Documente Academic
Documente Profesional
Documente Cultură
System
V200R016C60
Issue 09
Date 2019-12-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: support@huawei.com
Related Version
The following table lists the product version related to this document.
Intended Audience
This document describes how to install the U2000 and obtain the reference
information required during the installation.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as
follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Change History
Updates between document issues are cumulative. Therefore, the latest document
issue contains all updates made in previous issues.
Contents
6 Powering On a Server...........................................................................................................23
7 Installing the U2000 Server................................................................................................ 24
7.1 Preparing Software Packages........................................................................................................................................... 24
7.2 Pre-installation Check......................................................................................................................................................... 26
7.3 Starting the U2000 Installation Program..................................................................................................................... 28
7.4 Loading a U2000 License................................................................................................................................................... 35
7.5 Verifying the U2000 Server Installation........................................................................................................................ 38
7.5.1 Checking Environment Variables................................................................................................................................. 38
7.5.2 Checking the U2000 Version......................................................................................................................................... 39
9 FAQ........................................................................................................................................... 94
9.3.10 How Do I Verify Downloaded Software Packages Using the PGPVerify Software................................ 126
9.3.11 How to Set the Communication Mode on the U2000 server for the Single-Server System
(Windows).................................................................................................................................................................................... 128
9.3.12 How to Resolve the Problem that the License Does Not Take Effect........................................................ 130
9.3.13 How to Confirm the Encoding Format of the U2000 License File...............................................................130
9.3.14 Failure to Log In to the U2000 Server from a U2000 Client......................................................................... 131
9.3.15 How to Rectify the Failure to Open the CAU Download Web Page Because the Port Is Used........ 133
9.3.16 How to Solve the Problem Where the U2000 Server Fails to Be Installed Due to a Network Issue
......................................................................................................................................................................................................... 134
9.3.17 How Do I Change an H2 Database User's Password? ....................................................................................134
9.3.18 How Do I Change an H2 Database User's Password for the U2000 Guard.............................................136
9.4 Handling the Failure to Install the U2000 Server Software................................................................................ 138
1 Performance indicators
3 Installation Overview
This topic describes how to install the U2000 on Windows 10 (compatible with
Windows 7). Unless otherwise specified, the following operations apply to both
Windows 10 and Windows 7 OSs.
Terms
To ensure the U2000 install successfully, definitions for terms as used in this
document before introducing the U2000 scheme:
● Server: A server can refer to either hardware or software. In the client/server
structure, a server refers to the server program. The term refers to hardware
when used in reference to a computer where a server program runs.
● Workstation: A workstation refers to a high-end microcomputer equipped
with a large and high-resolution monitor, and large-capacity memory and
hard disks. The workstation has powerful functions of processing information,
such as images, and network connection functions.
This section describes the process of installing the U2000 server software. The SQL
Server 2008 database software and U2000 server software need to be installed.
The pre-installation schemes and installation scheme are available.
● Pre-installation scheme: The OS, patches, and U2000 software are pre-
installed on servers delivered by Huawei. Commission the servers directly.
● Installation scheme: If servers are purchased from other suppliers, install the
U2000 server software according to a U2000 deployment plan. For details, see
the associated part in the manual.
Shows the installation flowchart for the U2000 software.
Figure 4-1 Installation flowchart for the single-server system (Windows 10)
The installation of the U2000 server software includes installing the database software. If
the database has been installed on the system, check whether the database can meet
U2000 installation requirements. If the database does not meet the installation
requirements, uninstall and then reinstall it.
5 Installation Preparations
Before installing the U2000 server, you need to learn the configuration
requirements and networking structure of the U2000 server, collect installation
information, check the software, hardware, and environment, and apply for U2000
licenses.
5.1 Configuration Requirements
This section describes the configuration requirements on the hardware and
software of the server before installing the U2000.
5.2 Networking Structure
This section describes the networking structure of the single-server system.
5.3 Collecting Installation Information
This section describes how to collect installation information. Before installation,
collect required information, including the host name, IP address, time zone and
time, user password, and Disk Partition Scheme.
5.4 Checking Required Software
This section describes the software required to be checked. Ensure that the
required software is on-hand and meets the installation requirements before
installing the U2000.
5.5 Checking Hardware Connections
This section describes how to check hardware installation and cable connections
before installing a U2000. If hardware is improperly installed or cable is improperly
connected, unexpected error may occur during installation of the U2000.
5.6 Applying for a U2000 License
The U2000 License file is used to control the functions and management
capabilities of the U2000. If the license file is unavailable, you cannot log in to the
U2000 client, but can log in to the System Monitor client and the MSuite.
Hardware Configuration
The following table shows the configuration requirements on the hardware for the
U2000 server.
Table 5-1 Configuration requirements on the hardware for the U2000 server
Software Configuration
The following table shows the configuration requirements on the software for the
U2000 server.
Table 5-2 Configuration requirements on the software for the U2000 server
OS ● Windows 10
Professional(recommended)
● Windows 7
Professional(compatible)
Application Scenarios
The scenarios to which this document applies will be described.
The scenarios to describe are based on the following configurations:
● Hardware: one server and peripheral devices.
● Software: Windows 10 OS.
IP Address Planning
Planning Principles for IP Addresses are:
● The IP addresses must be unique on the network.
● The NMS application IP address communicate with the OSS in the normal
state.
● The NMS application IP address communicate with the managed equipment
in the normal state.
● The NMS application IP address communicate with U2000 clients in the
normal state.
NMS application This IP address is used for external NMS services such as
IP address communication between the NMS server and clients or
between the NMS server and NEs.
System IP address This IP address is the IP address of the OS. You can use it
to log in to the server to manage and maintain the OS.
Time 14:00
If the server is powered on for the first time, perform the following operations:
1. Log in to the operating system as the HP user, set a password for the OS HP you
can see 9.1.9 How Do I Set a Password for the OS HP.
2. See 9.1.6 How Do I Enable the OS Administrator to Enable the OS Administrator
Administrator user.
3. See 9.1.7 How Do I Set a Password for the OS Administrator to set a password
for the Administrator user.
● The passwords are examples only. Change the passwords after completing the
installation. The default password indicates the initial password used when
the U2000 is installed for the first time. Production preinstallation indicates
the U2000 software has been installed initially.
Enable the OS Administrator and set a password for the OS Administrator see 9.1.6
How Do I Enable the OS Administrator and 9.1.7 How Do I Set a Password for the
OS Administrator.
OS user FP None.
NOTICE
Disk F 300
For details about how to process server disk partition faults, see How to Partition Disks on
Windows 10 Without Loss.
● The installation path, including the installation package path and the U2000 installation
path, can contain only letters, digits, and underscores (_). The installation path cannot
contain spaces or brackets; otherwise, the installation fails.
● The software is installed in a disk with the largest capacity except disk C, for example,
disk D. All operations in this guide are performed in disk D.
If the Read Me_U2000 Version(English) file exists, read the Read Me_U2000
Version(Chinese) file before downloading the software packages. The Read Me_U2000
Version(Chinese) file is stored in the same path as software packages.
1. Log in to https://support.huawei.com/enterprise. Search for U2000 and
select iManager U2000 in the search box on the Support tab. Then, click
Downloads and select a desired version.
2. Download required software packages listed in Table 5-10. It is recommended
that you use the download tool (for example, HedEx_Lite). If you use
Windows Internet Explorer, some software packages may be renamed
automatically after being downloaded to the local computer.
The digital signature file file of the software file in the .asc format must be obtained
by clicking the in the Operation column at the same time. For example, the
software package is U2000version_server_nmsbase_win32_x86.7z, the corresponding
digital signature file is U2000version_server_nmsbase_win32_x86.7z.asc.
3. Use the PGPverify to verify correctness of the software packages. For details,
see How do I Verify Downloaded Software Packages Using the PGPVerify
Software.
4. Obtain the 7-zip software. Use the 7-zip tool to decompress the software
packages, obtain the 7-zip tool with the latest version from Web site https://
downloads.sourceforge.net/sevenzip and install the tool. For more
information about software operation, see the software Help or go to the
official website of the software for technical support.
Using DVDs
Ensure that the following DVDs are on-hand before installing the U2000 by using
DVDs.
Procedure
Step 1 Ensure that the power cables and ground wires for all components are tightly
connected and in good contact and that the polarities are properly placed.
Step 2 Ensure that all cables are bundled and free of visible damage.
Step 3 Check hardware connections and network cables according to the hardware
connection diagram.
----End
Follow-up Procedure
Remove unnecessary items from the telecommunications room. The workbench
must be neat and the movable floor must be level and clean.
Context
● The license file is not delivered to customers along with a U2000 installation
DVD. Contact Huawei engineers to apply for a license according to the
contract number and the equipment serial number (ESN) of the U2000 server.
● An ESN is a string consisting of 40-digit numerals or letters obtained through
encrypted calculation on the MAC addresses of the U2000 server network
interface. The number of ESNs is the same as the number of MAC addresses
on the U2000 server. The ESN for the USB interface of the IMM is also
contained in the echo information. To avoid applying for a new license due to
replacing certain network interface cards (NICs), save all the ESNs to ensure
proper use of the U2000 License.
● A license needs to be bound to an ESN of the server. If an ESN is changed
because an NIC or server is replaced, contact Huawei technical support
engineers to apply for a new U2000 License.
Procedure
Step 1 Obtain the contract number.
If the U2000 has been installed, using the ESN tool of the U2000 to view the ESN is
recommended. The directory of ESN tool of the U2000 is %IMAP_ROOT%\platform\bin. In
the preceding directories, %IMAP_ROOT% represents the installation directory of the
U2000. Example: D:\oss\server.
Mode 1: View the ESN using the ESN tool of the NMS after installing the U2000.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. Run the following commands:
> esn
Mode 2: Use the ESN tool to generate ESNs before installing the U2000.
Step 3 Send the project contract number and the preceding server ESNs to Huawei
engineers or a local Huawei office.
Step 4 Huawei engineers send the license file to you after obtaining it.
The license file delivered along with the U2000 is in .dat format.
----End
6 Powering On a Server
This section describes how to power on a server and the position of a power
button on a server.
1. Press the power buttons on the external device and monitor of the server.
2. Press the power button on the server.
Highlights the power button on HP Z240 with a blue box.
This section describes how to install the U2000 server, including the pre-
installation check, installation process, installation verification, and handling
process when the installation fails.
7.1 Preparing Software Packages
The U2000 can be installed by using software packages or installation DVDs.
Software packages and the PGP verification files of the software file in the .asc
format must be uploaded to the server if the software packages are used to install
the U2000. If the U2000 is installed by using DVD-ROMs, skip this operation.
7.2 Pre-installation Check
This section describes the checks that need to be performed before you install the
U2000 on Windows 10.
7.3 Starting the U2000 Installation Program
This section describes how to install U2000 server software.
7.4 Loading a U2000 License
This section describes how to load a U2000 license. Before using a U2000, you
must load a U2000 license.
7.5 Verifying the U2000 Server Installation
After the U2000 server software is installed, verify the installation according to on-
site requirements. Operations including powering on the system and starting the
database and server are optional. For example, if the on-site U2000 server has
powered on and the database has started, skip this step.
Prerequisites
Installation software is on-hand. For details, see 5.4 Checking Required Software.
Procedure
Step 1 Log in to the OS of the server as the Administrator user.
If the server is powered on for the first time, perform the following operations:
1. Log in to the operating system as the HP user, set a password for the OS HP you can
see 9.1.9 How Do I Set a Password for the OS HP.
2. See 9.1.6 How Do I Enable the OS Administrator to Enable the OS Administrator
Administrator user.
3. See 9.1.7 How Do I Set a Password for the OS Administrator to set a password for
the Administrator user.
Step 2 After downloading all of the required software packages and the PGP verification
files to the PC, copy the software packages and the PGP verification files of the
software file in the .asc format to the server, such as D:\oss.
NOTICE
Ensure that all mandatory software packages are uploaded. If a software package is not
uploaded, the U2000 installation may be interrupted because a file is lacked. Selecting the
components of the transport, IP, and access domains is recommended. After the
components are selected, you only need not to download software again when adding
domains. In this situation, only the disk space, not the database space, is occupied. The
installation packages to be uploaded are as follows:
● Database software(Mandatory) :
U2000version_server_sqlserver2008_dbper_en_win64_x86.zip
● Basic components (Mandatory) : U2000version_server_nmsbase_win32_x86.7z
● Core components (Mandatory) : U2000version_server_nmscore_win32_x86.7z
● Transport domain component (Optional). Prepare this component if managing transport
or PTN equipment: U2000version_server_nmstrans_win32_x86.7z
● IP domain components (Optional). Prepare these components if managing routers,
switches, or security equipment: U2000version_server_nmsip_win32_x86.7z
● Access domain components (Optional). Prepare this component if managing access
equipment: U2000version_server_nmsaccess_win32_x86.7z
Step 3 Use the PGPverify software to verify the uploaded software packages. See How
Do I Verify Downloaded Software Packages Using the PGPVerify Software.
Step 4 There is no requirement on the decompression sequence of software packages. It
is required that the installation software be decompressed to an NT file system
(NTFS) partition. Right-click a drive and choose Properties from the shortcut
menu to check whether the file system is in the NTFS partition. If the
corresponding partition does not use the NTFS, convert it to an NTFS partition
before decompressing the installation package. For details, see 9.1.11 How to
Convert the File System Type to NTFS.
Step 5 Decompress all installation packages into the same directory.
operations to use the 7-zip. Choose > All apps > 7-Zip > 7-Zip File Manager.
When you use Window 7 OS, please choose > All Programs > 7-Zip > 7-Zip File
Manager.
Select the directory where the installation package is stored on the address bar. Select
all the packages to be decompressed, right-click, and choose 7-Zip > Extract Here from
the shortcut menu.
● During the decompression of all selected software packages, if a message is displayed
asking you whether to overwrite an existing file, click Yes to overwrite the existing file.
----End
Prerequisites
The U2000 server is powered on.
Procedure
Step 1 Check the OS version.
On Windows 7 OS:
1. Right-click the Computer icon on the desktop and choose Properties from the shortcut
menu.
2. In the Windows edition area, check whether the OS version is Windows 7
Professional.
Step 2 Verify that the type of Windows 10 is 64 bit. For details, see 9.1.18 How to Query
the Type of a Windows OS.
Step 3 Check whether the database has been installed. If the SQL Server database has
not been installed, the server software automatically installs the SQL Server
database.
