and end-to-end manage GE trails based on ODUk.

– Manage optical-layer alarms and configure optical-layer overheads on a trail.

– Analyze connectivity of a WDM trail and identify a fault on a WDM trail.

– Enable and disable WXCP or SNCP protection for an ODUk trail or a client trail.

– Set the end-to-end optical power mode.

– Implement the "save as" and "print" functions for channel allocation of a WDM trail.

– Save the signal flow diagram of a WDM trail.

– Manage WDM trails base on rights and domains.

– Manage WDM discrete services.

– Manage WDM platinum trails.

– Create WDM trails by using eight clients at the same time.

– View relevant fibers based on trails.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-23

– View directly the timeslots and wavelengths that are used by a configured client servicetrail in the signal flow diagram.

– Add a column in the WDM Trail Management window to indicate whether protectionis configured.

– Identify whether an OCh trail is used by a client trail.l Delete a trail. You can delete a WDM trail (except an OTS trail) from the NE layer and

network layer of the U2000.l Implement enhanced automatic power equilibrium (EAPE) based on OCh trails. The EAPE

function automatically adjusts the transmitted optical power of each channel according tothe signal quality of each channel monitored by the OTU board at the receive end, to ensurethat the quality of signals in each channel at the receive end satisfies the preset requirements.In this way, service availability is ensured.

l Filter trails in the following ways:

– Filter all: Filter all trails and display only the qualified trails on a network.

– Secondary filter: According to filter criteria, filter trails from those that are alreadydisplayed.

– Incremental filter: Filter the newly added trails and display the qualified trails, whichshould also be the trails included in the currently displayed trails.

7.5 WDM ASON ManagementThe automatically switched optical network (ASON) is a new generation of optical network thatintegrates switch and transport functions. After a user initiates a service request, the ASONselects a route automatically, establishes and disconnects connections by using signaling control,and establishes network connections automatically and dynamically. An ASON NE refers to theequipment that is enabled with both WDM and ASON features. An ASON network is managedby the U2000 that combines ASON and WDM features.

Topology Management

You can perform the following operations on the U2000:

l Discover ASON topologies and resources automatically.l Synchronize NEs in a domain: The U2000 can obtain the topology of an ASON domain

from the active NE.l Set the active and standby NEs.l Manage domains, including creating and deleting domains, and changing domain names.l Query the ASON NE software version.l Manage IDs of ASON NEs.l Query the version of the ASON software.l Manage the OVPN status of ASON NEs.l Disable the ASON feature at the electrical layer.

Control Link Management

You can perform the following operations on the U2000:

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-24 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Synchronize network-wide control links.l Filter control links by domain or source/sink information.l View control links.l Query the information about current or history alarms on a control link.l Set alarm suppression for a control link.l User-define whether to display the color of alarms in the Control Link Management

window.

TE Link ManagementYou can perform the following operations on the U2000:

l Synchronize network-wide TE links by domain or payload type.l Filter TE links by domain, link signal type, payload type (optical layer or electrical layer),

OVPN customer, or source/sink information.l View TE links.l Query relevant ASON trails for a TE link.l Create fibers according to the TE link whose payload type is OCh.l Create a virtual TE link.l Delete a virtual TE link.l Manage TE links whose payload type is OCh, ODUk, ODU1_ODU2, or client (GE/Any).l Set the length of a TE link.l Set the risk link group number.l Create a link resource report.l View resource usage.l Query the information about current or history alarms on a link.l Set alarm suppression for control-plane alarms.l Query the status of a TE link.l Delete an interrupted TE link.l Query relevant TE links according to control-plane alarms.l Customize the cost for a TE link.l Allocate optical-layer TE links to OVPN customers.

ASON Trail ManagementYou can perform the following operations on the U2000:

l Filter relevant WDM ASON trails by domain, name, actual route, original route, creationtime, planning time, activation status, protection type, service level, alarm level,management status, whether the original route is active, and whether inverse multiplexingis available.

l Synchronize network-wide WDM ASON trails by domain, service level, or attributes.l View WDM ASON trails.l Query detailed information about WDM ASON trails.l Create WDM ASON trails of the diamond, gold, silver, or copper class.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-25

l Create WDM ASON trails of the OCh, ODU0, ODU1, ODU2, ODU3, or client level.l Create an inverse multiplexing WDM ASON trail.l Create associated WDM ASON trails with the same source node or different source nodes.l Duplicate WDM ASON trails.l Pre-compute routes when creating or optimizing WDM ASON trails.l Activate or deactivate WDM ASON trails.l Apply planning data to an ASON trail.l Delete inactive WDM ASON trails.l Delete a WDM ASON trail from the NMS.l Set routing attributes, including rerouting lockout status, reversion lockout status, rerouting

priorities, revertive mode, WTR time, scheduled revertive time, rerouting policy, triggercondition, crankback times, rerouting triggered by SD, and rerouting hold-off time.

l Set association source for WDM ASON trails.l Set association for WDM ASON trails.l Cancel association for WDM ASON trails.l Downgrade a WDM ASON trail to a traditional trail.l Query relevant server-layer trails for WDM ASON trails.l Query relevant client-layer trails for WDM ASON trails.l Query relevant trails for ASON trails.l Migrate an electrical-layer ASON trail in-service.l Enable or disable optical parameters verify of WDM ASON OCh trails, including OSNR,

PMD, and dispersion.l Revert a WDM ASON trail to the original route.l Optimize WDM ASON trails.l Switch services in the working or protection diamond trail manually.l Revert WDM ASON trails manually.l Refresh the actual route, original route, associated routes, or signal flow diagram of a WDM

ASON trail.l Set the current route as the original route.l Refresh the preset restoration trail for a WDM ASON trail.l Set one or two preset restoration trails for a WDM ASON trail.l Delete the preset restoration trail for a WDM ASON trail.l View the actual route, original route, or associated routes of a WDM ASON trail.l View the preset restoration trail for a WDM ASON trail.l View alarms of a WDM ASON trail.l View the control-plane alarm suppression information about WDM ASON trails.l Set control-plane alarm suppression for WDM ASON trails.l View performance events of WDM ASON trails.l View control-plane performance of WDM ASON trails.l View the control-plane performance parameters of WDM ASON trails.l Create WDM ASON trail reports.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-26 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Revert to original routes in batches.l Set names for WDM ASON trails in batches according to the naming rules.l Save the attributes of a service after creating a WDM ASON service successfully.l Restore the default attributes of a service when creating a WDM ASON service.l Manage creators of WDM ASON trails.l Refresh routes automatically after diamond trail protection switching.l Set the OVPN customer when creating an ASON OCh trail.l Set the OVPN customer of a WDM ASON OCh trail.l Implement sharing of wavelengths in the working and protection diamond ASON trails at

the optical layer.l Implement sharing of wavelengths in associated trails at the optical layer.l Set the route attributes of associated ASON trails, including trigger condition for rerouting

associated routes and shared policy of associated services.l Query the optical power of ASON trails.l Refresh wavelengths at the notification of wavelength changes on an OCh ASON trail.

SRG ManagementYou can perform the following operations on the U2000:

l Create, delete, and modify an SRG.l Manage SRGs of the channel type or customized type.

Combination of ASON Trails and Traditional TrailsYou can perform the following operations on the U2000:

l Create an ASON-WDM trail at the OCh, ODU2, ODU1, or client level.l Simplify the layers where multi-layer services are provisioned. To be specific, when you

create a client trail, its server-layer ASON-WDM trail is automatically created.l Implement the OVPN with colored routes in the WDM.l View both WDM trails and managed ASON trails in the WDM Trail Management

window.l Manage overhead bytes, alarms, and performance events of an ASON-WDM trail in a

centralized manner.l Query the ASON trails relevant to a WDM trail.l Query the WDM trails relevant to an ASON trail.l Downgrade an ASON trail to a traditional trail.l Upgrade a traditional WDM trail to a WDM ASON trail.l Collect the alarm statistics of the ASON section, which is added to the alarm statistics of

the ASON-WDM trail.l Manage, search for, upgrade, and downgrade ODU3 ASON-WDM trails.

Exchange of ScriptsYou can perform the following operations on the U2000:

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-27

l Import and export scripts of WDM ASON nodes.l Import and export scripts of WDM TE linksl Import and export scripts of WDM ASON trails.

ASON Management on a Per-NE BasisYou can perform the following operations on the U2000:

l Manage the ASON features of NEs.l Manage IDs of ASON NEs.l Manage control-plane parameters, including the bandwidth occupancy (%), bandwidth

weight, distance weight, hop weight, and customized cost weight.l Manage LMP control channels.l Manage LMP TE links.l Implement LMP automatic discovery.l Manage OSPF control links.l Manage OSPF TE links.l Manage OSPF IP addresses.l Authenticate the OSPF protocol.l Authenticate the RSVP protocol.l Manage the WDM fiber resource threshold.l Manage WDM ASON trails.l Maintain ASON signaling.l Maintain the ASON switching controller.l Manage the LMP status.l Manage the OSPF protocol status.l Manage the automatic reporting status of control-plane alarms.l Manage levels and suppression status of control-plane alarms.l Query SCN control routes.l Manage control-plane performance parameters.l Query control-plane performance.l Manage resource reservation.l Manage the resource occupation status.

By using the U2000, you can configure SDH ASON feature for the OptiX OSN 8800 I and OptiXOSN 8800 II as follows:

l Query OSPF SDH TE links.l Query OSPF member links.l Manage the flood threshold of OSPF TE links.l Manage ASON trail groups.l Query SDH ASON trails.l Manage the fiber resource threshold.l Maintain SDH ASON signaling.

7 WDM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

7-28 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Maintain the SDH ASON switch controller.l Maintain the ASON-shared MESH switch controller.l Manage control-plane performance of SDH ASON trails.l Manage control-plane alarms of SDH ASON trails.l Manage resource reservation.l Manage VC4 timeslot occupation status.

iManager U2000 Unified Network Management SystemProduct Description 7 WDM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

7-29

8 RTN Network Feature Management

About This Chapter

This topic describes the functional features of RTN NE management and network management.

8.1 RTN NE ManagementNE management refers to the management of configurations of an NE in terms of attributes,communication, services, protection, and clocks. The configuration object is a single NE. Thedata is saved to the NE layer of the U2000 and to the database on the NE.

8.2 RTN Protection Subnet ManagementA protection subnet is a network structure providing comprehensive self-protection functions.

8.3 End-to-End RTN ManagementEnd-to-end network management is also referred to as trail management. You can construct theconfiguration data of the end-to-end network management by searching for the data at the NElayer of the U2000, or directly configure the data at the network layer of the U2000, and applythe data to all the related NEs. Compared with configuring NE data on a per-NE basis,configuring NE data by using the trail management function is faster and more convenient.

iManager U2000 Unified Network Management SystemProduct Description 8 RTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

8-1

8.1 RTN NE ManagementNE management refers to the management of configurations of an NE in terms of attributes,communication, services, protection, and clocks. The configuration object is a single NE. Thedata is saved to the NE layer of the U2000 and to the database on the NE.

Basic NE Configuration

You can perform the following operations on the U2000:

l Support the ability to manage the connections between back-to-back RTN NEs. On theMain Topology of the U2000, the connections between back-to-back RTN NEs indicatethe relationships between the RTN NEs on the same station that are connected in a back-to-back manner through network interfaces.

l Modify NE attributes such as:

– NE name

– NE ID

– Extended NE ID

– Remarks

l Synchronize NE time: Align all NEs with the system time of the U2000 server. The usercan configure the U2000 to automatically synchronize the NE time by specifying theautomatic synchronization period.

l Query physical resources in the following lists:

– NE list

– Board manufacturer information

– Board list

– Cabinet list

– Subrack list

– Equipment room list

l Support the plug and play feature for boards: After a board is inserted into a slot, the NEPanel automatically displays the board and board information.

l Automatically disable the NE functions: Some NE functions that may affect services, suchas loopback and automatic laser shutdown (ALS), can be periodically disabled. When thetime expires, these operations automatically stop.

l Environment monitoring information. You can set the interfaces of environmentmonitoring.

l Support the license management function for equipment.

l Support the press-to-install function for logical boards.

l Support the hop management function.

Orderwire Configuration

You can perform the following operations on the U2000:

8 RTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

8-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Set and query the orderwire phone numbers, call waiting time, and orderwire phone portavailability.

l Set and query the orderwire occupied bytes.l Set and query the F1 data port.l Set and query the broadcast data port.

Equipment Protection ConfigurationYou can perform the following operations on the U2000:

l Configure 1+1 board protection.l Configure 1+1 IF protection.

Interface ConfigurationYou can perform the following operations on the U2000:

l Set the parameters for an SDH interface.l Set automatic laser shutdown.l Set the parameters for a PDH interface.l Set the parameters for an IF interface.l Set the parameters for a digital interface.l Set the parameters for an outdoor unit (ODU) interface.l Set overhead interfaces, including:

– Orderwire– Broadcast data port

l Query and set the overhead including:– Regenerator section overhead (J0).– Lower order path overhead (V5, J2)– VC-4 higher order path overhead (J1, C2) and its pass-through or termination.– VC-3 higher order path overhead (J1, C2).

l Enable IEEE 1588 overhead bytes.l Support PRBS.l Support the features of packet radio. You can configure a microwave interface in terms of

basic and advanced attributes, IF attributes, and Layer-2 and Layer-3 attributes.l Support the ability to configure the long and short serial numbers for an MP group.

Configuration for RTN Service and ProtectionYou can perform the following operations on the U2000:

l Configure VC-12, VC-3, or VC-4 services.l Convert between an SNCP service and a normal service.l Modify attributes of SNCP services.l Perform SNCP protection switching.l Support 1+1 linear MSP, 1:N (N ≤ 3) linear MSP.

iManager U2000 Unified Network Management SystemProduct Description 8 RTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

8-3

l Support the N+1 protection.l Support IF 1+1 protection.l Support the REG configuration.l Support MSP rings.l Support the XPIC feature.l Support Hybrid radio and the AM feature, carrying hybrid E1 and Ethernet services and

enhancing the availability of radio links.

Configuration for Ethernet Interfaces and ServicesYou can perform the following operations on the U2000:

l Configure Ethernet internal interfaces, including:– TAG attributes– Encapsulation/mapping– Network attributes– Link capacity adjustment scheme (LCAS)– Bound path

l Configure external Ethernet ports, including:– Basic attributes– Flow control– TAG attributes– Network attributes– Advanced attributes.

l Configure jumbo frames.l Configure QinQ types.l Configure Ethernet private line (EPL) services.l Configure EVPL (QinQ) services.l Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge

(VB) and configure the following: service mount, VLAN filtering, VLAN unicast, disableMAC address, bound path, self-learning MAC address, and VLAN MAC address tablecapacity.

l Test frame receiving and transmitting on Ethernet boards.l Configure quality of service (QoS), including:

– Flow setting– CAR– CoS– Port shaping– Board shaping

l Configure Ethernet Layer-2 switching, including:– Aging time– Spanning tree– IGMP snooping protocol.

8 RTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

8-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Support the ability to diagnose protocol faults and to restore protocols.l Configure point-to-point LPT management and point-to-multipoint LPT management.l Configure intra-board Ethernet LAGs.l Configure Ethernet ring protection.l Configure the RMON performance functions such as browsing history groups of Ethernet

ports, collecting performance statistics of a group, setting an alarm group of Ethernet ports,and setting a history control group.

Clock ConfigurationYou can perform the following operations on the U2000:

l Query the clock synchronization status.l Set clock source priority list, including:

– System clock source priority list– Priority table for phase-locked sources of the first external clock output– Priority table for phase-locked sources of the second external clock output

l Set clock source switching, including:– Clock source restoration parameters– Clock source switching condition– Clock source switching

l Configure clock subnets, including:– Clock subnet– Clock quality– Synchronization status message (SSM) output control– Clock ID status

l Set the external clock output phase-locked source, including:– External clock output phase-locked source– 2M phase-locked source external clock attributes

Ethernet OAM ManagementYou can configure the 802.1ag Ethernet OAM as follows on the U2000:l Support maintenance domain (MD), maintenance association (MA), maintenance end point

(MEP), and maintenance intermediate point (MIP).l Perform CC check.l Perform LB check.l Perform LT check.l Perform Ping tests.l Perform performance detect.

You can configure the 802.3ah Ethernet OAM as follows on the U2000:l Support OAM self-loop detection.l Enable OAM automatic discovery.

iManager U2000 Unified Network Management SystemProduct Description 8 RTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

8-5

l Support link event notification and the adjustment of the OAM error frame monitoringthreshold.

l Perform remote loopback.

IS-IS Protocol ConfigurationThe U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the protocolof the network control plane, and provides the following configuration functions:l Configure an IS-IS protocol instance.l Enable the IS-IS protocol for a port.l Import routes.l Configure link TE information.

OSPF Protocol ConfigurationThe U2000 uses the open shortest path first (OSPF) protocol as the protocol of the networkcontrol plane, and provides the following configuration functions:l Configure an OSPF protocol instance.l Enable the OSPF protocol for a port.l Import routes.l Configure the TE information about a link.

MPLS Signaling Protocol ConfigurationThe U2000 supports the configuration of the following signaling protocols:l RSVP-TE protocol: Resource reservation protocol-traffic engineering (RSVP-TE) is

derived from the RSVP protocol. The RSVP protocol is a type of QoS protocol. The RSVPprotocol reserves resources for specific services in a network to ensure the service quality.As the TE is generated, RSVP is extended accordingly to support LSP creation and to realizeTE.

l LDP protocol: Label distribution protocol (LDP) is a control and signaling protocol ofmulti-protocol label switching (MPLS).

RTN equipment supports using the RSVP-TE protocol to create dynamic LSP connection andusing the LDP protocol to create PW connection.

Static Route Management ConfigurationThe U2000 supports the configuration of static route management.

Address Resolution ConfigurationThe U2000 supports the configuration of address resolution.

IEEE 1588 Packet Clock ConfigurationYou can perform the following operations on the U2000:l Configure the selection mode of a frequency source.l Set the PTP system time.

8 RTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

8-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure a PTP clock subnet.l Configure a PTP clock service.l Set the WTR time for a PTP clock source.l Set the PTP clock source priority.

ACR Clock Configuration

Configure CES ACR or 1588 ACR clock.

LAG Configuration

Link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical linkof faster rate for transmitting data. This function improves the link availability and increaseslink capacity.

The U2000 supports the configuration of the following LAG attributes:l Configure the load sharing type, including sharing and non-sharing.l Configure the LAG type, including manual and static.l Configure the service distribution algorithm of the LAG.l Configure the port priority and system priority of the LAG.

BFD Configuration

Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.

BFD is a simple Hello protocol. It is similar to the neighbor detection of those famous protocolsin many aspects. A pair of systems periodically sends detection packets on the channel on whichsession between the two systems was created. If a system does not receive any detection packetfrom the opposite end within a specific time, the system assumes that a failure occurred in somepart of the bidirectional channel of the adjacent system.

QoS Configuration

Quality of service (QoS) indicates the performance of the data flow that travels through anetwork. The QoS is used to ensure end-to-end service quality. The QoS cannot increase thebandwidth, but it can minimize the delay and jitter in the network by reasonably allocating andmonitoring network resources. In this way, the quality of important services is ensured.

The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServfunction, that is, DS nodes. In a DS domain, all DS nodes use the same service provision policyto realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS nodesand internal DS nodes. The edge DS nodes usually perform complex flow classification on thetraffic that enters the DS domain. Traffic of different types is marked with different PHB servicetypes. For internal DS nodes, you need to perform only simple flow classification based on PHBservice type.

The U2000 supports the following QoS operations:l Configure Diffsever domains.l Configure ATM CoS mapping.l Configure simple flow classification and complex flow classification.

iManager U2000 Unified Network Management SystemProduct Description 8 RTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

8-7

l Configure CAR and Shaping.

l Configure the color blindness mode.

l Configure the WFQ schedule policy.

l Configure the port WREQ schedule policy.

l To simplify the operation and share some common QoS configuration parameters, theU2000 supports creating QoS function point policy. The function point policies are asfollows: port policy, ATM policy, and V-UNI ingress policy. Use these function pointpolicies to bind the CAR configuration attribute, shaping configuration attribute, flowclassification configuration attributes, WFQ schedule policy and WRED policy attributes.

MPLS Tunnel Configuration

The MPLS tunnel is defined in the MPLS protocol. Independent from the service, the MPLStunnel realizes end-to-end transmission, and carries the PWs related to the service.

The U2000 supports the following functions for configuring an MPLS tunnel on a per-NE basis:

l Configure basic attributes of the MPLS.

l Configure static unicast MPLS tunnels.

l Create forward and backward MPLS tunnels at the same time.

l Create the E-LSP.

l Manage PWs.

l Manage tunnel labels and PW labels.

MPLS Tunnel Protection Group Configuration

The U2000 supports the following functions for configuring an MPLS tunnel protection group:

l Create a 1+1 MPLS tunnel protection group and a 1:1 MPLS tunnel protection group,containing the switching mode, revertive mode, wait-to-restore (WTR) time, and hold-offtime.

l Perform MPLS tunnel protection switching.

l Query the protection switching status of an MPLS tunnel.

PWs with UDP Encapsulation

The U2000 supports the PWs with UDP encapsulation that are carried in IP tunnels.

IP Tunnel and GRE Tunnel Configuration

If the equipment at both ends of an IP network does not support MPLS tunnel, PWE3 servicescan pass through the IP network by using an IP tunnel or GRE tunnel.

An IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication.

The U2000 supports the configuration of bidirectional IP tunnels and GRE tunnels on a per-NEbasis.

The U2000 supports the Offload protection between MPLS and GRE tunnels.

8 RTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

8-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

CES Service ConfigurationCES is used for transparent transmission of switching data on TDM circuits in the packettransport network.

The U2000 supports the following functions for configuring CES services:l Create the corresponding PW when creating a CES service.l Create UNI-UNI and UNI-NNI CES services.l Create CES services of structure-aware TDM circuit emulation service over packet

switched network (CESoPSN) and of a structure-agnostic TDM over packet (SAToP).l Configure QoS of the CES service.l Configure the recovery value of idle timeslots.l Carry CES services over IP/GRE tunnels.

ATM Service ConfigurationATM emulation service is mainly used to transparently transmit ATM services in the packettransport network..

The U2000 supports the following functions for creating ATM services:

l Create an ATM service that contains multiple ATM connections.l Create UNI-UNI and UNIs-NNI ATM services.l Create PVP and PVC ATM services.l Create the corresponding PW when creating an ATM service.l Configure the IMA group.l Configure QoS of the ATM service.l Configure CoS mapping.

E-Line Service ConfigurationThe E-line service is a point-to-point Ethernet service. The equipment transmits user packetsfrom the user side to the network side based on Port or Port+VLAN. User data can betransparently transmitted in a point-to-point manner.

The U2000 supports the following functions for configuring E-line services on a per-NE basis:l Create UNI-UNI E-Line services.l Create UNI-NNI E-Line services that are carried on ports.l Create UNI-NNI E-Line services that are carried on PWs.l Create UNI-NNI E-Line services that are carried on QinQ links.l Configure the service and the QoS of the corresponding PW when creating an L2VPN

service.l Configure the V-UNI group.

E-AGGR Service ConfigurationThe E-AGGR service is a multipoint-to-point Ethernet service. The equipment uses several portsto access services from the V-UNI side, and converges the services into one PW at the networkside for transmission. User data from multiple points can be converged into one point.

iManager U2000 Unified Network Management SystemProduct Description 8 RTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

8-9

The U2000 supports the following functions for configuring E-AGGR services on a per-NEbasis:l Configure the VLAN forwarding table items of an E-AGGR service.l Configure the service and the QoS of the corresponding PW when creating an E-AGGR

service.l Configure the V-UNI group.

MPLS OAM ConfigurationMPLS OAM is an OAM function of the MPLS network. This function can check the quality ofLSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge, andlocate a defect inside the network at the MPLS layer. It can report and handle a defect. When afault occurs, the MPLS OAM provides a trigger scheme of protection switching.

The U2000 provides the following functions for configuring MPLS OAM:

l Configure MPLS OAM parameters of a tunnel.l Perform CV/FFD checks.l Perform LSP ping checks.l Perform PW ping checks.l Perform LSP traceroute checks.

ATM OAM ConfigurationATM OAM is an end-to-end OAM function for ATM services. This function can check thequality of ATM links that pass through multiple NEs. The ATM OAM function checks an ATMlink by inserting some OAM cells of the standard cell structure to the user cell flow.

The U2000 provides the following functions for configuring ATM OAM:

l Set segment end attributes.l Perform CC activation test.l Perform remote loopback.l Set the LLID.

8.2 RTN Protection Subnet ManagementA protection subnet is a network structure providing comprehensive self-protection functions.

To perform protection subnet management, you need to have the related license.

You can perform the following operations on the U2000:

l Create an RTN protection subnet.l Create an IF 1+1 protection subnet.l Create an IF N+1 protection subnet.l Manage RTN protection subnets.l Set the parameters for a protection subnet.l Query the switching status of a protection subnet.

8 RTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

8-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Query and delete a protection subnet.l Query protection subnet resources.

8.3 End-to-End RTN ManagementEnd-to-end network management is also referred to as trail management. You can construct theconfiguration data of the end-to-end network management by searching for the data at the NElayer of the U2000, or directly configure the data at the network layer of the U2000, and applythe data to all the related NEs. Compared with configuring NE data on a per-NE basis,configuring NE data by using the trail management function is faster and more convenient.

To perform end-to-end network management, the relevant license is required.

You can perform the following operations on the U2000:

l Create and maintain an RTN trail– Create a PDH microwave trail– Create an SDH microwave trail.– Activate or deactivate an RTN trail.

l Manage the alarms and performance events related to an RTN trail.– Query current and history alarms, current and history performance data, UAT, and

performance threshold-crossing records of an RTN trail.– Set the performance parameters for an RTN trail.– Query the RTN trails and customer information affected by an alarm.

l Filter trails in three ways– Filter all: Filter all trails and display only the qualified trails on a network– Secondary filter: Filter the trails that are displayed, according to the filter criteria.– Incremental filter: Filter all trails and display the newly qualified trails together with

the currently displayed ones

Management of Packet Servicesl PWE3 service management

– Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.– Predeploy a PWE3 service.– Implement the function of automatically discovering PWE3 services.– Modify and delete PWE3 services, and filter PWE3 services to view the desired services.– Manage multi-segment PWE3 services.– Implement the protection management of PWE3 services.– View the topology of PWE3 services.– View the alarms of a PWE3 service.– View the performance of a PWE3 service.– Manage discrete PWE3 services.– Manage PWE3 services based on rights and domains.– Clone a PWE3 service.

iManager U2000 Unified Network Management SystemProduct Description 8 RTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

8-11

– Manage PWE3 service templates.– Implement the function of automatically generating Ethernet OAM for PWE3 services.

l Tunnel Management– Create static CR, RSVP, LDP, and IP tunnels.– Create RSVP and LDP tunnels in batches.– Predeploy a tunnel.– Implement the function of automatically discovering tunnels.– Modify and delete a tunnel, and filter tunnels to view the desired tunnels.– View the topology of tunnels, including the working and protection routes.– View the alarm of a tunnel.– View the performance of a tunnel.– Manage discrete tunnels.– Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the

function of automatically discovering 1+1 or 1:1 tunnel protection groups.– Switch services in a 1+1 or 1:1 tunnel protection group manually.– Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection

groups.

Network-Wide Clock Topology Managementl Support the IEEE 1588 V2, SDH, and synchronous Ethernet clocks.l Display clock trace relationship.l Display clock alarm status.

8 RTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

8-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

9 PTN Network Feature Management

About This Chapter

This topic describes the functions and features of PTN NE management and networkmanagement.

9.1 PTN NE ManagementNE configuration includes the configuration of attributes, communications, services, protectionschemes, and clocks on an NE.

9.2 E2E PTN ManagementE2E network management is also referred to as trail management, which means the trail-basedconfiguration of network management data. The trail-based configuration can be performed bysearching for the NE-layer data on the U2000 or by configuring the network-layer data on theU2000. Then, the configuration is delivered to all associated NEs. Compared with the NE-basedconfiguration, the trail-based configuration is easier.

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-1

9.1 PTN NE ManagementNE configuration includes the configuration of attributes, communications, services, protectionschemes, and clocks on an NE.

Basic NE Configurationl Modifying NE attributes such as:

– NE name– NE ID– Extended NE ID– Remarks– NE pre-configuration

l Synchronizing NE time: NE time can be synchronized by delivering the system time of theU2000 server to all NEs. In addition, you can specify automatic synchronization time andautomatic synchronization period on the U2000.

l Plug and play feature of boards: After a board is inserted into a correct slot, the NE Paneldisplays the board and board information.

l Disabling functions automatically: Service-affecting functions, such as loopback andautomatic laser shutdown (ALX), can be disabled automatically by specifying an automaticdisabling time. When the time arrives, these functions are disabled automatically.

l Environment monitoringl Board replacementl Fan management

Service Interface Types ConfigurationThe working mode and application scenarios of an interface are determined by the generalattributes, Layer 2 attributes, and Layer 3 attributes of the interface.

Basic attributes are the physical attributes of an interface. Layer 2 attributes are the data linklayer attributes of an interface, such as ATM, VLAN, and QinQ. Layer 3 attributes are thenetwork layer attributes of an interface, such as IP attribute.

Table 9-1 lists the types of PTN service interfaces supported by the U2000.

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Table 9-1 Types of PTN service interfaces

ServiceInterface

SupportedPort Mode/EncapsulationType

Port Type MP GroupSupported orNot

Function

SDH interface Generalattributes

Physical port Not supported The generalattributes of anSDH interfacecan beconfiguredaccording to itsLayer 3attributes or beset to achannelizedSTM serviceinterface.

Layer 2attributes

Physical port Not supported Carrying ATMservices

Layer 3attributes

Physical port Not supported Carryingtunnels after thePPP protocol isenabled

PDH interface Generalattributes

Physical port Not supported Carrying TDMservices

Layer 2attributes

Physical port Not supported Carrying IMAsignals

Layer 3attributes

Physical port Supported Added to amulti-link PPP(MP) groupafter the PPPprotocol isenabled

Ethernetinterface

Generalattributes

N/A - The generalattributes of anEthernetinterface can beconfiguredaccording to theLayer 2attributes andLayer 3attributes of theinterface.

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-3

ServiceInterface

SupportedPort Mode/EncapsulationType

Port Type MP GroupSupported orNot

Function

Layer 2attributes

Physical port Not supported Carrying user-side or network-side Ethernetservices

Layer 3attributes

Physical port Not supported Carryingtunnels

Ethernet virtualinterface

Generalattributes

Logical port Not supported The generalattributes of anEthernetinterface can beconfiguredaccording toLayer 2attributes andLayer 3attributes.

Layer 2attributes

Logical port Not supported VLAN SubInterface:carryingEthernetservices

Layer 3attributes

Logical port Not supported l EOAVirtualInterface:carrying IPtunnels orGRE tunnels

l VLAN SubInterface:used forBFD,L3VPN orcarryingtunnels

l L3 VirtualInterface:carrying IP-LINEservices

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

ServiceInterface

SupportedPort Mode/EncapsulationType

Port Type MP GroupSupported orNot

Function

Advancedattributes

Logical port Not supported The advancedattributes of anEthernet virtualinterface can beconfiguredaccording toattributes of anADLS2+interface.

ADSL interface Generalattributes

Physical port - Carrying ADSLsignals

DSLTRUNKattributes

Logical port - Carrying ADSLsignals

G.SHDSLinterface

Generalattributes

Physical port - CarryingG.SHDSLsignals

Bound mode N/A - CarryingG.SHDSLsignals

EFM boundgroup

Logical port - Set according tothe bound mode

ATM boundgroup

Logical port - Set according tothe bound mode

IMA boundgroup

Logical port - CarryingG.SHDSLsignals

Serial interface Generalattributes

- - The generalattributes of aserial interfacecan beconfiguredaccording to theLayer 3attributes of theinterface.

Layer 3attributes

Logical port Supported A serialinterface can beadded to an MPgroup after thePPP protocol isenabled.

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-5

ServiceInterface

SupportedPort Mode/EncapsulationType

Port Type MP GroupSupported orNot

Function

MP Group Generalattributes

- - The generalattributes of anMP group canbe configuredaccording to theIP attributes ofthe group.

IP attributes Logical port - Carryingtunnels

Microwave Interface Configuration

You can perform the following operations on the U2000:l Configure a microwave interface, including general attributes, IF attributes, Layer 2

attributes, Layer 3 attributes, and advanced attributes.l Configure a radio link, including IF 1+1 protection, IF boards, and ODU boards.l Configure HOP management.

IS-IS Protocol Configuration

The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the protocolof the network control plane, and provides the following configuration functions:

l Configure node attributesl Configure port attributesl Import routesl Configure the TE information of a linkl Configure GR sessionsl Configure route aggregationl View route forwarding tables

OSPF Protocol Configuration

The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the networkcontrol plane, and provides the following configuration functions:l Configure node attributesl Configure port attributesl Configure peer attributesl Import routesl Configure the TE information of a link

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure route aggregationl Query peer informationl View route forwarding tables

MP-BGP Protocol ConfigurationThe U2000 uses the internal border gateway protocol (IBGP) to implement L3VPN functions,and provides the following configuration functions:l Configure MP-BGP instancesl Configure MP-BGP peersl Configure route filtering policies

LDP Protocol ConfigurationThe U2000 uses the label distribution protocol (LDP) to create LSP connections and PWconnections, and provides the following configuration functions:l Configure MPLS-LDP peer entitiesl Configure node attributesl Configure port attributesl Configure IP address filtering tablesl Configure routing policiesl Configure label policies

RSVP Protocol ConfigurationThe U2000 uses the resource reserved protocol (RSVP) to create LSP connections, and providesthe following configuration functions:l Configure node attributesl Configure port attributes

Static Route Management ConfigurationThe U2000 supports the configuration of static route management.