When you use Window 7 OS, please choose > All Programs
2. Check whether the Microsoft SQL Server program exists. If the program
exists, the database has been installed.
If the SQL Server database has been installed, check whether the database is
installed in binary mode. For details, see 9.2.4 How to Check Whether the
SQL Server Database Can Be Sorted in Binary Mode.
3. 3. Run the following command to check whether the isql command can be
executed:
C:\> isql -Usa -SDBSVR
Step 4 If the U2000 has been installed before, ensure that the U2000 database file has
been deleted.
If the database has been installed, uninstall it and then re-install it during the U2000
installation.
1. Choose > All apps > Windows Administrative Tools > Local Security
Policy. The Local Security Policy displays.
1. Choose > Control Panel, the All Control Panel Items window displayed.
2. Click Administrator Tools, the Administrator Tools window displayed.
3. Double-click Local Security Policy, the Local Security Policy window displayed.
2. Choose Security Settings > Account Policies > Password Policy from the
navigation tree as depicted in the image below.
3. Ensure that the value of Minimum password length is equal to or fewer
than 8 characters.
----End
Prerequisites
● The installation software is on-hand. For details about how to obtain the
installation software, see 7.1 Preparing Software Packages.
● Pre-installation checks have been completed. For details about how to
perform pre-installation checks in Windows 10, see 7.2 Pre-installation
Check.
● At least one NIC has been started.
● If the database has been installed, exit the SQL Server enterprise manager
before the U2000 is installed. This operation prevents U2000 installation
failures due to database errors.
● Ensure that the system time of the U2000 server is set correctly. If the system
time is incorrect, the SSL authentication will fail and the U2000 cannot be
installed. The system time of the U2000 server is of great importance.
Changing the system time during U2000 installation is prohibited.
Context
● In the installation process, the installation program needs to start certain
services of a network adapter. Therefore, the network adapter must be
connected to the network; otherwise, the U2000 server cannot be installed.
● If the U2000 software has been installed, the client is also installed on the
server.
● If the SQL Server 2008 has not been installed, the U2000 server software will
automatically install the SQL Server 2008.
Procedure
Step 1 Log in to a Windows OS as an OS user with Administrator rights.
NOTICE
The name of the directory where the installation packages are stored can contain
only letters, digits, and underscores (_). The directory name cannot contain spaces,
brackets, or Chinese characters; otherwise, the installation fails.
When you run a .bat file on Windows 10, a user account control dialog box may be
displayed. In this case, click Yes to allow the program to make changes to the computer.
It may cause the installation failure if run the file not as an Administrator by right-clicking
when installing.
● Mode 1: Installation with a software package:
Run the install.bat file as an Administrator by right-clicking in the directory
where the installation package is decompressed. The Set the Installation
Environment dialog box will be displayed.
– If the database has been installed on the OS, wait 5 to 10 minutes.
– If no database has been installed on the OS, wait about 20 to 30 minutes
until database installation is complete.
Do not close the Set the Installation Environment dialog box during the installation.
It may cause the installation failure if run the file not as an Administrator by right-
clicking when installing.
● Mode 2: Installation with a DVD:
– If no database has been installed on the OS.
i. Insert a database installation DVD-ROM and copy the thirdparty
folder to a local directory, such as D:\oss.
ii. 2. Insert a U2000 installation DVD-ROM. Run the install.bat file as
an Administrator by right-clicking in the root directory of the
installation DVD-ROM.
– If database has been installed on the OS.
Insert a U2000 installation DVD into the DVD-ROM. Run the install.bat
file as an Administrator by right-clicking in the root directory of the
installation disk. The Set the Installation Environment dialog box will
be displayed. Wait 5 to 10 minutes.
It may cause the installation failure if run the file not as an Administrator by right-
clicking when installing.
● If the PATH length exceeds 560 for a 32-bit Windows 10 OS, the follow-up operations
cannot be performed. In this case, shorten the PATH length.
● If the Decompressing the pack package dialog box will be displayed. You can ignore it.
● If the Windows Function dialog box is displayed indicating that .NET Framework3.5
needs to be installed, install it by referring to 9.1.13 How do I install .NET Framework.
Read the installation license agreement carefully. If you accept the agreement, click the I
accept these terms option button.
Step 4 Click I accept the terms, and click Next to continue. The Select Language dialog
box will be displayed.
Step 5 Select a language, such as English.
In a Chinese OS, the language can be set to Chinese or English. In an English OS, the
language can be set only to English.
Step 6 Click Next. The Configure Server dialog box will be displayed.
The installation path is the directory where the installation package is decompressed, such
as d:\oss. The installation path, including the installation package path and the U2000
installation path, can contain only letters, digits, and underscores (_). The installation path
cannot contain spaces or brackets; otherwise, the installation fails.
Step 7 Click Next. The Select Domain dialog box will be displayed.
This section assumes that the access, IP, and transport packages are uploaded and
decompressed. If only the access package is uploaded and decompressed, the page will
display Access domain alone. Select the domain need to be deployed based on the
managed devices. Selecting all the displayed domains is recommended.
● To add other domains, upload and decompress the corresponding packages and perform
the installation again.
● Software packages for the transport and IP components must be selected so as to
manage PTN 6900 series NEs.
Step 8 Click Next. The Configure Database dialog box will be displayed.
1. If the uploaded and decompressed package involves the transport domain, the Version
Style dialog box is displayed. Select the Version Style as required.
2. Click Next. The Version Timeslot Mode will be displayed.
3. Select the time slot mode as required, such as Sequential mode. The Sequential mode,
a timeslot numbering policy recommended by the ITU-T.
The following table lists parameters for the database U2000 user and the
database server.
Parameter Settings
Data File Path Specifies the path for storing data files. The
default installation path is D:\data.
NOTICE
● Please click Browse and change the data file save
path. To meet space requirements for long-term
running, changing this path to a path on another
partition (especially the partition with the largest
remaining space) by referring to the disk partition
planning before installation is recommended.
● Ensure that the disk for saving data files is not a
compact disk. If the disk is a compact disk, creating
an instance database will fail.
Parameter Settings
OSS Database User The OSS database user password must meet the
Password requirements:
● The password contains a minimum of eight
characters and a maximum of 30 characters.
● The password must contain at least four of
the following combinations:
– At least one lower-case letter
– At least one upper-case letter
– At least one digit
– At least one special character ~@#^*-_+
[{}]:./?
Other special characters are not supported.
Do not include other special characters,
such as ()|<>&`!$\"%'=;,space in
passwords.
● The password must be different from the user
name or the user name in reverse order and
cannot contain the complete user name
(case-insensitive).
Set a new password for OSS database user. For
example, Changeme_123.
NOTE
Plan and enter a new password according to the
preceding password rules to ensure system security.
Make a note of your password and keep it in a safe
place. Do not share your password with anyone.
Step 9 Set the installation parameters and click Next. The Preinstallation Check dialog
box will be displayed.
If a check item is abnormal, the Next button is unavailable and the installation
fails to be continued. Perform the following operations to solve the issue.
● If the remaining space of the OS is insufficient, release the space as required.
Click Retry in the Preinstallation Check dialog box until the check item is
displayed normally.
● If the user database is occupied, perform the following operations to solve the
issue.
a. Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services. right-click SQL Server
(MSSQLSERVER) in the right pane, and then choose Stop from the
shortcut menu to stop the database server. Then, choose Start to start
the database server to ensure that no external user accesses the SQL
Server database.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL
Server 2008 > Configuration Tools > SQL Server Configuration Manager > SQL
Server Services. right-click SQL Server (MSSQLSERVER) in the right pane, and then
choose Stop from the shortcut menu to stop the database server. Then, choose Start
to start the database server to ensure that no external user accesses the SQL Server
database.
b. Click Retry in the Preinstallation Check dialog box until the check item
is displayed normally.
● If one item among the database command, database version number,
database environment variable, and database sorting rule is abnormal,
uninstall the database and then install the U2000 again. For details about the
method of uninstalling the database, see 9.2.5 How to Manually Uninstall
the Microsoft SQL Server Database.
● If abnormal prompts to install the database, see software configuration to
reinstall the U2000 server software requirements after checking the operating
system version.
Step 11 Click Next. A progress bar will be displayed. The time required for the installation
depends on the number of components to be installed and the server
configuration. Wait patiently.
The system will display a prompt indicating that installation was successfully
completed.
Step 12 After the preceding settings, click Finish to complete U2000 installation. The Are
you sure you want to restart the operating system now? dialog box will be
displayed.
Step 13 Click No and see 9.1.1 How to Change the IP Address of the Single-Server
System to Change the IP Address of the Single-Server System.
----End
Prerequisites
● The OS and database must run properly.
If the database is not started, choose > All apps > Microsoft SQL
Server 2008 > SQL Server Configuration Manager > SQL Server Services,
right-click SQL Server (MSSQLSERVER) and choose Start to start the
database. If the database has been started, this step is not required.
On Window 7 OS: If the database is not started, choose > All Programs >
Microsoft SQL Server 2008 > Configuration Tools > SQL Server Configuration
Manager > SQL Server Services, right-click SQL Server (MSSQLSERVER) and choose
Start to start the database. If the database has been started, this step is not required.
● The processes of the U2000 must be properly started.
If U2000 services have not been started, double-click the U2000 Server
shortcut icon on the desktop or run the startnms.bat file in the %IMAP_ROOT
%\platform\bin to start U2000 services manually.
The license file name can contain digits, letters, and special characters excluding the
space or \ /:*?"<>|.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
To make both the U2000 commercial and temporary licenses take effect, use the GUI mode.
1. Copy and paste the authorized license to the server where the U2000 client is
installed. If the U2000 and server are on the same computer, directly copying
and pasting the license file to the %IMAP_ROOT%\etc\conf\license path is
prohibited, copy the license file to another directory.
– If you have logged in to the System Monitor before, enter the password for logging
in to the System Monitor.
– The initial password of the admin user is Changeme_123 (It is Admin_123 for a
U2000 that comes preinstalled). The password must be changed during the first
login to ensure system security. Keep the password confidential and change it
regularly.
4. Update the U2000 license.
– If a message indicating that no license is available is displayed when you
log in to the U2000 client.
i. In the Confirm dialog box, click Yes. The Open dialog box will be
displayed.
ii. In the Open dialog box that is displayed, select the new license file
and click Open. The License Comparison Results dialog box will be
displayed.
iii. Click OK.
iv. Click Yes and confirm the loaded license.
v. Click OK.
– If U2000 license is loaded before.
i. Choose Help > License Management > License Information from
the main menu (traditional style); alternatively, double-click System
Management in Application Center and choose License
Management > License Information from the main menu
(application style).
1. Copy the authorized license file to the U2000 server. Directly copying and
pasting the license file to the %IMAP_ROOT%\etc\conf\license path is
prohibited.
After the preceding operations are performed, the license file is automatically loaded to
the %IMAP_ROOT%\etc\conf\license path and renamed.
----End
Procedure
When you use Window 7 OS, Right-click Computer on the desktop and choose Properties from
the shortcut menu.
Step 2 Click Advanced system setting and click the Advanced tab.
Step 3 Click Environment Variables. In the dialog box that is displayed, the environment
variables shown in the following table must exist in the system environment
variable area.
Table 7-1 Environment variables used for installing the U2000 server and client
Environment Variable Name Value
IMAP_CONFIG_PATH %OSS_ROOT%\server\etc\conf
IMAP_ROOT %OSS_ROOT%\server
IMAP_JAVA_HOME D:\oss\OSSJRE\jre_win
IMAP_LOCALE UTF-8
OSS_ROOT D:\oss
Path D:\oss\server\3rdTools\lib;D:\oss\server
\3rdTools\python\bin;D:\oss\server
\3rdTools\python\lib;D:\oss\server
\3rdTools\bin
D:\oss\server\platform\bin;D:\oss
\server\platform\lbin;D:\oss\server
\platform\lib;D:\oss\server\cbb
\platform\lib
IMAP_DBTYPE sqlserver
IMAP_LANG en_US
IMAP_MO_XML_TEMPLATE_DIR %OSS_ROOT%\server\etc\conf
IMAP_ORBTYPE TAO
PYTHONPATH %OSS_ROOT%\server\platform\bin
\script;%OSS_ROOT%\server\platform
\lbin\script;%OSS_ROOT%\server
\platform\lib
SSL_RAND_FILE %OSS_ROOT%\server\var\tmp
\random
PYTHONHOME %OSS_ROOT%\server\3rdTools\python
Use the installation of a U2000 in the D:\oss path as an example. If the U2000 server is
installed in another path, the D:\oss path values are different.
The environment variable in the Path folder is the oss core environment variable. If the
actual Path environment variable does not have the preceding information, uninstall and
reinstall the U2000. If the actual Path environment variable has more information than the
preceding, ignore the variable setting because it does not affect the U2000 operation.
----End
Procedure
Step 1 Log in to a client.
1. On the OS desktop, double-click the U2000 Client shortcut icon.
2. In the dialog box that is displayed, enter a user name and password.
Step 2 Choose Help > About from the main menu. In the About dialog box, check the
U2000 version.
----End
This topic describes how to commission the U2000. Usually, the server delivered by
Huawei has been preinstalled, and you do not need to reinstall the U2000 on the
server.You can directly commission the U2000 and modify the system and U2000
parameters according to on-site requirements to allow for the normal use of the
U2000.If the server has not been preinstalled by Huawei, install the U2000 and
commission the system. To allow the U2000 to manage the network, you must
commission the U2000 before using the U2000 to manage NEs and configuring
services.
Access - As some of
the
Transport domains
may not
be
deployed
during
U2000
installation
, you can
use the
domain
deploymen
t function
to deploy
Deploy
a new
IP domain as
needed so
that the
U2000 can
manage
NEs in this
domain.
NOTE
If some
domains
are gray,
the
domains
have been
deployed.
Access - To disable
the U2000
from
managing
NEs in a
domain,
undeploy
the
domain to
Undeploy improve
Transport
system
operation
efficiency.
Do not
select all
the
domains
because
there must
be at least
one
domain
deployed.
NOTE
IP If some
domains
are gray,
the
domains
have not
been
deployed.
The
Windows
OS does
not
support
configurati
on of the
U2000
server to
function as
For details, see the NTP
section NTP server.
Set NTP NTP server IP address: Service Planning Therefore,
in U2000 Planning you must
Guide. configure
both the
U2000
server and
U2000
clients as
NTP clients
to trace
external
clock
sources.
Route
network
segment 1
v3 Authentication The
Password authentication
password must be
set when the
security level is set
to With
authentication,
without
encryption or
With
authentication
and encryption.
This parameter is
used for the
upper-layer OSS
to access the
U2000 using
SNMP NBIs.
Default value:
Changeme_123.
v3 Privacy The
Password communication
encryption
password must be
set if the security
level is With
authentication
and encryption.
Default value:
Changeme_123.
Incremental
Import:
specifies that
performance
indicators are
incrementally
imported to
the
performance
indicator
template and
only new
indicators are
added to the
original
indicator
template.
Export: The
performance
indicator
template is
exported,
backed up, or
provided to
another U2000
server.
● Manual
configuration:
Before
commissioning,
you must
confirm the
performance
indicators to be
monitored and
print the
performance
data. Modify:
In the dialog
box that is
displayed,
configure the
indicators as
required.
Procedure
Step 1 Ensure that the power cables and ground wires for all components are tightly
connected and in good contact and that the polarities are properly placed.
Step 2 Ensure that all cables are bundled and free of visible damage.
Step 3 Check hardware connections and network cables according to the hardware
connection diagram.
Step 4 Check the plugs and sockets.
1. Ensure that the latches of cable plugs are locked fast.
2. Ensure that the pins in each socket are complete and in good order. Curved
pins may cause short circuits.
----End
Follow-up Procedure
Remove unnecessary items from the telecommunications room. The workbench
must be neat and the movable floor must be level and clean.
Prerequisites
NOTICE
Manually changing the system IP address causes a failure to use the
commissioning tool. Therefore, configure the system IP address through the
commissioning tool.
Context
The commissioning tool is used only after the initial installation of the U2000 is
complete. Do not use the commissioning tool after the U2000 has running for a
period of time. If system parameters need to be commissioned, see section MSuite
in the U2000 Administrator Guide.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Ensure that the U2000 is not running.
Step 3 Perform the following operations to ensure that the SQL Server database has been
started.
Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager, choose SQL Server Services from the navigation tree,
right-click SQL Server (MSSQLSERVER) in the right pane
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager, choose SQL Server
Services from the navigation tree, right-click SQL Server (MSSQLSERVER) in the right pane
– When you log in to the MSuite client, a progress bar is displayed showing the
progress of Refresh Deployment Information. Wait until the operation is
complete.
– The MSuite works in single-user mode. Specifically, only one MSuite client can log
in to the MSuite at one time.
NOTICE
Step 8 After system commissioning parameters are set, restart the system to make the
modifications take effect.
----End
Prerequisites
● If the delivered server has been preinstalled, ensure that system
commissioning is performed. For details, see 8.2.2 Configuring System
Commissioning Parameters.
● If the delivered server has not been preinstalled, ensure that the U2000 is
installed. For details, see Installing the U2000.
● Ensure that the U2000 license has been loaded. For details, see 7.4 Loading a
U2000 License.
Context
The U2000 commissioning parameters cover communication security, U2000 user
security policy, communication between the U2000 and NEs, alarm function, and
common U2000 configurations.
Procedure
Step 1 Log in to the OS as a user with ossuser rights.
Step 2 Perform the following operations to ensure that the U2000 server processes have
been started.
When you use Window 7 OS ,please choose > Run.The Run window will be
displayed.
2. Enter cmd and click OK.
3. In the CLI, run the daem_ps command to check whether the U2000 process is
started.
– If information similar to the following is displayed, the U2000 process has
started.
imapmrb.exe 30616 RDP-Tcp#1 3 19,252 K
imapeventmgr.exe 4392 RDP-Tcp#1 3 19,812 K
imapsysd.exe 27224 RDP-Tcp#1 3 39,720 K
imapwatchdog.exe 36812 RDP-Tcp#1 3 14,216 K
ResourceMonitor.exe 29472 RDP-Tcp#1 3 25,024 K
imap_sysmonitor.exe 8368 RDP-Tcp#1 3 36,628 K
python.exe 33732 RDP-Tcp#1 3 21,216 K
httpd.exe 14920 RDP-Tcp#1 3 11,140 K
java.exe 21572 RDP-Tcp#1 3 92,424 K
httpd.exe 15980 RDP-Tcp#1 3 16,476 K
If information similar to the following is displayed, the U2000 process also has
started.
imapmrb.exe 11116 Services 0
30,392 K
imapeventmgr.exe 11164 Services 0
21,404 K
imapsysd.exe 10236 Services 0 42,116 K
imapwatchdog.exe 8584 Services 0 11,676 K
ResourceMonitor.exe 26056 Services 0 28,184 K
imap_sysmonitor.exe 13168 Services 0 39,632 K
– If no command output is displayed, the U2000 process is not started. You
can run the D:\oss\server\platform\bin\startnms.bat command in the
CLI to start the U2000 process. If information similar to the following is
displayed, the database has to be started. For details, see 12.2 Starting
the Database. Then, execute the startnms.bat file to start the U2000
process.
Service MSSQLSERVER does not running,please start it first.
Step 4 Perform the following operations to change the display style to the traditional
style for the client:
1. Choose File > Preferences from the U2000 Client main menu.
2. Choose Client Display Style from the navigation tree on the Preferences
page.
----End
Result
After U2000 parameters are commissioned, the U2000 and NEs can communicate
with each other properly, and the U2000 works properly.
9 FAQ
This section provides answers to the most frequent questions concerning the
installation.
9.1 Windows OS
Introduce FAQs about Windows OS.
9.2 SQL Server Database
This section describes the FAQs about the SQL Server database.
9.3 U2000 System
This section covers FAQs about the U2000 system.
9.4 Handling the Failure to Install the U2000 Server Software
If the U2000 fails to be installed, you need to handle the problem and re-install
the U2000. This section describes how to handle the failure to install the U2000.
9.1 Windows OS
Introduce FAQs about Windows OS.
Answer
NOTICE
Using virtual network interfaces is prohibited.
Step 1 Shut down the NMS server and all NMS clients.
In the directory of the NMS software after the installation, for example, the D:\oss
\server\platform\bin directory, run the stopnms.bat file or run the D:\oss\server
\platform\bin\stopnms.bat command to end the NMS processes.
1. Choose > All apps > Microsoft SQL Server 2008 > SQL Server Configuration
Manager > SQL Server Services.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL
Server 2008 > Configuration Tools > SQL Server Configuration Manager > SQL
Server Services.
2. Right-click SQL Server (MSSQLSERVER) and choose Start to start the database. If the
database has started, skip this step.
1. Choose > Control Panel > Network and Internet > Network and
Sharing Center > Change adapter settings to access the Network
Connections window.
When you use Window 7 OS, please choose > Control Panel > Network and
Internet > Network and Sharing Center > Change adapter settings to access the
Network Connections window.
2. In the Network and Sharing Center dialog box, click Change adapter
settings.
3. In the Network Connections dialog box that is displayed, right-click the
network connection to be configured and choose Properties from the
shortcut menu.
4. In the Local Area Connection Properties dialog box, click Internet Protocol
Version 4 (TCP/IPv4) and then Properties.
5. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box that is
displayed, enter the new IP address, subnet mask, and default gateway
address, and perform the related modification. Click OK.
6. Access the D:\oss\server\platform\conf directory. Change the values of
LOCALHOST_FIXSERVERNAME, MASTERHOST_FLOATSERVERNAME, and
MASTERHOST_FIXSERVERNAME in the watchdog.ini file from the default
value 127.0.0.1 to local IP address.
7. Access the D:\oss\server\etc\conf\ directory. Change the values of
fixedServerName and floatServerName in the sysconfigure.xml file from
the default value 127.0.0.1 to local IP address.
8. Access the D:\oss\server\etc\apache\conf\extra\ directory. In httpd-
vhosts.conf, add Listen 127.0.0.1:8080 below Listen $
{LOCALHOST_FLOATSERVERNAME}:8080.
9. Access the D:\oss\server\etc\apache\conf\extra\ directory. In httpd-ssl.conf,
add Listen 127.0.0.1:443 below Listen ${LOCALHOST_FLOATSERVERNAME}:
443.
Step 4 Start the server process of the MSuite.
In the D:\oss\engr\engineering directory, double-click the startserver.bat file to
start the server process of the MSuite.
Step 5 Log in to the MSuite client.
1. On the computer where the MSuite client is installed, double-click the U2000
NMS Maintenance Suite shortcut icon on the desktop. Wait about one
minute. The Login dialog box is displayed.
NOTICE
The Login dialog box that is displayed after the Network Management
System Maintenance Suite is logged out of cannot be used for login.
Otherwise, network configuration synchronization fails.
2. Set the related login parameters and click OK. The Management System
Maintenance Suite window is displayed.
– IP Address: Indicates the system IP address of the computer where the
MSuite server is installed.
– Port No.: The default port number is 12212. You do not need to change
the default value during login.
– User Name and Password: The default user name of the MSuite is admin
and the default password is Changeme_123. If the password has not
been changed, for system security, modify the default password and
remember the new password. For details, see Changing the Password of
the MSuite.
A dialog box may be displayed during the process of logging in to the MSuite
client. Click OK according to the prompt.
Step 6 On the Server tab page, right-click the server to be configured and choose
Synchronize Network Configuration from the shortcut menu. Click OK.
Step 7 Manually shut down the MSuite server and the database. Then, restart the OS.
1. Shut down the MSuite server. For details, see Step 2.
2. Shut down the database. For details, see How to Shut Down the SQL Server
Database.
3. Restart the OS.
– If NBIs instances are deployed and the xFTP monitor is configured before
the host name and IP address are changed, you must re-configure NBIs
on the MSuite client and re-configure the xFTP monitor on the U2000
client after changing the IP address and host name.
– The changed IP address will be used for re-configure an NBI. For details,
see the related NBI user guide. For details about how to configure the
xFTP monitor, see the U2000 Help.
----End
Context
Execute change the password of the MSuite. The password of the MSuite on the
secondary site is then automatically changed.
Procedure
Step 1 Log in to the MSuite client. For details, see Logging In to the MSuite Client.
Step 2 On the MSuite client, choose System > Change Passwordfrom the main menu.
The Change Password dialog box is displayed.
Step 3 Click OK. The Change Password dialog box is displayed.
Step 4 Enter the old password and new password.
----End
Prerequisites
● The MSuite server must be started.
● Port 12212 on the MSuite server is open.
● The MSuite client and the server communicate with each other properly.
Context
If you consecutively enter incorrect passwords three times, the IP address of the PC
on which the MSuite client is installed will be locked by the U2000. The U2000 will
unlock this IP address 5 minutes later.
Procedure
Step 1 On a computer where the MSuite client is installed, double-click the U2000 NMS
Maintenance Suite shortcut icon on the desktop and then wait about one minute.
The Login dialog box is displayed.
● If a dialog box showing The client and server versions are different is displayed,
upgrade the client using the CAU. The method of upgrading the U2000 client by using
the CAU is as follow:
– Install the U2000 client software in network mode: In address hurdle input https://
server_IP_address/cau/ (more secure, recommended) or http://
server_IP_address/cau/ in the address box of the Internet Explorer, and press
Enter to access the Web installation page. If you upgrade the U2000 client
software using the CAU, the MSuite client is also upgraded. For details, see U2000
Client Software Installation Guide.
– Log in to a U2000 client, if the The client and server versions are different and
please using the CAU upgraded client message is displayed,.click Yes. Follow the
upgrade wizard to upgrade the client.
● Upgrading the U2000 client will also upgrade the U2000 MSuite client.
The Login dialog box of the MSuite client has the function to keep the login list.
Selecting an IP address from the IP Address drop-down list is recommended. If
the desired IP address is not displayed in the drop-down list, enter an IP address.
● Port: The default port ID is 12212. There is no need to change the default
value during login but ensure that the port is not occupied.
● User Name: The default user name is admin.
● Password: The initial password of the admin user is Changeme_123. If you
have changed the password, enter the current password. The password must
be changed during the first login to ensure system security. Keep the
password confidential and change it regularly.
Step 3 Click Login.
● When you log in to the MSuite client, a progress bar is displayed showing the progress
of Refresh Deployment Information. Wait until the operation is complete.
● The MSuite works in single-user mode. Specifically, only one MSuite client can log in to
the MSuite at one time.Change the initial password upon your first login to ensure
U2000 system security and remember the new password. For details, see Changing the
Password of the MSuite
● .
----End
Follow-up Procedure
If during the login, the that network configuration information is inconsistent
and re-synchronization is required after login a dialog box is warm displayed,
read through the message to learn the server that needs to be synchronized. Then,
synchronize network configuration, for details, see Synchronize Network
Configurations.
Prerequisites
● Ensure that no client logins on the NMS server.
● Ensure that the NMS server programs are already stopped.
● Ensure that the database is running.
● Ensure that the network port for which a system IP address has been
configured during factory installation is connected to the network. Otherwise,
the network configurations will fail to be updated and the U2000 will fail to
be started.
Procedure
Step 1 Log in to the MSuite client. For details, see Logging In to the MSuite Client.
Step 2 On the MSuite client, click the Server tab.
Step 3 Right-click the server whose network configuration needs to be updated and
choose Synchronize Configuration from the shortcut menu. The Synchronize
Configurationa dialog box is displayed for you to confirm the operation.
Step 4 Click OK. A progress bar showing the update scheduleis displayed.
If a message is displayed indicating that you confirm no client logins on the NMS server
and stop the NMS service manually, click OK to stop the configuration synchronize.
Synchronize network configurations after the prerequisites are met.
Step 5 When the system displays Synchronize network configuration success, click OK.
----End
NOTICE
If there are multiple network interfaces and their IP addresses are within different
network segments, the static route can be configured on only one of these
network interfaces. To prevent the failure of one network interface from causing
the disconnection of the entire network, the static route needs to be added on
other network interfaces.
Answer
Step 1 Run the following command on the command prompt window to view the
existing routes:
C:\>route print
----End
Answer
Step 1 Choose > All apps > Windows System from the lower-right corner.
Step 2 Right-click Command Prompt and choose More > Run as administrator, the
Command Prompt window displayed.
Step 3 Run the following command:
net user administrator /active:yes
----End
Question
How do I set a password for the Windows 10 Administrator?
Answer
Step 1 Right-click and choose Computer Management from the shortcut menu. In
the displayed window, click Local Users and Groups and select Users.
Step 2 Right-click Administrator and choose Set Password from the shortcut menu.
Affirm start OS Administrator before set password, for details see 9.1.6 How Do I Enable
the OS Administrator.
Step 3 In the dialog box that is displayed, enter the password, for example
Changeme_123.