Address Resolution ConfigurationThe U2000 supports the configuration of address resolution.

Clock ConfigurationThe U2000 supports the configuration of various clock modes, and provides the followingfunctions:l Configure the clock domainl Query the status of clock synchronizationl Configure the IEEE 1588 Packet Clock

– Configure clock services– Configure clock synchronization attributes

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-7

– Configure the clock source priority table

– Configure clock subnets

– Configure external time interfaces

l Configure ACR clocks

– Configure CES ACR and 1588 ACR clocks

l Configure physical-layer clocks

– Query the status of clock synchronization

– Set clock source priority tables, including

– System clock source priority list

– Priority table for phase-locked sources of 1st external clock output

– Priority table for phase-locked sources of 2nd external clock output

– Setting clock source switching parameters, including

– Clock source reversion parameters

– Clock source switching condition

– Clock source switching

– Configure clock subnets, including

– Clock subnets

– Clock quality

– SSM output control

– Clock ID status

– Setting phase-locked sources output by external clock, including

– External clock output phase-locked source

– 2 Mbit/s phase-locked source external clock attributes

Board-Level Protection Configuration

You can perform the following operations on the U2000:

l Configure TPS protection of a subboard.

l Configure board 1+1 protection for the SCC and cross-connect boards.

l Check the switching status.

l Perform protection switching.

Synchronization Protocol Configuration

In the application scenario of dual-homing, the status of the peer equipment needs to be obtainedeither for the MC LAG or for the cross-MC LMSP. Meanwhile, the actions on both sides needto be negotiated based on different fault cases. With the method of adding information of thepeer end, a channel is established for control status synchronization with the peer end. In thismanner, the control packets can be transmitted and received through the channel and link faultdetection can be performed.

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

LAG/MC LAG ConfigurationA link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logicallink with a higher transmission rate. This function improves link availability and increases linkcapacity.

A multi-chassis (MC) LAG achieves load sharing between NEs.

The U2000 supports the configuration of the following LAG/MC LAG attributes:

l Load sharing type (sharing or non-sharing)l LAG types (manual or static)l Load sharing hash algorithml Port priority and system priority

LMSP/MC LMSP ConfigurationLinear MSP (LMSP) includes 1+1 linear MSP and 1:N linear MSP. The protection scheme usesthe protection channel to protect services that are transmitted on the working channel. When theworking channel fails, services are switched to the protection channel. Linear MSP applies tothe POS interface and structured STM interface.

The multi-chassis (MC) LMSP can implement the LMSP between NEs.

The U2000 supports the following LMSP/MC LMSP functions:

l Create LMSP groupsl Check the status of LMSP groupsl Perform a linear MSP switching

MSTP ConfigurationThe multiple spanning tree protocol (MSTP) can be used to clear loops in a network. The MSTPuses a specific algorithm to block some redundant trails and change a loop network to a non-loop tree network. This function prevents packet increase in a loop network and generation ofbroadcast storms in an endless cycle. Different from the STP and RSTP, the MSTP can forwarddata according to VLAN packets, achieving load balance of VLAN data.

The U2000 provides the following functions:

l Configure parameters of port groups and bridgesl Configure CIST and MSTI parametersl Query CIST status and MSTI status

IGMP Snooping ConfigurationThe Internet group management protocol snooping (IGMP Snooping) is the multicast constraintscheme that runs on Layer 2 equipment, and is used to manage and control multicast groups.

The U2000 supports the configuration of IGMP snooping for E-LAN services, and provides thefollowing functions:

l Configure IGMP Snooping protocol parametersl Configure fast leave ports

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-9

l Manage routesl Configure route member portsl Query statistics of IGMP protocol packets.

BFD ConfigurationThe bidirectional forwarding detection (BFD) protocol can be used to check the Ethernet linkstatus.

BFD is a simple Hello protocol. It is similar to the neighbor detection of those famous protocolsin many aspects. A pair of systems periodically send detection packets on the bidirectionalchannel where a session between the two systems is created. If a system does not receive anydetection packet from the opposite end in a specific time, the system regards that a failure occurson the channel.

The U2000 supports the BFD detection on IP/GRE tunnels and the interior gateway protocol(IGP).

LPT ConfigurationThe link state pass through (LPT) protocol is used to return the remote-end link status to thenear end. The near-end equipment performs operations according to the remote-end link status.When the intermediate transmission network is faulty, the LPT immediately informs the accessequipment at both ends of the transmission network to activate the backup network. In thismanner, the normal transmission of important data is ensured.

QoS ConfigurationThe quality of service (QoS) indicates the performance of the data flow that travels through anetwork. The QoS is used to ensure end-to-end service quality. The QoS cannot increase thebandwidth, but it can minimize the delay and jitter in the network by properly allocating andmonitoring network resources. In this manner, the quality of important services is ensured.

The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServfunction, that is, DS nodes. In a DS domain, all DS nodes use the same service provision policyto achieve the same per-hop behavior (PHB). DS nodes are classified into edge DS nodes andinternal DS nodes. Edge DS nodes usually perform complex flow classification on the trafficthat enters the DS domain. Different types of traffic are marked with different PHB service types.Internal DS nodes only need to perform simple flow classification based on PHB service types.

The U2000 supports the following QoS functions:

l Configure QoS profilel Configure DiffServ domainsl Configure ATM CoS mappingl Configure SVLAN DEI used flagl Configure simple flow classification and complex flow classificationl Configure CAR and shapingl Configure the color blindness model Configure the WFQ schedule policyl Configure the port WRED policy

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure the service WRED policy

l To simplify operations and share common QoS configuration parameters, the U2000supports the creation of QoS function point policies, including port policy, ATM policy,V-UNI ingress policy, V-UNI egress policy, PW policy, and QinQ policy. By using thesefunction point policies, you can bind CAR configuration, shaping configuration, flowclassification configuration, WFQ schedule policy, WRED policy, and color blindnessmode.

l Configure CoS queue mapping

l Configure the QoS profile for applying the same QoS policies to multiple NEs.

MPLS Tunnel Configuration

The multi-protocol label switch (MPLS) protocol achieves transparent transmission of dataservices. MPLS tunnels are the tunnels defined in the MPLS protocol. Independent from theservice, the MPLS tunnel achieves end-to-end transmission and carries the PWs related to theservice.

See Figure 9-1. Unicast MPLS tunnel is mainly used to transparently transmit point-to-pointPWE3 services.

Figure 9-1 Unicast MPLS tunnel

The U2000 provides the following functions associated with MPLS tunnels on a per-NE basis:

l Configure MPLS basic attributes

l Configure static unicast MPLS tunnels

l Create forward and backward MPLS tunnels at the same time

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-11

l Create static and bidirectional MPLS tunnelsl Create the E-LSPl Manage PWsl Manage tunnel labels and PW labels

MPLS Tunnel Protection Group ConfigurationThe U2000 provides the following functions associated with MPLS tunnel protection groups:

l Create MPLS tunnel 1+1 protection groups and MPLS tunnel 1:1 protection groups andconfiguring switching mode, revertive mode, wait-to-restore (WTR) time, and hold-offtime for the groups

l Perform MPLS tunnel protection switchingl Query the status of an MPLS tunnel protection group

MS PW ConfigurationBy creating multi-segment pseudowire (MS-PW) to transmit services, you can save tunnelresources and transmit services over different networks.

PW APS/MC PW APS ConfigurationAs a network protection mechanism, PW automatic protection switching (APS) is intended toprotect the services on the working PW with a protection PW. That is, when the working PW isfaulty, the services on the working PW are switched to the protection PW. In this manner, theservices on the working PW are protected.

The MC PW APS can be used to implement inter-NE PW APS protection.

The following PW APS/MC PW APS functions can be performed on a per-NE basis:l Create protection groupsl Bind the master and slave protection pairs

IP Tunnel and GRE Tunnel ConfigurationIf the equipment at the two ends of an IP network does not support MPLS tunnels, PWE3 servicescan pass through the IP network by using IP tunnels or GRE tunnels.

IP tunnels and GRE tunnels mainly apply to the Offload scenarios of mobile communication.

The U2000 supports the configuration of bidirectional IP tunnels and GRE tunnels on a per-NEbasis.

Dual-Homing Protection ConfigurationIn the case of dual-homing protection, two PE nodes (dual-homing nodes) are connected to oneCE node through attachment circuit (AC) links so that the services received by the PE nodes atboth ends of the bearer network can be protected.

The following types of dual-homing protection can be configured for ATM and CES services:l 1:1 MC-PW APS and 1:1 MC-LMSPl 1:1 MC-PW APS and 1+1 MC-LMSP

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l 1:1 PW redundancy and 1:1 MC-LMSP

l 1+1 PW redundancy and 1+1 MC-LMSP

The following types of dual-homing protection can be configured for E-line services.

l 1:1 MC-PW APS and MC-LAG

l 1:1 PW redundancy and MC-LAG

CES Service Configuration

Circuit emulation services (CES services) achieve transparent transmission of TDM circuitswitching data on the PSN.

See Figure 9-2. The 2G/3G stations or Intranet line accesses the PTN equipment by using theE1/ channelized STM-1 line. The equipment divides the E1 signals into pieces, encapsulates thepieces into the Ethernet, and transmits the E1 signals to the opposite end by using the PW.

Figure 9-2 CES service application model

The U2000 provides the following functions associated with CES services:

l Create CES services and corresponding PWs at the same time

l Create UNI-UNI and UNI-NNI CES services

l Create CES services of structure-aware TDM circuit emulation service over packetswitched network (CESoPSN) and CES services of structure-agnostic TDM over packet(SAToP)

l Configure QoS policies of CES services

l Configure idle timeslot recovery value

l Configure CES service alarm transparent transmission

l Select the tunnel where a PW is carried online

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-13

ATM Service Configuration

ATM emulation services achieve transparent transmission of ATM services on the PSN.

See Figure 9-3. The 3G station accesses the PTN equipment by using the ATM IMA group.The equipment encapsulates the ATM cells into the Ethernet, and transmits the ATM cells tothe opposite end by using the PW.

Figure 9-3 ATM service application model

The U2000 provides the following functions associated with ATM services:

l Create ATM services that contain multiple ATM connectionsl Create UNI-UNI and UNI-NNI ATM servicesl Create PVP and PVC ATM servicesl Create ATM services and corresponding PWs at the same timel Configure the IMA groupl Configure QoS policies of ATM servicesl Configure the CoS mapping table.l Select the tunnel where a PW is carried online

E-Line Service Configuration

E-line services achieve point-to-point transparent transmission of user data. The equipmenttransmits user packets from the user side to the network side based on Port or Port+VLAN.

See Figure 9-4. Company A has branches in City 1 and City 3. Company C has branches in City1 and City 2. Branches of Company A or Company C that are in different cities need datacommunication. The PTN equipment can provide E-line services for Company A and CompanyC, to meet their communication requirements. In addition, the service data can be completelyisolated.

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 9-4 E-Line Service

The U2000 supports the following functions associated with E-line services on a per-NE basis:

l Create UNI-UNI E-Line servicesl Create UNI-NNI E-Line services that are carried on portsl Create UNI-NNI E-Line services that are carried on PWsl Create UNI-NNI E-Line services that are carried on QinQ linksl Configure QoS policies for L2VPN services and corresponding PWs during the creation

of L2VPN servicesl Configure the V-UNI groupl Select the tunnel where a PW is carried online

E-AGGR Service ConfigurationE-AGGR services achieve multipoint-to-point aggregation of user data. The equipment usesseveral ports to access services from the V-UNI side, and converges the services into one PWat the network side for transmission.

See Figure 9-5 and Figure 9-6. A carrier wants to construct a 3G network. Services of eachNode B are converged and transported to the RNC. The data between each Node B and RNC isregarded as one service. At the convergence point, the QoS parameters such as the overallbandwidth are specified.

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-15

Figure 9-5 E-AGGR service scenario 1

Figure 9-6 E-AGGR service scenario 2

The U2000 supports the following functions associated with E-AGGR services on a per-NEbasis:

l Configure the VLAN forwarding table items of an E-AGGR service

l Configure QoS policies for L2VPN services and corresponding PWs during the creationof L2VPN services

l Configure the V-UNI group

l Select the tunnel where a PW is carried online

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

E-LAN Service Configuration

Based on the self-learning of MAC addresses, E-LAN services achieve packet forwardingbetween multiple V-UNI and NNI interfaces.

See Figure 9-7. The HQ of Company A is in City 3. Company A has Branch A in City 1, City2, and City 3, and has Branch B in City 1 and City 2. Branch A and Branch B do not have businesswith each other. Hence, the data should be isolated between the two branches. The HQ hasrequirements of communicating with each branch and accessing the Internet.

Figure 9-7 E-LAN service

E-LAN services use different VLAN IDs to identify service data of different branches. In thisway, data is shared within a branch and is isolated from the data for other branches. The Internetdata of the HQ is also isolated from the internal service data by using the VLAN.

The U2000 supports the following functions associated with E-LAN services on a per-NE basis:

l Create E-LAN services that are carried on portl Create E-LAN services that are carried on PWsl Create E-LAN services that are carried on QinQ linksl Configure QoS policies for L2VPN services and corresponding PWs during the creation

of L2VPN servicesl Configure the V-UNI and NNI interfaces of an E-LAN servicel Configure the split horizon group of an E-LAN servicel Configure the V-UNI groupl Configure the MAC address learning parametersl Configure the unknown frame processing model Configure the static MAC address

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-17

l Disable an MAC address

l Configure the self-learning of MAC addresses

l Select the tunnel where a PW is carried online

Service Mirroring Configuration

In service mirroring, all packets that enter a certain port are duplicated and then duplicatedpackets are transmitted through an observation port. In this manner, the normal service is scarcelyaffected when packets of the mirrored service are captured and analyzed.

You can configure the service mirroring as follows:

l Local service mirroring

l Remote service mirroring

MPLS OAM Configuration

MPLS OAM is an OAM function of the MPLS network. This function can check the quality ofLSPs in an MPLS network. The MPLS OAM scheme can effectively detect a defect inside thenetwork at the MPLS layer, and then report and handle the defect. When a fault occurs, theMPLS OAM triggers a protection switching.

The U2000 provides the following MPLS OAM functions:

l Configure MPLS OAM parameters of a tunnel

l Perform CV/FFD check

l Perform LSP ping check

l Perform PW ping check

l Perform LSP traceroute check

l Perform PW traceroute check

l Enable and disable FDI

Ethernet Service OAM Configuration

Ethernet service OAM is an end-to-end OAM function for services. This function can check thequality of Ethernet links that pass through multiple NEs. The Ethernet service OAM checks anEthernet link by sending OAM packets. The OAM packet is handled only at the MAC layer. Asa low rate protocol, the OAM protocol occupies very low network bandwidth. Hence, thisfunction does not affect services carried by the link.

The U2000 provides the following Ethernet service OAM functions:

l Create maintenance domains (MDs), maintenance associations (MAs), maintenance endpoints (MEPs), and maintenance intermediate points (MIPs)

l Perform a CC check

l Perform an LB check

l Perform an LT check

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Ethernet Port OAM Configuration

The Ethernet port OAM is mainly used to automatically check the connectivity and performanceand locate the faults of the physical links. It is applicable when the physical Ethernet ports aredirectly connected.

The U2000 provides the following Ethernet port OAM functions:

l Configure OAM parametersl Configure the OAM error frame monitoringl Query the remote OAM parameters

ATM OAM Configuration

ATM OAM is an end-to-end OAM function for ATM services. This function can check thequality of ATM links that pass through multiple NEs. The ATM OAM function checks an ATMlink by inserting some OAM cells of the standard cell structure into the user cell flow.

The U2000 provides the following ATM OAM functions:

l Set segment end attributesl Perform CC activation testsl Perform remote loopbacksl Settin the LLIDl Configure ATM alarm transmission

NMS Server Configuration

After the IP address of the NMS is configured on the gateway NE, all the managed non-gatewayNEs can automatically go online after being powered on.

9.2 E2E PTN ManagementE2E network management is also referred to as trail management, which means the trail-basedconfiguration of network management data. The trail-based configuration can be performed bysearching for the NE-layer data on the U2000 or by configuring the network-layer data on theU2000. Then, the configuration is delivered to all associated NEs. Compared with the NE-basedconfiguration, the trail-based configuration is easier.

To perform E2E network management on the U2000, the relevant license is required.

PWE3 Service Management

You can perform the following operations on the U2000:

l Create PWE3 services of multiple types, such as ATM, CES, and Ethernet services.l Predeploys PWE3 services.l Implement the function of automatically discovering PWE3 services.l Modify and delete PWE3 services, and view PWE3 services by using the filtering function.l Manage PWE3 services.

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-19

l Implement the protection management of PWE3 services.l View the topology of PWE3 services.l View the alarms of PWE3 services.l View the performance events of PWE3 services.l Create a monitoring instance for a PWE3 service.l Test and check PWE3 services.l Manage discrete PWE3 services.l Manage PWE3 services based on authority.l Clone PWE3 services.l Manage PWE3 service templates.l Implement the function of automatically generating Ethernet OAM for PWE3 services.l Set and view the status of port loopback at the node of PWE3 services.

VPLS Service ManagementYou can perform the following operations on the U2000:

l Create VPLS services.l Predeploy VPLS services.l Implement the function of automatically discovering VPLS services.l Modify and delete VPLS services, and view VPLS services by using the filtering function.l Manage VPLS services.l View the topology of VPLS services.l View the alarms of VPLS services.l View the performance events of VPLS services.l Create a monitoring instance for a VPLS service.l Test and check VPLS services.l Manage discrete VPLS services.l Manage VPLS services based on authority.l Manage VPLS service templates.l Implement the function of automatically generating Ethernet OAM for VPLS services.l Set and view the status of port loopback at the node of VPLS services.

L3VPN Service ManagementYou can perform the following operations on the U2000:

l Create an L3VPN service that supports the BGP/MPLS protocol.l Predeploy an L3VPN service.l Implement the function of automatically discovering L3VPN services.l Modify and delete L3VPN services, and view L3VPN services by using the filtering

function.l View the topology of L3VPN services.l View the alarms of an L3VPN service.

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l View the performance events of an L3VPN service.l Create a monitoring instance for a L3VPN service.l Test and check L3VPN services.l Manage discrete L3VPN services.l Manage L3VPN services based on authority.l Manage L3VPN service templates.l Configure the VRRP.l Set and view the status of port loopback at the node of L3VPN services.l Configure OAM.

Tunnel ManagementYou can perform the following operations on the U2000:

l Create static CR, RSVP, LDP, and IP tunnels.l Create RSVP and LDP tunnels in batches.l Predeploy a tunnel.l Implement the function of automatically discovering tunnels.l Modify and delete a tunnel, and view tunnels by using the filtering function.l View the topology of tunnels, including the working and protection routes.l View the alarms of a tunnel.l View the performance events of a tunnel.l Create a monitoring instance for a tunnel.l Test and check a tunnel.l Manage discrete tunnels.l Manage static CR, RSVP, LDP, and IP tunnels.l Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the function

of automatically discovering 1+1 or 1:1 tunnel protection groups.l Switch services in a 1+1 or 1:1 tunnel protection group manually.l Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection groups.l Create a tunnel and its protection tunnel at the same time.l Display the name of a tunnel in the global LSP view.l Manage the bidirectional static CR tunnels.l Set and view the status of port loopback at the node of tunnel.l Configure OAM.

IP Line Service ManagementYou can perform the following operations on the U2000:

l Create an IP line service.l Predeploy an IP line service.l Implement the function of automatically discovering IP line services.l Implement the protection management of IP line service.

iManager U2000 Unified Network Management SystemProduct Description 9 PTN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

9-21

l Modify and delete IP line services, and view IP line services by using the filtering function.l View the topology of IP line services.l View the alarms of an IP line service.l View the performance events of an IP line service.l Test and check an IP line service.l Manage IP line services based on rights and domains.l Set and view the status of port loopback at the node of IP line services.

Composite Service ManagementYou can perform the following operations on the U2000:

l Manage PWE3 access into PWE3 and PWE3 access into E-AGGR services.l Modify and delete composite services, and view composite services by using the filtering

function.l Implement the function of automatically discovering composite services.l View the topology of composite services, including the internal connections between the

services.l Display the status of composite services.

PTN Network Expansion and Service Cutover ManagementYou can perform the following operations on the U2000:

l Expand a PTN by adding nodes, deleting nodes, and upgrading or adjusting link capacities.l Implement the cutover of PWE3 trails.l Prepare a manual or scheduled service cutover plan.l Prepare a service cutover plan by using either the rollback cutover policy or the best-effort

cutover policy.l Hand over, restore, and verify the trails of cutover groups in batches.l Create and modify cutover groups and cutover plans, and delete cutover groups and cutover

plans in batches.l Create and delete active and pre-configured services in cutover groups.

9 PTN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

9-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

10 Router Feature and Switch FeatureManagement

About This Chapter

This topic describes router features and switch features.

10.1 Router ManagementRouter management allows you to configure and maintain routers by means of the GUI.

10.2 Router V8 ManagementRouter V8 management allows you to view NE configurations by means of GUIs.

10.3 Automatic NE Configuration ManagementAutomatic NE configuration management is implemented by means of DHCP on the U2000.Automatic NE configuration management allows you to deploy and remotely debug case-shapedrouters, reducing the costs in device deployment and increasing the efficiency of devicedeployment.

10.4 Switch ManagementSwitch management allows you to configure and maintain switches by means of the GUI.

10.5 Template ManagementIn NE configuration management, many operations need to be performed repeatedly. Thetemplate management function is introduced to solve this problem. This function allows you torapidly configure NEs in batches.

10.6 Diagnosis ManagementDiagnosis management provides easy-to-use diagnostic functions for you to test network andservice connectivity. Diagnostic cases can be run manually or run automatically at scheduledtimes.

10.7 Cluster ManagementThe Huawei Group Management Protocol (HGMP) is mainly used to solve the problems ofautomatic management operations and centralized management for multiple dispersed low-endand mid-range switches.

10.8 Node Redounded ManagementEnhanced-Trunk (E-Trunk), developed on the basis of Link Aggregation Control Protocol(LACP), is a protocol that controls and implements link aggregation among multiple sets of

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-1

equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS, VLL,or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links betweenthe CE and PEs.

10.9 Report Subsystem ManagementThe report subsystem allows you to generate, distribute, and manage reports based on the Weband helps you to monitor, analyze, and optimize network performance.

10.10 VPN Service ManagementThe U2000 provides centralized and unified management, including service deployment, servicemonitoring, and service diagnosis, on VPN services, namely, BGP/MPLS VPN service, VPLSservice, and PWE3 service.

10.11 Tunnel Service ManagementTunnel service management is used to plan and deploy services on the entire MPLS network.Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel servicemanagement, thus reducing the costs of operating and maintaining MPLS networks.

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

10.1 Router ManagementRouter management allows you to configure and maintain routers by means of the GUI.

Device ManagementDevice types and software versions can be automatically identified and differentiatedmanagement can be performed accordingly.

Component Managementl Information about components, including frames, boards, power supplies, fans, and ports

can be automatically obtained.l Information about components can be refreshed and component status can be monitored.

Panel ManagementInformation about components on panels, including frames, boards, power supplies, fans, andports, can be displayed.

Clock ManagementPhysical clocks and PTP clocks can be configured and managed.

Interface ManagementThe following interfaces can be configured:

l Ethernet interfacesl POS interfacesl Virtual interfaces such as subinterfaces, trunk interfaces, loopback interfaces, and virtual

template (VT) interfaces

LLDP ManagementLLDP can be globally configured or on interfaces.

Ethernet Features Managementl VLAN functions, including global VLAN, port VLAN, VLAN stacking, and VLAN

mapping, can be configured.l MAC address forwarding can be managed by configuring static MAC addresses, MAC

address learning rules, and MAC address aging.l The VLAN switch feature is supported.

Ethernet OAM ManagementOAM is implemented on the basis of two standards: IEEE 802.1ag and IEEE 802.3ah. TheU2000 can continuously monitor user services, and identify and locate faults by means of IEEE802.1ag; the U2000 can monitor user services of the last mile and report faults by means of IEEE802.3ah.

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-3

Ethernet OAM management supports the following functions:

l Manages global information.l Supports IEEE 802.1ag-related functions, such as the configurations of the MD, MA, local

MEP, remote MEP, and MIP, and diagnostic operations (including loopback, link trace,MAC ping, and MAC trace).

l Supports IEEE 802.3ah-related functions, such as Ethernet OAM configurations, queryingports, and loopback detection.

Channel ManagementThe following channels can be configured and managed:

l VTYsl Telnet and FTP servicesl Syslog parametersl Alarmsl SSH servicesl NAP services

QoS ManagementThe following QoS functions are supported:

l Traffic classifications, traffic behaviors, and traffic policiesl Interface QoS and system QoSl DS domain policiesl Traffic mirroring and port mirroringl HQoS, including the discard policy, HQoS flow queue policy, HQoS flow queue mapping,

HQoS scheduler, and HQoS user scheduling

Route ManagementStatic routes, routing information, routing policies, OSPF routes, and BGP/IS-IS public networkand private network routes can be configured.

MPLS ManagementThe following NE-level MPLS configurations are supported:

l MPLS-related protocolsl MPLS TE tunnell MPLS interface parametersl Static LSPsl MPLS OAM detection and protection groups

ACL ManagementACLs-based access control is supported.

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

BRAS ManagementThe following broadband remote access service (BRAS) features of multi-service gateways aresupported:

l Address pool managementl Authorization, authentication and accounting (AAA) managementl Domain and Point-to-Point Protocol (PPP) managementl Built-in Web server managementl Layer 3 Internet Service Provider (ISP) configuration managementl Portal server managementl VLAN managementl User managementl Real-time statistics collection on domains, IP address segments, and device IP addresses

VPDN ManagementThe Layer-2 Tunneling Protocol (L2TP) can be configured on multi-service gateways and L2TPtunnels can be managed.

BFD ManagementThe following BFD functions are supported:

l BFD attributesl BFD sessionsl BFD alarmsl BFD for VRF/PW/MPLS TE/VSI/physical links

VRRP/VGMP Managementl Virtual Router Redundancy Protocol (VRRP) configurations, including global VRRP

attributes, interface attributes, and interface VR, and VRRP alarms, are supported.l VRRP Group Management Protocol (VGMP) configurations, including global VGMP

attributes, VGMP members, and VGMP alarms, are supported.

VPN ManagementThe following VPN management functions are supported:

l Tunnel policiesl PWsl PW templatesl VSIsl VRFs

MSE ManagementMSE functions, including global MSE, AAA, user management, and interface services, aresupported.

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-5

Layer 3 Multicast Management

The following Layer 3 multicast functions are supported:

l Manage routers

l Manage IGMP

l Manage PIM

l Manage MSDP

l Manage L3VPN RP

Layer 2 Multicast Management

The following VSI-based Layer 2 multicast functions are supported for routers:

l IGMP snooping

l SSM mapping

l Multicast CAC

l Multicast groups

E-Trunk Management

The E-trunk search and discovery, E-trunk configuration, E-trunk member management, andtrunk member monitoring are supported.

Smart Configuration Tool

The Smart Configuration Tool (SCT) can import the routers managed by the U2000. CLIgrammar check, template configuration, navigation paths are supported. The SCT can issueconfigurations in batches and can be integrated with the U2000.

ANCP Management

The following ANCP features are supported for routers:

l ANCP management

l ANCP global configuration

l Line management

l Neighbor management

10.2 Router V8 ManagementRouter V8 management allows you to view NE configurations by means of GUIs.

Device Management

NE software versions can be automatically identified.

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Panel Managementl Information about components such as frames, boards, power supplies, fans, subboards,

and ports on the NE panel can be displayed.l Showing alarms using alarm indicators on the NE panel.l Information about alarms can be displayed.l Real-time performance data and historical performance data can be displayed.

NE ManagementThe following functions can be configured and information about these functions can bedisplayed:

l Routing protocols, including BGP, OSPF, and IS-ISl Security, including AAA and attack defensel MPLSl VPN, including L2VPN and L3VPNl QoSl Interfaces, including Ethernet and trunk interfacesl Channels, including SNMP, Telnet, and NETCONF channels

10.3 Automatic NE Configuration ManagementAutomatic NE configuration management is implemented by means of DHCP on the U2000.Automatic NE configuration management allows you to deploy and remotely debug case-shapedrouters, reducing the costs in device deployment and increasing the efficiency of devicedeployment.

Automatic NE configuration management supports the following functions:

l Starts or stops the DHCP server.l Manages configuration data.l Assigns NE IP addresses automatically.l Upgrades NE versions.l Modifies and applies NE scripts.l Views script application results.l Changes management IP addresses.

Automatic NE configuration management uses the C/S model, in which the NEs serve as theDHCP clients and the U2000 serves as the DHCP server to remotely deploy and commissionNEs.

FunctionThe detailed functions are as follows:

l Manages planned recordsThe functions of managing configuration data, creating a data record and importing datarecords in batches are provided.

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-7

l Manages DHCP serversThe function of automatically assigning IP addresses to NEs is supported when the DHCPserver function is enabled.

l Manages scriptsThe function of managing device scripts on the U2000 is provided for automaticallydeploying device configurations.

l Upgrades system versions remotelyThe function of remotely upgrading device versions is provided. Both automatic andmanual upgrade modes are available.

l Deploys device scripts remotelyThe function of remotely deploying device scripts is provided. Both automatic and manualdeployment modes are available.

l Monitors task status during automatic device deploymentThe function of monitoring task status during automatic device deployment is provided.

10.4 Switch ManagementSwitch management allows you to configure and maintain switches by means of the GUI.

Device Management

Device types and software versions can be automatically identified and differentiatedmanagement can be performed accordingly.

Component Managementl Information about components, including frames, boards, power supplies, fans, and ports

can be automatically obtained.

l Information about components can be refreshed and component status can be monitored.

Panel Management

Information about components on panels, including frames, boards, power supplies, fans, andports, can be displayed.

LLDP Management

LLDP can be globally configured or on interfaces.

Interface Management

The following interfaces can be configured:

l Ethernet interfaces

l POS interfaces

l Virtual interfaces such as subinterfaces, trunk interfaces, loopback interfaces, and Tunnelinterfaces

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Ethernet Features Management

The VLAN, VCT, and VLAN switch features are supported.

OAM Management

OAM is implemented on the basis of two standards: IEEE 802.1ag and IEEE 802.3ah. TheU2000 can continuously monitor user services, and identify and locate faults by means of IEEE802.1ag; the U2000 can monitor user services of the last mile and report faults by means of IEEE802.3ah.

Ethernet OAM management supports the following functions:

l Manages global information.

l Supports IEEE 802.1ag-related functions, such as the configurations of the MD, MA, localMEP, remote MEP, and MIP, and diagnostic operations (including loopback, link trace,MAC ping, and MAC trace).

l Supports IEEE 802.3ah-related functions, such as Ethernet OAM configurations, queryingports, and loopback detection.

Route Management

Static routes, routing policies, OSPF routes, IS-IS routes, and BGP routes can be configured.

MPLS Management

The following NE-level MPLS configurations are supported:

l MPLS-related protocols

l MPLS TE tunnel

l MPLS interface parameters

l Static LSPs

l MPLS OAM detection and protection groups

BFD Management

The following BFD functions are supported:

l BFD attributes

l BFD sessions

l BFD alarms

l BFD for VRF/PW/MPLS TE/VSI/physical links

VRRP/VGMP Managementl Virtual Router Redundancy Protocol (VRRP) configurations, including global VRRP

attributes, interface attributes, and interface VR, and VRRP alarms, are supported.

l VRRP Group Management Protocol (VGMP) configurations, including global VGMPattributes, VGMP members, and VGMP alarms, are supported.

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-9

VPN ManagementThe following VPN functions are supported:

l Tunnel policiesl PWsl PW templatesl VSIsl VRFs

EPON ManagementPON interface management and ONU management are supported.

Channel ManagementThe following channels can be configured and managed:

l VTYsl FTP servicesl Local usersl Syslog parametersl Alarm servicesl SSH servicesl SNMP parameters

DLDP ManagementThe Device Link Detection Protocol (DLDP), packet authentication mode, and statisticscollection are supported.

MSTP ManagementMSTP domains, MSTP protection, and statistics collection are supported.

DHCP ManagementDHCP servers, DHCP relay, client addresses, and DHCP statistics are supported.

Web Authentication ManagementThe Web authentication server is supported.

Controllable Multicast ManagementMulticast group, multicast template, and interface filtering are supported.

Mirroring ManagementLocal/remote interface mirroring, VLAN mirroring, MAC address mirroring, flow mirroring,CPU mirroring, and CPU buffer statistics are supported.

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

IP Source Guard ManagementStatic user binding table, dynamic check, and clearance of dynamic configurations are supported.

Interface Security ManagementEthernet interface security management is supported.