To ensure the security of the U2000, passwords must be complex enough. For example, a
password must contain eight or more characters of two types. The allowed characters are
digits, letters, and special characters. Remember to change passwords regularly.
----End
Question
How to change the password of the OS Administrator?
Answer
Step 1 Log in to the OS as the Administrator user.
● If the database is not started, manually start it. Otherwise, login to the database fails
after the password is changed.
● If the password of the Administrator is changed when the SQL Server database is not
started, login to the database fails. In this case, you need to change the password to the
original one, start the SQL Server database, and then change the password of the
Administrator. To ensure the security of the U2000, passwords must be complex
enough. For example, a password must contain eight or more characters of two types.
The allowed characters are digits, letters, and special characters. Remember to change
passwords regularly.
Step 5 In the dialog box that is displayed, enter the old password and the new password,
and confirm the new password.
----End
Answer
Step 1 Ensure that the OS HP is enabled and perform the following operations
Step 2 Right-click and choose Computer Management from the shortcut menu. In
the displayed window, click Local Users and Groups and select Users.
Step 3 Right-click HP and choose Set Password from the shortcut menu.
Step 4 In the dialog box that is displayed, enter the password, for example
Changeme_123.
To ensure the security of the U2000, passwords must be complex enough. For example, a
password must contain eight or more characters of two types. The allowed characters are
digits, letters, and special characters. Remember to change passwords regularly.
----End
Answer
Step 1 Log in to the OS as an Administratoruser.
Step 3 In the System dialog box, click the Remote settings tab.
Step 4 System Properties dialog box, set the remote login right through the option
button as required.
Step 5 Click OK.
----End
Answer
Step 1 Right click > Run. The Run window will be displayed.
Step 2 Enter cmd and click OK.
Step 3 Enter convert Drive letter where the installation package is decompressed: /
FS:NTFS. For example, if software bag in disk F,enter convert F: /FS:NTFS Enter
the corresponding information at the prompt.
Step 4 Restart the OS.
----End
Answer
When you use Window 7 OS, click , right-click Computer and click Manage.
Step 3 In the Computer Management dialog box, choose Storage > Disk Management
from the navigation tree.
Step 4 Right-click (C:) and choose Shrink Volume from the shortcut menu.
Step 5 After the Querying Shrink Space dialog box is displayed, wait for a while.
Step 6 In the Shrink C: dialog box, enter the disk space size to be released and click
Shrink.
Step 7 In the Computer Management dialog box, right-click Unlocated and choose
New Simple Volume from the shortcut menu.
Step 8 In the New Simple Volume Wizard dialog box, click Next.
Step 9 In the Specify dialog box, enter the size of space to be partitioned and click Next.
Step 10 In the Assign Drive Letter or Path dialog box, click the Assign the following
drive letter option button, select an assigned disk from the drop-down list (such
as D), and click Next.
Step 11 In the Format Partition dialog box, click the Format this volume with the
following setting option button, select the Perform a quick format check box,
and click Next.
Step 12 In the Completing the New Simple Volume Wizard dialog box, click Finish.
Step 13 After the new partition status turns to Formatting, click Action and choose
Refresh in the Computer Management dialog box.
----End
Question
How do I install .NET Framework?
Answer
Step 1 Insert the Windows 10 OS DVD to the drive.
Step 3 Choose > All apps > Windows System from the lower-right corner.
Step 4 Right-click Command Prompt and choose More > Run as administrator, the
Command Prompt window displayed.
----End
Answer
Step 1 Log in to the OS as an Administrator user.
Step 3 In the System dialog box, click the Advanced system settings tab.
Step 5 In the Protection Settings, choose Local Disk (C:)(System), click Configure.
Step 6 In the System Protection for Local Disk (C:), choose Disable system protection
and click OK.
Complete setting the disable system protection.
----End
Answer
Step 1 Press Ctrl+Shift+Esc. The Windows Task Manager dialog box is displayed.
Step 2 Click the Processes tab. Right-click the process needs to be ended, and choose End
Process.
----End
Prerequisites
● To use the service of a third-party tool for file transfer, make sure that the
third-party tool configured as the FTP or SFTP service is started, and stop the
FTPservice of the NMS server,otherwise cannot normal proceed file
transmission.
The way of stop the FTP service of the NMS server is Stop the twoftpdaemon process
in the task manager, configure the third-party FTP service, and then restart the
ftpdaemon process.
● The file transfer parameters set on the NMS must be the same as the
parameters set on the FTP or SFTP service.
● If FTP is used, perform operations as required. SFTP is recommended because
it provides better security.
– If the NMS is not installed on the server, log in to https://
mina.apache.org/ftpserver-project/downloads.html to download the
latest apache-ftpserver compression package and refer to the
documents on the website to configure the FTP service. For more
information about software operation, see the software Help or go to the
official website of the software https://mina.apache.org/ftpserver-
project/documentation.html for technical support. In addition to the
apache-ftpserver, the wftpd32.exe is another third-party tool used to
configure the FTP service. The wftpd32.exe cannot be used to configure
the FTP service. Otherwise, an abnormality occurs during remote
database backup.
– If the NMS has been installed on the server, apache-ftpserver will be
automatically installed along with NMS installation. Therefore, you do
not need to manually configure the FTP service after the U2000 is
installed.
Context
● The SFTP service is recommend because it provides better security.
● See operations in this topic on the windows server before NMS data is backed
up or restored.
● User created for minasshd SFTP services is ftpuser by default and the default
password is Changeme_123. To ensure the security of the system, change the
password for the ftpuser user periodically.
Procedure
● Configure the SFTP service.(The SFTP service needs to be configured only
when SFTP is used on a server where the NMS is not installed.)
----End
Question
How to Set the Virtual Memory to the System Managed Size
Answer
Step 1 Log in to a Windows OS as an OS user with Administrator rights.
Step 2 Right-click choose System on the desktop and choose Properties from the
shortcut menu.
Step 3 In the System dialog box, click the Advanced system settings tab.
Step 4 In the System Properties dialog box, click the Advanced tab.
Step 6 In the Performance Options dialog box, click the Advanced tab.
Step 8 In the Virtual Memory dialog box , deselect Automatically manage paging file
size for all drives and click the System managed size option button.
----End
Question
How to query the type of a Windows OS?
Answer
Step 1 Log in to the OS as an Administrator.
Step 3 In the System dialog box, view the value of Windows edition and verify that the
OS version is Windows 10 Professional.
----End
Question
Some system commands, such as ipconfig, can be run in the CLI on Windows10.
How do I log in to the CLI on Windows?
Answer
Step 1 Right click > Run. The Run window will be displayed.
To query the IP address and gateway information about the PC, enter ipconfig and press
Enter.
----End
Question
How to shut down automatic update of the Windows OS?
Answer
Step 1 Log in to the OS as the Administrator.
Step 2 Right click > Run. The Run window will be displayed.
Step 4 Enter services.msc and click OK. The Services window will be displayed.
Step 5 Right-click Windows Update service and choose Properties from the shortcut
menu.
Step 6 On the General tab, change the value of Startup type to Disabled.
----End
Question
How do I check whether the SQL Server database has been installed?
Answer
If the SQL Server database has not been installed, when you install the U2000, the SQL
Server database is automatically installed for the U2000.
----End
Question
How to Shut Down the SQL Server Database?
Answer
Step 1 Log in to Windows10 OS as an OS user with administrator rights.
Step 2 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Server Services.
Step 3 Perform the following operations to ensure that the SQL Server database has been
stopped.
Right-click SQL Server (MSSQLSERVER) and check whether the shortcut menu
option Stop is grayed out.
----End
Question
How do I start the SQL Server database
Answer
Step 1 Log in to Windows10 OS as an OS user with administrator rights.
Step 2 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Server Services.
Step 3 Perform the following operations to ensure that the database is started.
Right-click SQL Server (MSSQLSERVER) and check whether the shortcut menu
option Start is grayed out.
----End
Question
How to Check Whether the SQL Server Database Can Be Sorted in Binary Mode
Answer
Step 1 Log in to Windows10 OS as an OS user with administrator rights.
Step 2 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Server Services.
Step 3 Perform the following operations to ensure that the database is started.
Right-click SQL Server (MSSQLSERVER) and check whether the shortcut menu
option Start is grayed out.
Step 5 If the displayed information includes binary sort, the database is sorted in binary
mode. If the displayed information does not include binary sort, the database is
not sorted in binary mode.
----End
Question
How do I manually uninstall the Microsoft SQL Server database?
Answer
Step 1 Log in to Windows10 OS as an OS user with administrator rights.
Step 2 Ensure that the database is uninstalled correctly by performing the following
steps:
NOTICE
If the message similar with Microsoft SQL Server (2008 and 2008 R2) is not
Compatible with the Windows is displayed during database uninstallation,
ignore it and continue the operation according to the following steps.
The buttons displayed in Control Panel vary according to the check mode on the
upper right corner. Click the button similar to program.
2. Right-click Microsoft SQL Server 2008 (64-bit) and choose Uninstall/
Change.
3. The SQL Server 2008 dialog box will be displayed. Click Remove.
4. The SQL Server 2008 Setup dialog box will be displayed. After operation
completed, click OK.
5. The Select Instance dialog box will be displayed. Select default values, click
Next.
6. The Select Features dialog box will be displayed. Select default values, Select
the uninstalled SQL Server features, click Next.
7. The Removal Rules dialog box will be displayed. After operation completed,
click Next.
8. The Ready to Remove dialog box will be displayed. Click Remove.
9. The Removal Progress dialog box will be displayed. Wait for 3 minutes, after
operation completed, click Next.
10. The Complete dialog box will be displayed. Click Close. The SQL Server 2008
removal completed successfully.
11. Uninstall all database components except Microsoft SQL Server 2008 (64-
bit). Sort the components by Name (with the arrow facing upwards), and
uninstall the components one by one from top to bottom. To uninstall a
component, right-click it and choose Uninstall/Change.
During uninstallation, a message may be displayed indicating that the computer fails
to be restarted. See Step 4 to delete PendingFileRenameOperations.
12. After Microsoft XX is uninstalled, go to theUninstall or change a
programwindow. Right-click a blank area and choose Refresh from the
shortcut menu.Then, right-click the remaining SQL server programs one by
one and clickUninstall .
13. Delete the database-related directories and registry information.
– If the database is installed using a software package, navigate to the
directory where the U2000 installation package is stored and double-click
the manual_clean_sqlserver.bat script in the engr\engineering\script
directory.
– If the database is installed using a DVD-ROM, enter the U2000
installation DVD and double-click the manual_clean_sqlserver.bat script
in the engr\engineering\script directory.
4. Choose > All apps. Check whether Microsoft SQL Server 2008 programs
have been deleted. If not, right-click Microsoft SQL Server 2008 and choose
Delete from the shortcut menu.
When you use Window 7 OS, please choose > All Programs. Check
whether Microsoft SQL Server 2008 programs have been deleted. If not, right-
click Microsoft SQL Server 2008 and choose Delete from the shortcut menu.
5. Right click > Run. In the Run dialog box, enter regedit to open the
registration table, delete the following registry information:
1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server
2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server 2005
Redist
3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server 2008
Redist
4. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server Native
Client 10.0
5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\Setup\ExceptionComponents
6. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\App Paths\setup.exe\RunAsOnNonAdminInstall
7. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\App Paths\setup.exe\BlockOnTSNonInstallMode
8. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSSQLSERVER
9. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services
\SQLSERVERAGENT
10. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services
\MSSQLServerADHelper
11. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services
\MSSQLServerADHelper100
12. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC
13. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session
Manager\PendingFileRenameOperations
14. HKEY_LOCAL_MACHINE\SOFTWARE\ODBC\ODBC.INI\DBSVR
Step 3 After the preceding operations are performed, restart the OS.
Step 4 Ensure that the registries do not contain the PendingFileRenameOperations key
value.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. EnterRegedit.
3. Ensure that the registries do not contain the PendingFileRenameOperations
key value in the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
\Control\Session Manager. If PendingFileRenameOperations is included,
right-click it and choose Delete from the shortcut menu.
----End
Question
How to check the name of the SQL Server database server
Answer
Step 1 Log in to Windows10 OS as an OS user with administrator rights.
Step 2 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Native Client 10.0 Configuration.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Native Client 10.0
Configuration.
Step 3 Click the Aliases tab page to check the name of the SQL Server database server.
----End
Question
How to Check the Version of the SQL Server Database Server
Answer
Step 1 Log in to Windows10 OS as an OS user with administrator rights.
Step 2 Right click > Run. The Run window will be displayed.
Step 3 Enter cmd and click OK.
Step 4 In the CLI, run the following commands to check the database version
information:
C:\> isql -Usa -SDBSVR
----End
Answer
Step 1 Log in to the OS as a user with ossuser rights.
Step 2 Check whether the U2000 server is started:
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. Enter cmd and click OK.
3. Run the daem_ps command in the CLI to check whether the U2000 process is
started.
– If the process list contains imapmrb.exe, imapwatchdog.exe,
imapsysd.exe, imapeventmgr.exe, imap_sysmonitor.exe, and
ResourceMonitor.exe processes, the U2000 server has been started.
– If no command output is displayed, the U2000 process is not started yet.
In this case, run the D:\oss\server\platform\bin\startnms.bat command
or double-click startnms.bat in D:\oss\server\platform\bin\ to start the
U2000 process.
----End
Question
How do I start the processes of the U2000 single-server system
Answer
Step 1 Log in to the OS as a user with ossuser rights.
Step 2 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Server Services.
Step 3 Perform the following operations to ensure that the database is started.
Right-click SQL Server (MSSQLSERVER) and check whether the shortcut menu
option Start is grayed out.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. Enter cmd and click OK.
3. Run the daem_ps command in the CLI to check whether the U2000 process is
started.
– If the process list contains imapmrb.exe, imapwatchdog.exe,
imapsysd.exe, imapeventmgr.exe, imap_sysmonitor.exe, and
ResourceMonitor.exe processes, the U2000 server has been started.
– If no command output is displayed, the U2000 process is not started yet.
In this case, run the D:\oss\server\platform\bin\startnms.bat command
or double-click startnms.bat in D:\oss\server\platform\bin\ to start the
U2000 process.
----End
Question
How do I end the processes of the U2000 single-server system
NOTICE
You can stop all the services of the NMS, including the system monitoring process.
If you use the Stop All NMS Services function of the System Monitor, the system
monitoring process is not ended. Do not use this method if perform operations for
shutting down the NMS that is associated with the database.