MAC Address Authentication ManagementMAC address authentication is supported.

PPPoE+ ManagementPPPoE+ functions are supported.

AAA and User ManagementAAA and user management are supported.

MFF ManagementStatic gateways, MFF servers, and MFF network-side interfaces are supported.

ARP ManagementProxy ARP and ARP Ping-IP are supported.

DHCP Snooping ManagementAlarms on spoofing attacks, DoS attacks, lease-extending packet attacks, packet sending rate,and packet discarding are supported.

Firewall ManagementFirewall functions are supported.

NATNetwork address translation (NAT) is supported.

Traffic Suppression ManagementTraffic suppression is supported on Ethernet interfaces.

Anti-attack ManagementWhitelists, blacklists, user-defined flow, and CAR are supported.

IP Source Trail ManagementAttack source search and URPF are supported.

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-11

MBGP ManagementRoute advertisement policies, route exchange policies, and route attributes are supported.

RRPP ManagementRRPP, RRPP instances, RRPP rings, and working mode are supported.

Smart Link ManagementSmart Link groups, data flow policies for Smart Link groups, and Monitor Link groups aresupported.

IGMP Proxy ManagementStatic router interfaces, multicast policies, prompt leave, and IGMP proxy are supported.

IGMP Snooping ManagementStatic router interfaces, multicast policies, and IGMP snooping are supported.

MSDP ManagementMSDP peers and SA messages are supported.

PIM-DM ManagementMulticast sources, multicast neighbors, multicast forwarding, and assertion management aresupported.

PIM-SM ManagementMulticast sources, multicast neighbors, dynamic RP, and SPT switching are supported.

IGMP ManagementIGMP groups, IGMP group policies, and IGMP features are supported.

Multicast Route ManagementStatic multicast routes, multicast route policies, and multicast forwarding are supported.

Layer 2 Multicast ManagementLayer 2 multicast and multicast VLAN replication are supported.

802.1x Management802.1x management is supported.

Batch VLAN ManagementManaging VLANs in batches is supported.

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Port Isolation ConfigurationPort isolation is supported.

PoE ConfigurationPoE is supported.

Stack ConfigurationStack functions are supported.

QoS ManagementThe following QoS functions are supported:

l Traffic classifications, traffic behaviors, and traffic policiesl Interface QoS and system QoSl DS domain policiesl Traffic mirroring and port mirroring

VLANIF ConfigurationVLAN interfaces are supported.

Ethernet ConfigurationLDT, MAC tables, BPDU tunnels, and SEP are supported.

Security ConfigurationThe ACL, firewall, NAT, and ARP features are supported.

Basic ConfigurationNAP remote deployment is supported.

10.5 Template ManagementIn NE configuration management, many operations need to be performed repeatedly. Thetemplate management function is introduced to solve this problem. This function allows you torapidly configure NEs in batches.

Template FeaturesDefault templates are available. When a template is referenced, the attribute settings on thetemplate automatically apply to the configured resource.

A template has the following features:

l Offline configuration

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-13

Global templates are created in advance and saved on the U2000. They are not created ondevices. The creation of global templates is irrelevant to the equipment status.

l Global validityA global template can be referenced by all the devices managed by the U2000.

l Minimal duplicate data– After a global template is applied, the U2000 keeps only one record on the devices that

reference this template.– When a device references a global template, the U2000 does not add a record of template

data. The U2000 only records the reference relationship between the device and thetemplate.

l A global template can be referenced by a large number of devices of the same type. Thenumber of global templates, therefore, is small. Consequently, global templates are easy tomanage.

Main TemplatesThe main templates are as follows:

l ACL templateAn ACL template allows you to configure ACLs on multiple interfaces of different routersat the same time, simplifying attack defense configurations on the network access side.

l QoS templateRouters support the following QoS templates, which can be applied to NE interfaces inbatches:– CBQoS templates– DS domain templates– HQoS templates– PQ templates– Interface CAR templates

l IP multicast templateRouters support the following IP multicast templates:– Layer 2 CAC templates, which can be applied to VSIs, PWs, and NE interfaces to adjust

and configure multicast CAC configurations in batches– Layer 2 static multicast group templates, which can be applied to PWs and NE interfaces

to adjust and configure static multicast groups in batchesl VPN service template

Used to configure VPN services in batches.l Switch EPON template

Used to configure ONU services in batches.

10.6 Diagnosis ManagementDiagnosis management provides easy-to-use diagnostic functions for you to test network andservice connectivity. Diagnostic cases can be run manually or run automatically at scheduledtimes.

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Test Diagnosis Functionsl The U2000 provides test cases, such as VPLS MAC ping/traceroute, ICMP ping/traceroute,

PWE3 ping/traceroute, LSP ping/traceroute, and ICMP VRF ping/traceroute, which canhelp you to test network connectivity at each protocol layer.

l The U2000 allows you to combine several test cases into a test suite, so that you can performtest cases in batches. By diagnosing services layer by layer, the U2000 can rapidly locatethe network layer where a fault occurs.

– Application layer

DNS, DHCP, FTP, HTTP, SNMP, and VoIP

– Transport layer

TCP and UDP

– Network layer

ICMP ping/traceroute, ICMP VRF ping/traceroute, ICMP jitter, multicast ping/trace,multicast VRF trace, and MTU ping

– Data link layer

8021.ag MAC ping and CE ping

– MPLS service

PWE3 ping, PWE3 trace, LSP ping, LSP trace, VPLS MAC ping, VPLS MAC trace,MAC study, MFIB ping, and service ping

l The U2000 supports intelligent diagnostic result analysis. A result analysis template canbe customized to include diagnostic indicators such as delay, jitter, and packet loss ratioand a result analysis policy based on service levels. Diagnostic result analysis can help yourapidly determine network status.

Test Diagnosis Management

Test diagnosis management allows you to test network connectivity and QoS and rapidlypinpoint a fault location.

A test diagnostic tool consists of the following parts:

l Test suite

– A test suite consists of multiple test cases. Test cases are implemented on differentlayers: the application layer, transport layer, network layer, and data link layer. Testcases for MPLS services can also be created.

– You can choose to perform all test cases or only some cases in a test suite at the sametime. QoS can be determined based on the parameters shown in the test results, such asdelay, jitter, and packet loss ratio.

l Diagnostic policy

Test suites can be performed at a specified interval, such as daily, weekly, or monthly.

l Network scanning

Network information is collected and virtual link connectivity and side-by-side linkconnectivity are tested. The U2000 displays scanning progress in real time and allows youto stop the scanning. It also provides the traceroute function to locate faults.

l Historical data

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-15

The U2000 records historical data of test suite operations. It supports filtering and queryinghistorical data based on test suite names, test results, or test time.

l Diagnostic result analysis

The U2000 supports intelligent diagnostic result analysis. A result analysis template canbe customized to include diagnostic indicators such as delay, jitter, and packet loss ratioand a result analysis policy based on service levels. Diagnostic result analysis can help yourapidly determine network status.

10.7 Cluster ManagementThe Huawei Group Management Protocol (HGMP) is mainly used to solve the problems ofautomatic management operations and centralized management for multiple dispersed low-endand mid-range switches.

Cluster network management involves the following functions:

l Managing cluster views

l Configuring clusters

l Managing cluster configuration files

l Managing image programs

l Locating cluster faults

The U2000 provides cluster management for the CX200/CX200D/CX300/CX380/CX600/S2300/S3300/S5300. This function allows you to manage network equipment in a moreconvenient and efficient manner. With this function, you can monitor the network status throughthe physical topology of cluster networks and reduce improper operations on single equipmentduring management. Therefore, the U2000 meets the ever-increasing service requests.

Figure 10-1 and Figure 10-2 show the cluster topology management window and functionsprovided by theU2000.

Figure 10-1 Cluster topology

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Figure 10-2 Navigation path to cluster functions

The U2000 provides the following functions:l Automatically discovering and dynamically refreshing cluster equipment nodesl Automatically discovering and dynamically refreshing the physical topology of cluster

networks and linksl Managing the configurations of cluster equipment in batches and in a unified and

centralized mannerl Maintaining the equipment of a cluster in a centralized manner and supporting fault

detection and recoveryl Facilitating the backup and recovery of configuration datal Setting the parameters, such as the management VLAN, IP address pool, and multicast

MAC address, for the switches of a clusterl Supporting the plug-and-play feature of protocols such as NDP, NTDP, and HGMPl Supporting the access to command or member switches through Telnet based on the nodes

in the cluster view

10.8 Node Redounded ManagementEnhanced-Trunk (E-Trunk), developed on the basis of Link Aggregation Control Protocol(LACP), is a protocol that controls and implements link aggregation among multiple sets ofequipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS, VLL,or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links betweenthe CE and PEs.

This function allows you to perform the following operations:l Creat an E-Trunk, bind Eth-Trunks, and configure the attributes of the E-Trunk and the

Eth-Trunks.l Display the automatically discovered E-Trunk information in the database of the NMS to

the interface of the NMS.l Automatically discover the E-Trunk by user specify the equipment range, the configuration

of the equipment and the E-Trunk group can be automatically discovered.

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-17

10.9 Report Subsystem ManagementThe report subsystem allows you to generate, distribute, and manage reports based on the Weband helps you to monitor, analyze, and optimize network performance.

The report subsystem can generate reports in both manual and automatic modes. It can be easilyintegrated with the security management module of the U2000.

For more information, refer to the iManager U2000 (RPT)V100R002C01 Release Notes.

10.10 VPN Service ManagementThe U2000 provides centralized and unified management, including service deployment, servicemonitoring, and service diagnosis, on VPN services, namely, BGP/MPLS VPN service, VPLSservice, and PWE3 service.

Service Deployment

The U2000 provides a user-friendly service configuration GUI on which you can complete allconfiguration operations. The parameters of multiple sets of equipment can be automaticallygenerated through related service templates. User configuration results can be previewed throughthe topology before being delivered.

l Customer management

The U2000 supports the operations of adding, deleting, and modifying customers, andbinding customers to VPN services.

l BGP/MPLS VPN service management

– Configuring L3VPNs in networking modes such as Full-Mesh, Hub-Spoke, andExtranet

– Configuring VPN FRR and IP FRR for L3VPNs and binding L3VPNs to TE tunnels

– Configuring static, OSPF, and BGP private routes

– Configuring VPN services in inter-AS OptionA or inter-AS OptionB mode

– Configuring the service wholesale feature of BGP/MPLS VPNs based on the ME60

l In service wholesale mode, the ME60 forwards all the user service packets of a certain ISPto the access server of the ISP through VPNs.

– In this mode, the ME60 does not forward packets according to the destination IPaddresses of the packets as it usually does. Instead, the ME60 forwards packetsaccording to the ISP information of the users and forwards all the packets from the usersto the access server of the ISP. The access server of the ISP then implements the relatedservices or performs service accounting.

– With the service wholesale feature, the U2000 can support the multi-ISP service. Themulti-ISP service is also called the virtual ISP service. For a multi-ISP service, multipleISPs exist on a physical network. These ISPs lease the physical network of the physicalnetwork provider to operate services. Generally, the providers who construct physicalnetworks are called network service providers (NSPs) and the providers who leasephysical networks to operate services are called ISPs.

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

– The ME60 supports the multi-ISP service by wholesaling the user service packets ofdifferent ISPs to related ISPs.

l VPLS service management– Supporting the VPLS services in LDP signaling (Martini) mode– Supporting the interworking of different VSIs– Supporting VLL/VPLS services

l PWE3 service management– Configuring static and dynamic PWE3 services– Supporting PWE3 services in CES, ATM, Ethernet, IWF, and heterogeneous

interworking mode– Backing up PW configurations– Configuring PW FRR

l Composite service managementThe U2000 supports the management on composite services, such as the access of a VLLto another VLL, the access of a VLL to a VPLS network, the access of a VLL to an L3VPN,L3VPN multi-VRF, and inter-AS OptionA.

Automatic Service DiscoveryThe U2000 provides the function of automatically discovering BGP/MPLS VPN, VPLS, andPWE3 services that are running on the managed network. In addition, the U2000 can quicklyload services on the current network to itself for unified management and monitoring, withoutrequiring much user participation.

Service Monitoringl The U2000 provides the visual topology display function for MPLS VPN, VPLS, and

PWE3 services. The running status of the resources used by the current service, such as aninterface, a VRF, or a VSI, can be displayed in the related topology view, thus helping youto quickly locate faults. Moreover, the U2000 also allows you to customize topology views.For example, you can place the services of key customers in one topology view formonitoring.

l You can quickly locate a faulty service based on the alarm generated by the related NE.

Service Diagnosisl The diagnosis tools are used to detect the connectivity of networks and locate faults.

Through the service diagnosis function, you can generate diagnosis tasks according to theselected services and directly operate equipment nodes in topology views. The diagnosisresults can be directly displayed.

Service Check and Testl Configuration check: checking the consistency of VPN service configurations on different

sites and showing the positions of configuration errorsl Service connectivity test: testing the service connectivity through the ping and tracert tests,

and locating the fault equipmentl Protocol status test: checking the service protocol status and the forwarding table, and

displaying the error information, thereby helping you to locate faults

iManager U2000 Unified Network Management SystemProduct Description 10 Router Feature and Switch Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

10-19

10.11 Tunnel Service ManagementTunnel service management is used to plan and deploy services on the entire MPLS network.Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel servicemanagement, thus reducing the costs of operating and maintaining MPLS networks.

Tunnel Deploymentl Enabling MPLS, LDP, and MPLS TE on the network equipment and interfaces in batchesl Implement the planning of traffic on MPLS core networks by supporting the deployment

of end-to-end MPLS TE tunnel servicesl Facilitating the implementation of the MPLS access scheme by supporting the deployment

of static LSP servicesl Implementing the end-to-end MPLS OAM protection by supporting the configuration of

end-to-end MPLS TE protection groups, configuration of MPLS OAM detection, andmonitoring of related alarms

Automatic Tunnel DiscoveryWith the help of a network administrator, the LSPs and related protection groups that arepreviously deployed on the network can be restored to the U2000. This satisfies the requirementin the special case where the LSP deployment is prior to the U2000 installation. Moreover, lesstime of the network administrator is required and the impact of incorrect operations on originalservices is prevented.

Tunnel Monitoringl Supporting the networkwide tunnel view and displaying multiple types of tunnels, such as

static, RSVP, LDP, and IP tunnels, and their alarms in the topology viewl Collecting and displaying the performance data of tunnelsl Switching to the related tunnel from an alarm

Tunnel DiagnosisThe U2000 supports LSP ping and LSP tracert functions through which you can diagnosedeployed MPLS TE tunnels and static tunnel services.

10 Router Feature and Switch Feature ManagementiManager U2000 Unified Network Management System

Product Description

10-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

11 Feature Management for SecurityDevices

About This Chapter

This topic describes the features supported by security devices.

11.1 Security Device ManagementSecurity device management allows you to configure and maintain security devices by meansof the GUI.

11.2 Single-Point Web Configuration for Security DevicesSingle-point Web configuration integrates the existing Web functions on the device byembedding browser controls in the Client/Server interfaces. Single-point configuration appliesto all the configurations of security devices. In collaboration with centralized security policyconfiguration, it provides an integrated and comprehensive network security managementsolution.

11.3 Centralized Security Policy ConfigurationDeploying a set of security devices with comprehensive security technologies on a network doesnot mean that the network is well secured.

11.4 Report Subsystem ManagementThe report subsystem provides a complete set of convenient services. It allows you to generate,distribute, and manage reports based on the Web. The powerful report subsystem can help youto monitor, analyze, improve, and plan network performance.

11.5 VPN Service ManagementThe VPN service management module is an important part to implement the IPSec VPN/L2TPVPN solution. It is used to configure and monitor IPSec and L2TP VPN service.

iManager U2000 Unified Network Management SystemProduct Description 11 Feature Management for Security Devices

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

11-1

11.1 Security Device ManagementSecurity device management allows you to configure and maintain security devices by meansof the GUI.

Security device management supports the following functions:

l Device management

– Identifies software versions and adapt to different types of devices automatically.

– Supports channel management, including local users using Telnet and STelnet, SNMPparameters, and trap parameters.

l Component management

– Information about device components, including frames, boards, power supplies, fans,and ports can be automatically obtained.

– Information about device components can be refreshed and device component statuscan be monitored.

l Panel management

Information about components on the panel, including frames, boards, power supplies, fans,and ports, can be displayed.

l Interface management

General interface information and Ethernet interfaces can be configured.

l GTP management

Security devices can filter GTP packets according to GTP policies to protect GPRSnetworks from attacks such as GTP overbilling attacks.

l Automatic registration

The U2000 can automatically update the IP address of a receiving device based onregistration messages sent by the receiving device.

11.2 Single-Point Web Configuration for Security DevicesSingle-point Web configuration integrates the existing Web functions on the device byembedding browser controls in the Client/Server interfaces. Single-point configuration appliesto all the configurations of security devices. In collaboration with centralized security policyconfiguration, it provides an integrated and comprehensive network security managementsolution.

The Web features of security devices provide easy-to-use Web configuration windows throughwhich users can operate and maintain devices.

The single-point Web configuration is a proxy-based Web access mode. It can be implementedwithout affecting local browsers such as Internet Explorer and Firefox. The single-point Webconfiguration includes two parts: Web proxy and Web browser. The functions of single-pointWeb configuration are as follows:

l Users can open the Web management window of a device on a U2000 client.

l Users can log in to the Web window automatically.

11 Feature Management for Security DevicesiManager U2000 Unified Network Management System

Product Description

11-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Users can access security devices by means of the Hyper Text Transfer Protocol (HTTP)or the Hyper Text Transfer Protocol Secure (HTTPS) protocol.

l Multiple Web protocols, such as Java script, Hyper Text Marked Language (HTML), CSS,and Applet, and technologies related to Web 2.0 are supported.

11.3 Centralized Security Policy ConfigurationDeploying a set of security devices with comprehensive security technologies on a network doesnot mean that the network is well secured.

During network security maintenance, deploying a satisfied security scheme for a small-sizedlocal network is a complicated task. Designing and deploying a reliable security scheme for alarge-scale network is a more difficult and challenging task.

Centralized security policy configuration provides a reliable and stable protection system for anetwork. It is implemented on security devices deployed on the network.

Centralized security policy configuration has the following features:l Policy package management

– A policy package can manage all security devices on a network. A policy packageconsists of security policy, attack defense, and service port mapping.

– Users can create their own policy packages. A policy package can include all securityconfigurations such as creating, deploying, removing, and verifying configurations.

l Configuration and management scope– Security policy– Attack defense– Service port mapping– Policy resource

l Policy recovery– During network security management and maintenance, the data consistency between

the U2000 and devices must be ensured so that the actual network configurations canbe accurately displayed on the U2000.

– Policy recovery can restore the security policies and attack defense configurationsdeployed on devices and the used resources of devices to the U2000, achieving the dataconsistency between the NMS and devices.

l Policy auditAuditing the configuration data difference between the U2000 and devices helps to ensuredata consistency between the NEs and the U2000.

l Security policy configuration and management in two dimensions

1. Service-dimension configuration: manages services that are deployed on multiple orall devices on a network. This allows users to manage and audit services in a unifiedmanner. Users do not need to configure and check services on devices separately,reducing the cost and improving the efficiency.

2. Single NE-dimension configuration: manages the configurations of a single NE. Userscan check security configurations, create, modify, deploy, and remove configurationson a single NE, and import the configurations of other NEs to this NE.

l Policy deployment status display

iManager U2000 Unified Network Management SystemProduct Description 11 Feature Management for Security Devices

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

11-3

Whether a policy is deployed, whether the deployment is successful, and whether thedeployment status is the same as that on the device can be displayed. This helps to preventduplicate deployment of a policy.

l History record queryThe detailed procedures for configuring and maintaining policy packages are recorded. Thehistorical operations that users performed on policy packages can be checked.

11.3.1 Policy Package ManagementThis topic describes the fuction of policy package management.

11.3.2 Security Policy ConfigurationThe U2000 allows you to manually create and modify security device rules.

11.3.3 Attack Defense ConfigurationThe U2000 provides attack defense functions.

11.3.4 Policy Resource ConfigurationThe configuration of policy resources includes the configuration of service,addess sets,periodand ports sets.

11.3.5 Mapping ServiceThe U2000 It provides the configuration function that re-maps the most common service portsto other ones.

11.3.1 Policy Package ManagementThis topic describes the fuction of policy package management.

This feature allows you to create, modify, delete, verify, deploy, undeploy, discover, and auditpolicy packages, view the deployment and audit result of policy packages.

By changing operations based on single policies and single devices to centralized operationsbased on batch policies and multiple devices, this feature increases operation efficiency andreduces maintenance cost.

The policy packages verifying function ensures the correctness of policy package configurationsand correlations among the policies within the same policy package. With the policy verifyingfunction, you can correctly deploy policy packages on devices and avoid repeated modificationsdue to configuration errors during policy deployment.

Policy auditing is to audit the policy configuration differences between the NMS and device, soas to determine whether the policy needs to be deployed or discovered.

Policy discovery is to recover the data synchronized to the database to the NMS for management.

The rights to perform various operations on policy packages are under control. Operations onpolicy packages are recorded in logs for the policy maintenance personnel to monitor and managepolicies.

11.3.2 Security Policy ConfigurationThe U2000 allows you to manually create and modify security device rules.

The U2000 allows you to manually create the device rule, including:

l Specify the name of a new rulel Select the source security zone

11 Feature Management for Security DevicesiManager U2000 Unified Network Management System

Product Description

11-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Add the source address manuallyl Select the destination security zonel Add the destination addressl Select the servicel Select the actionl Add the devicel Add the time rangel Choose whether to generate logsl Configure functions such as ASPFl Configure functions such as DDoSl Configure functions such as package filtering

After a rule is created and deployed to a device, the device filters device information accordingto this rule.

The U2000 allows you to modify the device rule, including:

l Change the name of a rulel Change the source security zonel Change the source addressl Change the destination security zonel Change the destination addressl Change the servicel Change the actionl Change the devicel Change the time rangel Change whether to generate logsl Modify functions such as ASPFl Modify functions such as DDoSl Modify functions such as package filtering

The U2000 also allows you to delete a rule, or the value of a certain configuration item of a rule.

11.3.3 Attack Defense ConfigurationThe U2000 provides attack defense functions.

This feature provides attack defense functions against SYN flood, UDP flood, ICMP flood,HTTP get flood, DNS request flood, connection flood, scanning, malformed packet, specialpacket control, and blacklist for security devices.

11.3.4 Policy Resource ConfigurationThe configuration of policy resources includes the configuration of service,addess sets,periodand ports sets.

l Configuring services, address set, time range, and port set– Services

iManager U2000 Unified Network Management SystemProduct Description 11 Feature Management for Security Devices

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

11-5

As flexible support for the IP protocol, security services can be classified into TCPservices, UDP services, ICMP services, and other services. The U2000 provides somebasic services by default. You can create different services by adding differentparameter settings to the same protocol. Different types of services can form a servicegroup. A rule corresponds to one or multiple services. In the case where a rulecorresponds to multiple services, these services can be in a service group or map to theseservices. When you log in to the U2000 for the first time, the U2000 provides someservices by default.

– Address setWhen setting source and destination addresses on the U2000, you can either set singleIP addresses or set address sets.

– Time rangeTime ranges are classified into two types: continuous time ranges and periodic timeranges. A continuous time range starts from one time point and ends at another timepoint. Rules are valid only within the time range. A period time range is on a weeklycycle. You need to set the start time and end time of a day and specify on which daysof a week the rules are valid. Then the rules will take effect on a weekly cycle.

– Port setA port set is a collection of single, continuous, or discontinuous port numbers, specifyingthe ports through which the server can provide services. The value of a port set rangesfrom 0 to 65535.

l Configuration log serverBinary flow logs of devices can be sent to binary servers via configuration of log server.

11.3.5 Mapping ServiceThe U2000 It provides the configuration function that re-maps the most common service portsto other ones.

Mapping Service means security devices map the service ports of networking program to out-of-ordered ports when forwarding network data packets.It implies the most common ports toprevent the outer attack to programs.

11.4 Report Subsystem ManagementThe report subsystem provides a complete set of convenient services. It allows you to generate,distribute, and manage reports based on the Web. The powerful report subsystem can help youto monitor, analyze, improve, and plan network performance.

10.9 Report Subsystem Management lists the details of the report subsystem management.

11.5 VPN Service ManagementThe VPN service management module is an important part to implement the IPSec VPN/L2TPVPN solution. It is used to configure and monitor IPSec and L2TP VPN service.

11.5.1 IPSec End-to-End ServiceThe IPSec end-to-end service is to securely connect two intranets trustable to each other throughInternet. It is applied when secure communication connections need to be established. Thisapplication mode can be used to protect the sensitive data transmitted on the Internet.

11 Feature Management for Security DevicesiManager U2000 Unified Network Management System

Product Description

11-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

11.5.2 Remote Access ServiceThe U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2)and L2TP over IPSec technologies. The remote access service is applicable to employeesaccessing the enterprise intranet in remote dial-up mode over the Internet.

11.5.1 IPSec End-to-End ServiceThe IPSec end-to-end service is to securely connect two intranets trustable to each other throughInternet. It is applied when secure communication connections need to be established. Thisapplication mode can be used to protect the sensitive data transmitted on the Internet.

l Service deployment

This feature provides both the single service deployment function and the service batchdeployment function. Service deployment is used to make services take effect on devices.You can view the deployment results through the auditing function.

l Service discovery

This feature supports the function of automatically discovering services. With this function,you can discover running IPSec VPN services on the network and then restore thediscovered services to the U2000 for unified management and monitoring.

l Service monitoring

By monitoring the status of managed services in real time, the performance managementmodule allows you to view the service status in the topology view. The performancemanagement module monitors the service status and performance indicators and displayscollected performance data in graphs or reports.

l Display of the service topology

This feature provides the function of visualizing the service topology. In the topology view,you can view service alarms, service statuses, and service-related device alarms.

l Service audit

This feature supports to audit the differences of service configuration between the NMSand device.

11.5.2 Remote Access ServiceThe U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2)and L2TP over IPSec technologies. The remote access service is applicable to employeesaccessing the enterprise intranet in remote dial-up mode over the Internet.

l Service deployment

The remote access service management supports the deployment of a single service andthe deployment of services in batches. In addition, you can view deployment results in theservice topology view. Remote access services include L2TP service, L2TP over IPSecservice and IPSec (IKEv2) service three types.

l Service monitoring

The L2TP service, L2TP over IPSec service and IPSec (IKEv2) service management canmanage and monitor the online users of remote access services. It also provides thefunctions of displaying the statuses of online users in real time, restricting the number ofonline users, and forcing users to log out.

l Display of the service topology

iManager U2000 Unified Network Management SystemProduct Description 11 Feature Management for Security Devices

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

11-7

The remote access service management provides the function of visualizing the servicetopology. In the topology view, you can view service alarms, service statuses, and service-related device alarms.

l Service auditThe remote access service management supports to audit the differences of serviceconfiguration between the NMS and device.

l Service resource managementThe remote access service management provides the function of radius templatemanagement and user domain management.

11 Feature Management for Security DevicesiManager U2000 Unified Network Management System

Product Description

11-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

12 FTTx Network Feature Management

About This Chapter

This topic describes the functions and features of FTTx NE management and networkmanagement.

12.1 OLT ManagementFor NE configuration management, the U2000 provides graphical user interfaces (GUIs) forconfiguring NEs and maintaining NE configurations. You can configure services for equipmentin the GUIs.

12.2 ONU ManagementFor NE configuration management, the U2000 provides graphical user interfaces (GUIs) forconfiguring NEs and maintaining NE configurations. You can configure services for equipmentin the GUIs.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-1

12.1 OLT ManagementFor NE configuration management, the U2000 provides graphical user interfaces (GUIs) forconfiguring NEs and maintaining NE configurations. You can configure services for equipmentin the GUIs.

Device ManagementDevice management includes the management of NE panels, basic and common deviceattributes, clock sources, security, protocols, and device templates.

NE Panel Management

You can perform the following operations on the U2000:l Display the NE panel by double-clicking an NE.l Query the details of equipment.l Collect statistics on device resources.l Query the information about shelves.l Collect the statistics on shelf resources.l Query inter-shelf links.l Add, delete, start, disable, reset, and confirm a board.l Query the CPU usage and memory usage of boards in real time.l Display the port view by double-clicking a board.l Perform an active/standby switchover on the control boards.l Configure traffic management and rate limitation for GPON boards.l Configure rate limitation for EPON boards.

Management of Basic and Common Device Attributes

The management of basic and common device attributes includes the query of the globalinformation about devices and the configuration of the global policies of devices.

You can perform the following operations on the U2000:l Query the system information about devices.l Query the statistics on the resources and status of devices.l Query the license information about the functions and resources of devices.l Configure the system time, IP address of a device, and the binding between a Layer 3

interface and an IP address.l Configure the SNMP protocol port.l Set device handshake parameters.l Configure the policy for automatically backing up device data.l Enable and disable the energy-conservation function of a device.l Configure and manage license files.

Clock Source Management

Clock source management includes the management and configuration of equipment-level clocksource information, such as information about the line clock, 1588 clock, and clock priorities.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Security Management

You can perform the following operations on the U2000:l Enable and disable anti-ICMP attack, anti-IP attack, anti-IP spoofing, anti-MAC spoofing,

and anti-DoS attack.l Set the aging time of an MAC address.l Enable and disable MAC address learning.l Configure the security attributes for user login in the CLI.

Protocol Management

You can perform the following operations on the U2000:l Manage the Link Aggregation Control Protocol (LACP), Spanning Tree Protocol (STP)/

Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP),Bidirectional Forwarding Detection (BFD), and Internet Group Management Protocol(IGMP).

l Control the Address Resolution Protocol (ARP) proxy.l Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option

(RAIO) customized format.l Control the Dynamic Host Configuration Protocol (DHCP) option 82 function.l Control the DHCP proxy and DHCP relay forwarding functions.l Configure 802.1ag attributes of the Ethernet packet.

Global Configuration of Services

The global configuration of services includes the configuration of the VLAN, QoS, xDSL,GPON, EPON, and multicast services.

Device Template Management

Device template management includes the display of different types of device templates on theU2000. Templates include the GPON template, EPON template, MDU SNMP template, IGMPtemplate, traffic template, VLAN service template, optical transceiver alarm template, and PWtemplate. Currently, the U2000 supports only query and generation of global templates.

Network Interface ManagementNetwork interface management includes the management and maintenance of E1/T1 ports andthe Ethernet port.

Management and Maintenance of E1/T1 Ports

E1/T1 ports are classified into TDM E1/T1 ports, CES E1/T1 ports, and IMA E1/T1 ports.

TDM E1/T1 ports can be used as access ports or upstream ports, depending on the function ofa board.

On E1 ports for upstream transmission, you can perform only the loopback operation.

On E1 ports for PRA access, you can perform the following operations: configure or delete portattributes, set the alarm threshold of L2 signaling bit errors, query timeslots, and enable or disableservices.

On CES E1/T1 ports, you can collect real-time performance statistics of the ports, configure portattributes, set a port alias, and perform loopback.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-3

On IMA E1/T1 ports, you can query real-time performance statistics of the ports, and manageIMA groups and IMA links, such as adding, deleting, modifying, resetting, blocking, andunblocking an IMA group or link.

Management of Ethernet Ports

Ethernet port management includes the management of ports and aggregation groups. You canperform the following operations on the U2000:

l Configure port attributes.

l Create, delete, query, and modify an aggregation group.

l Activate and deactivate an Ethernet port.

l Collect real-time performance statistics and clear the performance statistics.

l Configure the PPPoE, DHCP option 82, 802.3ah ETH OAM loopback, and port rate limitfunctions.

l Query the attributes of optical transceivers on Ethernet optical ports.

Connection Management

Connection management includes the management of service virtual ports and E1 connections.

Service Virtual Port Management

A service virtual port enables user equipment to access the OLT. The service virtual port providesservice streams between the user equipment and the OLT for carrying user services. You canperform the following operations on the U2000:

l Query, add, delete, modify, activate, and deactivate a service virtual port.

l Collect the real-time performance statistics and clear the performance statistics.

l Perform ATM ping tests.

l Configure the extended attributes of a service virtual port. Extended attributes allow forgreater flexibility of addressing customer requirements. Extended attributes include themaximum number of learnable MAC addresses, the PPPoE session, the encapsulation type,and the maximum number of MAC addresses that can be bound.

l Configure the connection attributes of a service virtual port, including the alias, VPI/VCI,transmit traffic profile, and receive traffic profile.

l Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtualport. After successful shifting, the service port assumes the new VLAN ID.

l Bind IP addresses to a service virtual port and query the bound IP addresses. To specifythat only the users with certain IP addresses can access the service virtual port, perform thebinding operation. After successful binding, the service forwarding module checks thesource IP address of user packets. If the source IP address does not match any of the IPaddresses bound to the service virtual port, the user packets are dropped. Otherwise, theuser packets are forwarded. This ensures the security of user access.

l Bind static MAC addresses to a service virtual port. To specify that only the users withcertain static MAC addresses can access the service virtual port, perform this operation.After successful binding, the service forwarding module checks the source MAC addressof user packets. If the source MAC address does not match any of the MAC addressesbound to the service virtual port, the user packets are dropped. Otherwise, the user packetsare forwarded. This ensures the security of user access.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure service bundles. If several service virtual ports carry the same service, a servicebundle can be configured to bundle the service streams over the service virtual ports.

E1 Connection Management

In the FTTx scenario, an E1 connection is used for transmitting the TDM service over the GPONnetwork by encapsulating the TDM packets directly into a GPON GEM frame. In E1 connectionmanagement, you can query, add, modify, and delete an E1 connection on the U2000.

Layer 2 Management

Layer 2 management includes the management of the VLAN, the Rapid Spanning Tree Protocol(RSTP), Multiple Spanning Tree Protocol (MSTP), Access Node Control Protocol (ANCP), andRapid Ring Protection Protocol (RRPP).

VLAN Service Management

VLAN service management includes the management of the standard VLAN, MUX VLAN,smart VLAN, and super VLAN. You can perform the following operations on the U2000:

l Query, add, delete, and modify a VLAN.

l Collect the real-time performance statistics of a VLAN.

l Clear the real-time performance statistics of a VLAN.

l Manage a Layer 3 interface and its subinterfaces.

RSTP Management

You can perform the following operations on the U2000:

l Modify and restore the default value of the trail overheads of a port.

l Collect the RSTP statistics of a port.

l Clear the RSTP statistics of a port.

MSTP Management

MSTP management includes the management of domains, instances, and ports. You can performthe following operations on the U2000:

l Modify and restore the default setting of a domain.

l Add, delete, and modify an instance.

l Modify a port.

l Query the statistics of a port.

ANCP Management

You can perform the following operations on the U2000:

l Add, delete, modify, enable, and disable an ANCP session.

l Query the real-time status of an ANCP session.

RRPP Management

For RRPP management, you can perform the query, add, delete, and modify operations.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-5

Layer 3 ManagementLayer 3 management includes the management of the Dynamic Host Configuration Protocol(DHCP), Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge(PWE3), and Layer 3 routes.

DHCP Management

DHCP management includes the management of the DHCP server group, MAC addresssegment, standard mode, DHCP domain, and VLAN L3 interface. You can perform thefollowing operations on the U2000:l Query, add, delete, and modify a DHCP server group.l Query, add, delete, and modify a MAC address segment.l Query, enable, disable, and modify a standard mode.l Query, add, delete, and modify a DHCP domain.l Modify a VLAN Layer 3 interface.

MPLS/PWE3 Management

The MPLS is a transmission technology. It implements transparent transmission of data packetsbetween users. The MPLS tunnel is defined in the MPLS protocol. Independent of a service, anMPLS tunnel implements end-to-end transmission and carries service-related PWs.

You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000:l Configure the basic attributes of the MPLS.l Configure the MPLS tunnel of the static unicast type.l Create forward MPLS tunnels.l Create an E-LSP.l Manage PWs.l Manage tunnel tags and PW labels.

ACL and QoS ManagementACL and QoS management includes the management of the access control list (ACL), qualityof service (QoS), time segments, and hierarchical QoS (HQoS).

In a traditional packet-based network, all packets are treated in the same way. Every router adoptsthe first-in first-out (FIFO) policy to process packets, and makes its best effort to transmit packetsto the destination. The router, however, does not make any commitment to packet transmissionperformance, such as the delay, delay variation (jitter), packet loss rate, and reliability. With therapid development of the computer network, more and more networks are connected to theInternet. In addition, new services are emerging and raise new requirements on the servicecapability of the IP network. Therefore, network-wide end-to-end QoS solutions are called intoattention, which necessitates QoS assurance for services. To achieve so, devices must be ableto apply QoS techniques and provide hierarchical QoS guarantee for different types of servicestreams (especially for those highly sensitive to delay and jitter). For ACL management, youcan perform the following operations on the U2000:l Configure one or more time segments, and associate a time segment with an ACL by

specifying the name of the time segment in the ACL.l Query, modify, create, and delete the ACL of the standard, extended, Layer 2, and user-

defined types.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

QoS management includes filtering packets based on ACL, tagging priorities, limiting trafficand port rate, collecting statistics on traffic, redirecting, and mirroring. On the U2000, you canquery, add, modify, and delete a QoS policy.

HQoS stands for the hierarchical QoS. It not only controls user traffic but also schedules packetsaccording to the priorities of user services. On the U2000, you can query, add, modify, and deletean HQoS policy.

BFD Management

The BFD can quickly check the link status between two devices.

To mitigate the impact of device faults on services and to improve the network availability, anetwork device needs to quickly detect any fault occurring between the device and its adjacentdevices. Actions can then be taken to ensure service continuity. The BFD enables the device tocheck the connectivity of a type of data protocol of the same trail between two systems. The trailcan be a physical or a logical link, including a tunnel. The BFD mechanism is a remedy for theweakness of the existing detection mechanism.

User Security and System Security Management

You can perform the following operations on the U2000:

l Configure user access in PITP mode.

l Configure user access in DHCP option 82 mode.

l Configure user access control.

l Configure system secure access.

Ethernet Connectivity Fault Management

As the Ethernet technology extends from carrier networks to metropolitan area networks(MANs) and wide area networks (WANs), carriers are increasingly concerned about themaintainability of equipment, especially the Ethernet equipment. An imperative demand for theoperation, administration and maintenance (OAM) of transport equipment hence arises. The802.1ag connectivity fault management (CFM) provides a method for detecting faults end-to-end. The Ethernet OAM mechanisms supported by 802.1ag CFM include connectivity check(CC), loopback (LB), link trace (LT), and forward AIS alarms. You can perform the followingoperations on the U2000:

l Manage maintenance domains (MDs). Ethernet CFM divides a network into up to eightlevels. A bridge can span multiple levels to manage different MDs. A CFM MD isconstituted by bridges. An MD is the combination of bridges and maintenance levels. MDscan be classified into three layers: user domain (levels 7-5), service provider domain (levels4-3), and carrier domain (levels 2-0). Different MDs are maintained by differentmanagement entities.

l Manage maintenance associations (MAs). An MD can be divided into multiple MAs. EachMA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. AnMA can be regarded as a combination of an MD and a VLAN. According to the standards,multiple VLANs can map one SI, and one SI maps one MA.

l Manage maintenance points (MPs). An MA consists of MPs defined on the ports of bridges.An MP is a combination of a bridge port, a VLAN, and a maintenance level. MPs areclassified into maintenance association end points (MEPs) and maintenance association

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-7

intermediate points (MIPs). MEPs initiate and respond to CFM messages; MIPstransparently transmit or respond to CFM messages but do not initiate the messages.

Protection Group Management

Protection group management involves the protection switchover and protection group.

Protection switchover: Important board resources and port resources are generally backed up toenhance system reliability. If a fault occurs on a working member, protection switchover willbe triggered to transfer services to the protection member that will continue to handle theservices.

Protection group: You can manage the working member and the protection member in theprotection group. In a protection group, you can manage the relationship between the membersinvolved in the protection switchover, record the status of members, and manage theconfiguration data and status that are involved by the protection relationship between themembers.

With the protection group feature, you can protect the following objects on the U2000:

l Active and standby control boards

l Aggregation groups on active control board and standby control board

l Ports on active and standby control boards

l Upstream Ethernet ports

l Upstream aggregation links of Ethernet ports

l Objects configured with GPON/EPON type B protection

l Objects configured with GPON type C protection

l Objects configured with EPON type D protection

l Objects configured with GPON/EPON type B dual-homing

GPON Service Management

Gigabit passive optical network (GPON) uses the passive optical transmission technology. Itsupports a downstream transmission rate of 2.448 Gbit/s and an upstream transmission rate of1.244 Gbit/s.

GPON service management supports two modes: distributed mode and profile mode. Theequipment and the U2000 support both modes. In the distributed mode, GPON servicemanagement includes the management of the UNI ports, GEM ports, and ONUs. In the profilemode, GPON service management includes the management of the UNI ports and ONUs; in thismode, the GEM port is encapsulated in the line template of the UNI port.

For GPON UNI port management, you can perform the following operations on the U2000:

l Modify the port attributes, such as the minimum reach, maximum reach, configurationstatus of the ONU auto-discovery function, configuration status of the downstream FECfunction, status of the laser switch, and update cycle of the encryption key of the GPONUNI port.

l Enable and disable the ONU auto-discovery function for a GPON UNI port. After the ONUauto-discovery function is enabled, the OLT regularly checks whether any ONUs newlyconnected to the GPON UNI port are online.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Cut over services to implement GPON port backup on the OLT. If the active GPON porton the OLT is faulty, you can switch over the ONU services from the faulty GPON port tothe specified standby GPON port on the OLT.

l Query the alarms of GPON UNI ports. This function allows you to maintain and manageGPON UNI ports according to the details about and suggested solutions for active alarms.

l Enable and disable the laser of a GPON UNI port. By default, the laser of a GPON UNIport is enabled so that the ONUs connected to the GPON UNI port can go online.

l Detect and isolate rogue ONU on a GPON UNI port.l Query the real-time performance statistics and clear the performance statistics.

A GEM port identifies the virtual service channel that carries service streams between theMA5600T or MA5603T and an ONU. An ONU can provision services only after the mappingbetween the GEM port, T-CONT, and service stream is configured on the ONU. For GEM portmanagement, you can perform the following operations on the U2000:l Enable and disable the encryption function. When the encryption function is enabled, the

device encrypts the service stream carried on the GEM port. This feature enhances thesecurity of user data.

l Bind a GEM port to an ONU to establish the mapping between the GEM port on the OLTand the T-CONT on the ONU.

l Limit the rate of packets of a specified priority on a GEM port according to the specifiedtraffic profile.

l Query the real-time performance statistics and clear the performance statistics of a GEMport.

An ONU provides user interfaces. A GPON UNI port can be connected to a maximum of 128ONUs. For GPON ONU management, you can perform the following operations on the U2000:l Add, delete, and modify an ONU.l Generate topological nodes. Perform this operation to generate topological nodes for ONT

management in the topology view.l Locate directly an ONU in the topology view through the topological node.l Activate and deactivate an ONU.l Re-register an ONU. After an online ONU is reset by force, the ONU re-registers with the

OLT to update the registration information about the ONU.l Re-discover an ONU. ONU re-discovery is applicable only to the ONU that adopts the

once-on authentication mode.l Configure the parameters of value-added service (VAS). The VAS feature of the GPON

ONU is used for provisioning VAS, such as the VoIP service.l Upgrade ONUs.l Query the real-time performance statistics of ONUs and clear the performance statistics.

EPON Service ManagementThe Ethernet passive optical network (EPON) is an Ethernet-based passive optical network(PON). It is a new generation broadband access technology, using the point to multi-point(P2MP) structure and the passive optical fiber transmission mode. As a new technology of fiberbroadband access for the "last mile", the PON does not require node devices but only a simpleoptical splitter at the optical branching point. The PON has the following features:l Fewer optical fibers.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-9

l Shared bandwidth between branches.l Less investment in telecommunications rooms.l Higher equipment security.l Faster network deployment.l Lower overall costs for network construction.

The EPON uses the wavelength division multiplexing (WDM) technology for concurrentbidirectional signal transmission. Upstream and downstream signals are transmitted overdifferent wavelengths: upstream uses a 1310 nm wavelength and downstream uses a 1490 nmwavelength. The EPON provisions the voice, data, and video services for users over a singleoptical fiber.

Currently, the EPON supports a maximum symmetric transmission rate of 1.25 Gbit/s inupstream and downstream, and a maximum transmission reach of 20 km. In downstreamdirection, the EPON broadcasts encrypted data to different users; in upstream direction, theEPON employs the time division multiplexing (TDM) technology. In this way, the EPONimplements bandwidth sharing in upstream and downstream directions and accommodates thebandwidth requirements of access users.

EPON service management includes the management of EPON UNI ports and ONUs.

The EPON UNI port is the downstream port for the EPON access. The OLT is connected tovarious types of ONUs, including MDUs, through the UNI port to provision high-speed Internetservice for users. For EPON UNI port management, you can perform the following operationson the U2000:l Modify the attributes of an EPON UNI port, including the alias, ONU auto-discovery

function, the maximum distance between an ONU and the OLT, and the tag attribute ofpackets.

l Display the topology of the optical distribution node (ODN). The EPON UNI port, as anODN, is connected to a remote MDU. With this feature, you can enter the ODN+MDULayer 2 topology view, and view the ODN-centered star topology. In addition, you canadd, delete, and modify the MDU, and configure relevant services.

l Enable and disable an EPON UNI port. The laser of an EPON UNI port is enabled by defaultso that the ONUs connected to the EPON UNI port can go online.

l Enable and disable the ONU auto-discovery function for an EPON UNI port. After theONU auto-discovery function is enabled, the OLT regularly checks whether any ONUsnewly connected to the EPON UNI port go online.

l Cut over services to implement EPON port backup on the OLT. If the active EPON porton the OLT is faulty, you can switch over the ONU services from the faulty EPON port toa specified standby EPON port on the OLT.

l Query the alarms of EPON UNI ports. This function allows you to maintain and manageEPON UNI ports according to the details about and suggested solutions for active alarms.

l Query the real-time performance statistics and clear the performance statistics.

An ONU provides user interfaces. For EPON ONU management, you can perform the followingoperations on the U2000:l Add, delete, and modify an ONU.l Generate topological nodes. Perform this operation to generate topological nodes for ONT

management in the topology view.l Locate directly an ONU in the topology view through the topological node.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Activate and deactivate an ONU.l Re-register an ONU. After an online ONU is reset by force, the ONU re-registers with the

OLT to update the registration information about the ONU.l Re-discover an ONU. ONU re-discovery is applicable only to the ONU that adopts the

once-on authentication mode.l Configure the parameters of value-added service (VAS). The VAS feature of the EPON

ONU is used for provisioning VAS, such as the VoIP service.l Upgrade ONUs.l Query the real-time performance statistics of ONUs and clear the performance statistics.

Multicast Service ManagementMulticast is a point-to-multipoint (P2MP) communication mode in which the source sendsinformation to a specified subset of objects under a network node. Multicast services areapplicable to the streaming media, distance learning, video conferencing, video on demand(VOD), network gaming, data replication, and other P2MP transmission.

Multicast communication uses a class D IP address (224.0.0.0 to 239.255.255.255) as thedestination IP address. A source host sends out a packet that uses a class D IP address as thedestination. If other hosts in the network are interested in the multicast packet, these hosts cansend a request to join the multicast group and receive the packet. The hosts outside of the groupcannot receive the packets sent by the source host.

In controllable multicast, network equipment determines whether a user has the rights to watchprograms by identifying the join or request packets of the user. Then, the access device controlsand forwards the multicast services accordingly.

There are two multicast modes:l IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer.

It is used to manage and control multicast services.l IGMP proxy: In a tree topology, the OLT does not set up routes for forwarding multicast

packets; the OLT only relays and forwards multicast protocol packets. To multicast users,the OLT is a multicast router that implements the router functions defined in the IGMPprotocol. To multicast routers, the OLT is a multicast user.

You can perform the following operations on the U2000 to manage multicast services:l Manage multicast users.l Manage multicast VLANs.l Manage the virtual upstream ports of multicast services.l Manage multicast subtending ports.

Service Provisioning TemplateThe OLT supports the E2E service template to improve the service provisioning efficiency.

Alarm Responsibility DivisionThe alarm responsibility division function helps quickly and accurately identify the possiblecause of an out-of-management alarm of an ONU, such as whether the backbone optical fiberor branch optical fiber is faulty, or the terminal is experiencing a power outage. In this manner,physical visits to the sites of fault can be reduced.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-11

12.2 ONU ManagementFor NE configuration management, the U2000 provides graphical user interfaces (GUIs) forconfiguring NEs and maintaining NE configurations. You can configure services for equipmentin the GUIs.

Device ManagementDevice management includes the management of NE panels, basic and common deviceattributes, clock sources, security, protocols, global configuration of services, and devicetemplates.

NE Panel Management

You can perform the following operations on the U2000:l Display the NE panel by double-clicking an NE.l Query the details of equipment.l Collect statistics on device resources.l Query the information about shelves.l Collect the statistics on shelf resources.l Query inter-shelf links.l Add, delete, start, disable, reset, and confirm a board.l Query the real-time performance statistics on the CPU usage and memory of boards.l Display the port view by double-clicking a board.l Perform an active/standby switchover on the control boards.

Management of Basic and Common Device Attributes

The management of basic and common device attributes includes the query of the globalinformation about devices and the configuration of the global policies of devices.

You can perform the following operations on the U2000:l Query the system information about devices.l Query the statistics on the resources and status of devices.l Query the license information about the functions and resources of devices.l Configure the system time, IP address of a device, and the binding between a Layer 3

interface and an IP address.l Configure the SNMP protocol port.l Set device handshake parameters.l Configure the policy for automatically backing up device data.l Enable and disable the energy-conservation function of a device.l Configure and manage license files.

Clock Source Management

Clock source management includes the management and configuration of equipment-level clocksource information, such as information about the line clock, 1588 clock, and clock priorities.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Security Management

You can perform the following operations on the U2000:l Enable and disable anti-ICMP attack, anti-IP attack, anti-IP spoofing, anti-MAC spoofing,

and anti-DoS attack.l Set the aging time of an MAC address.l Enable and disable MAC address learning.l Configure the security attributes for user login in the CLI.

Protocol Management

You can perform the following operations on the U2000:l Manage the Link Aggregation Control Protocol (LACP), Spanning Tree Protocol (STP)/

Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP),Bidirectional Forwarding Detection (BFD), and Internet Group Management Protocol(IGMP).

l Control the Address Resolution Protocol (ARP) proxy.l Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option

(RAIO) custom format.l Control the Dynamic Host Configuration Protocol (DHCP) option 82 function.l Control the DHCP proxy and DHCP relay forwarding functions.l Configure 802.1ag attributes of the Ethernet packet.

Global Configuration of Services

The global configuration of services includes the configuration of the VLAN, QoS, xDSL, andmulticast services.

Device Template Management

Device template management includes the display of different types of device templates on theU2000. Templates include the GPON template, EPON template, MDU SNMP template, IGMPtemplate, traffic template, VLAN service template, optical transceiver alarm template, and PWtemplate. Currently, the U2000 supports only query and generation of global templates.

Network Interface ManagementNetwork interface management includes the management of GPON ports, EPON ports, Ethernetports, and xDSL bonding groups.

Management of GPON NNI Ports

The GPON network to network interface (NNI) is the upstream port provided by the controlboard. You can perform the following operations on the U2000:l Configure the suppression level of the broadcast, multicast, and unknown unicast packet

traffic.l Configure and query the alarm thresholds of an optical transceiver.l Collect the real-time performance statistics on the number of discarded Ethernet frames,

transmitted Ethernet frames, received Ethernet frames, transmitted GEM frames, receivedGEM frames, transmitted PLOAM messages, received PLOAM messages, transmittedOMC messages, and received OMC messages.

Management of EPON NNI Ports

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-13

EPON NNI is the upstream port provided by the ONU. You can perform the following operationson the U2000:l Configure and query the alarm thresholds of an optical transceiver.l Collect the real-time performance statistics on the number of transmitted frames,

transmitted bytes, received frames, received bytes, received OAMPDU frames, andreceived MPCP frames.

Management of Ethernet Ports

Ethernet port management includes the management of ports and aggregation groups. You canperform the following operations on the U2000:l Configure port attributes.l Create, delete, query, and modify an aggregation group.l Activate and deactivate an Ethernet port.l Collect real-time performance statistics and clear the performance statistics.l Configure the PPPoE, DHCP option 82, 802.3ah ETH OAM loopback, and port rate limit

functions.l Query the attributes of optical transceivers on Ethernet optical ports.

Management of xDSL Bonding Groups

You can perform the following operations on the U2000:l Create, delete, and modify an xDSL bonding group.l Set the upstream PVC value for an xDSL bonding group.

Connection ManagementONU connection management includes the management of service virtual ports.

Service Virtual Port Management

A service virtual port enables user equipment to access the ONU. The service virtual portprovides service streams between the user equipment and the ONU for carrying user services.You can perform the following operations on the U2000:l Query, add, delete, modify, activate, and deactivate a service virtual port.l Collect the real-time performance statistics and clear the performance statistics.l Perform ATM ping tests.l Configure the extended attributes of a service virtual port. Extended attributes allow for

greater flexibility of addressing customer requirements. Extended attributes include themaximum number of learnable MAC addresses, the PPPoE session, the encapsulation type,and the maximum number of MAC addresses that can be bound.

l Configure the connection attributes of a service virtual port, including the alias, VPI/VCI,transmit traffic profile, and receive traffic profile.

l Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtualport. After successful shifting, the service port assumes the new VLAN ID.

l Bind IP addresses to a service virtual port and query the bound IP addresses. To specifythat only the users with certain IP addresses can access the service virtual port, perform thebinding operation. After successful binding, the service forwarding module checks thesource IP address of user packets. If the source IP address does not match any of the IP

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

addresses bound to the service virtual port, the user packets are dropped. Otherwise, theuser packets are forwarded. This ensures the security of user access.

l Bind static MAC addresses to a service virtual port. To specify that only the users withcertain static MAC addresses can access the service virtual port, perform the bindingoperation. After successful binding, the service forwarding module checks the source MACaddress of user packets. If the source MAC address does not match any of the MACaddresses bound to the service virtual port, the user packets are dropped. Otherwise, theuser packets are forwarded. This ensures the security of user access.

l Configure service bundles. If several service virtual ports carry the same service, a servicebundle can be configured to bundle the service streams over the service virtual ports.

Layer 2 Management

Layer 2 management includes the management of the VLAN, the Rapid Spanning Tree Protocol(RSTP), the Multiple Spanning Tree Protocol (MSTP), and the Access Node Control Protocol(ANCP).

VLAN Service Management

VLAN service management includes the management of the standard VLAN, MUX VLAN,smart VLAN, and super VLAN. You can perform the following operations on the U2000:

l Query, add, delete, and modify a VLAN.

l Collect the real-time performance statistics of a VLAN.

l Clear the real-time performance statistics of a VLAN.

l Manage a Layer 3 interface and its subinterfaces.

RSTP Management

You can perform the following operations on the U2000:

l Modify and restore the default value of the trail overheads of a port.

l Collect the RSTP statistics of a port.

l Clear the RSTP statistics of a port.

MSTP Management

MSTP management includes the management of domains, instances, and ports. You can performthe following operations on the U2000:

l Modify and restore the default setting of a domain.

l Add, delete, and modify an instance.

l Modify a port.

l Query the statistics of a port.

ANCP Management

You can perform the following operations on the U2000:

l Add, delete, modify, enable, and disable an ANCP session.

l Query the real-time status of an ANCP session.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-15

Layer 3 ManagementLayer 3 management includes the management of the Dynamic Host Configuration Protocol(DHCP), Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge(PWE3), and Layer 3 routes.

DHCP Management

DHCP management includes the management of the DHCP server group, MAC addresssegment, standard mode, DHCP domain, and VLAN L3 interface. You can perform thefollowing operations on the U2000:l Query, add, delete, and modify a DHCP server group.l Query, add, delete, and modify a MAC address segment.l Query, enable, disable, and modify a standard mode.l Query, add, delete, and modify a DHCP domain.l Modify a VLAN Layer 3 interface.

MPLS/PWE3 Management

The MPLS is a transmission technology. It implements transparent transmission of data packetsbetween users. The MPLS tunnel is defined in the MPLS protocol. Independent of a service, anMPLS tunnel implements end-to-end transmission and carries service-related PWs.

You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000:l Configure the basic attributes of the MPLS.l Configure the MPLS tunnel of the static unicast type.l Create forward MPLS tunnels.l Create an E-LSP.l Manage PWs.l Manage tunnel tags and PW label.

ACL and QoS ManagementACL and QoS management includes the management of the access control list (ACL), qualityof service (QoS), and time segments.

In a traditional packet-based network, all packets are treated in the same way. Every router adoptsthe first-in first-out (FIFO) policy to process packets, and makes its best effort to transmit packetsto the destination. The router, however, does not make any commitment to packet transmissionperformance, such as the delay, delay variation (jitter), packet loss rate, and reliability. With therapid development of the computer network, more and more networks are connected to theInternet. In addition, new services are emerging and raise new requirements on the servicecapability of the IP network. Therefore, network-wide end-to-end QoS solutions are called intoattention, which necessitates QoS assurance for services. To achieve so, devices must be ableto apply QoS techniques and provide hierarchical QoS guarantee for different types of servicestreams (especially for those highly sensitive to delay and jitter). For ACL management, youcan perform the following operations on the U2000:l Configure one or more time segments, and associate a time segment with an ACL by

specifying the name of the time segment in the ACL.l Query, modify, create, and delete the ACL of the standard, extended, Layer 2, and user-

defined types.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

QoS management includes filtering packets based on ACL, tagging priorities, limiting trafficand port rate, collecting statistics on traffic, redirecting, and mirroring. On the U2000, you canquery, add, modify, and delete a QoS policy.

User Security and System Security Management

You can perform the following operations on the U2000:

l Configure user access in PITP mode.

l Configure user access in DHCP option 82 mode.

l Configure user access control.

l Configure system secure access.

l Manage BFD sessions.

BFD Management

The BFD mechanism can quickly check the link status between two devices.

To mitigate the impact of device faults on services and to improve the network availability, anetwork device needs to quickly detect any fault occurring between the device and its adjacentdevices. Actions can then be taken to ensure service continuity. The BFD enables the device tocheck the connectivity of a type of data protocol of the same trail between two systems. The trailcan be a physical or a logical link, including a tunnel. The BFD mechanism is a remedy for theweakness of the existing detection mechanism.

Ethernet Connectivity Fault Management

As the Ethernet technology extends from carrier networks to metropolitan area networks(MANs) and wide area networks (WANs), carriers are increasingly concerned about themaintainability of equipment, especially the Ethernet equipment. An imperative demand for theoperation, administration and maintenance (OAM) of transport equipment hence arises. WithinEthernet technology, the 802.1ag connectivity fault management (CFM) provides a method fordetecting faults end-to-end. The Ethernet OAM mechanisms supported by 802.1ag CFM includeconnectivity check (CC), loopback (LB), link trace (LT), and forward AIS alarms. You canperform the following operations on the U2000:

l Manage maintenance domains (MDs). Ethernet CFM divides a network into up to eightlevels. A bridge can span multiple levels to manage different MDs. A CFM MD isconstituted by bridges. An MD is the combination of bridges and maintenance levels. MDscan be classified into three layers: user domain (levels 7-5), service provider domain (levels4-3), and carrier domain (levels 2-0). Different MDs are maintained by differentmanagement entities.

l Manage maintenance associations (MAs). An MD can be divided into multiple MAs. EachMA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. AnMA can be regarded as a combination of an MD and a VLAN. According to the standards,multiple VLANs can map one SI, and one SI maps one MA.

l Manage maintenance points (MPs). An MA consists of MPs defined on the ports of bridges.An MP is a combination of a bridge port, a VLAN, and a maintenance level. MPs areclassified into maintenance association end points (MEPs) and maintenance associationintermediate points (MIPs). MEPs initiate and respond to CFM messages; MIPstransparently transmit or respond to CFM messages but do not initiate the messages.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-17

xDSL Service ManagementxDSL service management includes the management of the asymmetrical digital subscriber loop(ADSL), ADSL2+, ATM global single-pair high-speed digital subscriber line (G.SHDSL), andvery high speed digital subscriber lines 2 (VDSL2) services. The features of these services areas follows:

ADSL Service Management

ADSL is a technology for providing the asymmetric and high-speed private line access serviceover common twisted pairs. The ADSL supports the asymmetrical transmission in the upstreamand downstream directions, which is suitable for the user data access service and can providehigh-speed data transmission channels for users. The ADSL2+ is an extension of the ADSLtechnology. It supports a maximum transmission rate of 24 Mbit/s and 2.5 Mbit/s in thedownstream and upstream respectively and a maximum transmission distance of 6.5 km. Youcan perform the following operations on the U2000:l Activate and deactivate a port.l Perform and cancel a loopback.l Deactivate a port and then activate it again to initialize the port.l Reconfigure port attributes.l Configure the port attributes, such as the associated line template, alarm template, extended

template, and monitoring thresholds. These attributes are used to activate the ADSL port.l Query the real-time and history performance statistics.

G.SHDSL Service Management

G.SHDSL is a technology for providing a high-rate symmetrical data service over one or twotwisted pairs. The 2-wire, 4-wire, 6-wire, and 8-wire G.SHDSL access services are supportedto allow for a transmission distance ranging from 3 km to 6 km. The rates of the 2-wire, 4-wire,6-wire, and 8-wire G.SHDSL lines range from 192 kbit/s to 5696 kbit/s, 384 kbit/s to 4608 kbit/s, 576 kbit/s to 17088 kbit/s, and 768 kbit/s to 22784 kbit/s respectively. You can perform thefollowing operations on the U2000:l Activate and deactivate a port.l Maintain a port.l Bind and unbind a port. You can bind multiple ATM G.SHDSL ports. This increases the

bandwidth at the physical layer and improves the rate of the ATM G.SHDSL port.l Configure port attributes, such as the associated line profile and alarm profile. These

attributes are used to activate the ATM G.SHDSL port.l Query the real-time performance statistics.

VDSL2 Service Management

VDSL2 is an extension of the VDSL technology. It provides high-speed private line access inthe symmetrical or asymmetrical mode over common twisted pairs. VDSL2 supports a highbandwidth with symmetric rates of up to 100 Mbit/s and multiple spectrum template andencapsulation modes. Based on these features, it provides short-distance and high-speed accesssolutions to the next generation broadband access scenarios. You can perform the followingoperations on the U2000:l Activate and deactivate a port.l Perform and cancel a loopback.l Deactivate a port and then activate it again to initialize a port.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Reconfigure port attributes.

l Configure the port attributes, such as the associated line profile, alarm profile, extendedprofile, and monitoring thresholds of a VDSL2 port. These attributes are used to activatethe VDSL2 port.

l Query the real-time and history performance statistics.

Ethernet Access Management

Ethernet access management includes the management of ports and aggregation groups. Youcan perform the following operations on the U2000:

l Configure port attributes.

l Create, delete, query, and modify an aggregation group.

l Activate and deactivate an Ethernet port.

l Collect real-time performance statistics and clear the performance statistics.

l Control the PPPoE, DHCP Option 82, 802.3ah ETH OAM loopback, and port rate limitfunctions.

l Query the attributes of optical transceivers for Ethernet optical ports.

Multicast Service Management

Multicast is a point-to-multipoint (P2MP) communication mode in which the source sendsinformation to a specified subset of objects under a network node. Multicast services areapplicable to the streaming media, distance learning, video conferencing, video on demand(VOD), network gaming, data replication, and other P2MP transmission.

Multicast communication uses a class D IP address (224.0.0.0 to 239.255.255.255) as thedestination IP address. A source host sends out a packet that uses a class D IP address as thedestination. If other hosts in the network are interested in the multicast packet, these hosts cansend a request to join the multicast group and receive the packet. The hosts outside of the groupcannot receive the packets sent by the source host.

In controllable multicast, network equipment determines whether a user has the rights to watchprograms by identifying the join or request packets of the user. Then, the access device controlsand forwards the multicast services accordingly.

There are two multicast modes:

l IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer.It is used to manage and control multicast services.

l IGMP proxy: In a tree topology, the OLT does not set up routes for forwarding multicastpackets; the OLT only relays and forwards multicast protocol packets. To multicast users,the OLT is a multicast router that implements the router functions defined in the IGMPprotocol. To multicast routers, the OLT is a multicast user.

You can perform the following operations on the U2000 to manage multicast services:

l Manage multicast users.

l Manage multicast VLANs.

l Manage the virtual upstream ports of multicast services.

l Manage multicast subtending ports.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-19

Narrowband Service ManagementNarrowband service management includes the management of the media gateway (MG),signaling gateway (SG), POTS ports, and IP ports.

MG Management

In the next generation network (NGN), the media gateway (MG) and the media gatewaycontroller (MGC) are separated. That is, the functions of the user plane are separated from thefunctions of the control plane. The messages of the user plane interact with each other by usingthe MG and the messages of the control plane interact with each other by using the MGC. AnMG device consists of the MG, MGC, digital signal processor (DSP) management, and ringingmapping. You can perform the following operations on the U2000:l Manage MGsl Manage MGCsl Manage ringing mappingl Manage DSP channels

SG Management

Signaling gateway (SG) management includes the management of signaling gateways andassociations. An SG is a part for signaling interaction. An SG is a signaling proxy for receivingand transmitting signaling messages between the No.7 signaling network and the IP network.An SCTP association provides data transmission for the transfer of the protocol data unit of oneor more ports.

VoIP PSTN Port Management

The public switched telephone network (PSTN) is a communication network that providestelephone services for public users over analog subscriber lines. It is also called plain oldtelephone service (POTS).

Voice over IP (VoIP) is a communication mode for delivery of voice and data over InternetProtocol (IP) networks. In the VoIP technology, voice information is transmitted in digital formin discrete packets rather than through the traditional circuit-oriented protocols of PSTN.

The VoIP PSTN service is provided through the VoIP PSTN ports on the voice service boardof an ONU. A gateway is established on the ONU between the PSTN network and the IP network.

You can perform the following operations on the U2000:l Configure and modify port attributes.l Enable and disable services.l Perform and cancel a loopback.l Reset a port.l Collect the real-time performance statistics.