Answer
Step 1 Exit all the U2000 clients.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. Enter cmd and click OK.
3. Run the daem_ps command in the CLI to check whether the U2000 process is
stopped.
– If the process list contains imapmrb.exe, imapwatchdog.exe,
imapsysd.exe, imapeventmgr.exe, imap_sysmonitor.exe, and
ResourceMonitor.exe processes, the U2000 server has been started. In
this case, run the D:\oss\server\platform\bin\stopnms.bat command or
double-click stopnms.bat in D:\oss\server\platform\bin\ to stop the
U2000 process.
– If no command output is displayed, the U2000 process is stopped yet.
----End
Question
When the U2000 is installed on Windows OS, the following message is displayed
and the installation is paused. In this case, how do I resolve the problem?
PATH environment's length is
too long. Please delete some useless fields and then perform the installation.
Answer
Step 1 Right-click on the desktop and choose System from the shortcut menu.
Step 2 Click Advanced system setting and click the Advanced tab.
Step 4 Click Environment Variables to check whether the environment variable exceeds
the maximum length. When you check the length of the PATH environment
variable, you may find that %PATH% is added to the environment variable. As a
result, environment variable exceeds the maximum length.
... C:\WINDOWS\system32;%PATH%; ...
In this case, delete %PATH% from the environment variable.
----End
Answer
Prepare installation packages according to the U2000 installation scheme.
Answer
Step 1 On Windows OS, the system displays a message indicating that a suspended file is
already created during the reinstallation of the U2000. This is because the
suspended file is generated during the previous installation.
Enter the following command in the address bar and then press Enter:
%tmp%
----End
Answer
Step 1 Verify that this problem is caused by a failure to find the database installation file.
Step 2 Specify the database installation DVD-ROM path or the decompression path of
the database installation package.
Step 3 Verify that the database installation file matches the OS. If they do not match,
reinstall the database.
----End
Question
During installation of the U2000 server software, the U2000 does not respond
when the progress bar for file copy reaches 80% and a message indicating a
database connection failure is displayed. How to solve this problem?
Answer
Step 1 View the U2000 installation logs. The installation logs show that the fault occurs
because the server memory does not meet the configuration requirement; as a
result, the memory runs out during installation of the U2000 server software.
Step 2 Ensure that server hardware and software meet configuration requirements. For
details, see the U2000 Single-Server System Software Installation Guide (Windows
10).
----End
Question
In a scenario where the U2000 server software is installed by using software
packages, software packages are decompressed, the system displays a message
indicating that the client installation packages and basic packages cannot exist at
the same time. How do I handle this problem?
Answer
This problem arises because both the server software packages and client software
packages are copied and then decompressed at the same time. To resolve this
problem, delete client software packages and then decompress them again.
Answer
● Software packages and signature files correspond to each other and are
stored in the same directory. A software package corresponds to a signature
file. Signature files are released with products and their software packages.
● The extension of signature files is .asc. Generally, the names of signature files
are the same as the names of software packages. That is, when the software
package name is V200R016C60.zip, the corresponding signature file name is
V200R016C60.zip.asc.
● Obtain the PGPVerify tool that is used to verify the completeness of
downloaded software packages and its public key file KEYS.
a. Download and decompress the PGPVerify tool.
n For carrier: visit https://support.huawei.com/carrier/
digitalSignatureAction to download the OpenPGP Signature
Verification Guide package and decompress it. Continue to
decompress the VerificationTools.zip package in the current folder.
n For enterprise: visit https://support.huawei.com/enterprise/
toolNewInfoAction!showDetail?
pid=8221819&show=showServiceDetail&versionid=TV1000000016
to download and decompress the VerificationTools.zip package.
b. Go to the VerificationTools folder that is generated after decompression
and obtain different versions of PGPVerify software for different OSs.
n Windows: PGPVerify.exe (in the Windows directory)
n Solaris: PGPVerify-sparc.tar.bz2 (in the solaris\PGPVerify TOOL
directory)
n Linux: PGPVerify-x86_64.tar.gz (in the linux\X86\bit64\PGPVerify
TOOL directory)
c. Windows OS supports GUI-based verification and CLI-based verification.
Solaris and Linux OSs support CLI-based verification only.
d. KEYS is the public key file.
● PGPVerify is a digital signature verification tool released by Huawei. Users can
select third-party openPGP verification tools based on actual needs.
Tool OS Tool Description
● D:\oss\ indicates the directory that stores the signature file. Change it based
on site requirements. The signature file and software package must be stored
in the same directory.
● To verify a single file, click Single Verify and select the file to be verified.
n The green item indicates passed verification, that is, [PASS].
n The yellow item indicates unsupported verification, that is, [WARN].
For example, the signature file or software version does not exist.
n The red item indicates failed verification, that is, [FAIL].
NOTICE
If a version has multiple signature files to be verified, the version is secure
only when the verification results of all files are "PASS". If the verification
results contain "WARN" or "FAIL", the verification is not passed and
security risks exist. In that event, re-download the software package.
● Assume that the signature file and software package are stored in the D:\oss\
directory, and the PGPVerify tool and public key file are stored in the C:\ directory.
● To verify a single file, run the "C:\PGPVerify.exe" -k "C:\KEYS" -f "D:\oss
\V200R016C60.zip.asc" command.
In the preceding characters in bold, the RSA key ID is consistent with the public
key ID. For a certain file, if no "WARN" or "FAIL" character is contained in other
information, the signature file is valid.
NOTICE
If a version has multiple signature files to be verified, the version is secure
only when the verification results of all files are "PASS". If the verification
results contain "WARN" or "FAIL", the verification is not passed and
security risks exist. In that event, re-download the software package.
----End
Answer
Step 1 Log in to the OS on the U2000 server as an administrator and do as follows to
query the communication mode in use:
Right click > Run. In the Run dialog box, enter cmd to open the command
line interface (CLI). Enter ssl_adm -cmd query to query the communication mode
that the U2000 server is using.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed,enter cmd to open the command line interface (CLI). Enter ssl_adm -cmd query to
query the communication mode that the U2000 server is using.
Right click > Run. In the Run dialog box, enter cmd to open the CLI. Enter
ssl_adm -cmd setmode mode parameter and set the communication mode for
the U2000 server and client.
When you use Window 7 OS, please choose > Run. The Run window will be displayed,
enter cmd to open the CLI. Enter ssl_adm -cmd setmode mode parameter and set the
communication mode for the U2000 server and client.
The available options for mode parameter are common, ssl, and both.
● common: common mode. If mode parameter is set to common, the U2000 server and
client can communicate only in common mode, and http protocol must be used to
download the U2000 client in CAU mode.
● ssl: security mode. If mode parameter is set to ssl, the U2000 server and client can
communicate only in security mode, and https protocol must be used to download the
U2000 client in CAU mode. The security mode is recommended to ensure security for
communication between the U2000 server and client.
● both: indicates that the U2000 server and client can communicate with each other in
either common or SSL mode.
Step 4 If you need to install the client in CAU mode after the server communication
mode is set, you must perform the following operations as the administrator user:
In the U2000 software installation path, for example, D:\oss\cau\bin, run the
cau.bat file to update the CAU. If the following information is displayed, the
operation has been set successfully.
CAU is now updating resource,
please wait...
Script is executed successfully.
----End
9.3.12 How to Resolve the Problem that the License Does Not
Take Effect
Question
A message is displayed indicating that the license of the U2000 is invalid. As a
result, the U2000 cannot be started or certain functions cannot be used.
How do I resolve this problem?
Answer
The possible causes are as follows:
● The license item is incorrect.
● The time setting of the OS is incorrect.
● Check for and rectify the fault on Windows according to the following
precautions:
Answer
The encoding format of the U2000 license file must be UNIX, not DOS.
Possible Causes
The possible causes are as follows:
● The U2000 server does not work properly, the U2000 server fails to start
properly, the disk on the U2000 server is full, or the memory usage of the
U2000 server is high because many processes are started.
● An incorrect user name or password has been entered for logging in to the
U2000 client.
● If the U2000 server runs on Windows, the dynamic port of the SQL Server is
not 1433; therefore, the U2000 server fails to connect to the database and
login to the U2000 server from a U2000 client fails.
● The network between the client and server does not function properly.
● The license file is a temporary one or is damaged.
● The number of clients allowed in the license is restricted.
● The port between the client and server is shielded by firewall or viruses. In
common mode, port 31037 is used by default. In SSL mode, port 31039 is
used by default.
● The version of the client is inconsistent with that of the server.
● The communication protocol used by the client is inconsistent with that used
by the server.
● The user that logs in to the client is locked. This may be caused by too many
times of login failures.
● The IP address of the computer where the client is installed is not listed in the
ACL.
● The OS time on the client is set incorrectly and the ILOG JTGO license is
expired.
● The DCN is faulty.
● The 360 antivirus software has been installed on the server.
● The dfwModule fails to be loaded.
● The maximum client login limit has been reached.
Procedure
Step 1 If an error message is displayed, locate and rectify the fault as prompted.
Step 2 Check whether the server has been started properly. Ensure that the server runs
properly, the disk space of the server is not used up, and not many processes are
started on the server. If many processes are started on the server, the memory
usage is high.
To troubleshoot the full disk space on the server on Windows, perform the
following operations:
Check that disk C is fully used, delete log files, and restart the U2000.
3. Ensure that not many processes are started on the server.
After the U2000 server is started, do not access the JDE desktop (switch to the
CED environment for the U2000 on the live network). Start the U2000 in CLI
mode.
Step 3 Verify that the entered user name and password are correct.
Step 4 If a message indicating that the license file is invalid when you log in to the
U2000 client, rectify the license fault according to 9.3.12 How to Resolve the
Problem that the License Does Not Take Effect and log in to the U2000 client.
Step 5 Choose Help > License Management > License Information from the main
menu (traditional style); alternatively, double-click System Management in
Application Center and choose License Management > Licenes Information
from the main menu (application style).
If the number of clients to log in exceeds the maximum number of clients allowed
in the license, apply for a new license and update the U2000 license file.
Step 6 Check whether the versions of the client and server are consistent. If the versions
are inconsistent, a message will be displayed asking you to upgrade the client. In
this case, try to upgrade or reinstall the client.
Step 7 Check whether the versions of the client and server are consistent. If the versions
are inconsistent, a message will be displayed asking you to upgrade the client. In
this case, try to upgrade or reinstall the client.
Run the ssl_adm -cmd query command on the U2000 server to view the communication
mode of the U2000 server. For details, see 9.3.11 How to Set the Communication Mode
on the U2000 server for the Single-Server System (Windows).
Generally, the communication bandwidth between the client and server is at least
2 Mbit/s and the packet loss ratio is smaller than 0.1%.
To check the network between the client and server, run the following command
on Windows:
> ping -t IP_address_of_the_NMS
Step 9 Check whether the port between the client and server is shielded by firewall or
viruses. Install a virus scanner, scan the entire disk, and remove viruses. If the
client installed on the computer where the server belongs can log in to the server,
but other clients cannot log in, check whether the port has been added to the
Windows firewall. If not, perform the following operations to add the port to the
Windows firewall:
Step 10 Log in to the U2000 client as the admin user and choose Administration > NMS
Security > ACL.
On the U2000, you can set the client IP addresses that can be accessed. If the IP
address of a client is not in the permitted range, the client cannot access the
server. For details, see "Setting the Access Control List" in Chapter "Security
Management" in the U2000 Administrator Guide. If NAT is used for IP address
translation for communication between the client and server, ensure that the
translated IP address is permitted in the ACL.
Step 11 If the number of failed login attempts by using the same user exceeds 3, the login
authority of the user is locked.
You can log in to the client again in 30 minutes (default) or unlock the user as
another user that has the authority, such as user admin.
Step 12 Check whether the system time is the current time. If not, modify the system time.
Step 13 Check whether the 360 antivirus software has deleted some U2000 files. If yes,
uninstall the 360 antivirus software and re-install the U2000.
Step 14 Log in to NE Software Management, check the process list, and start all the
processes with Automatic startup mode.
Step 15 Create a user and use it to log in. For details, see "Setting the Maximum Number
of Sessions" in U2000 Administrator Guide.
----End
Question
How do I rectify the failure to open the CAU download web page because the port
is used?
Answer
Step 1 Run the netstat -aon|findstr port number command in the CLI.
Step 2 On the Processes tab page in Windows Task Manager, right-click the PID and
choose End Process from the shortcut menu.
● Stop the process only after you confirm that it can be stopped. Otherwise, the U2000
may fail to run properly.
● If the PID list is not displayed on the Processes tab page, choose View > Select
Columns from the menu bar and select PID.
----End
Question
How do I solve the problem where the U2000 fails to be installed due to a
network issue.
Answer
During installation of the U2000, some NIC services must be invoked during
software installation. If the NIC is not activated, the U2000 server cannot be
installed properly.
Step 1 Resolve the network issue about the server and reinstall the U2000.
----End
Question
How do I change an H2 database user's password?
Answer
Step 1 Log in to the operating system as the administrator user.
Step 3 In the H2 Manager dialog box, set relevant parameters, as shown in Table 9-3.
Parameter Description
Step 4 Click Change user password. If the Info dialog box showing the following
message is displayed, the password has been successfully changed.
----End
Answer
Stop the Sysguard process on the U2000 before changing the password of the U2000
Guard's H2 database.
● Perform the following operations to change the password of an H2 database
user on the Solaris/SUSE Linux-based U2000:
a. Log in to the OS as the ossuser user over SSH using the PuTTY.
b. Run the following command to start the tool used to manage passwords
of H2 database users:
$ cd /opt/oss/server/base_service/sysguard/H2Manager
$ ./H2Manager.sh
c. Enter the password of the database user dbuser and press Enter. The
default password is Changeme_123. The password must be changed
during the first login to ensure system security. Keep the password
confidential and change it regularly.
Information similar to the following is displayed:
if you want to change the password,please input the old password:
--------------------------------password requirements---------------------------------------
--1: Length between 8 to 30. --
--2: At least one lowercase letter. --
--3: At least one uppercase letter. --
--4: At least one digit. --
--5: At least one special character: ~@#^-_+[{}]:./? --
--6: Other special characters, such as ()|<>&\`!$"%'=;, and space, are not supported. --
--------------------------------------------------------------------------------------------
e. Enter the planned database user password again and press Enter.
If the last line of the command output is as follows, the password has
been successfully changed:
Changing the dbuser's password succeeded.