VoIP ISDN BRA Port Management

ISDN basic rate access (BRA) is the basic rate interface (BRI) and user-network interfaceprovided by the ONU. The BRI supports a transmission rate of 44 kbit/s and provides 2 Bchannels for carrying services and 1 D channel for transmitting the call control signaling andmaintaining the management signaling. The rate of B channels is 64 kbit/s and the rate of Dchannel is 16 kbit/s. In the upstream direction, the ONU transmits the ISDN service to the NGNnetwork in IP networking mode. The ISDN service is called the VoIP ISDN BRA service. Youcan perform the following operations on the U2000:

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure and modify port attributes.l Enable and disable services.l Perform and cancel a loopback.l Activate and deactivate a port.l Reset a port.l Query the statistics on the usage of MG ports and collect the number of VoIP ISDN BRA

ports by port status.l Configure the alarm threshold of Layer 2 signaling errors.l Collect the real-time performance statistics.

VoIP ISDN PRA Port Management

ISDN primary rate access (PRA) is the primary rate interface (PRI) and user-network interfaceprovided by the ONU. The PRI supports a transmission rate of 2.048 Mbit/s and provides 30 Bchannels and 1 D channel. The rates of the B channel and D channel are 64 kbit/s. In the upstreamdirection, the ONU transmits the ISDN service to the NGN network in IP networking mode. TheISDN service is called the VoIP ISDN PRA service. You can perform the following operationson the U2000:l Configure and modify port attributes.l Enable and disable services.l Perform and cancel a loopback.l Query the statistics on the usage of MG ports and collect the number of VoIP ISDN PRA

ports by port status.l Configure the alarm threshold of Layer 2 signaling errors.l Query the timeslots that are occupied by a specified VoIP ISDN PRA port.

Sheet-based Predeployment Management

The U2000 provides the sheet-based predeployment solution which enables you to import devicedata to the U2000 in batches. This solution provides for plug-and-play (PnP) of equipment,implements software-commissioning-free and requires only one site visit. Therefore, thissolution improves deployment efficiency and reduces network construction cost, and at the sametime allows for concurrent offline configuration and on-site construction. Sheet-basedpredeployment has the following features:l Offline deployment by importing a predeployed sheetl Automatic upgrade of NE softwarel Automatic issuing of configuration data

Plug-and-Play Feature Management

When an MDU is faulty, it is essential to locate the fault and recover services quickly. It is,however, time-consuming to locate and troubleshoot an internal fault of the MDU. Therefore,faulty MDUs are directly replaced, and are stored and repaired later in a centralized manner.

Solution limitations:l The versions of the MDUs of the same type in the entire network must be the same.l The configuration data of the MDUs must be backed up periodically to safeguard the data.

iManager U2000 Unified Network Management SystemProduct Description 12 FTTx Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

12-21

l Only one MDU can go offline and one MDU be automatically discovered during automaticreplacement.

Solution implementation procedure:

l 1. Back up the configuration data as required by using the DC component.

l 2. Replace the MDU that encounters a severe hardware fault.

l 3. The hardware installation engineer replaces the faulty MDU with a new MDU andfurnishes the maintenance engineer with the identification information about the newMDU.

l 4. The maintenance engineer modifies the authentication information about the MDU onthe U2000, starts the automatic upgrade of the NE software by using the DC component,and loads the configuration file to the MDU.

Solution benefit:

l The MDU implements PnP and is replaced quickly.

l The configuration data is restored quickly.

MDU replacement methods:

l Manual replacement based on a MAC address (EPON) or SN (GPON)

l Automatic replacement based on the key or password

l Automatic one-to-one replacement based on the MAC address

Remote Acceptance

To achieve one site visit and reduce the O&M cost in FTTx network construction, the deployedONUs must support remote acceptance. With the FTTx PnP solution, you can perform thefollowing acceptance operations:

l Narrowband emulation acceptance, to check whether the voice links are in the normal stateby using the call emulation test.

l PPPoE dialup emulation acceptance, to check whether the links for Internet access are inthe normal state.

ONT Automatic Bulk Upgrade

An FTTH network is deployed with a large number of ONTs. When the ONTs are upgraded,the following problems may occur:

l The range of ONTs to be upgraded cannot be determined when ONTs are added to thenetwork during service provisioning.

l

l The online status of ONTs in user premises cannot be confirmed.

The U2000 provides the automatic offline bulk upgrade solution for ONTs. You can performthe following operations on the U2000:

l Upgrade ONTs in batches.

l Upgrade ONTs automatically by creating a periodic upgrade task.

l Upgrade offline ONTs automatically when the ONTs go online.

12 FTTx Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

12-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

13 MSAN Network Feature Management

About This Chapter

This topic describes the functions and features of MSAN NE management and networkmanagement.

13.1 MSAN ManagementFor NE configuration management, the U2000 provides graphical user interfaces (GUIs) forconfiguring NEs and maintaining NE configurations. You can configure services for equipmentin the GUIs.

iManager U2000 Unified Network Management SystemProduct Description 13 MSAN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

13-1

13.1 MSAN ManagementFor NE configuration management, the U2000 provides graphical user interfaces (GUIs) forconfiguring NEs and maintaining NE configurations. You can configure services for equipmentin the GUIs.

Device ManagementDevice management includes the management of NE panels, basic and common deviceattributes, clock sources, security, protocols, global configuration of services, and devicetemplates.

NE Panel Management

You can perform the following operations on the U2000:l Display the NE panel by double-clicking an NE.l Query the details of equipment.l Collect statistics on device resources.l Query the information about shelves.l Collect the statistics on shelf resources.l Query inter-shelf links.l Add, delete, start, disable, reset, and confirm a board.l Query the real-time performance statistics on the CPU usage and memory of boards.l Display the port view by double-clicking a board.l Perform an active/standby switchover on the control boards.

Management of Basic and Common Device Attributes

The management of basic and common device attributes includes the query of the globalinformation about devices and the configuration of the global policies of devices.

You can perform the following operations on the U2000:l Query the system information about devices.l Query the statistics on the resources and status of devices.l Query the license information about the functions and resources of devices.l Configure the system time, IP address of a device, and the binding between a Layer 3

interface and an IP address.l Configure the SNMP protocol port.l Set device handshake parameters.l Configure the policy for automatically backing up device data.l Enable and disable the energy-conservation function of a device.l Configure and manage license files.

Clock Source Management

Clock source management includes the management and configuration of equipment-level clocksource information, such as information about the line clock, 1588 clock, and clock priorities.

13 MSAN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

13-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Security Management

You can perform the following operations on the U2000:l Enable and disable anti-ICMP attack, anti-IP attack, anti-IP spoofing, anti-MAC spoofing,

and anti-DoS attack.l Set the aging time of a MAC address.l Enable and disable MAC address learning.l Configure the security attributes for user login in the CLI.

Protocol Management

You can perform the following operations on the U2000:l Manage the Link Aggregation Control Protocol (LACP), Spanning Tree Protocol (STP)/

Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP),Bidirectional Forwarding Detection (BFD), and Internet Group Management Protocol(IGMP).

l Control the Address Resolution Protocol (ARP) proxy.l Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option

(RAIO) custom format.l Control the Dynamic Host Configuration Protocol (DHCP) option 82 function.l Control the DHCP proxy and DHCP relay forwarding functions.l Configure 802.1ag attributes of the Ethernet packet.

Global Configuration of Services

The global configuration of services includes the configuration of the VLAN, QoS, xDSL, andmulticast services.

Device Template Management

Device template management includes the display of different types of device templates on theU2000. Templates include the IGMP template, traffic template, VLAN service template, andPW template. Currently, the U2000 supports only query and generation of global templates.

Network Interface ManagementNetwork interface management includes the management and maintenance of E1/T1 ports andthe Ethernet port.

Management and Maintenance of E1/T1 Ports

E1/T1 ports are classified into TDM E1/T1 ports, CES E1/T1 ports, and IMA E1/T1 ports.

TDM E1/T1 ports can be used as access ports or upstream ports, depending on the functions ofthe boards.

On E1 ports for upstream transmission, you can perform only the loopback operation.

On E1 ports for PRA access, you can perform the following operations: configure or delete portattributes, set the alarm threshold of L2 signaling bit errors, query timeslots, and enable or disableservices.

On CES E1/T1 ports, you can collect real-time performance statistics of ports, configure the portattributes, set port alias, and perform loopback.

iManager U2000 Unified Network Management SystemProduct Description 13 MSAN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

13-3

On IMA E1/T1 ports, you can query real-time performance statistics of the ports, and manageIMA groups and IMA links, including adding, deleting, modifying, resetting, blocking, andunblocking an IMA group or link.

Management of Ethernet Ports

Ethernet port management includes the management of ports and aggregation groups. You canperform the following operations on the U2000:l Configure port attributes.l Create, delete, query, and modify an aggregation group.l Activate and deactivate an Ethernet port.l Collect real-time performance statistics and clear the performance statistics.l Configure the PPPoE, DHCP option 82, 802.3ah ETH OAM loopback, and port rate limit

functions.l Query the attributes of optical transceivers for Ethernet optical ports.

Connection Management

Connection management includes the management of service virtual ports and CESoPconnections.

Service Virtual Port Management

A service virtual port enables user equipment to access the OLT. The service virtual port providesservice streams between the user equipment and the OLT for carrying user services. You canperform the following operations on the U2000:l Query, add, delete, modify, activate, and deactivate a service virtual port.l Collect the real-time performance statistics and clear the performance statistics.l Perform ATM ping tests.l Configure the extended attributes of a service virtual port. Extended attributes allow for

greater flexibility of addressing customer requirements. Extended attributes include themaximum number of learnable MAC addresses, the PPPoE session, the encapsulation type,and the maximum number of MAC addresses that can be bound.

l Configure the connection attributes of a service virtual port, including the alias, VPI/VCI,transmit traffic profile, and receive traffic profile.

l Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtualport. After successful shifting, the service port assumes the new VLAN ID.

l Bind IP addresses to a service virtual port and query the bound IP addresses. To specifythat only the users with certain IP addresses can access the service virtual port, perform thebinding operation. After successful binding, the service forwarding module checks thesource IP address of user packets. If the source IP address does not match any of the IPaddresses bound to the service virtual port, the user packets are dropped. Otherwise, theuser packets are forwarded. This ensures the security of user access.

l Bind static MAC addresses to a service virtual port. To specify that only the users withcertain static MAC addresses can access the service virtual port, perform the bindingoperation. After successful binding, the service forwarding module checks the source MACaddress of user packets. If the source MAC address does not match any of the MACaddresses bound to the service virtual port, the user packets are dropped. Otherwise, theuser packets are forwarded. This ensures the security of user access.

13 MSAN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

13-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure service bundles. If several service virtual ports carry the same service, a servicebundle can be configured to bundle the service streams over the service virtual ports.

Management of CESoP Connection Management

The circuit emulation service over packet (CESoP) simulates circuit emulation services overpackets. After the CESoP connection is set up and the required service stream is created, thecommunication over the CESoP E1 line is successful.

Layer 2 Management

Layer 2 management includes the management of the VLAN, the Rapid Spanning Tree Protocol(RSTP), Multiple Spanning Tree Protocol (MSTP), Access Node Control Protocol (ANCP), andRapid Ring Protection Protocol (RRPP).

VLAN Service Management

VLAN service management includes the management of the standard VLAN, MUX VLAN,smart VLAN, and super VLAN. You can perform the following operations on the U2000:

l Query, add, delete, and modify a VLAN.

l Collect the real-time performance statistics of a VLAN.

l Clear the real-time performance statistics of a VLAN.

l Manage a Layer 3 interface and its subinterfaces.

RSTP Management

You can perform the following operations on the U2000:

l Modify and restore the default value of the trail overheads of a port.

l Collect the RSTP statistics of a port.

l Clear the RSTP statistics of a port.

MSTP Management

MSTP management includes the management of domains, instances, and ports. You can performthe following operations on the U2000:

l Modify and restore the default setting of a domain.

l Add, delete, and modify an instance.

l Modify a port.

l Query the statistics of a port.

ANCP Management

You can perform the following operations on the U2000:

l Add, delete, modify, enable, and disable an ANCP session.

l Query the real-time status of an ANCP session.

RRPP Management

For RRPP management, you can perform the query, add, delete, and modify operations.

iManager U2000 Unified Network Management SystemProduct Description 13 MSAN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

13-5

Layer 3 ManagementLayer 3 management includes the management of the Dynamic Host Configuration Protocol(DHCP), Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge(PWE3), and Layer 3 routes.

DHCP Management

DHCP management includes the management of the DHCP server group, MAC addresssegment, standard mode, DHCP domain, and VLAN L3 interface. You can perform thefollowing operations on the U2000:l Query, add, delete, and modify a DHCP server group.l Query, add, delete, and modify a MAC address segment.l Query, enable, disable, and modify a standard mode.l Query, add, delete, and modify a DHCP domain.l Modify a VLAN Layer 3 interface.

MPLS PWE3 Management

The MPLS is a transmission technology. It implements transparent transmission of data packetsbetween users. The MPLS tunnel is defined in the MPLS protocol. Independent of a service, anMPLS tunnel implements end-to-end transmission and carries service-related PWs.

You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000:l Configure the basic attributes of the MPLS.l Configure the MPLS tunnel of the static unicast type.l Create forward MPLS tunnels.l Create an E-LSP.l Manage PWs.l Manage tunnel tags and PW labels.

ACL and QoS ManagementACL and QoS management includes the management of the access control list (ACL), qualityof service (QoS), time segments, and hierarchical QoS (HQoS).

In a traditional packet-based network, all packets are treated in the same way. Every router adoptsthe first-in first-out (FIFO) policy to process packets, and makes its best effort to transmit packetsto the destination. The router, however, does not make any commitment to packet transmissionperformance, such as the delay, delay variation (jitter), packet loss rate, and reliability. With therapid development of the computer network, more and more networks are connected to theInternet. In addition, new services are emerging and raise new requirements on the servicecapability of the IP network. Therefore, network-wide end-to-end QoS solutions are called intoattention, which necessitates QoS assurance for services. To achieve so, devices must be ableto apply QoS techniques and provide hierarchical QoS guarantee for different types of servicestreams (especially for those highly sensitive to delay and jitter). For ACL management, youcan perform the following operations on the U2000:l Configure one or more time segments, and associate a time segment with an ACL by

specifying the name of the time segment in the ACL.l Query, modify, create, and delete the ACL of the standard, extended, Layer 2, and user-

defined types.

13 MSAN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

13-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

QoS management includes filtering packets based on ACL, tagging priorities, limiting trafficand port rate, collecting statistics on traffic, redirecting, and mirroring. On the U2000, you canquery, add, modify, and delete a QoS policy.

HQoS stands for the hierarchical QoS. It not only controls user traffic but also schedules packetsaccording to the priorities of user services. On the U2000, you can query, add, modify, and deletean HQoS policy.

User Security and System SecurityYou can perform the following operations on the U2000:l Configure user access in PITP mode.l Configure user access in DHCP option 82 mode.l Configure user access control.l Configure system secure access.l Manage BFD sessions.

Ethernet Connectivity Fault ManagementAs the Ethernet technology extends from carrier networks to metropolitan area networks(MANs) and wide area networks (WANs), carriers are increasingly concerned about themaintainability of equipment, especially the Ethernet equipment. An imperative demand for theoperation, administration and maintenance (OAM) of transport equipment hence arises. WithinEthernet technology, the 802.1ag connectivity fault management (CFM) provides a method fordetecting faults end-to-end. The Ethernet OAM mechanisms supported by 802.1ag CFM includeconnectivity check (CC), loopback (LB), link trace (LT), and forward AIS alarms. You canperform the following operations on the U2000:l Manage maintenance domains (MDs). Ethernet CFM divides a network into up to eight

levels. A bridge can span multiple levels to manage different MDs. A CFM MD isconstituted by bridges. An MD is the combination of bridges and maintenance levels. MDscan be classified into three layers: user domain (levels 7-5), service provider domain (levels4-3), and carrier domain (levels 2-0). Different MDs are maintained by differentmanagement entities.

l Manage maintenance associations (MAs). An MD can be divided into multiple MAs. EachMA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. AnMA can be regarded as a combination of an MD and a VLAN. According to the standards,multiple VLANs can map one SI, and one SI maps one MA.

l Manage maintenance points (MPs). An MA consists of MPs defined on the ports of bridges.An MP is a combination of a bridge port, a VLAN, and a maintenance level. MPs areclassified into maintenance association end points (MEPs) and maintenance associationintermediate points (MIPs). MEPs initiate and respond to CFM messages; MIPstransparently transmit or respond to CFM messages but do not initiate the messages.

Protection Group ManagementProtection group management involves the protection switchover and protection group.

Protection switchover: Important board resources and port resources are generally backed up toenhance system reliability. If a fault occurs on a working member, protection switchover willbe triggered to transfer services to the protection member that will continue to handle theservices.

iManager U2000 Unified Network Management SystemProduct Description 13 MSAN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

13-7

Protection group: You can manage the working member and the protection member in theprotection group. In a protection group, you can manage the relationship between the membersinvolved in the protection switchover, record the status of members, and manage theconfiguration data and status that are involved by the protection relationship between themembers.

With the protection group feature, you can protect the following objects on the U2000:

l Active and standby control boards

l Aggregation groups on active control board and standby control board

l Ports on active and standby control boards

l Upstream Ethernet ports

l Upstream aggregation links of Ethernet ports

xDSL Service Management

xDSL service management includes the management of the asymmetrical digital subscriber loop(ADSL), ADSL2+, ATM global single-pair high-speed digital subscriber line (G.SHDSL), andvery high speed digital subscriber lines 2 (VDSL2) services. The features of these services areas follows:

ADSL Service Management

ADSL is a technology for providing the asymmetric and high-speed private line access serviceover common twisted pairs. ADSL supports the asymmetrical transmission in the upstream anddownstream directions, which is suitable for the user data access service and can provide high-speed data transmission channels for users. ADSL2+ is an extension of the ADSL technology.It supports a maximum transmission rate of 24 Mbit/s and 2.5 Mbit/s in the downstream andupstream respectively and a maximum transmission distance of 6.5 km. You can perform thefollowing operations on the U2000:

l Activate and deactivate a port.

l Perform and cancel a loopback.

l Deactivate a port and then activate it again to initialize the port.

l Reconfigure port attributes.

l Configure the port attributes, such as the associated line template, alarm template, extendedtemplate, and monitoring thresholds. These attributes are used to activate the ADSL port.

l Query the real-time and history performance statistics.

G.SHDSL Service Management

G.SHDSL is a technology for providing a high-rate symmetrical data service over one or twotwisted pairs. The 2-wire, 4-wire, 6-wire, and 8-wire G.SHDSL access services are supportedto allow for a transmission distance ranging from 3 km to 6 km. The rates of the 2-wire, 4-wire,6-wire, and 8-wire G.SHDSL lines range from 192 kbit/s to 5696 kbit/s, 384 kbit/s to 4608 kbit/s, 576 kbit/s to 17088 kbit/s, and 768 kbit/s to 22784 kbit/s respectively. You can perform thefollowing operations on the U2000:

l Activate and deactivate a port.

l Perform and cancel a loopback.

l Bind and unbind a port. You can bind multiple ATM G.SHDSL ports. This increases thebandwidth at the physical layer and improves the rate of the ATM G.SHDSL port.

13 MSAN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

13-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure port attributes, such as the associated line profile and alarm profile. Theseattributes are used to activate the ATM G.SHDSL port.

l Query the real-time performance statistics.

VDSL2 service Management

VDSL2 is an extension of the VDSL technology. It provides high-speed private line access inthe symmetrical or asymmetrical mode over common twisted pairs. VDSL2 supports a highbandwidth with symmetric rates of up to 100 Mbit/s and multiple spectrum template andencapsulation modes. Based on these features, it provides short-distance and high-speed accesssolutions to the next generation broadband access scenarios. You can perform the followingoperations on the U2000:l Activate and deactivate a port.l Perform and cancel a loopback.l Deactivate a port and then activate it again to initialize a port.l Reconfigure port attributes.l Configure the port attributes, such as the associated line profile, alarm profile, extended

profile, and monitoring thresholds of a VDSL2 port. These attributes are used to activatethe VDSL2 port.

l Query the real-time and history performance statistics.

Multicast Service ManagementMulticast is a point-to-multipoint (P2MP) communication mode in which the source sendsinformation to a specified subset of objects under a network node. Multicast services areapplicable to the streaming media, distance learning, video conferencing, video on demand(VOD), network gaming, data replication, and other P2MP transmission.

Multicast communication uses a class D IP address (224.0.0.0 to 239.255.255.255) as thedestination IP address. A source host sends out a packet that uses a class D IP address as thedestination. If other hosts in the network are interested in the multicast packet, these hosts cansend a request to join the multicast group and receive the packet. The hosts outside of the groupcannot receive the packets sent by the source host.

In controllable multicast, network equipment determines whether a user has the rights to watchprograms by identifying the join or request packets of the user. Then, the access device controlsand forwards the multicast services accordingly.

There are two multicast modes:l IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer.

It is used to manage and control multicast services.l IGMP proxy: In a tree topology, the OLT does not set up routes for forwarding multicast

packets; the OLT only relays and forwards multicast protocol packets. To multicast users,the OLT is a multicast router that implements the router functions defined in the IGMPprotocol. To multicast routers, the OLT is a multicast user.

You can perform the following operations on the U2000 to manage multicast services:l Manage multicast users.l Manage multicast VLANs.l Manage the virtual upstream ports of multicast services.l Manage multicast subtending ports.

iManager U2000 Unified Network Management SystemProduct Description 13 MSAN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

13-9

MG ManagementIn the next generation network (NGN), the media gateway (MG) and the media gatewaycontroller (MGC) are separated. That is, the functions of the user plane are separated from thefunctions of the control plane. The messages of the user plane interact with each other by usingthe MG and the messages of the control plane interact with each other by using the MGC. AnMG device consists of the MG, MGC, digital signal processor (DSP) management, and ringingmapping. You can perform the following operations on the U2000:l Manage MGs.l Manage MGCs.l Manage ringing mapping.l Manage DSP channels.

SG ManagementSignaling gateway (SG) management includes the management of signaling gateways andassociations. An SG is a part for signaling interaction. AN SG is a signaling proxy for receivingand transmitting signaling messages between the No.7 signaling network and the IP network.An SCTP association provides data transmission for the transfer of the protocol data unit of oneor more ports.

Narrowband VoIP Service ManagementNarrowband VoIP service management includes the management of the MG, SG, POTS ports,and IP ports.

VoIP PSTN Port Management

The public switched telephone network (PSTN) is a communication network that providestelephone services for public users over analog subscriber lines. It is also called plain oldtelephone service (POTS).

Voice over IP (VoIP) is a communication mode for delivery of voice and data over InternetProtocol (IP) networks. In the VoIP technology, voice information is transmitted in digital formin discrete packets rather than through the traditional circuit-oriented protocols of PSTN.

The VoIP PSTN service is provided through the VoIP PSTN ports on the voice service boardof an ONU. A gateway is established on the ONU between the PSTN network and the IP network.

You can perform the following operations on the U2000:l Configure and modify port attributes.l Enable and disable services.l Perform and cancel a loopback.l Reset a port.l Collect the real-time performance statistics.

VoIP ISDN BRA Port Management

ISDN basic rate access (BRA) is the basic rate interface (BRI) and user-network interfaceprovided by the ONU. The BRI supports a transmission rate of 44 kbit/s and provides 2 Bchannels for carrying services and 1 D channel for transmitting the call control signaling andmaintaining the management signaling. The rate of B channels is 64 kbit/s and the rate of Dchannel is 16 kbit/s. In the upstream direction, the ONU transmits the ISDN service to the NGN

13 MSAN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

13-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

network in IP networking mode. The ISDN service is called the VoIP ISDN BRA service. Youcan perform the following operations on the U2000:l Configure and modify port attributes.l Enable and disable services.l Perform and cancel a loopback.l Activate and deactivate a port.l Reset a port.l Query the statistics on the usage of MG ports and collect the number of VoIP ISDN BRA

ports by port status.l Configure the alarm threshold of Layer 2 signaling errors.l Collect the real-time performance statistics.

VoIP ISDN PRA Port Management

ISDN primary rate access (PRA) is the primary rate interface (PRI) and user-network interfaceprovided by the ONU. The PRI supports a transmission rate of 2.048 Mbit/s and provides 30 Bchannels and 1 D channel. The rates of the B channel and D channel are 64 kbit/s. In the upstreamdirection, the ONU transmits the ISDN service to the NGN network in IP networking mode. TheISDN service is called the VoIP ISDN PRA service. You can perform the following operationson the U2000:l Configure and modify port attributes.l Enable and disable services.l Perform and cancel a loopback.l Query the statistics on the usage of MG ports and collect the number of VoIP ISDN PRA

ports by port status.l Configure the alarm threshold of Layer 2 signaling errors.l Query the timeslots that are occupied by a specified VoIP ISDN PRA port.

V5 Voice Service ManagementV5 voice service management includes the management of V5 interfaces, service ports, semi-permanent connections (SPCs), VFB boards, ATI boards, and CDI boards.

V5 Interface Management

The V5 interface is a standard digital interface between the access network (AN) and the localexchange (LE). The V5 interface supports the access of abundant integrated services. In addition,it separates accesses and services to optimize the network organization. You can perform thefollowing operations on the U2000:l Manage the attributes of V5 interfaces.l Restart the PSTN protocol on the V5 interface.l Switch over the logical communication channels of a specified V5 interface for protection.l Manage 2M links.l Manage communication channels.l Manage ISDN communication channels.l Configure the ringing mode for users.

Service Port Management

iManager U2000 Unified Network Management SystemProduct Description 13 MSAN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

13-11

Service ports are classified into V5 PSTN ports, V5 ISDN BRA ports, and V5 ISDN PRA ports.

You can perform the following operations to manage V5 PSTN ports on the U2000:l Configure and modify port attributes.l Enable and disable services.l Perform and cancel a loopback.l Reset a port.l Collect real-time performance statistics.

You can perform the following operations to manage V5 ISDN BRA ports on the U2000:l Configure and modify port attributes.l Enable and disable services.l Perform and cancel a loopback.l Activate and deactivate a port.l Reset a port.l Query the statistics on the usage of MG ports and collect the number of V5 ISDN BRA

ports by port status.l Configure the alarm threshold of Layer 2 signaling errors.l Collect real-time performance statistics.

You can perform the following operations to manage V5 ISDN PRA ports on the U2000:l Configure and modify port attributes.l Enable or disable services.l Perform and cancel a loopback.l Query the statistics on the usage of MG ports and collect the number of V5 ISDN PRA

ports by port status.l Configure the alarm threshold of Layer 2 signaling errors.l Query the timeslots occupied by a specified V5 ISDN PRA port.

SPC Management

SPC can connect, release, check, and protect one or more 64 kbit/s channels of different portsof the same board or different boards. SPCs occupy dedicated and fixed voice channels to meetthe communication requirements of special and VIP access subscribers and ensure thecommunication quality. You can perform the following operations on the U2000:l Set up common SPCs between narrowband service ports.l Set up VoIP-based IP SPCs.l Set up internal SPCs.l Configure private lines.l Set up V5 SPCs.l Set up V5 pre-SPCs.

VFB Board Management

The UA5000(PVMV1) provides point-to-point voice frequency (VF) channels to transmit voiceor data in dedicated networks. You can connect VF telephones or modems (connecting userterminals) to the VF channels at the two sides so that the voice or data is interconnected overdedicated lines. The VFB board of the UA5000(PVMV1) is a 2/4-wire VF dedicated line

13 MSAN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

13-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

interface board and supports the VF dedicated line services. The VFB board provides the functionof adjusting the 2/4-wire port through software. It provides sixteen 2-wire port or eight 4-wireports. You can perform the following operations on the U2000:l Configure the attributes of ports provided by the VFB board.l Add SPCs.

Certain dedicated networks access LEs or interwork with remote dedicated networks over theaccess network. In dedicated networks, many users adopt the E&M trunk ports. To access theseusers over the access network, ONUs must provide the E&M trunk ports.

ATI Board Management

The ATI board, inserted in a service shelf, transparently transmits E/M signaling and 2-wire/4-wire VF signals by using SPCs. This helps the HONET system access certain dedicatednetworks. The ATI board provides six 2-wire/4-wire E&M trunk ports. Each port provides the2-wire/4-wire VF line and the 1E1M signaling line. If the 1E1M signaling line is not in use, the2-wire/4-wire VF line can be used independently to transmit VF signals. You can perform thefollowing operations on the U2000:l Configure the 2-wire/4-wire VF and E&M trunk service.l Configure the hotline service of E&M trunk ports.

CDI Board Management

The CDI board is a 16-channel direct-dialing-in subscriber interface board of the HONET accesssystem, which implements the transparent transmission through analog subscriber ports. TheCDI board implements the transparent extension inside the HONET system for the analogsubscriber ports of external exchanges by means of digital-to-analog conversion between CDIports and ASL ports, transparent transmission, and signaling processing of hosts. In addition, asa foreign exchange office (FXO) port, the CDI port works with the foreign exchange subscriber(FXS) port provided by the ASL board to implement the analog access of the POTS users to theLE. You can perform the following operations on the U2000:l Configure the Z interface extension service.l Configure the PBX bidirectional service.l Configure the DDI service.

Narrowband Data Service ManagementNarrowband data service management includes the management of multifunctional terminaladapters (MTAs), HSL boards, and TDM G.SHDSL ports.

MTA Management

The MTA of the UA5000(PVMV1) provides the synchronous port with the rate of 64/128 kbit/s and the synchronous or asynchronous port with the sub-rate of 2.4/4.8/9.6/19.2 kbit/s. TheMTA also provides physical communication channels between terminal users and the DDNnetwork or other digital terminal users. You can perform the following operations on the U2000:l Configure the attributes of MTA ports.l Add SPCs.

HSL Management

The HSL board of the UA5000 (PVMV1) provides two V.35 ports and two FE1 ports to accessN x 64k (n ranges from 1 to 31) data services. You can perform the following operations on theU2000:

iManager U2000 Unified Network Management SystemProduct Description 13 MSAN Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

13-13

l Configure the attributes of V.35 ports provided by the HSL board.l Add SPCs.

TDM G.SHDSL ports

The UA5000(PVMV1) uses the SDL board to carry G.SHDSL services. The SDL board accessesthe G.SHDSL service of data dedicated line subscribers in TDM mode. You can perform thefollowing operations on the U2000:l Configure the TDM G.SHDSL service.l Configure the subtend service of the TDM G.SHDSL port.

13 MSAN Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

13-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

14 DSLAM Network Feature Management

About This Chapter

This topic describes the functions and features of DSLAM NE management and networkmanagement.

14.1 DSLAM ManagementFor NE configuration management, the U2000 provides graphical user interfaces (GUIs) forconfiguring NEs and maintaining NE configurations. You can configure services for equipmentin the GUIs.

iManager U2000 Unified Network Management SystemProduct Description 14 DSLAM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

14-1

14.1 DSLAM ManagementFor NE configuration management, the U2000 provides graphical user interfaces (GUIs) forconfiguring NEs and maintaining NE configurations. You can configure services for equipmentin the GUIs.

Device ManagementDevice management includes the management of NE panels, basic and common deviceattributes, clock sources, security, protocols, global configuration of services, and devicetemplates.

NE Panel Management

You can perform the following operations on the U2000:l Display the NE panel by double-clicking an NE.l Query the details of equipment.l Collect statistics on device resources.l Query the information about shelves.l Collect the statistics on shelf resources.l Query inter-shelf links.l Add, delete, start, disable, reset, and confirm a board.l Query the real-time performance statistics on the CPU usage and memory of boards.l Display the port view by double-clicking a board.l Perform an active/standby switchover on the control boards.

Management of Basic and Common Device Attributes

The management of basic and common device attributes includes the query of the globalinformation about devices and the configuration of the global policies of devices.

You can perform the following operations on the U2000:l Query the system information about devices.l Query the statistics on the resources and status of devices.l Query the license information about the functions and resources of devices.l Configure the system time, IP address of a device, and the binding between a Layer 3

interface and an IP address.l Configure the SNMP protocol port.l Set device handshake parameters.l Configure the policy for automatically backing up device data.l Enable and disable the energy-conservation function of a device.l Configure and manage license files.

Clock Source Management

Clock source management includes the management and configuration of equipment-level clocksource information, such as information about the line clock, 1588 clock, and clock priorities.

14 DSLAM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

14-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Security Management

You can perform the following operations on the U2000:l Enable and disable anti-ICMP attack, anti-IP attack, anti-IP spoofing, anti-MAC spoofing,

and anti-DoS attack.l Set the aging time of a MAC address.l Enable and disable MAC address learning.l Configure the security attributes for user login in the CLI.

Protocol Management

You can perform the following operations on the U2000:l Manage the Link Aggregation Control Protocol (LACP), Spanning Tree Protocol (STP)/

Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP),Bidirectional Forwarding Detection (BFD), and Internet Group Management Protocol(IGMP).

l Control the Address Resolution Protocol (ARP) proxy.l Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option

(RAIO) custom format.l Control the Dynamic Host Configuration Protocol (DHCP) option 82 function.l Control the DHCP proxy and DHCP relay forwarding functions.l Configure 802.1ag attributes of the Ethernet packet.

Global Configuration of Services

The global configuration of services includes the configuration of the VLAN, QoS, xDSL, andmulticast services.

Device Template Management

Device template management includes the display of different types of device templates on theU2000. Templates include the IGMP template, traffic template, VLAN service template, andPW template. Currently, the U2000 supports only query and generation of global templates.