The tool resides in the U2000 installation directory, which may be different from
the preceding directory. You can modify the U2000 installation directory based on
actual situations.
c. Double-click H2Manager.bat to start the tool.
Information similar to the following is displayed:
please input dbuser's password:
d. Enter the password of the database user dbuser and press Enter. The
default password is Changeme_123.
Information similar to the following is displayed:
if you want to change the password,please input the old password:
--------------------------------password requirements---------------------------------------
--1: Length between 8 to 30. --
--2: At least one lowercase letter. --
f. Enter the planned database user password again and press Enter.
If the following information is displayed, the password has been
successfully changed.
Changing the dbuser's password succeeded.
Context
Using the uninstall.bat program carried by the U2000 to uninstall software is
recommended. For details, see 10 Uninstalling the U2000 Server. If this method
cannot be used to uninstall software after installation fails, refer to the following
operations:
Procedure
Step 1 End U2000 and MSuite processes.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. Enter cmd and click OK.
3. Run the daem_ps command in the CLI to check whether the U2000 process is
stopped.
– If the process list contains imapmrb.exe, imapwatchdog.exe,
imapsysd.exe, imapeventmgr.exe, imap_sysmonitor.exe, and
ResourceMonitor.exe processes, the U2000 server has been started. In
this case, run the D:\oss\server\platform\bin\stopnms.bat command or
double-click stopnms.bat in D:\oss\server\platform\bin\ to stop the
U2000 process.
– If no command output is displayed, the U2000 process is stopped yet.
Step 2 Press Ctrl+Shift+Esc. The Windows Task Manager dialog box is displayed.
Step 3 In the Windows Task Manager dialog box, click the Processes tab and check
whether the httpd and tomcat processes exist. If the two processes exist,
manually end them.
Step 4 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services. right-click SQL Server
(MSSQLSERVER) in the right pane, and then choose Stop from the shortcut menu
to stop the database server. Then, choose Start to start the database server to
ensure that no external user accesses the SQL Server database.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Server Services.
right-click SQL Server (MSSQLSERVER) in the right pane, and then choose Stop from the
shortcut menu to stop the database server. Then, choose Start to start the database server to
ensure that no external user accesses the SQL Server database.
● Choose > All apps. Check whether Microsoft SQL Server 2008
programs have been deleted. If not, right-click Microsoft SQL Server 2008
and choose Delete from the shortcut menu.
When you use Window 7 OS, please choose > All Programs. Check whether
Microsoft SQL Server 2008 programs have been deleted. If not, right-click Microsoft SQL
Server 2008 and choose Delete from the shortcut menu.
Step 6 Restart the OS, log in to the OS as user administrator, and re-install the U2000.
----End
Procedure
Step 1 Log out of all running U2000 clients.
Step 2 End U2000 services and processes. Double-click the stopserver.bat file in the
U2000 path, that is, D:\oss\engr\engineering, to end the U2000 MSuite
processes.
Step 3 End the NMS processes.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. Enter cmd and click OK.
3. Run the daem_ps command in the CLI to check whether the U2000 process is
stopped.
Step 4 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services. right-click SQL Server
(MSSQLSERVER) in the right pane, and then choose Stop from the shortcut menu
to stop the database server. Then, choose Start to start the database server to
ensure that no external user accesses the SQL Server database.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Server Services.
right-click SQL Server (MSSQLSERVER) in the right pane, and then choose Stop from the
shortcut menu to stop the database server. Then, choose Start to start the database server to
ensure that no external user accesses the SQL Server database.
When uninstalling the U2000 server, ensure that the database works properly. If the
database has been stopped, the uninstallation may fail.
----End
Prerequisites
● Preparations for uninstalling the U2000 server software have been completed.
● Ensure that the NMS installation path has been stopped.
Context
● Do not uninstall databases when uninstalling the U2000. If the database
needs to be uninstalled, uninstall the U2000 and then the database.
Otherwise, some data files cannot be deleted.
● If the database and backup files need to be saved, manually back up the D:
\backup\dbbackup directory to a non-installation directory of the U2000
before uninstalling the U2000.
● This operation will uninstall the U2000. Specifically, this operation will cause
NEs fail to be managed and monitored and cause the U2000 database
information to be deleted.
Procedure
If a message is displayed indicating that a process is not stopped and therefore the U2000
cannot be uninstalled, right-click the taskbar and choose Start Task Manager from the
shortcut menu. In the task manager, click the Processes tab and select the Show processes
from all users check box. Check whether the ftpdaemon.exe process exists. If the process
exists, select the process and click End Process.
Step 4 After the uninstallation is complete, the Uninstallation Completed dialog box
will be displayed.
----End
Procedure
Step 1 Log in to a Windows OS as an OS user with administrator rights.
Step 2 Ensure that the shortcut icons are deleted from the Windows desktop. In addition,
ensure that the U2000 menu item has been deleted from the > All apps
menu.
When you use Window 7 OS, please choose > All Programs menu.
Step 3 Ensure that the installation path of the U2000 server, such as the D:\oss path, is
deleted.
Step 4 Ensure that the environment variables of the U2000 have been deleted.
When you use Window 7 OS ,Right-click Computer on the desktop and choose Properties
from the shortcut menu.
2. Click Advanced system setting and click the Advanced tab.
NOTICE
The path environment variable is carried by the system. During U2000
uninstallation, only parameters newly added for the path environment variable
will be deleted.
----End
Prerequisites
● You have obtained the trust certificate (rootCA.cer, subCA1.cer) and identity
certificate (server.p12) used by the server and the encryption password for
the identity certificate.
● The SSL certificates have been backed up.
● Use the FTP to upload the new SSL certificate files (server.p12, rootCA.cer
and subCA1.cer) to the following directory on the U2000 server as the
ossuser user before you replace the SSL certificate of server.
– Solaris/SUSE Linux: /opt/oss/server/certs.
● The directory is true only if the U2000 on Solaris or SUSE Linux OS is installed
in /opt/oss. If the U2000 is not installed in partition /opt, change the
partition in the directory accordingly.
● If security hardening is performed, ossuser FTP/SFTP rights will be disabled. In
this case, you need to upload files to the backup directory in the FTP root
directory as the ftpuser user (the FTP root directory of ftpuser is /opt/
backup/ftpboot) and then copy files to the target directory as the ossuser
user.
– Windows: D:\oss\server\certs.
NOTICE
Place only the certificate files server.p12, rootCA.cer and subCA1.cer in this
directory. Do not place other files in it. Otherwise, the certificate replacement
script will fail to be executed.
Context
● By default, the U2000 client authenticates the U2000 server, but the U2000
server does not authenticate the U2000 client.
● The Huawei-predefined SSL certificates used to safeguard communication
between the U2000 server and client are located in the following directory:
– On Solaris or SUSE Linux OS: /opt/oss/server/etc/ssl.
– On Windows OS: D:\oss\server\etc\ssl.
● The MSuite and the U2000 use the same SSL certificates.
● The following script-based replacement procedure assumes that your OS is
Solaris or SUSE Linux OS. If your OS is Windows, replace the certificates for
the U2000 server in a similar way.
NOTICE
After SSL Certificates for the U2000 server have been replaced, you may fail
to log in to the MSuite.
Procedure
● Replace SSL certificates for the U2000 server through the GUI.
a. Run the following command to stop U2000 process.
Solaris/SUSE Linux Single-Server OS:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
The new encryption password for the identity certificate must meet the following
requirements:
● The password contains a minimum of 8 characters and a maximum of 20
characters.
● At least one space or one special character: `~!@#$%^&*()-_=+\|[{}];:'",<.>/?
● At least two of the following combinations: lowercase letters a to z,
uppercase letters A to Z, and digits 0 to 9.
● The password cannot be the same as the user name or the reverse of the
user name.
f. Click OK.
g. Because the MSuite reuses the U2000 digital certificates, restart the
MSuite server for the certificates to take effect.
● Replace SSL certificates for the U2000 server using a script.
a. Log in to the OS as the ossuser user.
b. Run the following command to stop U2000 process.
Windows OS:
> ssl_adm -cmd replace_certs -dir D:\oss\server\certs
f. Enter the new identity certificate old password, the new identity
certificate new password and reenter the new identity certificate
new password, press Enter.
----End
Follow-up Procedure
● After the SSL digital certificates on the server and clients are replaced, delete
the webrenderer cache directory C:\Users\%username%\thirdparty
\webrender manually on all clients and restart the client processes.
Otherwise, functions depending on webrenderer may fail.
Context
The trust certificate preconfigured by Huawei consists of the root certificate
huaweiossCA.crt and intermediate certificate networkossCA.crt. All of the
certificates need to be deployed on the Internet Explorer.
Procedure
Step 1 Open the Internet Explorer of the U2000 client and choose Tool > Internet
Options from the main menu.
Step 2 In the Internet Options dialog box, select Content tab and click Certificates.
Step 3 In the Certificates dialog box, deploy the root certificate huaweiossCA.crt.
1. Select the Trusted Root Certification Authorities tab and click Import.
2. In the Certificate Import Wizard dialog box, click Next.
3. Click Browse..., select the trusted root certificate huaweiossCA.crt, and click
Next.
----End
Follow-up Procedure
● If the U2000 GUI is displayed abnormally, the SSL certificate fails to be
uploaded. Refer to the preceding operations to redeploy a digital certificate.
● If the dialog which prompted you need trusted certification is displayed in the
U2000 NE management, right-click Continue to this website (not
recommended), and then click Open in the New Window. In the dialog box
that is displayed, click OK. If the Security Alert dialog box for the installation
certificate is displayed, click OK to display the current function GUI. After
finish the operation, the U2000 GUI will display normally.
The U2000 server can be started in three steps: power on the server safely, start
the database, and start the U2000 server processes.
12.1 Powering On the Server Safely
This topic describes how to power on the server in a Windows 10 single-server
system safely.
12.2 Starting the Database
This topic describes how to start the database in a Windows single-server system.
The U2000 can start properly only after the database is started.
12.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a Windows single-
server system. You can log in to the U2000 to manage a network only after
starting the U2000 server processes on the computer on which the U2000 is
installed.
Prerequisites
The OS has been started.
Context
Generally, the database starts along with the OS.
Procedure
Step 1 Log in to the OS as an administrator.
Step 2 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Server Services.
Step 3 Perform the following operations to ensure that the database is started.
Right-click SQL Server (MSSQLSERVER) and check whether the shortcut menu
option Start is grayed out.
----End
Result
Open the task manager of the server and click the Processes tab to check whether
the sqlserver.exe process is started by the dbuser user.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is
running properly, and the database has been started.
Context
● Generally, the U2000 server processes start along with the OS.
● Only one default NMS user, admin, is provided during U2000 software
installation. The admin user is a U2000 administrator with the highest rights
on the U2000 system.
Procedure
Step 1 Log in to the OS as a user with ossuser rights.
Step 2 View the startup information about the U2000 server processes.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. Enter cmd and click OK.
3. Run the daem_ps command in the CLI to check whether the U2000 process is
started.
– If the process list contains imapmrb.exe, imapwatchdog.exe,
imapsysd.exe, imapeventmgr.exe, imap_sysmonitor.exe, and
ResourceMonitor.exe processes, the U2000 server has been started.
– If no command output is displayed, the U2000 process is not started yet.
In this case, run the D:\oss\server\platform\bin\startnms.bat command
or double-click startnms.bat in D:\oss\server\platform\bin\ to start the
U2000 process.
Step 3 Check the running status of every process on the System Monitor client.
1. Choose > All apps > Network Management System > U2000 System
Monitor or click the shortcut icon on the desktop to start the U2000 System
Monitor client.
When you use Window 7 OS, please choose > All Programs > Network
Management System > U2000 System Monitor or click the shortcut icon on the desktop
to start the U2000 System Monitor client.
2. In the Login dialog box, enter a user name and a password.
● Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). For details, see
section 9.3.11 How to Set the Communication Mode on the U2000 server for the
Single-Server System (Windows) to query or change the communication mode of the
server.
● The initial password of the admin user is Changeme_123 (It is Admin_123 for a U2000
that comes preinstalled). The password must be changed during the first login to ensure
system security. Keep the password confidential and change it regularly.
----End
Result
● If the U2000 services with the startup type of Automatic have started
properly, the U2000 runs properly.
● If some services have not started, select them, right-click, and choose Start
the Service from the shortcut menu.
● If the U2000 does not run properly, contact Huawei engineers.
Follow-up Procedure
● The network management system maintenance suite is used for U2000
commissioning, maintenance, and redeployment.
Log in to the OS as a user with administrator rights, in the Windows Task
Manager dialog box, check whether msdaemon.exe and msserver.exe are
listed.
– If the two processes are listed, the MSuite server has started.
– If the two processes are not listed, the MSuite server has not started.
Navigate to the D:\oss\engr\engineering directory of U2000 server and
double-click startserver.bat to start the MSuite server.
● If login to a U2000 client fails, see 9.3.14 Failure to Log In to the U2000
Server from a U2000 Client.
● If the above checks have one does not meet the requirements, the installation
was abnormal, see 9.4 Handling the Failure to Install the U2000 Server
Software.
Three steps are required to shut down the U2000 server: stop the U2000 server
processes, shut down the database, and power off the server safely.
13.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs.
Stop the U2000 server processes only for some special purposes, for example,
changing the system time of the computer where the server is installed or
upgrading the version. This topic describes how to stop the U2000 server processes
on a Windows single-server system.
13.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting
down the database, stop the U2000 server processes. This topic describes how to
shut down the database on a Windows single-server system.
13.3 Powering Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the
database. This topic describes how to power off the Windows single-server system
safely.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. Enter cmd and click OK.
3. Run the daem_ps command in the CLI to check whether the U2000 process is
stopped.
– If the process list contains imapmrb.exe, imapwatchdog.exe,
imapsysd.exe, imapeventmgr.exe, imap_sysmonitor.exe, and
ResourceMonitor.exe processes, the U2000 server has been started. In
this case, run the D:\oss\server\platform\bin\stopnms.bat command or
double-click stopnms.bat in D:\oss\server\platform\bin\ to stop the
U2000 process.
– If no command output is displayed, the U2000 process is stopped yet.
----End
Result
In Windows Task Manager, click the Processes tab and check that there is no
process such as imapmrb.exe, imapwatchdog.exe, imapsysd.exe,
imapeventmgr.exe, imap_sysmonitor.exe, and ResourceMonitor.exe. So the
U2000 server processes have been stopped.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose > All apps > Microsoft SQL Server 2008 > SQL Server
Configuration Manager > SQL Server Services.