Network Interface ManagementNetwork interface management includes the management and maintenance of E1/T1 ports andthe Ethernet port.

Management and Maintenance of E1/T1 Ports

E1/T1 ports are classified into TDM E1/T1 ports, CES E1/T1 ports, and IMA E1/T1 ports.

TDM E1/T1 ports can be used as access ports or upstream ports, depending on the functions ofboards.

On E1 ports for upstream transmission, you can perform only the loopback operation.

On E1 ports for PRA access, you can perform the following operations: configure or delete portattributes, set the alarm threshold of L2 signaling bit errors, query timeslots, and enable or disableservices.

On CES E1/T1 ports, you can collect real-time performance statistics of ports, configure the portattributes, set port alias, and perform loopback.

iManager U2000 Unified Network Management SystemProduct Description 14 DSLAM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

14-3

On IMA E1/T1 ports, you can query real-time performance statistics of the ports, and manageIMA groups and IMA links, including adding, deleting, modifying, resetting, blocking, andunblocking an IMA group or link.

Management of Ethernet Ports

Ethernet port management includes the management of ports and aggregation groups. You canperform the following operations on the U2000:

l Configure port attributes.

l Create, delete, query, and modify an aggregation group.

l Activate and deactivate an Ethernet port.

l Collect real-time performance statistics and clear the performance statistics.

l Configure the PPPoE, DHCP option 82, 802.3ah ETH OAM loopback, and port rate limitfunctions.

l Query the attributes of optical transceivers for Ethernet optical ports.

Connection Management

ONU connection management includes the management of service virtual ports.

Service Virtual Port Management

A service virtual port enables user equipment to access the ONU. The service virtual portprovides service streams between the user equipment and the ONU for carrying user services.You can perform the following operations on the U2000:

l Query, add, delete, modify, activate, and deactivate a service virtual port.

l Collect the real-time performance statistics and clear the performance statistics.

l Perform ATM ping tests.

l Configure the extended attributes of a service virtual port. Extended attributes allow forgreater flexibility of addressing customer requirements. Extended attributes include themaximum number of learnable MAC addresses, the PPPoE session, the encapsulation type,and the maximum number of MAC addresses that can be bound.

l Configure the connection attributes of a service virtual port, including the alias, VPI/VCI,transmit traffic profile, and receive traffic profile.

l Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtualport. After successful shifting, the service port assumes the new VLAN ID.

l Bind IP addresses to a service virtual port and query the bound IP addresses. To specifythat only the users with certain IP addresses can access the service virtual port, perform thebinding operation. After successful binding, the service forwarding module checks thesource IP address of user packets. If the source IP address does not match any of the IPaddresses bound to the service virtual port, the user packets are dropped. Otherwise, theuser packets are forwarded. This ensures the security of user access.

l Bind static MAC addresses to a service virtual port. To specify that only the users withcertain static MAC addresses can access the service virtual port, perform the bindingoperation. After successful binding, the service forwarding module checks the source MACaddress of user packets. If the source MAC address does not match any of the MACaddresses bound to the service virtual port, the user packets are dropped. Otherwise, theuser packets are forwarded. This ensures the security of user access.

14 DSLAM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

14-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Configure service bundles. If several service virtual ports carry the same service, a servicebundle can be configured to bundle the service streams over the service virtual ports.

Layer 2 Management

Layer 2 management includes the management of the VLAN, the Rapid Spanning Tree Protocol(RSTP), Multiple Spanning Tree Protocol (MSTP), Access Node Control Protocol (ANCP), andRapid Ring Protection Protocol (RRPP).

VLAN Service Management

VLAN management includes the management of the standard VLAN, MUX VLAN, smartVLAN, and super VLAN. You can perform the following operations on the U2000:l Query, add, delete, and modify a VLAN.l Collect the real-time performance statistics of a VLAN.l Clear the real-time performance statistics on VLANs.l Manage a Layer 3 interface and its subinterfaces.

RSTP Management

You can perform the following operations on the U2000:l Modify and restore the default value of the trail overheads of a port.l Collect the RSTP statistics of a port.l Clear the RSTP statistics of a port.

MSTP Management

MSTP management includes the management of domains, instances, and ports. You can performthe following operations on the U2000:l Modify and restore the default setting of a domain.l Add, delete, and modify an instance.l Modify a port.l Query the statistics of a port.

ANCP Management

You can perform the following operations on the U2000:l Add, delete, modify, enable, and disable an ANCP session.l Query the real-time status of an ANCP session.

RRPP Management

For RRPP management, you can perform the query, add, delete, and modify operations.

Layer 3 Management

Layer 3 management includes the management of the Dynamic Host Configuration Protocol(DHCP), Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge(PWE3), and Layer 3 routes.

DHCP Management

iManager U2000 Unified Network Management SystemProduct Description 14 DSLAM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

14-5

DHCP management includes the management of the DHCP server group, MAC addresssegment, standard mode, DHCP domain, and VLAN L3 interface. You can perform thefollowing operations on the U2000:l Query, add, delete, and modify a DHCP server group.l Query, add, delete, and modify a MAC address segment.l Query, enable, disable, and modify a standard mode.l Query, add, delete, and modify a DHCP domain.l Modify a VLAN Layer 3 interface.

MPLS PWE3 Management

The MPLS is a transmission technology. It implements transparent transmission of data packetsbetween users. The MPLS tunnel is defined in the MPLS protocol. Independent of a service, anMPLS tunnel implements end-to-end transmission and carries service-related PWs.

You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000:l Configure the basic attributes of the MPLS.l Configure the MPLS tunnel of the static unicast type.l Create forward MPLS tunnels.l Create an E-LSP.l Manage PWs.l Manage tunnel tags and PW labels.

ACL and QoS ManagementACL and QoS management includes the management of the access control list (ACL), qualityof service (QoS), time segments, and hierarchical QoS (HQoS).

In a traditional packet-based network, all packets are treated in the same way. Every router adoptsthe first-in first-out (FIFO) policy to process packets, and makes its best effort to transmit packetsto the destination. The router, however, does not make any commitment to packet transmissionperformance, such as the delay, delay variation (jitter), packet loss rate, and reliability. With therapid development of the computer network, more and more networks are connected to theInternet. In addition, new services are emerging and raise new requirements on the servicecapability of the IP network. Therefore, network-wide end-to-end QoS solutions are called intoattention, which necessitates QoS assurance for services. To achieve so, devices must be ableto apply QoS techniques and provide hierarchical QoS guarantee for different types of servicestreams (especially for those highly sensitive to delay and jitter). For ACL management, youcan perform the following operations on the U2000:l Configure one or more time segments, and associate a time segment with an ACL by

specifying the name of the time segment in the ACL.l Query, modify, create, and delete the ACL of the standard, extended, Layer 2, and user-

defined types.QoS management includes filtering packets based on ACL, tagging priorities, limiting trafficand port rate, collecting statistics on traffic, redirecting, and mirroring. On the U2000, you canquery, add, modify, and delete a QoS policy.

HQoS stands for the hierarchical QoS. It not only controls user traffic but also schedules packetsaccording to the priorities of user services. On the U2000, you can query, add, modify, and deletean HQoS policy.

14 DSLAM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

14-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

User Security and System SecurityYou can perform the following operations on the U2000:l Configure user access in PITP mode.l Configure user access in DHCP option 82 mode.l Configure user access control.l Configure system secure access.

BFD ManagementThe BFD mechanism is used for quickly checking the link status between two devices.

To mitigate the impact of device faults on services and to improve the network availability, anetwork device needs to quickly detect any fault occurring between the device and its adjacentdevices. Actions can then be taken to ensure service continuity. The BFD enables the device tocheck the connectivity of a type of data protocol of the same trail between two systems. The trailcan be a physical or a logical link, including a tunnel. The BFD mechanism is a remedy for theweakness of the existing detection mechanism.

Ethernet Connectivity Fault ManagementAs the Ethernet technology extends from carrier networks to metropolitan area networks(MANs) and wide area networks (WANs), carriers are increasingly concerned about themaintainability of equipment, especially the Ethernet equipment. An imperative demand for theoperation, administration and maintenance (OAM) of transport equipment hence arises. WithinEthernet technology, the 802.1ag connectivity fault management (CFM) provides a method fordetecting faults end-to-end. The Ethernet OAM mechanisms supported by 802.1ag CFM includeconnectivity check (CC), loopback (LB), link trace (LT), and forward AIS alarms. You canperform the following operations on the U2000:l Manage maintenance domains (MDs). Ethernet CFM divides a network into up to eight

levels. A bridge can span multiple levels to manage different MDs. A CFM MD isconstituted by bridges. An MD is the combination of bridges and maintenance levels. MDscan be classified into three layers: user domain (levels 7-5), service provider domain (levels4-3), and carrier domain (levels 2-0). Different MDs are maintained by differentmanagement entities.

l Manage maintenance associations (MAs). An MD can be divided into multiple MAs. EachMA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. AnMA can be regarded as a combination of an MD and a VLAN. According to the standards,multiple VLANs can map one SI, and one SI maps one MA.

l Manage maintenance points (MPs). An MA consists of MPs defined on the ports of bridges.An MP is a combination of a bridge port, a VLAN, and a maintenance level. MPs areclassified into maintenance association end points (MEPs) and maintenance associationintermediate points (MIPs). MEPs initiate and respond to CFM messages; MIPstransparently transmit or respond to CFM messages but do not initiate the messages.

Protection Group ManagementProtection group management involves the protection switchover and protection group.

Protection switchover: Important board recourses and port recourses are generally backed up toenhance system reliability. If a fault occurs on a working member, protection switchover will

iManager U2000 Unified Network Management SystemProduct Description 14 DSLAM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

14-7

be triggered to transfer services to the protection member that will continue to handle theservices.

Protection group: You can manage the working member and the protection member in theprotection group. In a protection group, you can manage the relationship between the membersinvolved in the protection switchover, record the status of members, and manage theconfiguration data and status that are involved by the protection relationship between themembers.

With the protection group feature, you can protect the following objects on the U2000:l Active and standby control boardsl Aggregation groups on active control board and standby control boardl Ports on active and standby control boardsl Upstream Ethernet portsl Upstream aggregation links of Ethernet ports

xDSL Service Management

xDSL service management includes the management of the asymmetrical digital subscriber loop(ADSL), ADSL2+, ATM global single-pair high-speed digital subscriber line (G.SHDSL), andvery high speed digital subscriber lines 2 (VDSL2) services. The features of these services areas follows:

ADSL Service Management

ADSL is a technology for providing the asymmetric and high-speed private line access serviceover common twisted pairs. ADSL supports the asymmetrical transmission in the upstream anddownstream directions, which is suitable for the user data access service and can provide high-speed data transmission channels for users. ADSL2+ is an extension of the ADSL technology.It supports a maximum transmission rate of 24 Mbit/s and 2.5 Mbit/s in the downstream andupstream respectively and a maximum transmission distance of 6.5 km. You can perform thefollowing operations on the U2000:l Activate and deactivate a port.l Perform and cancel a loopback.l Deactivate a port and then activate it again to initialize the port.l Reconfigure port attributes.l Configure the port attributes, such as the associated line template, alarm template, extended

template, and monitoring thresholds. These attributes are used to activate the ADSL port.l Query the real-time and history performance statistics.

G.SHDSL Service Management

G.SHDSL is a technology for providing a high-rate symmetrical data service over one or twotwisted pairs. The 2-wire, 4-wire, 6-wire, and 8-wire G.SHDSL access services are supportedto allow for a transmission distance ranging from 3 km to 6 km. The rates of the 2-wire, 4-wire,6-wire, and 8-wire G.SHDSL lines range from 192 kbit/s to 5696 kbit/s, 384 kbit/s to 4608 kbit/s, 576 kbit/s to 17088 kbit/s, and 768 kbit/s to 22784 kbit/s respectively. You can perform thefollowing operations on the U2000:l Activate and deactivate a port.l Perform and cancel a loopback.

14 DSLAM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

14-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

l Bind and unbind a port. You can bind multiple ATM G.SHDSL ports. This increases thebandwidth at the physical layer and improves the rate of the ATM G.SHDSL port.

l Configure port attributes, such as the associated line profile and alarm profile. Theseattributes are used to activate the ATM G.SHDSL port.

l Query the real-time performance statistics.

VDSL2 Service Management

VDSL2 is an extension of the VDSL technology. It provides high-speed private line access inthe symmetrical or asymmetrical mode over common twisted pairs. VDSL2 supports a highbandwidth with symmetric rates of up to 100 Mbit/s and multiple spectrum template andencapsulation modes. Based on these features, it provides short-distance and high-speed accesssolutions to the next generation broadband access scenarios. You can perform the followingoperations on the U2000:l Activate and deactivate a port.l Perform and cancel a loopback.l Deactivate a port and then activate it again to initialize a port.l Reconfigure port attributes.l Configure the port attributes, such as the associated line profile, alarm profile, extended

profile, and monitoring thresholds of a VDSL2 port. These attributes are used to activatethe VDSL2 port.

l Query the real-time and history performance statistics.

Multicast Service ManagementMulticast is a point-to-multipoint (P2MP) communication mode in which the source sendsinformation to a specified subset of objects under a network node. Multicast services areapplicable to the streaming media, distance learning, video conferencing, video on demand(VOD), network gaming, data replication, and other P2MP transmission.

Multicast communication uses a class D IP address (224.0.0.0 to 239.255.255.255) as thedestination IP address. A source host sends out a packet that uses a class D IP address as thedestination. If other hosts in the network are interested in the multicast packet, these hosts cansend a request to join the multicast group and receive the packet. The hosts outside of the groupcannot receive the packets sent by the source host.

In controllable multicast, network equipment determines whether a user has the rights to watchprograms by identifying the join or request packets of the user. Then, the access device controlsand forwards the multicast services accordingly.

There are two multicast modes:l IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer.

It is used to manage and control multicast services.l IGMP proxy: In a tree topology, the OLT does not set up routes for forwarding multicast

packets; the OLT only relays and forwards multicast protocol packets. To multicast users,the OLT is a multicast router that implements the router functions defined in the IGMPprotocol. To multicast routers, the OLT is a multicast user.

You can perform the following operations on the U2000 to manage multicast services:l Manage multicast users.l Manage multicast VLANs.

iManager U2000 Unified Network Management SystemProduct Description 14 DSLAM Network Feature Management

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

14-9

l Manage the virtual upstream ports of multicast services.l Manage multicast subtending ports.

14 DSLAM Network Feature ManagementiManager U2000 Unified Network Management System

Product Description

14-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

15 Reliability

About This Chapter

Reliability design assures that measures are taken to prevent potential risks so that the productcan work in a safer manner.

15.1 Reliability DesignThis topic describes the reliability design of the U2000. The reliability design of the U2000ensures hardware reliability, software reliability, and system security and reliability.

15.2 Reliability IndicatorThis topic describes the indicators of the reliability design.

15.3 HA SystemThe high availability (HA) system helps you improve the running reliability of the U2000 server.

15.4 DCN ProtectionYou can use a data communication network (DCN) to connect the U2000 to a standby gatewayNE (GNE). This improves the reliability of the communication connection between theU2000 and equipment.

15.5 Disk MirroringThe disk mirroring function helps to improve the reliability of disk data on the U2000 server.

15.6 Data BackupThe data backup function helps to improve the reliability of important U2000 data.

iManager U2000 Unified Network Management SystemProduct Description 15 Reliability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

15-1

15.1 Reliability DesignThis topic describes the reliability design of the U2000. The reliability design of the U2000ensures hardware reliability, software reliability, and system security and reliability.

Hardware Reliability

U2000Hardware reliability is improved by disk redundancy, equipment redundancy, and HAsystem.

l Disk redundancy: The U2000 supports disk redundancy. For example, RAID1, RAID10,hot standby, or disk array can be used for different hardware platforms.

l Equipment redundancy: During network deployment, the U2000 improves reliability bymeans of redundant equipment such as switches and NICs.

l HA system: For details, see 15.3 HA System.

Software Reliability

Software reliability mechanism of the U2000 enables the U2000 to withstand software failuressuch as software application failure or database damage.

The U2000 supports the automatic protection mechanism so that it can monitor and check therunning status of its processes. When the U2000 detects that a process stops abnormally or isfaulty, it records system logs. Then, the system restarts the process automatically and ensuresthat the process runs in the normal state. The system can also generate an alarm that urges a userto manually resolve the problem.

In the case of an HA system, when the active server is faulty (for example, software applicationsfail or the database quits unexpectedly), switchover is performed between the active server andthe standby server and the standby server starts to monitor networks.

Periodic and effective backup of the U2000 data ensures that the system runs stably and recoverspromptly from faults. The U2000 provides various data backup methods. For details, see 15.6Data Backup.

System Security and Reliability

System security and reliability involve the following aspects:

l OS enhancement: The U2000 provides the SetSolaris to enhance the security of Solaris OS.

l Antivirus scheme: The U2000 uses the OfficeScan of Trend Micro as the antivirus softwareon Windows OS.

l Operation security: The U2000 supports user management, right management, user securitymanagement, ACL, AAA, and a series of security policies to ensure the security ofoperations that are performed on the U2000.

l Communication security and reliability: The U2000 client and server communicate witheach other in SSH mode, which ensures security of communication between them. Inaddition, DCN protection ensures the reliability of communication connections betweenthe U2000 and NEs.

15 ReliabilityiManager U2000 Unified Network Management System

Product Description

15-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

15.2 Reliability IndicatorThis topic describes the indicators of the reliability design.

Table 15-1 lists the reliability indicators of the U2000.

Table 15-1 Reliability indicators of the U2000

Item Indicator Remarks

MTBF The average fault interval islarger than 6 months.The fault is defined as databasecrash.

HA system

MTTR The average fault recovery timeis no more than 15 minutes.The fault is defined as databasecrash.

HA system

HA switching time ≤ 15 minutes 70% of the managementcapacity

NMS start time ≤ 10 minutes 70% of the managementcapacity

NMS shutdown time ≤ 10 minutes 70% of the managementcapacity

15.3 HA SystemThe high availability (HA) system helps you improve the running reliability of the U2000 server.

The non-distributed U2000 server works in 1+1 backup mode. If the active site is faulty,applications on the U2000 are automatically switched to the standby site so that the U2000application is not interrupted. See Figure 15-1.

iManager U2000 Unified Network Management SystemProduct Description 15 Reliability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

15-3

Figure 15-1 Switchover between active and standby sites in HA system

Normal Status

When a fault occurs, the NMS application is switched to the standby site.

Application

Applicaton

Real time data replication

The protection mechanism of an HA system has two aspects:

l Database synchronization and backup between the active and standby sites

l Automatic application switchover between the active and standby sites

The U2000 provides the following HA schemes:

l HA system (Veritas 1+1 hot standby): Applicable to remote hot standby of the non-distributed system, featuring automatic switching.

15.4 DCN ProtectionYou can use a data communication network (DCN) to connect the U2000 to a standby gatewayNE (GNE). This improves the reliability of the communication connection between theU2000 and equipment.

The communication between non-GNEs and the U2000 is forwarded by the GNE. In theU2000, you can set the active GNE and standby GNE for NEs in advance. When thecommunication between the active GNE and the U2000 is interrupted, the U2000 automaticallyswitches to the standby GNE for communication, so that the communication between theU2000 and NEs is not interrupted. When the communication between the U2000 and the activeGNE recovers, the U2000 determines whether to use the active GNE again according to thepreset revertive mode.

NOTE

The recommended number of non-gateway NEs (including non-gateway NEs that connects to the GNE by usingthe extended ECC) that connect to each GNE is fewer than 50. Once the limit is exceeded, the number of GNEsshould be increased.

15 ReliabilityiManager U2000 Unified Network Management System

Product Description

15-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

15.5 Disk MirroringThe disk mirroring function helps to improve the reliability of disk data on the U2000 server.

If the server has two or more than two hard disks, you can create disk mirroring (RAID 1) wheninstalling the U2000. After you create disk mirroring, if the active disk is damaged, run acommand to switch the data to the standby disk, thereby restoring the working data and parametersettings before the active disk is damaged.

The RAID 5 and hot spare disk are recommended for the disk array where six hard disks areconfigured. Specifically, configure RAID 5 by using any four hard disks and use the remainingone as a hot spare disk.

15.6 Data BackupThe data backup function helps to improve the reliability of important U2000 data.

The security of network data is a concern of users. Table 15-2 lists the data backup solutionsprovided by the U2000.

Table 15-2 Data backup

Data to Be Backed Up Solution Operation

Alarm log, abnormal eventlog, performance log,security log, and operationlog

Dump logs. Perform operations on theU2000 client. For details, seethe U2000 Online Help.

Configuration data Export the configuration datato script files in the MMLcommand format. The scriptfiles neglect the structuraldifferences among databasesof the U2000 of differentversions, and are suitable fordata backup in case ofversion upgrade. The scriptfiles supported by theU2000 include network-wideconfiguration files, U2000naming file, NEconfiguration file, NE listfiles, U2000 computerinformation files, serviceimplementationconfiguration files, network-layer information files, andnetwork simulation andplanning information files.

iManager U2000 Unified Network Management SystemProduct Description 15 Reliability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

15-5

Data to Be Backed Up Solution Operation

Database Back up all data in theU2000 database.In general, restoring all dataon the database takes lessthan three hours. Therestoration duration isdetermined by the networksize and the bandwidthbetween the U2000 serverand the remote server.Supported backup scenariosare as follows:l OS: Windows, SUSE

Linux, or Solaris.l Database: Oracle,

Sybase, or SQL Server.l Data backup path:

immediate backup to thelocal, immediate backupto the remote. andscheduled backup to theremote. If the scheduledbackup fails, the U2000reports an alarm.

l Source of data to berestored: local restorationor remote restoration.

NE database Back up the NE data.

15 ReliabilityiManager U2000 Unified Network Management System

Product Description

15-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

16 Performance Indicators

This topic describes the performance indicators of the U2000.

Table 16-1 Performance indicators

Item Subitem Indicator

Storage capacity Capacity of current alarms Maximum: 100,000 pieces

Capacity of history alarms Maximum: 2,000,000 pieces

Capacity of logs, includingoperation logs and systemlogs

Maximum: 1,000,000 pieces

Resources occupied CPU usage The CPU usage is normallynot greater than 10%.

Processing capability Response speed of handlingan alarm

The interval from the time atwhich an alarm is generatedon the equipment to the timeat which the alarm isdisplayed on the U2000 isnormally not longer than 10seconds.

Response speed of handlingperformance data

In the case of 1,000 pieces ofperformance data, theinterval from the time atwhich they are reported to theU2000 to the time at whichthey are stored in thedatabase is normally 10seconds.

iManager U2000 Unified Network Management SystemProduct Description 16 Performance Indicators

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

16-1

Item Subitem Indicator

Alarm handling capability In a normal circumstance,100 (400 at maximum) piecesof alarms can be handled persecond by a full-domainU2000. When managing onlyaccess equipment, the U2000can handle 50 pieces ofalarms per second.

U2000 user managementcapability

User Maximum: 500

User group Maximum: 50

Object set Maximum: 100

Operation Set Maximum: 255

HA switchover time Switchover between remoteactive and standby servers

Less than 15 minutes

Stability Mean time between failures(MTBF)

The MTBF is longer than sixmonths. A failure is thesituation where the databasequits unexpectedly.

Mean time to recovery(MTTR)

The MTTR is not longer than15 minutes. A failure is thesituation where the databasequits unexpectedly.

Management capability Number of managed physicalnodes

Maximum: 15,000

Number of managedequivalent NEs

Maximum: 20,000

Service capability VPN access interface Maximum: 5,000,000

Number of tunnels Maximum: 100,000

HWECC/IP over DCCnetworking capacity

Number of manageableGNEs

Not more than 3000

Number of manageable NEsfor a GNE

Not more than 50

Table 16-2 DCN bandwidth requirements

Item Bandwidth

Bandwidth required for the communicationbetween a U2000 client and the U2000 server

2 Mbit/s

16 Performance IndicatorsiManager U2000 Unified Network Management System

Product Description

16-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Item Bandwidth

Bandwidth required for the communicationbetween N Equivalent NEs and the U2000server

A bandwidth of 2 Mbit/s may not meet thebandwidth requirements in differentnetworks. In this case, you can set the CIR orPIR by using the following formula:CIR:l N > 56: 2048 kbit/s + (N - 56) x 0.5 kbit/

sl N <= 56: 2 Mbit/sPIR:l N > 56: 10240 kbit/s + (N - 56) x 5 kbit/sl N <= 56: 10 Mbit/s

Bandwidth required for the communicationbetween an OSS and the U2000 server

2 Mbit/sNOTE

A minimum of 2 Mbit/s is required.

Bandwidth required for the communicationbetween the primary and secondary sites in anHA system (Veritas hot standby)

2 Mbit/sNOTE

A minimum of 2 Mbit/s is required. A bandwidthof 2 Mbit/s is enough if you do not synchronize allperformance data by using PMS. If you want tosynchronize the performance data, morebandwidth is required.

iManager U2000 Unified Network Management SystemProduct Description 16 Performance Indicators

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

16-3

17 Management Capability

About This Chapter

Management capability refers to the capability of the NMS to manage network resources, whichare expressed in the number of equivalent NEs.

The key technical specifications include the number of equivalent NEs, number of clients, andnumber of physical NEs.The management capability of the U2000 in a network that consists ofdifferent types of NEs is affected by the following factors:l The management capability refers to the maximum number of equivalent NEs that can be

managed by the U2000 on certain hardware configuration conditions. The managementcapability depends on the hardware and varies with the hardware configuration.

l If a client also runs on the computer where the server is running, the management capabilityis reduced by 50%. Hence, it is recommended that you run the client and server on differentcomputers.

l The system limits the number of physical nodes. Hence, the number of physical nodes is arestriction for the management capability.

l Virtual NEs are not included in the management capability. A pre-configured NE is equalto a real NE. One third-party NE is equal to one equivalent NE. The equivalent coefficientof the OEM equipment is calculated in the way similar to Huawei equipment.

17.1 NE Equivalent CoefficientThe NE equivalent coefficient is the ratio of the resources used by physical NEs or ports to theresources used by equivalent NEs.

17.2 Management Capabilities of the U2000 on Different Hardware PlatformsThis topic describes the management capabilities of the U2000 on different hardware platforms.

17.3 Manageable EquipmentThis topic describes the equipment that can be managed by the U2000.

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-1

17.1 NE Equivalent CoefficientThe NE equivalent coefficient is the ratio of the resources used by physical NEs or ports to theresources used by equivalent NEs.

Equivalent NE and Equivalent Coefficientl Equivalent NE: The functional features, cross-connect capacity, and number of cards, ports,

or channels are specific to NEs of different types. As these NEs require different resourcesof the NMS, the number of NEs that can be managed by the NMS depends on the NE types.For easy description and calculation of the management capability, the concept ofequivalent NE is defined so that NEs of different types or a number of ports can be convertedto equivalent NEs by a uniform criteria according to the system resources required bythem. The system resources required by an equivalent NE is equal to the resources formanaging an STM-1 transport NE.

l Equivalent coefficient: Equivalent coefficient = (Resources used by physical NEs or ports)/(Resources used by equivalent NEs)

Currently, a set of U2000 can manage a maximum of 15,000 physical NEs, 15,000 equivalentNEs, and 100 clients. This conclusion is drawn after the tests under a certain environment andobjectively reflects the actual management capability of the U2000.

The management scales of the U2000 are defined as follows:l Small-scale network: 2,000 equivalent NEs of the U2000l Medium-scale network: 6,000 equivalent NEs of the U2000l Large-scale network: 15,000 equivalent NEs of the U2000

NOTEIt is recommended that you enable no more than 100,000 performance collection instances at the same time toensure the running efficiency of the U2000.

Calculating the Number of Equivalent NEsGenerally, the number of equivalent NEs that the U2000 can manage is calculated according tothe following rules:l The basic unit of an equivalent NE of the U2000 is OptiX Metro 1000.l Number of equivalent NEs = <Number of equivalent NEs in the transport domain> +

<Number of equivalent NEs in the IP domain> + <Number of equivalent NEs in the accessdomain>

l The comparison coefficient of an equivalent NE of the U2000 to the equivalent NE in eachdomain is as follows:– 1 equivalent NE in the transport domain = 1 equivalent NE of the U2000– 4 equivalent nodes in the IP domain = 1 equivalent NE of the U2000– 3.3 equivalent nodes in the access domain = 1 equivalent NE of the U2000

NOTEThe preceding rules are not fixed. For more details, see the Management Capability Instructions.

17.1.1 Equivalent NEs in the Transport Domain<Number of equivalent NEs in the transport domain> = (Number of transport NEs of type_I xEquivalent coefficient + ... + (Number of transport NEs of type_n x Equivalent coefficient)

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

17.1.2 Equivalent NEs in the IP Domain<Number of equivalent NEs in the IP domain> = (Number of IP NEs of type_I x Equivalentcoefficient) + ... + (Number of IP NEs of type_n x Equivalent coefficient)

17.1.3 Equivalent NEs in the Access Domain<Number of equivalent NEs in the access domain> = Number of FTTx OLT equivalent NEs +Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs + Number ofDSLAM equivalent NEs + Number of equivalent NEs of other access equipment

17.1.1 Equivalent NEs in the Transport Domain<Number of equivalent NEs in the transport domain> = (Number of transport NEs of type_I xEquivalent coefficient + ... + (Number of transport NEs of type_n x Equivalent coefficient)

NOTE

For example, there are 5 OptiX OSN 9500 (equivalent coefficient: 10), 10 OptiX OSN 7500 (equivalentcoefficient: 6.5), and 100 OptiX OSN 3500 (equivalent coefficient: 4.5). Then, you can calculate the numberof equivalent NEs in the transport domain as follows:

Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 + 100 x 4.5 = 565

The management capability of the U2000 varies with OptiX NE Equivalents, as shown in Table17-1.

Table 17-1 Management capabilities of the U2000 on different OptiX NE Equivalents

NE Series NE Type Equivalent Coefficient forthe U2000

OSN series OptiX OSN 500 1

OptiX OSN 1500 3.5 (With ASON)2.5 (Without ASON)

OptiX OSN 2000 2

OptiX OSN 2500 4.5 (With ASON)3.5 (Without ASON)

OptiX OSN 2500 REG 3.5 (Without ASON)

OptiX OSN 3500 6.5 (With ASON)4.5 (Without ASON)

OptiX OSN 7500 10 (With ASON)6.5 (Without ASON)

OptiX OSN 9500 15 (With ASON)10 (Without ASON)

MSTP series OptiX Metro 100 0.5

OptiX Metro 200 0.5

OptiX Metro 500 1

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-3

NE Series NE Type Equivalent Coefficient forthe U2000

OptiX 155/622H (Metro 1000) 1

OptiX Metro 1000V3 1

OptiX Metro 1050 1.5

OptiX Metro 1100 1.5

OptiX 155/622 (Metro 2050) 2

OptiX 2500+(Metro 3000) 3

OptiX Metro 3100 3

OptiX 10G (Metro 5000) 4

SDH series OptiX 155C 1

OptiX 155S 1

OptiX 155/622B_I 2

OptiX 155/622B_II 2

OptiX 2500 3

OptiX 2500 REG 1.5

Metro WDM series OptiX Metro 6020 1

OptiX Metro 6040 1

OptiX Metro 6040V2 1

OptiX Metro 6100 1.5

OptiX Metro 6100V1 1.5

OptiX Metro 6100V1E 1.5

OptiX OSN 900A 1

LH WDM series OptiX BWS OAS, OptiX BWSOCS, OptiX BWS OIS

1.5

OptiX BWS 320GV3 1.5

OptiX BWS 1600G, OptiX BWS1600G OLA

1.5 +1.5 *N (N refers to thenumber of slave shelves)

OptiX OTU40000 1

Marine series OptiX BWS 1600S 1.5

OptiX PFE 1670 1

OptiX SLM 1630 1

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

NE Series NE Type Equivalent Coefficient forthe U2000

NG WDM series OptiX OSN 1800 1

OptiX OSN 3800 3.5 (With ASON)1.5 (Without ASON)

OptiX OSN 6800 4+4*N (With ASON)2+2*N (Without ASON)N refers to the number of slaveshelves

OptiX OSN 8800 T32 10+10*N (With ASON)6+6*N (Without ASON)N refers to the number of slaveshelves

OptiX OSN 8800 T64 16+16*N (With ASON)12+12*N (Without ASON)N refers to the number of slaveshelves

NA WDM series OptiX BWS 1600A 1.5

OptiX BWS 1600(NA) 1.5

OptiX OSN 1800(NA) 1

OptiX OSN 3800A 3.5 (With ASON)1.5 (Without ASON)

OptiX OSN 6800A 4+4*N (With ASON)2+2*N (Without ASON)N refers to the number of slaveshelves

OptiX OSN 8800 T32(NA) 10+10*N (With ASON)6+6*N (Without ASON)N refers to the number of slaveshelves

OptiX OSN 8800 T64(NA) 16+16*N (With ASON)12+12*N (Without ASON)N refers to the number of slaveshelves

RTN series OptiX RTN 605 0.4

OptiX RTN 610 0.4

OptiX RTN 620 0.5

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-5

NE Series NE Type Equivalent Coefficient forthe U2000

OptiX RTN 910 0.5

OptiX RTN 950 1

OptiX RTN 5000S 1

17.1.2 Equivalent NEs in the IP Domain<Number of equivalent NEs in the IP domain> = (Number of IP NEs of type_I x Equivalentcoefficient) + ... + (Number of IP NEs of type_n x Equivalent coefficient)

NOTE

For example, there are 5 NE5000E (equivalent coefficient: 10), 200 S5300 (equivalent coefficient: 1.25),and 1000 CX200 (equivalent coefficient: 0.625). Then, you can calculate the number of equivalent NEs inthe IP domain as follows:

Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925

The management capability of the U2000 varies with IP NE Equivalents, as shown in Table17-2.