When you use Window 7 OS, please choose > All Programs > Microsoft SQL Server
2008 > Configuration Tools > SQL Server Configuration Manager > SQL Server Services.
Step 3 Perform the following operations to ensure that the SQL Server database has been
stopped.
Right-click SQL Server (MSSQLSERVER) and check whether the shortcut menu
option Stop is grayed out.
● If Stop is grayed out, the SQL Server database is stopped.
● If Stop is not grayed out, the SQL Server database is not stopped. Right-click
SQL Server (MSSQLSERVER) and choose Stop from the shortcut menu.
----End
Follow-up Procedure
Two methods are available for checking whether the SQL Server database can
connect normally.
When you use Window 7 OS, please choose > Run. The Run window will be
displayed.
2. In the Run dialog box, enter cmd. A command line interface (CLI) is
displayed.
3. Run the following commands:
> isql -Usa -SDBSVR
Prerequisites
● The U2000 server processes must have been stopped.
● The database must have been shut down.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose > Power > Shut down to shut down the Windows OS.
When you use Window 7 OS, please choose > Shut down.
----End
A
access control list A list of entities, together with their access rights, which are authorized to
have access to a resource.
access control right The level of right granted to a user for his access to certain items.
ACL See access control list
advanced telecom A platform that is used by the hardware of the N2510. To expand the
application system capacity smoothly, you only need to add certain boards to the shelf
environment and need not replace the server. This helps reduce the investments of the
customer.
AIS See Alarm Indication Signal
Alarm A message reported when a fault is detected by a device or by the network
management system during the process of polling devices. Each alarm
corresponds to a recovery alarm. After a recovery alarm is received, the
status of the corresponding alarm changes to cleared.
alarm An operation performed on an alarm. Through this operation, the status of
acknowledgement an alarm is changed from unacknowledged to acknowledged, which
indicates that the user starts handling the alarm. The process during which
when an alarm is generated, the operator needs to acknowledge the alarm
and take the right step to clear the alarm.
alarm correlation A process of analyzing the alarms that meet alarm correlation rules. If
rule analyzing alarm 2 is generated within 5 seconds after alarm 1 is generated and meets
the alarm correlation analysis rules, the EMS masks alarm 2 or improves its
severity level according to the alarm correlation rules.
alarm delay time The alarm delay time consists of the start delay time and the end delay
time. When an NE detects an alarm for a period, the period is the start
delay time. When an NE detects that the alarm disappears for a period, the
period is the end delay time. Unnecessary alarms that are caused by error
reports or jitters can be avoided by setting the delay time.
alarm indication On the cabinet of an NE, there are four indicators in different colors
indicating the current status of the NE. When the green indicator is on, it
indicates that the NE is powered on. When the red indicator is on, it
indicates that a critical alarm is generated. When the orange indicator is on,
it indicates that a major alarm is generated. When the yellow indicator is
on, it indicates that a minor alarm is generated. The ALM alarm indicator
on the front panel of a board indicates the current status of the board.
(Metro)
Alarm Indication A code sent downstream in a digital network as an indication that an
Signal upstream failure has been detected and alarmed. It is associated with
multiple transport layers. Note: See ITU-T Rec. G.707/Y.1322 for specific AIS
signals.
alarm mask On the host, an alarm management method through which users can set
conditions for the system to discard (not to save, display, or query for) the
alarm information meeting the conditions.
alarm reporting to On a device, an alarm is reported to the EMS at once after the alarm is
the EMS generated. On the EMS client, the corresponding alarm information is
immediately displayed on the alarm panel.
alarm severity The significance of a change in system performance or events. According to
ITU-T recommendations, an alarm can have one of the following
severities:Critical, Major, Minor, Warning.
alarm status The devices in the network report traps to the NMS, which displays the
alarm statuses in the topological view. The status of an alarm can be
critical, major, minor and prompt.
alarm When alarm synchronization is implemented, the EMS checks the alarm
synchronization information in its database and on the NEs. If the alarm information on the
two locations is inconsistent, the alarm information on the NEs is
synchronized to the EMS database to replace the original records.
ALC link A piece of end-to-end configuration information, which exists in the
equipment (single station) as an ALC link node. Through the ALC function
of each node, it fulfils optical power control on the line that contains the
link.
ARP Proxy When a host sends an ARP request to another host, the request is processed
by the DSLAM connected to the two hosts. The process is called ARP proxy.
This protocol helps save the bandwidth in the networking of a low-rate
WAN or helps implement the layer 3 communication between access
devices in the networking of layer 2 isolation.
Asynchronous A data transfer technology based on cell, in which packets allocation relies
Transfer Mode on channel demand. It supports fast packet switching to achieve efficient
utilization of network resources. The size of a cell is 53 bytes, which consist
of 48-byte payload and 5-byte header.
ATAE See advanced telecom application environment
ATM See Asynchronous Transfer Mode
Authority and The function of the NMS for authority management. With this function, you
Domain Based can:
Management
1. Partition and control the management authority
2. Manage device nodes and service data by region
3. Allocate users with different management and operation rights for
different regions
auto-negotiation An optional function of the IEEE 802.3u Fast Ethernet standard that enables
devices to automatically exchange information over a link about speed and
duplex abilities.
B
bandwidth A range of transmission frequencies that a transmission line or channel can
carry in a network. In fact, it is the difference between the highest and
lowest frequencies the transmission line or channel. The greater the
bandwidth, the faster the data transfer rate.
BASE A kind of bus or plane used to load software, transmit alarms and maintain
information exchange.
basic input/output A firmware stored in the computer mainboard. It contains basic input/
system output control programs, power-on self test (POST) programs, bootstraps,
and system setting information. The BIOS provides hardware setting and
control functions for the computer.
BFD See Bidirectional Forwarding Detection
Bidirectional A simple Hello protocol, similar to the adjacent detection in the route
Forwarding protocol. Two systems periodically send BFD detection messages on the
Detection channel between the two systems. If one system does not receive the
detection message from the other system for a long time, you can infer
that the channel is faulty. Under some conditions, the TX and RX rates
between systems need to be negotiated to reduce traffic load.
BIOS See basic input/output system
board Board refers to an electronic part that can be plugged in to provide new
capability. It comprises chips and electronic components and these
components are always on a flat and hard base and connected through
conductive paths. A board provides ports for upstream connections or
service provisioning.
Bond Bond: On the SUSE Linux OS, the bond technology is used to form a virtual
layer between the physical layer and the data link layer. This technology
allows two server NICs connecting to a switch to be bound to one IP
address. The MAC addresses of the two NICs are also automatically bound
as one MAC address. In this manner, a virtual NIC is formed. The bond
technology supports two modes: double-live and primary/secondary. In
double-live mode, after receiving request data from a remote server, the
virtual NIC on the server determines data transmission based on an
algorithm, improving network throughput and usability of the server. In
primary/secondary mode, if an NIC does not function properly, services will
be automatically switched to the other NIC, ensuring service protection. The
SUSE Linux OS supports the binding of NICs in primary/secondary mode.
C
C/S See client/server software architecture
CAR See committed access rate
CAU See Client Auto Update
CDE See Common Desktop Environment
CIR See Committed Information Rate
client A device that sends requests, receives responses, and obtains services from
the server.
Client Auto Update This function helps you to automatically detect the update of the client
version and upgrade the client. This keeps the version of the client is the
same as that of the server.
Client/Server The model of interaction in a distributed system in which a program at one
site sends a request to a program at another site and awaits a response.
The requesting program is called a client. The program satisfying the
request is called the server. It is usually easier to build client software than
build the server software.
client/server A message-based and modular software architecture that comprises servers
software and clients. Compared with the centralized, mainframe, and time sharing
architecture computing, the client/server software architecture improves the usability,
flexibility, interoperability, and scalability. In this architecture, a client is
defined as the party that requires services and a server is defined as the
party that provides services. The client/server architecture reduces network
traffic by providing a query response rather than transferring all files.
cluster A mechanism adopted to improve the system performance. Several devices
of the same type form a cluster. The exterior of a cluster is some like a kind
of equipment. In the interior of a cluster, the nodes share the load.
committed access A traffic control method that uses a set of rate limits to be applied to a
rate router interface. CAR is a configurable method by which incoming and
outgoing packets can be classified into QoS (Quality of Service) groups, and
by which the input or output transmission rate can be defined.
Committed The rate at which a frame relay network agrees to transfer information in
Information Rate normal conditions. Namely, it is the rate, measured in bit/s, at which the
token is transferred to the leaky bucket.
Common Desktop The Common Desktop Environment (CDE) is an integrated graphical user
Environment interface for open systems desktop computing. It delivers a single, standard
graphical interface for the management of data and files (the graphical
desktop) and applications. CDE's primary benefits -- deriving from ease-of-
use, consistency, configurability, portability, distributed design, and
protection of investment in today's applications -- make open systems
desktop computers as easy to use as PCs, but with the added power of local
and network resources available at the click of a mouse.
Common Object A specification developed by the Object Management Group in 1992 in
Request Broker which pieces of programs (objects) communicate with other objects in
Architecture other programs, even if the two programs are written in different
programming languages and are running on different platforms. A program
makes its request for objects through an object request broker, or ORB, and
thus does not need to know the structure of the program from which the
object comes. CORBA is designed to work in object-oriented environments.
See also IIOP, object (definition 2), Object Management Group, object-
oriented.
Common Object A specification developed by the Object Management Group in 1992 in
Request Broker which pieces of programs (objects) communicate with other objects in
Architecture other programs, even if the two programs are written in different
programming languages and are running on different platforms. A program
makes its request for objects through an object request broker, or ORB, and
thus does not need to know the structure of the program from which the
object comes. CORBA is designed to work in object-oriented environments.
See also IIOP, object (definition 2), Object Management Group, object-
oriented.
CORBA See Common Object Request Broker Architecture
CORBA See Common Object Request Broker Architecture
Data Data Communications Channel. The data channel that uses the D1-D12
Communication bytes in the overhead of an STM-N signal to transmit information on
Channel operation, management, maintenance and provision (OAM&P) between
NEs. The DCC channels that are composed of bytes D1-D3 is referred to as
the 192 kbit/s DCC-R channel. The other DCC channel that are composed of
bytes D4-D12 is referred to as the 576 kbit/s DCC-M channel.
data communication A communication network used in a TMN or between TMNs to support the
network data communication function.
data replication link A link used for data replication between the production machine and
redundancy machine. It is separated from the network of the primary links.
DCC See Data Communication Channel
DCN See data communication network
DDN See digital data network
Delay An average time taken by the service data to transmit across the network.
DG disk group
DHCP See Dynamic Host Configuration Protocol
digital data network A high-quality data transport tunnel that combines the digital channel
(such as fiber channel, digital microwave channel, or satellite channel) and
the cross multiplex technology.
disk mirroring A technique in which all or part of a hard disk is duplicated onto one or
more other hard disks, each of which ideally is attached to its own
controller. With disk mirroring, any change made to the original disk is
simultaneously made to the other disks so that if the original disk becomes
damaged or corrupted, the mirror disks will contain a current, undamaged
collection of the data from the original disk.
Dynamic Host A client-server networking protocol. A DHCP server provides configuration
Configuration parameters specific to the DHCP client host requesting, generally,
Protocol information required by the host to participate on the Internet network.
DHCP also provides a mechanism for allocation of IP addresses to hosts.
E
E1 A European standard for high-speed data transmission at 2.048 Mbit/s. It
provides 32 x 64 kbit/s channels.
ECC See embedded control channel
embedded control A logical channel that uses a data communications channel (DCC) as its
channel physical layer, to enable transmission of operation, administration, and
maintenance (OAM) information between NEs.
Equipment Serial A 32-bit number assigned by the mobile station manufacturer, uniquely
Number identifying the mobile station equipment.
ESN See Equipment Serial Number
F
Fabric A kind of bus/plane used to exchange system service data.
File Transfer A member of the TCP/IP suite of protocols, used to copy files between two
Protocol computers on the Internet. Both computers must support their respective
FTP roles: one must be an FTP client and the other an FTP server.
FTP See File Transfer Protocol
G
gateway A device to connect two network segments which use different protocols. It
is used to translate the data in the two network segments.
gateway network A network element that is used for communication between the NE
element application layer and the NM application layer
GE The IEEE standard dubbed 802.3z, which includes support for transmission
rates of1 Gbps (gigabit per second)--1,000 Mbps (megabits per second)--
over an Ethernet network.
GMT See Greenwich Mean Time
GNE See gateway network element
graphical user A visual computer environment that represents programs, files, and options
interface with graphical images, such as icons, menus, and dialog boxes, on the
screen.
Greenwich Mean The mean solar time at the Royal Greenwich Observatory in Greenwich
Time near London in England, which by convention is at 0 degrees geographic
longitude.
GUI See graphical user interface
Internet Protocol A update version of IPv4. It is also called IP Next Generation (IPng). The
Version 6 specifications and standardizations provided by it are consistent with the
Internet Engineering Task Force (IETF).Internet Protocol Version 6 (IPv6) is
also called. It is a new version of the Internet Protocol, designed as the
successor to IPv4. The specifications and standardizations provided by it are
consistent with the Internet Engineering Task Force (IETF).The difference
between IPv6 and IPv4 is that an IPv4 address has 32 bits while an IPv6
address has 128 bits.
inventory A physical inventory in the U2000, that is, a physical resource such as a
telecommunications room, rack, NE, subrack, board, subboard, port, optical
module, fiber/cable, fiber and cable pipe, link resource, interface resource,
access service, ONU, or NE e-label that can be managed on the U2000, and
the relationship between resources.
IP See Internet Protocol
IPv4 The abbreviation of Internet Protocol version 4. IPv4 utilizes a 32bit address
which is assigned to hosts. An address belongs to one of five classes (A, B,
C, D, or E) and is written as 4 octets separated by periods and may range
from 0.0.0.0 through to 255.255.255.255. Each address consists of a network
number, an optional subnetwork number, and a host number. The network
and subnetwork numbers together are used for routing, and the host
number is used to address an individual host within the network or
subnetwork. IPv4 addresses may also be represented using CIDR (Classless
Inter Domain Routing).
IPv6 See Internet Protocol Version 6
ISO See International Standard Organization
ITU-T See International Telecommunication Union Telecommunication
Standardization
J
Java Virtual The environment in which Java programs run. The Java Virtual Machine
Machine gives Java programs a software-based computer they can interact with.
Because the Java Virtual Machine is not a real computer but exists in
software, a Java program can run on any physical computing platform.