Table 17-2 Management capabilities of the U2000 on different IP NE Equivalents

NE Series NE Type Equivalent Coefficient forthe U2000

Router NE05/NE08(E)/NE16(E) 0.75

NE20/NE20E 1.25

NE40/NE80 5

NE40E-X3 1.25

NE40E-4 1.25

NE40E-X8 2.5

NE40E-8 2.5

NE40E-X16 5

NE40E-16 5

NE5000E 10*N (N: number of chassis)

R-series router 1

AR-series router 0.25

Security equipment forload balancing andblocking

SSP 10

NSE 10

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

NE Series NE Type Equivalent Coefficient forthe U2000

Switch S2000 series 0.125

S2300 series 0.625

S2700 series 0.625

S3000 series 0.125

S3300 series 0.75

S3700 series 0.75

S5000 series 0.25

S5300 series 1.25

S5700 series 1.25

S6500 series 0.75

S7800 series 1.25

S8016 series 1.25

S8500 series 1.25

S9303 series 2.0

S9306 series 3.5

S9312 series 6.0

PTN series OptiX PTN 1900 2.5

OptiX PTN 3900 4.5

OptiX PTN3900-8 4.0

OptiX PTN 912 0.5

OptiX PTN 910 0.5

OptiX PTN 950 1

MAN service platform CX200 series 0.625

CX300 series 1.25

CX600-X1 0.5

CX600-X2 1

CX600-X3 1.25

CX600-4 1.25

CX600-X8 2.5

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-7

NE Series NE Type Equivalent Coefficient forthe U2000

CX600-8 2.5

CX600-X16 5

CX600-16 5

Firewall Eudomen 300/500/1000 0.5

Eudomen 200E series 0.25

Eudomen 1000E series 0.75

Eudomen 8040 3

Eudomen 8080 6

Eudomen 8080E 4

Eudomen 8160E 8

USG USG9110 4

USG9120 2

USG9210 3

USG9220 6

USG9310 4

USG9320 8

USG5000 series 0.75

USG3030 0.25

USG3040 0.25

USG2100 series 0.25

USG2200 series 0.25

USG50 0.25

SRG SRG1200 0.25

SRG20-10 0.25

SRG20-11 0.25

SRG20-12 0.25

SRG20-15 0.25

SRG20-20 0.25

SRG20-21 0.25

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

NE Series NE Type Equivalent Coefficient forthe U2000

SRG20-30 0.25

SRG20-31 0.25

SRG20-31-D 0.25

SIG SIG9810 4

SIG9820 8

SIG9800 Server 4

SVN SVN3000 0.25

Broadband access MA5200E/F series 1.5

MA5200G series 10

ME60 series 10

Voice gateway VG1040/1041 series 0.25

WLAN AP AP 0.25

17.1.3 Equivalent NEs in the Access Domain<Number of equivalent NEs in the access domain> = Number of FTTx OLT equivalent NEs +Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs + Number ofDSLAM equivalent NEs + Number of equivalent NEs of other access equipment

NOTE

l Number of FTTx OLT equivalent NEs = (Number of ONTs x Equivalent coefficient) + (Number ofMDUs x Equivalent coefficient) + (Number of P2P ports x Equivalent coefficient)

l Number of FTTx MDU equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +(Number of ports of type n x Equivalent coefficient)

l Number of MSAN equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +(Number of ports of type n x Equivalent coefficient)

l Number of DSLAM equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +(Number of ports of type_n x Equivalent coefficient)

l Number of equivalent NEs of other access equipment = (Number of NEs of type_I x Equivalentcoefficient) + ... + (Number of NEs of type_n x Equivalent coefficient)

The management capability of the U2000 varies with access NE Equivalents, as shown in Table17-3.

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-9

Table 17-3 Management capabilities of the U2000 on different access NE Equivalents

Class Type Equivalent Coefficient forthe U2000

FTTx OLT(calculation based onthe managed ONT,MDU, and P2Presources in the caseof OLT)

ONT 1/64

MDU 1/32

P2P port 1/64

FTTx MDU(calculation based onthe managed userports in the case ofMDU)

xDSL port 1/128

E1 port 1/128

ETH port 1/128

PSTN/ISDN/HSL port 1/160

MSAN (calculationbased on the numberof managed ports)

xDSL port 1/128

E1 port 1/128

ETH port 1/128

PSTN/ISDN/HSL port 1/160

DSLAM (calculationbased on the numberof managed ports)

xDSL port 1/128

E1 port 1/128

ETH port 1/128

Other NEs(calculation based onthe NE types)

MD5500 1.5

8850 18

8825 18

8750 18

MA5200V1R2/R9 3

17.2 Management Capabilities of the U2000 on DifferentHardware Platforms

This topic describes the management capabilities of the U2000 on different hardware platforms.

Table 17-4 lists the management capabilities of the Table 17-4 on different hardware platforms.

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Table 17-4 Management capabilities of the U2000 on different hardware platforms

Server Short Nameof Computer

ManagementCapability

Number ofClients

SupportUnifiedNetworkManagement

Number ofPhysicalNEs

Mainstream Server to Be Delivered with the U2000 V100R002C01

Maximumnumber ofphysical

NEs: 15000Maximumnumber of

SDH paths:300000

Maximumnumber of

WDM paths:50000

Sun Server

T5220-4C*1.2G-16G

2000 32 No

T5220-8C*1.4G-32G

6000 64 Yes

M4000-4P*2.53G-32GArray:6*300G Array

15000 100 Yes

PC Server HPDL380G6-2P*2.0G-8G

2000 32 Yes

HPDL580G5-4P*2.13G-16G

6000 64 Yes

Compatible Server (Reuse)

SUN Server M4000-2P*2.15G-16G

6000 64 No

SUNV890-4P*1.5G-16G

3000 48 No

SUNV890-2P*1.5G-8G

1500 32 No

SUNV445-4P*1.6GHz-8G

1500 32 No

SUNE2900-8P*1.5GHz-32G

5000 80 Yes

SUNE2900-12P*1.5GHz-48G

5000 100 Yes

FujitsuServer

PW650-4P*1.8GHz-16G

2000 48 No

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-11

Server Short Nameof Computer

ManagementCapability

Number ofClients

SupportUnifiedNetworkManagement

Number ofPhysicalNEs

PW650-2P*1.8GHz-8G

1500 32 No

PC Server IBMX3650-2P*2.0G-8G

2000 32 No

IBMX3850M2-4P*2.13G-16G

6000 64 No

Compatible Server for the Single-Domain UpgradeThe servers are applicable to only the single-domain upgrade instead of the

cross-domain management in centralized manner. For example, if the T2000is installed on SUN V490, the T2000 can be directly upgraded to the U2000,but the U2000 cannot have the management functions of the IP and access

domains in this case.

SUN Server SUNNetra240-2P*1.5GHz-2G

600 16 NoSUNNetra240does notsupport themanagementof PTNdevices. IfT2000 isinstalled onNetra240,afterupgraded tothe U2000,the U2000cannot havethemanagementfunctions ofthe PTNdevices. Ifmust tomanage thePTNdevices, theNetra240must bechanged.

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Server Short Nameof Computer

ManagementCapability

Number ofClients

SupportUnifiedNetworkManagement

Number ofPhysicalNEs

SUNV490-2P*1.6GHz-4G

800 24 No

SUNV440-2P*1.6GHz-4G

800 24 No

SUNV240-2P*1.5GHz-4G

600 16 No

SUNV245-2P*1.5GHz-4G

600 16 No

PC Server IBMX3500-2P*2.0G-4G

2000 64 No

IBMX3200-1P*2.4G-2G

600 14 No

HPML350-2P*2.0G-4G

2000 64 No

HPML110-1P*2.4G-2G

600 24 No

HPML570-4P*2.0G-4G

2000 48 No

DELLR900-4P*2.13G-4G

2000 48 No

DELLPE6800-4P*2.0G-4G

2000 48 No

DELLPE2900-2P*2.0G-4G

1500 32 No

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-13

Server Short Nameof Computer

ManagementCapability

Number ofClients

SupportUnifiedNetworkManagement

Number ofPhysicalNEs

DELLPE840-1P*2.4G-2G

600 24 No

HPDL380G5-2P*2.0G-8G

6000 64 No

HPDL580G5-4P*2.13G-16G

10000 100 No

IBMX3650-2P*2.0G-8G

6000 64 No

IBMX3850M2-4P*2.13G-16G

10000 100 No

17.3 Manageable EquipmentThis topic describes the equipment that can be managed by the U2000.

17.3.1 Manageable MSTP Series Equipment

17.3.2 Manageable WDM Series Equipment

17.3.3 Manageable NA WDM Series Equipment

17.3.4 Manageable Submarine Line Equipment

17.3.5 Manageable RTN Series Equipment

17.3.6 Manageable PTN Series Equipment

17.3.7 Manageable FTTx Series Equipment

17.3.8 Manageable MSAN Series Equipment

17.3.9 Manageable DSLAM Series Equipment

17.3.10 Manageable Router Series Equipment

17.3.11 Manageable Switch Series Equipment

17.3.12 Manageable Metro Service Platform Equipment

17.3.13 Manageable Broadband Access Series Equipment

17.3.14 Manageable VoIP Gateway Equipment

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

17.3.15 Manageable WLAN Series equipment

17.3.16 Manageable Firewall Series Equipment

17.3.17 Manageable DPI Equipment

17.3.18 Manageable SVN Series EquipmentManageable SVN series equipment are listed as follows:

17.3.19 Manageable OP-Bypass EquipmentManageable OP-Bypass equipment are listed as follows:

17.3.1 Manageable MSTP Series EquipmentManageable MSTP series equipment is listed as follows:

Table 17-5 Manageable MSTP series equipment

Category Equipment Description

SDH series OptiX 155C OptiX 155C SDH transmission unit forthe access network

OptiX 155S OptiX 155S simplified STM-1 opticaltransmission system

OptiX 1556/622B_IOptiX 1556/622B_II

OptiX 155/622B STM-1/STM-4compatible optical transmission system(19-inch rack)

OptiX 2500 OptiX 2500 STM-4/STM-16compatible optical transmission system

OptiX 2500 REG OptiX 2500 REG STM-16 regenerator

MSTP series OptiX Metro 100 OptiX Metro 100 terminal STM-1optical transmission system

OptiX Metro 200 OptiX Metro 200 ultra compact STM-1optical transmission system

OptiX Metro 500 OptiX Metro 500 ultra compact STM-1multi-service transmission system

OptiX 155/622H (Metro1000)

OptiX 155/622H(Metro1000) STM-1/STM-4 MSTP

OptiX Metro 1000 OptiX 155/622H(Metro1000) STM-1/STM-4 MSTP optical transmissionsystem V3 series

OptiX Metro 1050 OptiX Metro 1050 compact STM-1/STM-4 multi-service opticaltransmission system

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-15

Category Equipment Description

OptiX Metro 1100 OptiX Metro 1100 compact containerSTM-16 multi-service transmissionsystem

OptiX 155/622 (Metro2050)

OptiX 155/622(Metro2050) STM-1/STM-4 compatible optical transmissionsystem

OptiX 2500+ (Metro3000)

OptiX 2500+(Metro3000) STM-16MADM/MSTP optical transmissionsystem

OptiX Metro 3100 OptiX Metro 3100 STM-16 multi-service transmission system

OptiX 10G (Metro 5000) OptiX 10G(Metro5000)STM-64MADM optical transmission system

OSN series OptiX OSN 500 OptiX OSN 500 STM-1/STM-4 multi-service CPE optical transmission system

OptiX OSN 1500 OptiX OSN 1500 intelligent opticaltransmission system

OptiX OSN 2000 OptiX OSN 2000 enhanced STM-1/STM-4 multi-service opticaltransmission system

OptiX OSN 2500 OptiX OSN 2500 intelligent opticaltransmission system

OptiX OSN 2500 REG OptiX OSN 2500 REG STM-16regenerator

OptiX OSN 3500OptiX OSN 3500 II

OptiX OSN 3500 intelligent opticaltransmission system

OptiX OSN 7500 OptiX OSN 7500 intelligent opticalswitching system

OptiX OSN 9500 OptiX OSN 9500 intelligent opticalswitching system

17.3.2 Manageable WDM Series EquipmentManageable WDM series equipment is listed as follows:

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Table 17-6 Manageable WDM equipment

Category Equipment Description

Metro WDM series OptiX Metro 6020 OptiX Metro 6020 compactcontainer CWDM systemV100R001

OptiX Metro 6040 OptiX Metro 6040 compactcontainer WDM systemV100R001

OptiX Metro 6040 V2 OptiX Metro 6040 compactcontainer DWDM systemV200R001 or higher

OptiX Metro 6100 OptiX Metro 6100 DWDMmulti-service transmissionsystem V100R002

OptiX Metro 6100V1 OptiX Metro 6100 DWDMmulti-service transmissionsystem V100R003

OptiX Metro 6100 V1E OptiX Metro 6100 WDMmulti-service transmissionsystem V100R004 or higher

OptiX OSN 900A OptiX OSN 900A compactWDM system (A Type)

LH WDM series OptiX BWS 320G OptiX BWS 320G backboneDWDM optical transmissionsystem V300R002

OptiX BWS 320G V3 OptiX BWS 320G backboneDWDM optical transmissionsystem V300R004

OptiX BWS 1600G, OptiXBWS 1600G OLA

OptiX BWS 1600Gbackbone DWDM opticaltransmission systemV100R003 or higher

OptiX BWS 1600S OptiX BWS 1600Ssubmarine line terminalequipment

OptiX OTU40000 OptiX OTU 40000 backboneDWDM optical transmissionsystem

NG WDM series OptiX OSN 1800 OptiX OSN 1800 compactmulti-service edge opticaltransport platform

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-17

Category Equipment Description

OptiX OSN 3800 OptiX OSN 3800 compactintelligent optical transportplatform

OptiX OSN 6800 OptiX OSN 6800 intelligentoptical transport platform

OptiX OSN 8800 T32OptiX OSN 8800 T64

OptiX OSN 8800 T32intelligent optical transportplatformOptiX OSN 8800 T64intelligent optical transportplatform

NOTE

The OptiX BWS 1600G OLA is an independent power supply subrack. It is supported by the OptiX BWS1600G backbone DWDM optical transmission system V100R004 and higher versions.

17.3.3 Manageable NA WDM Series EquipmentManageable NA WDM series equipment is listed as follows:

Table 17-7 Manageable NA WDM equipment

Category Equipment Description

LH WDM series OptiX BWS 1600A OptiX BWS 1600A WDMOptical TransmissionSystem

OptiX BWS 1600G(NA) OptiX BWS 1600G(NA)Backbone DWDM OpticalTransmission System

NG WDM series OptiX OSN 1800(NA)compact intelligent opticaltransport platform

OptiX OSN 1800(NA)

OptiX OSN 3800A compactintelligent optical transportplatform

OptiX OSN 3800A

OptiX OSN 6800Aintelligent optical transportplatform

OptiX OSN 6800A

OptiX OSN 8800 I/II(NA)intelligent optical transportplatform

OptiX OSN 8800 I/II(NA)

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

17.3.4 Manageable Submarine Line EquipmentManageable submarine line equipment is listed as follows:

Table 17-8 Manageable submarine line equipment

Category Equipment Description

Submarine line series OptiX SLM 1630 OptiX SLM 1630 submarineline monitor

OptiX PFE 1670 OptiX PFE 1670 PowerFeeding Equipment

OptiX BWS 1600S OptiX BWS 1600Ssubmarine line terminalequipment

17.3.5 Manageable RTN Series EquipmentManageable RTN series equipment is listed as follows:

Table 17-9 Manageable RTN equipment

Category Equipment Description

RTN series OptiX RTN 605 OptiX RTN 605 radiotransmission system

OptiX RTN 610 OptiX RTN 610 radiotransmission system

OptiX RTN 620 OptiX RTN 620 radiotransmission system

OptiX RTN 910 OptiX RTN 910 radiotransmission system

OptiX RTN 950 OptiX RTN 950 radiotransmission system

OptiX RTN 5000S OptiX RTN 5000S radiotransmission system

17.3.6 Manageable PTN Series EquipmentManageable PTN series equipment is listed as follows:

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-19

Table 17-10 Manageable PTN series equipment

Category Equipment Description

PTN series OptiX PTN 1900 OptiX PTN 1900 multi-service packet transmissionplatform

OptiX PTN 3900 OptiX PTN 3900 multi-service packet transmissionplatform

OptiX PTN 3900-8 OptiX PTN 3900-8 multi-service packet transmissionplatform

OptiX PTN 912 OptiX PTN 912 multi-service packet transmissionplatform

OptiX PTN 910 OptiX PTN 910 multi-service packet transmissionplatform

OptiX PTN 950 OptiX PTN 950 multi-service packet transmissionplatform

17.3.7 Manageable FTTx Series EquipmentManageable FTTx series equipment are listed as follows:

Table 17-11 Manageable FTTx series equipment

Category Equipment Description

OLT series

MA5600T SmartAX MA5600T Multi-service AccessModule

MA5603T SmartAX MA5603T Optical AccessEquipment

MA5680T SmartAX MA5680T Optical AccessEquipment

MA5683T SmartAX MA5683T Optical AccessEquipment

MA5606T SmartAX MA5606T Optical AccessEquipment, Only the version of V800R105support.

MA5603U SmartAX MA5603U Multi-serviceAccess Module

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Category Equipment Description

MDU series

MA5606T SmartAX MA5606T Optical AccessEquipment

MA5620 SmartAX MA5620 Multiple DwellingUnit

MA5626 SmartAX MA5626 Multiple DwellingUnit

MA5628 SmartAX MA5628 Multiple DwellingUnit

MA5620E SmartAX MA5620E EPON MultipleDwelling Unit

MA5626E SmartAX MA5626E EPON MultipleDwelling Unit

MA5620G SmartAX MA5620G GPON MultipleDwelling Unit

MA5626G SmartAX MA5626G GPON MultipleDwelling Unit

MA5610 SmartAX MA5610 Multi-service AccessModule

MA5612 SmartAX MA5612 Multi-service AccessModule

MA5616 SmartAX MA5616 Multi-service AccessModule

MA5651 SmartAX MA5651 Multiple DwellingUnit

MA5651G SmartAX MA5651G Multiple DwellingUnit

MA5652G SmartAX MA5652G GPON MultipleDwelling Unit

MA5635 SmartAX MA5635 Multi-service AccessModule

MA5662 SmartAX MA5662 Multi-Service AccessModule

SRG2220 SRG2220 Service Router Gateway

ONT series

EchoLife:OT550 -

EchoLife:HG850 -

EchoLife:HG850a -

EchoLife:HG851 -

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-21

Category Equipment Description

EchoLife:HG852 -

EchoLife:HG853 -

EchoLife OT925 -

SmartAX OT928 -

EchoLife:HG810 -

EchoLife:HG811 -

EchoLife:HG813 -

EchoLife:HG860 -

EchoLife:HG861 -

EchoLife:HG863 -

EchoLife:HG865 -

EchoLife:HG810a -

EchoLife:HG866 -

EchoLife:HG866e -

U5KG -

810e -

813e -

850e -

925e -

U5KE -

HG8240 -

HG8245 -

HG8247 -

17.3.8 Manageable MSAN Series EquipmentManageable MSAN series equipment are listed as follows:

Table 17-12 Manageable MSAN series equipment

Category Equipment Description

UA5000 series UA5000 UA5000 Universal Access Unit

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Category Equipment Description

UA5000(PVU) UA5000 Universal Access Unit

UA5000(IPMB) UA5000 Universal Access Unit

UA5000(PVMV1) UA5000 Universal Access Unit

MD5500 series MD5500 MD5500 Multi-serviceDistribution Module

17.3.9 Manageable DSLAM Series EquipmentManageable DSLAM series equipment are listed as follows:

Table 17-13 Manageable DSLAM series equipment

Category Equipment Description

MA5100 series

MA5100V2 SmartAX MA5100 Multi-serviceAccess Module

MA5105 SmartAX MA5105 Multi-serviceAccess Module

MA5300 series MA5300 SmartAX MA5300 BroadbandAccess System

MA5600 series

MA5600V3 SmartAX MA5600 Multi-serviceAccess Module

MA5605 SmartAX MA5605 Multi-serviceAccess Module

MA5615 SmartAX MA5615 BroadbandAccess System

MA5600V8 series

MA5600T SmartAX MA5600T Multi-service Access Module

MA5603T SmartAX MA5603T Multi-service Access Module

MA5606T SmartAX MA5606T Multi-service Access Module

17.3.10 Manageable Router Series EquipmentManageable router series equipment are listed as follows:

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-23

Table 17-14 Manageable router series equipment

Category Device Description

NE series routers NE05 Net engine 05 router

NE08 Net engine 08 router

NE16 Net engine 16 router

NE08E Net engine 08E router

NE16E Net engine 16E router

NE20 Net engine 20 router

NE20E Net engine 20E router

NE40 Net engine 40 universal switching router

NE80 Net engine 80 universal switching router

NE40E/NE80E Net engine 40E/80E core router

NE5000E Net engine 5000E core router

R/AR series routers R series routers R series routers

AR18 Advanced router 18 serials router

AR28 Advanced router 28 serials router

AR46 Advanced router 46 serials router

AR19 Advanced router 19 serials router

AR29 Advanced router 29 serials router

AR49 Advanced router 49 serials router

17.3.11 Manageable Switch Series EquipmentManageable switch series equipment are listed as follows:

Table 17-15 Manageable switch series equipment

Category Device Description

S8500 series switches S8505 Quidway S8505 Series RoutingSwitches

S8505E Quidway S8505E Series RoutingSwitches

S8508 Quidway S8508 Series RoutingSwitches

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-24 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Category Device Description

S8512 Quidway S8512 Series RoutingSwitches

S7800 series switches S7800 Quidway S7800 Series EthernetSwitches

S6500 series switches S6502 Quidway S6502 Series EthernetSwitches

S6503 Quidway S6502 Series EthernetSwitches

S6506R Quidway S6506R Series EthernetSwitches

S6506 Quidway S6506 Series EthernetSwitches

S5000 series switches S50 series switches Quidway S5000 Series EthernetSwitches

S55 series switches Quidway S5500 Series EthernetSwitches

S56 series switches Quidway S5600 Series EthernetSwitches

S3000 series switches S30 series switches Quidway S3000 Series EthernetSwitches

S35 series switches Quidway S3500 Series EthernetSwitches

S39 series switches Quidway S3900 Series EthernetSwitches

S2000 series switches S20 series switches Quidway S2000 Series EthernetSwitches

S24 series switches Quidway S2400 Series EthernetSwitches

box series switches S2300 Quidway S2300 Series EthernetSwitches

S2700 Quidway S2700 Series EthernetSwitches

S3300 Quidway S3300 Series EthernetSwitches

S3700 Quidway S3700 Series EthernetSwitches

S5300 Quidway S5300 Series EthernetSwitches

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-25

Category Device Description

S5700 Quidway S5700 Series EthernetSwitches

frame series switches S9300 Quidway S9300 Terabit RoutingSwitch

17.3.12 Manageable Metro Service Platform EquipmentManageable Metro service platform equipment are listed as follows:

Table 17-16 Manageable Metro service platform equipment

Category Device Description

CX series devices CX200 CX200 Metro Services Platform

CX200C CX200C Metro Services Platform

CX200D CX200D Metro Services Platform

CX300 CX300 Metro Services Platform

CX380 CX380 Metro Services Platform

CX600 CX600 Metro Services Platform

17.3.13 Manageable Broadband Access Series EquipmentManageable broadband access series equipment are listed as follows:

Table 17-17 Manageable broadband access series equipment

Category Device Description

Multi-servicegateways

MA5200E Multiservice access 5200E service gateway

MA5200F Multiservice access 5200F service gateway

MA5200G Multiservice access 5200G service gateway

ME60 series Multiservice engine 60 serials service gateway

17.3.14 Manageable VoIP Gateway EquipmentManageable VoIP gateway equipment are listed as follows:

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-26 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Table 17-18 Manageable VoIP gateway equipment

Category Device Description

VoIP Gateway VG10 VoIP gateways 10

VG20 VoIP gateways 20

VG80 VoIP gateways 80

XE series -

17.3.15 Manageable WLAN Series equipmentManageable WLAN Series equipment are listed as follows:

Table 17-19 Manageable WLAN series equipment

Category Device Description

WLAN WA10 AP WLAN 10

WA12 AP WLAN 12

17.3.16 Manageable Firewall Series EquipmentManageable firewall series equipment are listed as follows:

Table 17-20 Manageable firewall series equipment

Category Device Description

Eudemon E8080E Eudemon 8000E series Firewall

E8160E Eudemon 8000E series Firewall

NE40E-FW Eudemon 8000E series Firewall

NE80E-FW Eudemon 8000E series Firewall

E8040 Eudemon 8000 series Firewall

E8080 Eudemon 8000 series Firewall

E1000E U2 Eudemon 1000E series Firewall

E1000E U3 Eudemon 1000E series Firewall

E1000E U5 Eudemon 1000E series Firewall

E1000E U6 Eudemon 1000E series Firewall

Eudemon1000E-D Eudemon 1000E series Firewall

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-27

Category Device Description

Eudemon1000E-I Eudemon 1000E series Firewall

E300 Eudemon 300 series Firewall

E500 Eudemon 500 series Firewall

E1000 Eudemon 1000 series Firewall

E200 Eudemon 200 series Firewall

E100E Eudemon E100E series Firewall

E200S Eudemon E200S series Firewall

USG USG9310 USG9300 Unified Security Gateway

USG9320 USG9300 Unified Security Gateway

USG9210 USG9200 Unified Security Gateway

USG9220 USG9200 Unified Security Gateway

USG5320 USG5000 Unified Security Gateway

USG5330 USG5000 Unified Security Gateway

USG5350 USG5000 Unified Security Gateway

USG5360 USG5000 Unified Security Gateway

USG5310 USG5000 Unified Security Gateway

USG5300ADD USG5000 Unified Security Gateway

USG5300ADI USG5000 Unified Security Gateway

USG2130 USG2100 Unified Security Gateway

USG2130W USG2100 Unified Security Gateway

USG2160 USG2100 Unified Security Gateway

USG2160W USG2100 Unified Security Gateway

E200E-B E200E Unified Security Gateway

USG2160 USG2100 Unified Security Gateway

USG2160W USG2100 Unified Security Gateway

USG2160BSR USG2100 Unified Security Gateway

USG2160BSR-W USG2100 Unified Security Gateway

USG2130BSR USG2100 Unified Security Gateway

USG2130BSR-W USG2100 Unified Security Gateway

USG2120BSR USG2100 Unified Security Gateway

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-28 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Category Device Description

USG2160HSR USG2100 Unified Security Gateway

USG2160HSR-W USG2100 Unified Security Gateway

USG2130HSR USG2100 Unified Security Gateway

USG2130HSR-W USG2100 Unified Security Gateway

Eudemon200E-B E200E Unified Security Gateway

Eudemon200E-BW E200E Unified Security Gateway

USG2130HSR-P USG2100 Unified Security Gateway

USG2130HSR-WP USG2100 Unified Security Gateway

USG2160HSR-P USG2100 Unified Security Gateway

USG2160HSR-WP USG2100 Unified Security Gateway

USG2110-F USG2100 Unified Security Gateway

USG2110-F-W USG2100 Unified Security Gateway

USG2110-A-W USG2100 Unified Security Gateway

USG2110-A-GW-W USG2100 Unified Security Gateway

USG2110-A-GW-C USG2100 Unified Security Gateway

USG2110-A-GW-T USG2100 Unified Security Gateway

USG50 USG50 Unified Security Gateway

USG2110 USG2100 Unified Security Gateway

USG2210 USG2100 Unified Security Gateway

USG2220 USG2100 Unified Security Gateway

USG2230 USG2100 Unified Security Gateway

USG2250 USG2100 Unified Security Gateway

USG2250-D USG2100 Unified Security Gateway

USG2205BSR USG2200 Unified Security Gateway

USG2220BSR USG2200 Unified Security Gateway

USG2220BSR-D USG2200 Unified Security Gateway

E200E_C E200E Unified Security Gateway

E200E_F E200E Unified Security Gateway

E200E-F-D E200E Unified Security Gateway

USG2220BSR USG2200 Unified Security Gateway

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-29

Category Device Description

USG2205BSR USG2200 Unified Security Gateway

USG2220HSR USG2200 Unified Security Gateway

USG2205HSR USG2200 Unified Security Gateway

USG5150 USG5100 Unified Security Gateway

USG5120 USG5100 Unified Security Gateway

USG5150BSR USG5100 Unified Security Gateway

USG5120BSR USG5100 Unified Security Gateway

USG5150HSR USG5100 Unified Security Gateway

USG5120HSR USG5100 Unified Security Gateway

USG2205HSR USG2200 Unified Security Gateway

USG2220HSR-D USG2200 Unified Security Gateway

USG2220TSM USG2200 Unified Security Gateway

USG2250TSM USG2200 Unified Security Gateway

USG5120-D USG5100 Unified Security Gateway

USG5120BSR-D USG5100 Unified Security Gateway

USG3040 USG3040 Unified Security Gateway

USG3030 USG3030 Unified Security Gateway

SRG SRG2220 SRG2200 Secure Routing Gateway

SRG2220-D SRG2200 Secure Routing Gateway

SRG2210 SRG2200 Secure Routing Gateway

SRG3230 SRG3200 Secure Routing Gateway

SRG3240 SRG3200 Secure Routing Gateway

SRG3240-D SRG3200 Secure Routing Gateway

SRG3250 SRG3200 Secure Routing Gateway

SRG3260 SRG3200 Secure Routing Gateway

SRG20-20 SRG20 Secure Routing Gateway

SRG20-21 SRG20 Secure Routing Gateway

SRG20-30 SRG20 Secure Routing Gateway

SRG20-31 SRG20 Secure Routing Gateway

SRG20-31-D SRG20 Secure Routing Gateway

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-30 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Category Device Description

SRG2220 SRG2200 Secure Routing Gateway

SRG2220-D SRG2200 Secure Routing Gateway

SRG20-10 SRG20 Secure Routing Gateway

SRG1210 SRG1200 Secure Routing Gateway

SRG1210W SRG1200 Secure Routing Gateway

SRG1220 SRG1200 Secure Routing Gateway

SRG1220W SRG1200 Secure Routing Gateway

SRG1210-S SRG1200 Secure Routing Gateway

SRG1210-S SRG1200 Secure Routing Gateway

SRG20-11 SRG20 Secure Routing Gateway

SRG20-12 SRG20 Secure Routing Gateway

SRG20-15 SRG20 Secure Routing Gateway

SRG20-15W SRG20 Secure Routing Gateway

SRG20-12W SRG20 Secure Routing Gateway

EGW EGW2160 EGW2100 series Enterprise Gateway

EGW2160W EGW2100 series Enterprise Gateway

EGW2130 EGW2100 series Enterprise Gateway

EGW2130W EGW2100 series Enterprise Gateway

EGW2220 EGW2200 series Enterprise Gateway

EGW2220-D EGW2200 series Enterprise Gateway

EGW2210 EGW2200 series Enterprise Gateway

EGW3260 EGW3200 series Enterprise Gateway

EGW3250 EGW3200 series Enterprise Gateway

EGW3240 EGW3200 series Enterprise Gateway

EGW3240-D EGW3200 series Enterprise Gateway

EGW3230 EGW3200 series Enterprise Gateway

EGW2112GW EGW2100 series Enterprise Gateway

17.3.17 Manageable DPI EquipmentManageable DPI equipment are listed as follows:

iManager U2000 Unified Network Management SystemProduct Description 17 Management Capability

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

17-31

Table 17-21 Manageable DPI equipment

Category Device Description

SIG SIG9810 SIG9810 DPI Equipment

SIG9820 SIG9820 DPI Equipment

NE40E-DPI NE40E-DPI DPI Equipment

NE80E-DPI NE80E-DPI DPI Equipment

SIG Server SIG DPI Equipment

DPI Server DPI DPI Equipment

RADIUS Server RADIUS DPI Equipment

URL Classify Server URL Classify DPIEquipment

17.3.18 Manageable SVN Series EquipmentManageable SVN series equipment are listed as follows:

Table 17-22 Manageable SVN series equipment

Category Device Description

SVN SVN3000 SVN3000

17.3.19 Manageable OP-Bypass EquipmentManageable OP-Bypass equipment are listed as follows:

Table 17-23 Manageable OP-Bypass equipment

Category Device Description

OP-Bypass OP-Bypass OP-Bypass

17 Management CapabilityiManager U2000 Unified Network Management System

Product Description

17-32 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

18 Standards Compliance

This topic describes the standards that the U2000 is compliant with.