JRE Java runtime environment
JVM See Java Virtual Machine
K
keyboard, video, and A hardware device installed in the integrated configuration cabinet. KVM
mouse serves as the input and output device for the components inside the
cabinet. It consists of a screen, a keyboard, and a mouse.
KVM See keyboard, video, and mouse
L
LAN See Local Area Network
LCT See Local Craft Terminal
LDAP See Lightweight Directory Access Protocol
License A permission that the vendor provides for the user with a specific function,
capacity, and durability of a product. A license can be a file or a serial
number. Usually the license consists of encrypted codes, and the operation
authority varies with different level of license.
Lightweight An TCP/IP based network protocol that enables access to a DSA. It involves
Directory Access some reduced functionality from X.500 DAP specification.
Protocol
Link Layer Discovery The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE
Protocol 802.1ab. Using the LLDP, the NMS can rapidly obtain the Layer 2 network
topology and changes in topology when the network scales expand.
LLDP See Link Layer Discovery Protocol
load balancing The distribution of activity across two or more servers or components in
order to avoid overloading any one with too many requests or too much
traffic.
Local Area Network A network formed by the computers and workstations within the coverage
of a few square kilometers or within a single building. It features high speed
and low error rate. Ethernet, FDDI, and Token Ring are three technologies
used to implement a LAN. Current LANs are generally based on switched
Ethernet or Wi-Fi technology and running at 1,000 Mbit/s (that is, 1 Gbit/s).
Local Craft Terminal Local Craft Terminal. The terminal software that is used for local
maintenance and the management of NEs in the singer-user mode, to
realize integrated management of multi-service transmission network. See
also U2000.
M
MAN See Metropolitan Area Network
MD5 See Message-Digest Algorithm 5
MDP See message dispatch process
message dispatch N/A
process
Message-Digest A one-way hashing algorithm that produces a 128-bit hash. Both MD5 and
Algorithm 5 Secure Hash Algorithm (SHA) are variations on MD4 and are designed to
strengthen the security of the MD5 hashing algorithm.
Metropolitan Area A metropolitan area network (MAN) is a network that interconnects users
Network with computer resources in a geographic area or region larger than that
covered by even a large local area network (LAN) but smaller than the area
covered by a wide area network (WAN). The term is applied to the
interconnection of networks in a city into a single larger network (which
may then also offer efficient connection to a wide area network). It is also
used to mean the interconnection of several local area networks by
bridging them with backbone lines. The latter usage is also sometimes
referred to as a campus network.
modem A device or program that enables a computer to transmit data over, for
example, telephone or cable lines. Computer information is stored digitally,
whereas information transmitted over telephone lines is transmitted in the
form of analog waves. A modem converts between these two forms.
MS Manual Switch
MSTP See multi-service transmission platform
MSuite NMS maintenance suite
multi-service A platform based on the SDH platform, capable of accessing, processing
transmission and transmitting TDM services, ATM services, and Ethernet services, and
platform providing unified management of these services.
N
NBI See northbound interface
NE See network element
network element A network element (NE) contains both the hardware and the software
running on it. One NE is at least equipped with one system control board
which manages and monitors the entire network element. The NE software
runs on the system control board.
network layer The network layer is layer 3 of the seven-layer OSI model of computer
networking. The network layer provides routing and addressing so that two
terminal systems are interconnected. In addition, the network layer provides
congestion control and traffic control. In the TCP/IP protocol suite, the
functions of the network layer are specified and implemented by IP
protocols. Therefore, the network layer is also called IP layer.
Network A system in charge of the operation, administration, and maintenance of a
Management network.
System
Network Time The Network Time Protocol (NTP) defines the time synchronization
Protocol mechanism. It synchronizes the time between the distributed time server
and the client.
new technology file An advanced file system designed for use specifically with the Windows NT
system operating system. It supports long filenames, full security access control, file
system recovery, extremely large storage media, and various features for
the Windows NT POSIX subsystem. It also supports object-oriented
applications by treating all files as objects with user-defined and system-
defined attributes.
O
OAM See operation, administration and maintenance
Object Set A collection of managed objects. Object sets are established to facilitate the
user right management. If a user (or user group) is authorized with the
operation rights of an object set, the user (or user group) can perform all
the authorized operations on all the objects within the object set. This saves
you the trouble of setting the management rights for each NE one by one.
Object sets can be created by geographical area, network layer, equipment
type and so on.
OMC See Operation and Maintenance Center
ONU See Optical Network Unit
Operation and An Operations and Maintenance Centre is an element within a network
Maintenance Center management system responsible for the operations and maintenance of a
specific element or group of elements. For example an OMC-Radio may be
responsible for the management of a radio subsystem where as an OMC-
Switch may be responsible for the management of a switch or exchange.
However, these will in turn be under the control of a NMC (Network
Management Centre) which controls the entire network.
Operation Rights Operation Rights specify the concrete operation that the user can perform.
The operation right aims at the security objects. If one user has no right to
manage one device, he or she cannot operate the device.
Operation Set A collection of operations. Classifying operations into operation sets helps
to manage user operation rights. Operations performed by different users
have different impacts on system security. Operations with similar impacts
are classified into an operation set. Users or user groups entitled to an
operation set can perform all the operations in the operation set. The NMS
provides some default operation sets. If the default operation sets cannot
meet the requirements for right allocation, users can create operation sets
as required.
Operation System Operation System is abbreviated to OS. OS is the interface between users
and computers. It manages all the system resources of the computer, and
also provides an abstract computer for users. With the help of OS, users can
use the computers without any direct operation on hardware. For the
computer system, OS is a set of programs used to manage all system
resources; for users, OS provides a simple and abstract method to use the
system resources.
operation, A group of network support functions that monitor and sustain segment
administration and operation, activities that are concerned with, but not limited to, failure
maintenance detection, notification, location, and repairs that are intended to eliminate
faults and keep a segment in an operational state and support activities
required to provide the services of a subscriber access network to users/
subscribers.
Operations Support A system whose main function is to run applications that manage network
System elements, networks and services.
Optical Network A form of Access Node that converts optical signals transmitted via fiber to
Unit electrical signals that can be transmitted via coaxial cable or twisted pair
copper wiring to individual subscribers.
OS See Operation System
OSS See Operations Support System
P
packet loss ratio The ratio of total lost packet outcomes to total transmitted packets in a
population of interest.
packet transport N/A
network
PC See Personal Computer
Peak Information Peak Information Rate . A traffic parameter, expressed in bit/s, whose value
Rate should be not less than the committed information rate.
Personal Computer A computer used by an individual at a time in a business, a school, or at
home.
PIR See Peak Information Rate
PMU The unit that is used to monitor power supply in the equipment.
Point-to-Point PPPoE, point-to-point protocol over Ethernet, is a network protocol for
Protocol over encapsulating PPP frames in Ethernet frames. It is used mainly with DSL
Ethernet services. It offers standard PPP features such as authentication, encryption,
and compression.
port 1. Of a device or network, a point of access where signals may be
inserted or extracted, or where the device or network variables may be
observed or measured. (188)
2. In a communications network, a point at which signals can enter or
leave the network en
Power and The power and environment monitoring unit is installed at the top of the
environment cabinet of the SDH equipment and is used to monitor the environment
monitoring unit variables, such as the power supply and temperature. With external signal
input through the relay, fire alarm, smoke alarm, burglary alarm, etc. can
be monitored as well. With the display on NMS system, the change of
environment can be monitored timely and accurately. For the equipment
installed with a power & environment monitoring board, the following
parameters can be set: relay switch output control, temperature alarm
threshold, relay usage and alarm setting, query of DIP switch status, etc.
S
Script file It is the text file describing the physical information and configuration
information of the entire network, including the NE configuration file, port
naming file, end-to-end configuration file, NE physical view script file, NMS
information file and service implementation data script file.
SDH See Synchronous Digital Hierarchy
Secure File Transfer A network protocol designed to provide secure file transfer over SSH.
Protocol (SFTP)
Secure Shell (SSH) A set of standards and an associated network protocol that allows
establishing a secure channel between a local and a remote computer. A
feature to protect information and provide powerful authentication function
for a network when a user logs in to the network through an insecure
network. It prevents IP addresses from being deceived and plain text
passwords from being captured.
Secure Sockets A protocol for ensuring security and privacy in Internet communications.
Layer SSL supports authentication of client, server, or both, as well as encryption
during a communications session.
Security Log Security logs record the security operations on the NMS, such as logging in
to the server, modifying the password, and exiting from the NMS server.
Serial Line Interface Serial Line Interface Protocol, defines the framing mode over the serial line
Protocol to implement transmission of messages over the serial line and provide the
remote host interconnection function with a known IP address.
server 1. On a local area network, a computer running administrative software
that controls access to the network and its resources, such as printers
and disk drives, and provides resources to computers functioning as
workstations on the network.
2. On the Internet or other network, a computer or program that
responds to commands from a client. For example, a file server may
contain an archive of data or program files; when a client submits a
request for a file, the server transfers a copy of the file to the client.
3. A network device that provides services to network users by managing
shared resources, often used in the context of a client-server
architecture for a LAN.
Simple Mail Transfer The TCP/IP (Transmission Control Protocol/Internet Protocol) protocol which
Protocol facilitates the transfer of electronic-mail messages, specifies how two
systems are to interact, and the format of messages used to control the
transfer of electronic mail.
Simple Network A network management protocol of TCP/IP. It enables remote users to view
Management and modify the management information of a network element. This
Protocol protocol ensures the transmission of management information between any
two points. The polling mechanism is adopted to provide basic function
sets. According to SNMP, agents, which can be hardware as well as
software, can monitor the activities of various devices on the network and
report these activities to the network console workstation. Control
information about each device is maintained by a management information
block.
Simple Network A protocol that is adapted from the Network Time Protocol (NTP) and
Time Protocol synchronizes the clocks of computers over the Internet.
SLIP See Serial Line Interface Protocol
SMM See shelf management module
SMTP See Simple Mail Transfer Protocol
SNMP See Simple Network Management Protocol
SNR See Signal Noise Ratio
SNRM See Signal to Noise Ratio Margin
SNTP See Simple Network Time Protocol
SONET See Synchronous Optical Network
SQL See structured query language
SSL See Secure Sockets Layer
static route A route that cannot adapt to the change of network topology. Operators
must configure it manually. When a network topology is simple, the
network can work in the normal state if only the static route is configured.
It can improve network performance and ensure bandwidth for important
applications. Its disadvantage is as follows: When a network is faulty or the
topology changes, the static route does not change automatically. It must
be changed by the operators.
Stelnet Secure Shell Telnet
structured query A database query and programming language widely used for accessing,
language querying, updating, and managing data in relational database systems.
SVM Solaris Volume Manager
Switching It refers to the period of time between the start of detecting and the
restoration time moment when the line is switched back to the original status after
protection switching occurs in the MSP sub-network.
Synchronous Digital SDH is a transmission scheme that follows ITU-T G.707, G.708, and G.709. It
Hierarchy defines the transmission features of digital signals such as frame structure,
multiplexing mode, transmission rate level, and interface code. SDH is an
important part of ISDN and B-ISDN. It interleaves the bytes of low-speed
signals to multiplex the signals to high-speed counterparts, and the line
coding of scrambling is only used only for signals. SDH is suitable for the
fiber communication system with high speed and a large capacity since it
uses synchronous multiplexing and flexible mapping structure.
Synchronous Optical Synchronous Optical Network, is a method for communicating digital
Network information using lasers or light-emitting diodes (LEDs) over optical fiber.
The method was developed to replace the Plesiochronous Digital Hierarchy
(PDH) system for transporting large amounts of telephone and data traffic
and to allow for interoperability between equipment from different vendors.
SONET defines interface standards at the physical layer of the OSI seven-
layer model. The standard defines a hierarchy of interface rates that allow
data streams at different rates to be multiplexed. SONET establishes Optical
Carrier (OC) levels from 51.8 Mbps (OC-1) to 9.95 Gbps (OC-192).
SYSLOG Syslog is an industry standard protocol for recording device logs.
T
TCP See Transmission Control Protocol
TCP/IP See Transmission Control Protocol/Internet Protocol
Telecommunication The Telecommunications Management Network is a protocol model defined
Management by ITU-T for managing open systems in a communications network.An
Network architecture for management, including planning, provisioning, installation,
maintenance, operation and administration of telecommunications
equipment, networks and services.
Telnet Standard terminal emulation protocol in the TCP/IP protocol stack. Telnet is
used for remote terminal connection, enabling users to log in to remote
systems and use resources as if they were connected to a local system.
Telnet is defined in RFC 854.
TFTP See Trivial File Transfer Protocol
Time zone A division of the earth's surface, usually extending across 15 degrees of
longitude devised such that the standard time is the time at a meridian at
the centre of the zone.
timing task The system can create a timing task (such as backing up, loading and
management recovering a task), run a timing task automatically, and suspend or resume
a timing task.
TMN See Telecommunication Management Network
Transmission One of the core protocols of the Internet protocol suite. Using TCP,
Control Protocol applications on networked hosts can create connections to one another,
over which they can exchange streams of data. TCP guarantees reliable and
in-order delivery of data from the sender to the receiver. TCP also
distinguishes data for multiple connections by concurrent applications
running on the same host.
Transmission Common name for the suite of protocols developed to support the
Control Protocol/ construction of worldwide internetworks.
Internet Protocol
Trivial File Transfer A small and simple alternative to FTP for transferring files. TFTP is intended
Protocol for applications that do not need complex interactions between the client
and server. TFTP restricts operations to simple file transfers and does not
provide authentication. TFTP is small enough to be contained in ROM to be
used for bootstrapping diskless machines.
W
WAN See Wide Area Network
wavelength division A technology that utilizes the characteristics of broad bandwidth and low
multiplexing attenuation of single mode optical fiber, uses multiple wavelengths as
carriers, and allows multiple channels to transmit simultaneously in a single
fiber.
WDM See wavelength division multiplexing
Wide Area Network A network composed of computers which are far away from each other
which are physically connected through specific protocols. WAN covers a
broad area, such as a province, a state or even a country.
Wireless Local Area A generic term covering a multitude of technologies providing local area
Network networking via a radio link. Examples of WLAN technologies include WiFi
(Wireless Fidelity), 802.11b and 802.11a, HiperLAN, Bluetooth, etc.
WLAN See Wireless Local Area Network
work station A terminal or microcomputer, usually one that is connected to a mainframe
or to a network, at which a user can perform applications.
WS See work station