The U2000 is developed according to the network management system model that the ITU-TTMN series standards define. The information model is constructed based on the object-orientedconcept. Complying with multiple standards, the U2000 has good expandability and reusability.The U2000 complies with the following international standards and protocols:l RFC 793 Telnet/TCP/IP standardsl RFC 1155, RFC 1157, RFC 1212, RFC 1213 and RFC 1215 SNMP V1 series standardsl RFC 1905, RFC 1906, RFC 1907, RFC 1908, RFC 2011, RFC 2012, RFC 2013, RFC 2571,

RFC 2572, RFC 2573, RFC 2574, RFC 2576, RFC 2578, RFC 2579, and RFC 2580 SNMPV2 series standards

l RFC 3411, RFC 3412, RFC 3413, RFC 3414, RFC 3415, RFC 3416, RFC 3417, and RFC3418 SNMP V3 series standards

l RFC 3164 Syslog standardsl ISO 8824 and ISO 8825 ASN.1 standardsl ITU-T standards for managing the telecommunications management network: M.3000, M.

3010, M.3020, M.3100, and M.3400 (without accounting)l HTTP and JAVA interface protocols and standardsl W3C SOAP 1.1/WSDLl TL1 (Telcordia GR-811, GR-831, etc.)l The XML service delivery and inventory query are based on the MTOSI standards as

follows: TMF 518, TMF 612, and TMF 864l CORBA 2.5 protocoll ISO 8824 and ISO 8825 ASN.1 standardsl The CORBA alarm northbound interface complies with the MTNM standards as follows:

TMF 513, TMF 608, and TMF 814

Table 18-1 lists the details of the standards and protocols.

iManager U2000 Unified Network Management SystemProduct Description 18 Standards Compliance

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

18-1

Table 18-1 Details of the Standards and Protocols

StandardsandProtocols Description

RFC 793 Transmission Control Protocol (Darpa Internet Program ProtocolSpecification)

RFC 1155 Structure and Identification of Management Information for TCP/IP-basedInternets

RFC 1212 Concise MIB Definitions

RFC 1213 Management Information Base for Network Management of TCP/IP-basedInternets: MIB-II

RFC 1215 A Convention for Defining Traps for use with the SNMP

RFC 1905 Protocol Operations for Version 2 of the Simple Network ManagementProtocol

RFC 1906 Transport Mappings for Version 2 of the Simple Network ManagementProtocol

RFC 1907 Management Information Base for Version 2 of the Simple NetworkManagement Protocol

RFC 1908 Coexistence between Version 1 and Version 2 of the Internet-standardNetwork Management Framework

RFC 2011 SNMPv2 Management Information Base for the Internet Protocol usingSMIv2

RFC 2012 SNMPv2 Management Information Base for the Transmission ControlProtocol using SMIv2

RFC 2013 SNMPv2 Management Information Base for the User Datagram Protocolusing SMIv2

RFC 2571 An Architecture for Describing SNMP Management Frameworks

RFC 2572 Message Processing and Dispatching for the Simple Network ManagementProtocol

RFC 2573 SNMP Applications

RFC 2574 User-based Security Model (USM) for version 3 of the Simple NetworkManagement Protocol

RFC 2576 Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework

RFC 2578 Structure of Management Information Version 2 (SMIv2)

RFC 2579 Textual Conventions for SMIv2

RFC 2580 Conformance Statements for SMIv2

18 Standards ComplianceiManager U2000 Unified Network Management System

Product Description

18-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

StandardsandProtocols Description

RFC 3411 An Architecture for Describing Simple Network Management Protocol(SNMP) Management Frameworks

RFC 3412 Message Processing and Dispatching for the Simple Network ManagementProtocol (SNMP)

RFC 3413 Simple Network Management Protocol (SNMP) Applications

RFC 3414 User-based Security Model (USM) for version 3 of the Simple NetworkManagement Protocol (SNMPv3)

RFC 3415 View-based Access Control Model (VACM) for the Simple NetworkManagement Protocol (SNMP)

RFC 3416 Version 2 of the Protocol Operations for the Simple Network ManagementProtocol (SNMP)

RFC 3417 Transport Mappings for the Simple Network Management Protocol (SNMP)

RFC 3418 Management Information Base (MIB) for the Simple Network ManagementProtocol (SNMP)

RFC 3164 BSD syslog Protocol

ISO8824-4-2000

Information Technology - Abstract Syntax Notation One (ASN.1):Parameterization of ASN.1 Specifications Amendment 1: ASN.1 semanticmodel

ISO8825-2-1998

Information Technology - ASN.1 Encoding Rules: Specification of PackedEncoding Rules (PER) Second Edition; Technical Corrigendum 1:12/15/1999; Amendment 1: 12/01/2000

ITU-T M.3000

Overview of TMN recommendations

ITU-T M.3010

Principles for a telecommunications management network

ITU-T M.3013

Considerations for a telecommunications management network

ITU-T M.3017

Framework for the integrated management of hybrid circuit/packet networks

ITU-T M.3020

TMN interface specification methodology

ITU-T M.3100

Generic network information model

ITU-T M.3101

Managed Object Conformance statements for the generic network informationmodel

iManager U2000 Unified Network Management SystemProduct Description 18 Standards Compliance

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

18-3

StandardsandProtocols Description

ITU-T M.3180

Catalogue of TMN management information

ITU-T M.3200

TMN management services and telecommunications managed areas:overview

ITU-T M.3300

TMN F interface requirements

ITU-T M.3400

TMN management functions

ITU-T X.720

Management information model

ITU-T X.721

Definition of management information

ITU-T X.722

Guidelines for the definition of managed objects

ITU-T X.733

Information technology - Open Systems Interconnection - SystemsManagement: alarm reporting function

ITU-T X.903

Information technology - Open distributed processing - Reference Model:architecture

ITU-T G.707

Network node interface for the synchronous digital hierarchy (SDH)

ITU-T G.773

Protocol suites for Q-interfaces for management of transmission systems

ITU-T G.774 (01, 02,03, 04)

Synchronous digital hierarchy (SDH) - Management information model forthe network element view

ITU-T G.783

Characteristics of synchronous digital hierarchy (SDH) equipment functionalblocks

ITU-T G.784

Synchronous digital hierarchy (SDH) management

ITU-T G.803

Architecture of transport networks based on the synchronous digital hierarchy(SDH)

ITU-T G.831

Management capabilities of transport networks based on the synchronousdigital hierarchy (SDH)

ITU-T G.851.1

Management of the transport network - Application of the RM-ODPframework

ITU-T G.852.1

Enterprise viewpoint for simple subnetwork connection management

18 Standards ComplianceiManager U2000 Unified Network Management System

Product Description

18-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

StandardsandProtocols Description

ITU-T G.852.2

Enterprise viewpoint description of transport network resource model

ITU-T G.852.3

Enterprise viewpoint for topology management

ITU-T G.852.6

Enterprise viewpoint for trail management

ITU-T G.853.1

Common elements of the information viewpoint for the management of atransport network

ITU-T G.853.2

Subnetwork connection management information viewpoint

ITU-T G.853.3

Information viewpoint for topology management

ITU-T G.853.6

Information viewpoint for trail management

ITU-T G.854.1

Computational interfaces for basic transport network model

ITU-T G.854.3

Computational viewpoint for topology management

ITU-T G.854.6

Computational viewpoint for trail management

RationalUnifiedProcess 5.5

Rational Unified Process

Sif99025 EML-NML interface models

TMF513V2.0

Multi-Technology Network Management Business Agreement NML-EMLInterface Version 2.0

TMF608V2.0

Multi-Technology Network Management Information Agreement NML-EMLInterface Version 2.0

TMF814V2.0

Multi Technology Network Management Solution Set ConformanceDocument Version 2.0

TMF814V2.0

Multi Technology Network Management Solution Set ConformanceDocument Version 2.0

iManager U2000 Unified Network Management SystemProduct Description 18 Standards Compliance

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

18-5

A Glossary and Abbreviations

A

Abnormal Resource When the NMS carries out the operation of device resource polling on the devicemanagement module or the module is refreshed manually, the physical resources of somedevices, such as the card, sub-card and port, cannot be accessed because they have beendeleted or have some faults. So, after the NMS carries out the operation of device resourcepolling on the device management module or the module is refreshed manually again,the result of polling the physical resources differ from the first time. The physicalresources that cannot be polled in the second time are called the abnormal resource.

AIS insertion If there are excessive errors in a channel, AIS can be inserted in this channel to indicateit is unavailable. For a line board, you can set whether to insert AIS when there areexcessive errors in the B1, B2 and B3 bytes. For a tributary board at the E1 or T1 level,you can set whether to insert AIS when there are excessive errors in BIP-2. For a tributaryboard at the E3 level or higher, you can set whether to insert AIS when there are excessiveerrors in the B3 byte.

AIS Alarm Indication Signal. A signal sent downstream in a digital network if an upstreamfailure has been detected and persists for a certain time.

Alarm correlationanalysis

In the case alarm2 is raised within five seconds after alarm1 is raised, and alarm2complies with the conditions defined in the alarm correlation analysis rule, you can eithersuppress the alarm2 or raise its severity level according to the behavior defined in thealarm correlation rule. Such a process is called alarm correlation analysis.

Alarm Level Alarm level is to identify the severity of an alarm or event. It is divided up into fourlevels: critical, major, minor, warning alarm.

Alarm Status Device reports the trap information to NMS. NMS displays the received information onthe alarm start on the topological view.

The alarm state contains four types: urgent alarm, important alarm, subordinate alarmand prompt alarm.

Auto Discovery NMS tests the remote device by using PING or the SNMP parameter module configuredin advanced to discover the IP device or the device that supports SNMP and to add thediscovered devices automatically.

iManager U2000 Unified Network Management SystemProduct Description A Glossary and Abbreviations

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-1

Alarm reversion For the port that has already been configured but not actually loaded with services, thisfunction can be used to avoid generating relevant alarm information, thus preventingalarm interference.

Alarm severity According to ITU-T recommendations, the alarm is classified into four severities:Critical, Major, Minor, and Warning.

Alarm suppression The suppressed alarm of a specific object is not reported. The object here may be thenetworkwide equipment, a specific NE, a specific board and even a specific functionmodule of a specific board.

Alarm A visible or an audible indication to notify the person concerned that a failure or anemergency has occurred. See also Event.

ATM protection group An ATM protection group refers to the logically bound ATM VP network or subnetworkconnections that share the same physical transmission channel. In the VP group (VPG),a pair of VP connections (working connection and its protection connection) is used formonitoring the automatic protection switching, called monitoring connections (APSVPCs). If the monitoring connections switch over, the whole VPG will switch over toquicken the ATM protection switching (as quick as the protection switching of the SDHlayer.

ALS Automatic Laser Shutdown. ALS is turned on when the optical interface board does notcarry services or the optical fibre is faulty. Its service life can be prolonged by decreasingthe duration during which laser is on.

Attribute Property of an object.

Automatic switching When the active board or path fails, the standby one can automatically take over the jobof the active one.

B

Band Width In the data communication area, bandwidth specifies the maximum value of the ratewhen the data passes through some data channel.

Baseline Select the test result when the line is in good condition as the line test baseline, to providea basis of comparison and analysis for the following line test result.

Baseline collection test One of the test types for submarine line. In the case of deployment or fault restoration,or when updating the baseline is required, you need to collect the baseline, to providereference for comparison tests, and alerts or alarms.

Binding In virtual concatenated payload configuration, designating one binding number toidentify the VC4s of the same virtual concatenated payload is called "bind". If a faultoccurs to one of the bound services, all bound services will switch as a whole.

Bit error alarmthreshold

When the bit error reaches a specific limit, the equipment will report an alarm. This limitis the bit error alarm threshold. The threshold can be divided into crossing threshold anddefect threshold.

C

Comparison test inperiodic mode

One of the test types for submarine line. Carry out polling tests for multiple lines on thesame LMU board periodically, compare the test result with the baseline data in in-servicemode, and provide alerts or alarms for the line.

A Glossary and AbbreviationsiManager U2000 Unified Network Management System

Product Description

A-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Comparison test insingle-test mode

One of the test types for submarine line. Test a line by using test parameters of thebaseline collection test in in-service mode, compare the test result with the baseline data,and provide alerts or alarms for the line.

Check alarms The check feature compares one (or more) uncleared alarm on the NMS with that on theNE. If an alarm is included in the current alarms on the NE, it is kept on the NMS. Ifnot, it will be removed from the NMS.

Client A kind of terminal (PC or workstation) connected to a network that can send instructionsto a server and get results through a user interface. See also server.

Clock View The Clock View provides a visible platform to enable:1. NE clock settings2.Networkwide clock synchronisation status query3. Clock tracing and search functions

Configuration data The data that configures the NE hardware for coordination between this NE and otherNEs in the entire network and operation of specified services. Configuration data is theinstruction file of NEs, and it is the key for efficient network running. The typicalconfiguration data includes board configuration, clock configuration and protectionrelationship.

Configurationmanagement

Configuration management enables inventory query of network configuration resources,including relevant configuration of NMS or SNMS, NE, subnet, links, SNC, route, TP,edge point, equipment, and so on. Real-time inventory change report can also be providedthrough this resource, it will be timely reported to the upper NMS to notify the carrierof the current network operation status and ensure data consistency of the upper NMSor SNMS.

Configure To set the basic parameters of an operation object.

Connection point A reference point where the output of a trail termination source or a connection is boundto the input of another connection, or where the output of a connection is bound to theinput of a trail termination sink or another connection. The connection point ischaracterized by the information which passes across it. A bidirectional connection pointis formed by the association of a contradirectional pair.

Connection A "transport entity" which consists of an associated pair of "unidirectional connections"capable of simultaneously transferring information in opposite directions between theirrespective inputs and outputs.

Current alarms Alarms that do not clear, or has cleared but is not acknowledged.

Current performancedata

The performance data stored in the current register is called current performance data.The current 15-minute or 24-hour register (only one for each) is applied to collect theperformance data in the current monitoring period. It changed within the monitor period.

Change Audit Service Change Audit Service is developed to record the change on the network device, includingthe changes on the information about the device, the configuration and the mapping. Itprovides one integrated database. Every application program records these changes inthe database and ensures that these changes in the database are reflected on otherapplications.

Cluster The cluster is an administrative domain composed of a set of switches. It consists of acommand switch and multiple member switches. The management over all the switcheswithin the cluster is realized through a public IP address.

Configuration File Text file, including various configuration on the device.

iManager U2000 Unified Network Management SystemProduct Description A Glossary and Abbreviations

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-3

D

DCC Within an STM-N signal there are two DCC channels, one is the 192 kbit/s DCC-Rchannel composed of bytes D1-D3, and the other is the 576 kbit/s DCC- channelcomposed of bytes D4-D12. All NEs can communicate with one another through theDCC-R. The DCC-M is not the regenerator section overhead and does not supportcommunications among regenerators, and it is used to support communication channelsof more universal purpose.

DNI Dual Node Interconnection. The protection mode defined in G. 842 Recommendationfor the inter-ring service . By using the recommended protection modes, the protectionof the interconnecting service between two ring networks composed of the devices fromdifferent manufacturers and in different protection modes can be realised. Moreover, incase of fibre failure or node failure, services can also be protected.

Domain The domain of the NMS specifies the scope of address or functions which are availableto a certain user.

Dump Dump is a process of exporting alarm data from the database to the customized file andmeanwhile the exported data is cleared in the database.

E

ECC Embedded Control Channel. An ECC provides a logical operations channel betweenSDH NEs, utilising a data communications channel (DCC) as its physical layer.

EMU Environment Monitoring Unit. As one type of power and environment monitoring unit,EMU is installed on the top of the OptiX 155/622H equipment cabinet to monitor theenvironment variables, such as the power supply and temperature. With external signalinput through the relay, fire alarm, smoke alarm, burglary alarm, and so on can bemonitored as well. Displayed on the NMS, the change of environment can be monitoredtimely and accurately.

Equipment set An aggregate of multiple managed equipment. Equipment set facilitates the userauthority management on equipment in the management domain of the NMS. If someoperation authorities over one equipment set are assigned to a user (user group), theseoperation authorities over all equipment of the equipment set are assigned to the user(user group).

F

Failure The fault cause persisted long enough to consider the ability of an item to perform arequired function to be terminated. The item may be considered as failed; a fault has nowbeen detected.

Fault A fault is the inability of a function to perform a required action. This does not includean inability due to preventive maintenance, lack of external resources, or planned actions.

Filter The filter is used to filter the matched logs and have the unmatched one left.

Forced switch This command performs the ring switch from working channels to the protectionchannels. This switch occurs regardless of the state of the protection channels, unlessthe protection channels are satisfying a higher priority bridge request.

A Glossary and AbbreviationsiManager U2000 Unified Network Management System

Product Description

A-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

H

History alarms Alarms that have cleared and been acknowledged.

History performancedata

The performance data stored in the history register and the auto-report performance datastored on the NMS are called history performance data in a unified way.

I

Intermediate office It refers to the equipment used for optical fibre management and dispatch in themetropolitan area. It has multiple pairs of interfaces for the optical fibre connection.Every two interfaces in a pair are connected with each other to form a longer physicaloptical fibre path. The physical optical fibre path connecting the transmission equipmentcan comprise two or more sections of optical fibre cascaded via the intermediate office.There is an intermediate office information list for some fibre & cable connections, whichshows the section information about the fibre & cable.

In-Service Mode One of the test modes for submarine line. By using the in-service test mode , you cantest submarine cables and repeaters without damaging the existing services of thesubmarine system.

Image (OS) Binary file, equivalent to the OS of the device and a part of the device version.

IP address In the TCP/IP protocol, it is used to uniquely identify the address of the communicationport, which consists of four bytes in decimal digits, for example, 129.9.161.55.

J

Jitter This index shows the delay stability of many Ping operations with the unit of ms.

L

Label A mark on a cable, a subrack, or a cabinet for identification.

Layer A concept used to allow the transport network functionality to be described hierarchicallyas successive levels; each layer being solely concerned with the generation and transferof its characteristic information.

LCT Local Craft Terminal. The LCT provides the user with single-layer management networksolutions to the transmission network of up to five NEs to realise integrated managementof multi-service transmission network. Usually it uses the cross-over cable or serial portcable to connect one NE, so as to configure and maintain a single NE. See also U2000LCT.

Licence A permission provided by a vendor to authorise the use of specific functions of a product.Usually the licence consists of encrypted codes, and the operation authority varies withdifferent level of licence.

Link The link is responsible to transmit the data from one station to next neighbour stationcorrectly.

Lock NE login This function prohibits the users at lower levels from logging in NE and forces loggedNE users with lower level to log out.

iManager U2000 Unified Network Management SystemProduct Description A Glossary and Abbreviations

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-5

M

Main Topology The default NMS client interface and all topology management functions are accessedhere.

Managementinformation

The signal passing across an access point.

Manual switch When the protection channel is efficient and there is no higher-level switching request,this mode switches the service from the working channel to the protection channel, thustesting whether network still has the protection capability.

Manual test One of the test types for submarine line. You need to set test parameters manually, startthe test, and save the test result as the baseline of the in-service mode.

MO Managed Object. The management view of a resource within the telecommunicationenvironment that may be managed via the agent. Examples of SDH managed objectsare: equipment, receive port, transmit port, power supply, plug-in card, virtual container,multiplex section, and regenerator section.

MS Multiplex Section. A multiplex section is the trail between and including two multiplexsection trail termination functions.

MSP Multiplex section protection. The nodes online achieve protection switching through theK1 and K2 bytes in the multiplex section, including linear 1+1 MS protection switchinglink, linear 1:n MS protection switching link, dedicated MS protection ring and sharedMS protection ring.

N

NE database There are three types of database on NE SCC board as following: (1) DRDB: a dynamicdatabase in a dynamic RAM, powered by battery; (2) SDB: a static database in a power-down RAM; (3) FDB0, FDB0: permanently saved databases in a Flash ROM. In efficientoperation, the NE configuration data is saved in DRDB and SDB at the same time.Backing up an NE database means backing up the NE configuration data from SDB toFDB0 and FDB1.

NE Explorer NE Explorer is the main operation interface of the NMS. For easy navigation, the NEExplorer window presents an expandable directory tree (Function Tree) in the lower leftpane. The configuration, management and maintenance of the equipment are accessedhere.

NE Network Element. NE includes the hardware unit and the software running on it. Usually,one NE has at least an SCC (system control and communication) board which responsiblefor the management and monitoring of the NE. The NE software runs on the SCC board.

NM Network Management. In the telecommunication management network structure, theNMS is located between the NE level and network level, which can supports all functionsat NE level and part of the network level management functions. See also U2000.

NNI Network Node Interface. NNI identifies the interface between the ATM network nodes.See also SDH NNI.

Node Node is one of the topology objects and the minimum unit that represents the devicedisplayed on the topological view. The device is displayed with the node icon on thetopological view. The type of the node includes the router, the switch and the 3rd-partydevice and the virtual node.

A Glossary and AbbreviationsiManager U2000 Unified Network Management System

Product Description

A-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

O

Online help An indexed collection of information on all aspects of the NMS. They can be accessedat any time from the Help menu or by pressing the F1 key.

Optical time domainreflectormeter

OTDR is an optical fault locator and analysis tool for optical fiber networks. The OTDRfeatures a light, compact, hand-held design with an intelligent user interface that is easyand quick to use. The color LCD display and backlight design makes testing work morecomfortable and convenient, whether during daylight or at night.

Out-of-Service Mode One of the test modes for submarine line. By transmitting detection light with high power,the out-of-service test can detect the fiber status and repeater status, to realize the statusdetection and fault point location after fiber cut. In general, when detecting that a line isabnormal during a test in in-service mode, you can carry out a test in out-of-service modeto locate the fault.

OWSP Optical Wavelength Shared Protection. OWSP is a bidirectional ring, where each nodeis equipped with an OWSP. There are two channels (λ1 and λ2) in the main optical pathon the internal and external rings in each span on a ring. The fibre and the OWSP on themain optical path are connected with the optical ports inputting λ1 and λ2 on the mux/demux board (unnecessary to be connected with the OTU), and thus λ1 and λ2 can beadded and dropped at every node.

P

Path protection The working principle of path protection: When the system works in path protectionmode, the PDH path uses the dual-fed and signal selection mode. Through the tributaryunit and cross-connect unit, the tributary signal is sent simultaneously to the east andwest lines. Meanwhile, the cross-connect matrix sends the signal dually sent from theopposite end to the tributary board through the active and standby buses, and thehardware of the tributary board will selectively receive the signal from the two groupsof buses automatically according to the AIS number of the lower order path.

Path A trail in a path layer.

Performance register Performance register is the memory space for performance event counts, including 15-min current performance register, 24-hour current performance register, 15-min historyperformance register, 24-hour history performance register, UAT register and CSESregister.

Performance threshold Performance events usually have upper and lower thresholds. When the performanceevent count value exceeds the upper threshold, a performance threshold-crossing eventis generated; when the performance event count value is below the upper threshold fora period of time, the performance threshold-crossing event is ended. In this way,performance jitter caused by some sudden events can be shielded.

PMU One type of power and environment monitoring unit.

Private line Both communication parties are connected permanently.

Procedure A generic term for an action.

Process A generic term for a collection of actions.

Protection path A specific path that is part of a protection group and is labeled protection.

iManager U2000 Unified Network Management SystemProduct Description A Glossary and Abbreviations

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-7

Protection strategy In case the service route provides multiple service protections, different protectionstrategies can be selected as required. Protection strategy refers to the protection modegiven the priority in use for the trail: protection, no protection, and extra traffic. Of theabove, the protection preference is divided into trail protection and sub-networkconnection protection.

Protection subnet The resources that form a protection subnetwork include NEs and fiber cables. Thecreation of the protection subnetwork actually means that corresponding logical systemis configured for each NE by means of creating the protection subnetwork, the opticalinterfaces (or VC4) of each board are mapped into the logical system, and then theseindependent logical systems are connected with one another to form a complete networkstructure.

Packets Loss Ratio This index shows the packet loss ratio after many Ping operations with the unit of %.

Poll Status The NMS polls the device status and other configuration data periodically and displaysthe polling results on the topology view.

The polling status contains normal, unknown, off-line, light fault, subordinate fault,important fault and urgent fault.

R

ROADM Reconfiguration Optical Add/Drop Multiplexing. ROADM helps you to terminate orpass through any one wavelength at every node without affecting the existing services.At the same time, ROADM can change wavelengths through the NMS remotely, to adjustwavelengths added or dropped in a quick and convenient manner. In addition, ROADMenables power equalization at path level through a built-in power equalization function,and thus adjusts power for pass-through paths in a better way than a band-based dynamicgain equalizer (DGE) does.

Route The IP route selection is in table driving mode. In each host and each router of the Internet,there is a routing table that contains information about how the service is transmittedfrom the source to the sink, providing a basis for route selection. Ethernet static routingin ET1 refers to the mapping relationship between the Ethernet port and the bound path.Its routing type includes port routing and VLAN routing. Port routing: It meansconfiguring a route between the Ethernet port and the bound path port, which is usuallyused for point-to-point networking communication; VLAN routing: It means configuringa route between the Ethernet port and the bound path port based on the VLAN service.It can be used flexibly in point-to-point, point-to-multipoint or multipoint-to-multipointcommunication. The implementation is to divide and converge the data stream accordingto the VLAN flag of the packet. As a VLAN flag can be added to the Ethernet port, theequipment can be applied more flexibly.

Report The report that is generated manually in a real-time fashion.

RTT RTT is the round trip time, which is the time delay of the ping task.

S

Script file It is the text file describing the physical information and configuration information ofthe entire network, including the NE configuration file, port naming file, end-to-endconfiguration file, NE physical view script file, NM information file and serviceimplementation data script file.

A Glossary and AbbreviationsiManager U2000 Unified Network Management System

Product Description

A-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

Schedule Task The report on schedule task that is generated at a interval along with the periodicalrunning of the schedule tasks.

Script A list of instructions for performing a specific task or action, written in a scriptinglanguage.

SDH NNI SDH Network Node Interface. It is applied to build communications connection withthe equipment beyond the NMS management area. Usually, the NM creates an SDH NNIby creating a logical system on the port of an idle line board, and the NE must be a TMwithout protection and fibre connection.

Section A trail in a section layer.

Settings Parameters of an operation that can be selected by the user.

Severity See Alarm Severity.

Subnet mask Also referred to as the network mask off code, it is used to define network segments, sothat only the computers in the same network segment can communicate with one another,thus suppressing broadcast storm between different network segments.

Subnet number Subnetwork number is used to differentiate the different network sections in the sub-network conference. Actually it is the first several digits (one or two) of the user phonenumber. An orderwire phone number is composed of the sub-network number and theuser number.

Subnet Sub-network is the logical entity in the transmission network and comprises a group ofnetwork management objects. A sub-network can contain NEs and other sub-networks.A sub-network planning can better the organisation of a network view.

Support The frame on the bottom of a cabinet, when installing the cabinet on the antistatic floor.

Synchronise NE time Send the system time of the NMS server to NEs so as to synchronise all NEs with theserver.

T

T2000 The T2000 is a subnetwork management system (SNMS). In the TMN architecture, theT2000 is located between the NE level and network level, which can supports all functionof NE-level and part of the network-level management functions. See also NM.

T2100 The T2100 is a network level management system for the optical transmission network,and is located in the network management layer (NML) in the telecommunicationmanagement network (TMN) architecture.

TDA clock source TDA is short for Tone Data Access. For the 2500+ NE equipment, it can be installedwith the external TDA board for which the clock source must be set so that the TDAboard can switch according to the set clock source sequence when clock source switchingoccurs.

TMN Telecommunications Management Network. The entity which provides the means usedto transport and process information related to management functions for thetelecommunications network.

Topology The NMS topology is a basic component of the man-machine interactive interface. Thetopology clearly shows the structure of the network, the alarms of different NEs, sub-networks in the network, the communication status as well as the basic network operationstatus.

iManager U2000 Unified Network Management SystemProduct Description A Glossary and Abbreviations

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-9

Trail managementfunction

A network level management function of the NMS. Through trail management, you canconfigure end-to-end services, view graphic interface and visual routes of a trail, querydetailed information of a trail, filter, search and locate a trail quickly, manage andmaintain trails in a centralised manner, manage alarms and performance data by trail,and print a trail report.

Trail A trail is a kind of transport entity, mainly engaged in transferring signal from the inputof the trail source to the output of the trail sink, and monitoring the integrality of thetransferred signal. According to the different levels of the trail, the trail includes varioustypes (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail, VC4, VC3 and VC12). Amongthem, OTS, OCH and OMS represent the trails in a DWDM layer network. For the ADMand TM equipment in the SDH network, each optical fibre connection corresponds to anSPI, RS or MS trail, and a trail is the general name for service carriers, including SDHand PDH services.

Tributary loopback A fault can be located for each service path by performing loopback to each path of thetributary board. There are three kinds of loopback modes: No loopback, Outloop andInloop.

Threshold The alarm range will be defined after the performance data is collected. The thresholdcontains the upper and lower one, related with the unit and index.

U

U2000 To be oriented to the future network trend, the iManager U2000 that is the unifed networkmanagement system (NMS) combines all-IP and FMC, and manages carrier equipmentand access equipment in a centralized manner.

UAT Unavailable Time. A UAT event is reported when the monitored object generates 10consecutive severely errored seconds (SES) and the SESs begin to be included in theunavailable time. The event will end when the bit error ratio per second is better than10-3 within 10 consecutive seconds.

UNI UNI is the abbreviation for User Network Interface. It identifies the interface betweenthe user and the ATM network node.

Unprotected Services transmitted through an ordinary way, once a failure or interruption occurs, thedata cannot be restored for lack of protection mechanism.

Upload Report all or part of the configuration data of the NE to the NM and overwrite theconfiguration data saved in the NE layer on the NM side.

User group User set refers to the set of NMS users with the same management authorities. The defaultuser group includes: system administrator, system maintainer, system operator andsystem supervisor. The attributes of user set include name and detailed description.

User The user of the NMS client, and the user and his/her password define the correspondingauthority of operation and management of the NMS.

V

VC4 loopback The fault of each VC4 path on the optical fibre can be located by setting loopback foreach VC4 path of the line. There are three kinds of loopback modes: No loopback,Outloop, Inloop.

A Glossary and AbbreviationsiManager U2000 Unified Network Management System

Product Description

A-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)

VC4 server trail The path rate of the VC4 server trail is 150.336Mbit/s. The VC4 server trail providestransparent channels (that is, circuit group) for circuit-layer network nodes (for example,a switch) in a path-layer network, and acts as the basic unit of inter-office communicationpath. When the VC4 server trail is configured, only the higher order cross-connection ofVC4 is generated in the intermediate NE, but no cross-connection is generated at the twoends, that is, no service is added/dropped. Therefore, the VC4 server trail is not atraditional service. It is only the basis for VC3 and VC12 trail creation.

VCI The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in both NNI cell orUNI cell. It indicates the virtual channel in the path. The VPI and VCI together indicatea virtual connection.

View Organize and display rules and filter conditions of the topology data. Customize the viewaccording to requirements of every product and organize the data in the view displayedby the topology module, such as the layer 2 view, VPN view and IP view. By default,the platform provides the physical view. The topology view can be planned accordingto the domain, maintenance relationship and so on.

Edits and displays the rule of the topology data or the filter conditions. It can be tailoredaccording to the requirements

Virtual fibre A virtual fibre is created between SDH equipment that has WDM equipment in between.From SDH equipment perspective, creation of virtual fibres disassociates its fibreconnection with WDM equipment and prevents impact on the auto fibre search function,ensuring independence of SDH trail management.From WDM equipment perspective,its service bearer layer is a virtual fibre instead of a true one after the virtual fibre iscreated. Deletion of the true fibre does not affect trail management.

Virtual NE Like a common NE, a virtual NE is also displayed with an icon on a view, but it is onlyan NE simulated according to the practical situation, which does not represents an actualNE. Therefore, the actual status of this NE cannot be queried and its alarm status cannotbe displayed with colours. Usually, when the trail management function is used for theNEs or sub-networks the NMS cannot manage, or the equipment is interconnected withother vendors NEs for service configuration, the end-to-end service configurationmethod and the trail management capability are provided.

VLAN ID Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes,and one NE can support up to 8K VLAN routes.

VPI The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the NNI cell, and 8 bitsin the UNI cell.

W

Wavelength protectiongroup

The wavelength protection group is important to describe the wavelength protectionstructure. Its function is similar to that of the protection sub-network in the SDH NE.The wavelength path protection can only work with the correct configuration of thewavelength protection group.

WDM service The WDM service is accessed at the client side of the OTU board that can access SANservices.

Web LCT In the TMN architecture, the Web LCT is located in the NE management level, whichcan manage the RTN series and NG WDM series equipment.

Working path A specific path that is part of a protection group and is labelled working.

iManager U2000 Unified Network Management SystemProduct Description A Glossary and Abbreviations

Issue 05 (2010-11-19) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-11

WTR time A period of time that must elapse before a - from a fault recovered - trail/connection canbe used again to transport the normal traffic signal and/or to select the normal trafficsignal from.

WTR Wait to Restore. This command is issued when working channels meet the restoralthreshold after an SD or SF condition. It is used to maintain the state during the WTRperiod unless it is pre-empted by a higher priority bridge request.

WXCP Wavelength Cross-Connection Protection. It is a path protection type for ring networks.In this protection mode, services are switched between the primacy and secondary ringsthrough cross-connection based on the dual fed signal selection principle.

A Glossary and AbbreviationsiManager U2000 Unified Network Management System

Product Description

A-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 05 (2010-11-19)